Hi there! Here's some tech reading for you (As usual, a hat tip to Hacker News and Twitter feeds, which are my usual sources).
| Tag(s)                  | 
Link | 
| ann,jvm | Gradle 7.5 Release Highlights - YouTube | 
| cloud,data | Beam Summit 2022 - Palo Alto Network's massive-scale deployment of Beam - YouTube | 
| cloud,security | "Access Undenied: Automatically discovering reasons for Access Denied messages in IAM" - Noam Dahan - YouTube | 
| cloud,security | AWS re:Inforce 2022 - AWS Identity and Access Management (IAM) deep dive (IAM301) - YouTube | 
| cloud,security | Abusing the Replicator: Silently Exfiltrating Data with the AWS S3 Replication Service - Kat Traxler - YouTube | 
| cloud,security | Cloud lateral movement: Breaking in through a vulnerable container | Sysdig | 
| cloud,security | Incident Response in AWS - Chris Farris | 
| cloud,security | Leveraging Azure Resource Graph for Good and for Evil - Darwin Salazar - YouTube | 
| cloud,security | Stop Guessing and Start Proving: Demystifying AWS Zelkova - Kaushik Devireddy - YouTube | 
| cloud,security | The True Power of AWS Tags - Yoav Yanilov & Itamar Bareket - YouTube | 
| data | Beam Summit 2022 - Beam as a High-Performance Compute Grid - YouTube | 
| data | Beam Summit 2022 - From script slums to beam skyscrapers - YouTube | 
| data | Cassandra-backed Streaming Graph with Quine | Apache Cassandra World Party 2022 - YouTube | 
| data | Client Optimization: How Tencent Maintains Apache Pulsar Clusters with over 100 Billion Messages Daily - StreamNative | 
| data | ETL Extract Trino Load A Case for Trino as a Batch Processing Engine - YouTube | 
| data | Git for Data Lakes—How lakeFS Scales Data Versioning to Billions of Objects - YouTube | 
| data | Introducing a Query Acceleration Path for Analytics in SQLite3 - YouTube | 
| data | Notes on the SQLite DuckDB paper | 
| data | Trino, the Swiss Army Knife for the Analytics Platform - YouTube | 
| data,ann | Where's this journey taking us, What's next for Cassandra… | Apache Cassandra World Party 2022 - YouTube | 
| fun | Chelsea Troy — A Framework for Addressing Technical Debt - YouTube | 
| fun,system | RubyConf 2021 - Some Assembly Required by Aaron Patterson - YouTube | 
| java | Concurrent Marking in G1 | 
| java | Data-Oriented Programming - Inside Java Newscast #29 - YouTube | 
| java | Java 19 in Action - Inside Java Newscast #33 - YouTube | 
| java | Java 8 to 18: Most important changes in the Java Platform - YouTube | 
| java | Local Class Improvements - YouTube | 
| java | Panama: Not-so-Foreign Memory. Using MemorySegment as a high-performance ByteBuffer replacement. | 
| java | Performance Tuning of the Hazelcast SQL Engine | Hazelcast | 
| jvm | Groovy: Solving cryptarithmetic puzzles with Groovy and constraint programming using Choco, JaCoP, and OR-Tools | 
| jvm,ann | Helidon 3.0 is released. After two years of development, the… | by Dmitry Kornilov | Helidon | Jul, 2022 | Medium | 
| jvm,ann | Micronaut Framework 3.6.0 Released! - Micronaut Framework | 
| jvm,ann,data | Trino | A decade of query engine innovation | 
| k8s | Getting Started With Ephemeral Containers MetalBear | 
| k8s,ann | Kubernetes v1.25: Combiner | Kubernetes | 
| k8s,fun | Kubernetes - Seinfeld | 
| life | A space industry expert on how women are discouraged from pursuing STEM | 
| life | RubyConf 2021 - Reframing Shame & Embracing Mistakes by Jameson Hampton - YouTube | 
| security | Apidays Apisecure 2022 - Top 10 API Vulnerabilities found In The Wild By Sella Rafaeli. - YouTube | 
| security | Apidays HongKong 2022 - Attack API Architecture By Alvin Tam. - YouTube | 
| security | Apidays HongKong 2022 - Offensive API Penetration Testing By Sunny Singh. - YouTube | 
| security | Apidays HongKong 2022 - The truth about anomaly detection in API security by Rob Dickinson. - YouTube | 
| security | Apidays NewYork 2022 - Sherlock Holmes and the Cryptic Case of API Security By Brenton House. - YouTube | 
| security | BSidesSF 2020 - Graph Based Detection and Response with Grapl (Colin O'Brien) - YouTube | 
| security,cloud | A Tacky Graph and Listless Defenders: Looking Beneath the Attack Surface - Jasmine Henry - YouTube | 
| security,cloud | AWS re:Inforce 2022 - Using graphs for security operations insights (sponsored by Wiz) (DEM224-S) - YouTube | 
| security,cloud | Dismantling the Beast: Formally Proving Access at Scale in AWS - Nick Jones & Mohit Gupta - YouTube | 
| security,cloud | Everything you never wanted to know about flow logs - Daniel Wyleczuk-Stern - YouTube | 
| system | How we clone a running VM in 2 seconds - CodeSandbox Blog | 
| system | Serving Netflix Video Traffic at 400Gb/s and Beyond | 
  
Until next time!
 
No comments:
Post a Comment