<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Sun, 26 Apr 2026 07:39:18 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>TechSNAP - Episodes Tagged with “Ai”</title>
    <link>https://techsnap.systems/tags/ai</link>
    <pubDate>Fri, 29 Nov 2019 00:15:00 -0800</pubDate>
    <description>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Systems, Network, and Administration Podcast. </itunes:subtitle>
    <itunes:author>Jupiter Broadcasting</itunes:author>
    <itunes:summary>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:owner>
      <itunes:name>Jupiter Broadcasting</itunes:name>
      <itunes:email>chris@jupiterbroadcasting.com</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<item>
  <title>417: Machine Learning Magic</title>
  <link>https://techsnap.systems/417</link>
  <guid isPermaLink="false">88c620a6-0b1c-4698-aac4-ac757b632286</guid>
  <pubDate>Fri, 29 Nov 2019 00:15:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/88c620a6-0b1c-4698-aac4-ac757b632286.mp3" length="19052274" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We explore the rapid adoption of machine learning, its impact on computer architecture, and how to avoid AI snake oil.</itunes:subtitle>
  <itunes:duration>26:27</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We explore the rapid adoption of machine learning, its impact on computer architecture, and how to avoid AI snake oil.
Plus so-so SSD security, and a new wireless protocol that works best where the Wi-Fi sucks. 
</description>
  <itunes:keywords>OFNP,wireless,wifi,On-Off Noise Power Communication,LORA,WiFi 6,Ubiquiti ,Unifi,Amplifi,Amplifi Alien,mesh wifi,router,home networking,networking,wireless,ethernet,ASUS,AiMesh,OFDMA,Orthogonal Frequency-Division Multiple Access,SmallNetBuilder,Tim Higgins,SSD,storage,IEEE,encryption,cryptography,hardware encryption,BitLocker,LUKS,DBAN,hard disk,hard drive,storage,solid state,Secure Erase,ATA,security,machine learning,AI,artificial intelligence,artificial general intelligence,training,neural network,inference,drunkard's walk,Nvidia,Tesla V100,Matrix multiplication,linear algebra,supercomputers,NPU,TPU,Google,Jeffrey Dean,CPU,GPU,Chip Design,Deep Learning,Intel AVX512,Deep Learning Boost,OpenVINO,ResNet,i9-10980XE,Arvind Narayanan,AIExpert, DevOps, TechSNAP, Jupiter Broadcasting</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We explore the rapid adoption of machine learning, its impact on computer architecture, and how to avoid AI snake oil.</p>

<p>Plus so-so SSD security, and a new wireless protocol that works best where the Wi-Fi sucks.</p><p>Links:</p><ul><li><a title="“Where the Wi-Fi sucks” is where a new wireless protocol does its magic" rel="nofollow" href="https://arstechnica.com/gadgets/2019/11/where-the-wi-fi-sucks-is-where-a-new-wireless-protocol-does-its-magic/">“Where the Wi-Fi sucks” is where a new wireless protocol does its magic</a></li><li><a title="Ubiquiti’s new “Amplifi Alien” is a mesh-capable Wi-Fi 6 router" rel="nofollow" href="https://arstechnica.com/gadgets/2019/11/ubiquitis-new-amplifi-alien-is-a-mesh-capable-wi-fi-6-router/">Ubiquiti’s new “Amplifi Alien” is a mesh-capable Wi-Fi 6 router</a></li><li><a title="Self-encrypting deception: weaknesses in the encryption of solid state drives" rel="nofollow" href="https://www.ieee-security.org/TC/SP2019/papers/310.pdf">Self-encrypting deception: weaknesses in the encryption of solid state drives</a></li><li><a title="Securely erase a solid-state drive" rel="nofollow" href="https://kb.iu.edu/d/aiut">Securely erase a solid-state drive</a></li><li><a title="Solid state drive/Memory cell clearing - ArchWiki" rel="nofollow" href="https://wiki.archlinux.org/index.php/Solid_state_drive/Memory_cell_clearing">Solid state drive/Memory cell clearing - ArchWiki</a></li><li><a title="The Deep Learning Revolution and Its Implications for Computer Architecture and Chip Design" rel="nofollow" href="https://arxiv.org/abs/1911.05289">The Deep Learning Revolution and Its Implications for Computer Architecture and Chip Design</a></li><li><a title="Intel Core i9-10980XE—a step forward for AI, a step back for everything else" rel="nofollow" href="https://arstechnica.com/gadgets/2019/11/intel-core-i9-10980xe-a-step-forward-for-ai-a-step-back-for-everything-else/">Intel Core i9-10980XE—a step forward for AI, a step back for everything else</a></li><li><a title="How to recognize AI snake oil" rel="nofollow" href="https://www.cs.princeton.edu/~arvindn/talks/MIT-STS-AI-snakeoil.pdf">How to recognize AI snake oil</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We explore the rapid adoption of machine learning, its impact on computer architecture, and how to avoid AI snake oil.</p>

<p>Plus so-so SSD security, and a new wireless protocol that works best where the Wi-Fi sucks.</p><p>Links:</p><ul><li><a title="“Where the Wi-Fi sucks” is where a new wireless protocol does its magic" rel="nofollow" href="https://arstechnica.com/gadgets/2019/11/where-the-wi-fi-sucks-is-where-a-new-wireless-protocol-does-its-magic/">“Where the Wi-Fi sucks” is where a new wireless protocol does its magic</a></li><li><a title="Ubiquiti’s new “Amplifi Alien” is a mesh-capable Wi-Fi 6 router" rel="nofollow" href="https://arstechnica.com/gadgets/2019/11/ubiquitis-new-amplifi-alien-is-a-mesh-capable-wi-fi-6-router/">Ubiquiti’s new “Amplifi Alien” is a mesh-capable Wi-Fi 6 router</a></li><li><a title="Self-encrypting deception: weaknesses in the encryption of solid state drives" rel="nofollow" href="https://www.ieee-security.org/TC/SP2019/papers/310.pdf">Self-encrypting deception: weaknesses in the encryption of solid state drives</a></li><li><a title="Securely erase a solid-state drive" rel="nofollow" href="https://kb.iu.edu/d/aiut">Securely erase a solid-state drive</a></li><li><a title="Solid state drive/Memory cell clearing - ArchWiki" rel="nofollow" href="https://wiki.archlinux.org/index.php/Solid_state_drive/Memory_cell_clearing">Solid state drive/Memory cell clearing - ArchWiki</a></li><li><a title="The Deep Learning Revolution and Its Implications for Computer Architecture and Chip Design" rel="nofollow" href="https://arxiv.org/abs/1911.05289">The Deep Learning Revolution and Its Implications for Computer Architecture and Chip Design</a></li><li><a title="Intel Core i9-10980XE—a step forward for AI, a step back for everything else" rel="nofollow" href="https://arstechnica.com/gadgets/2019/11/intel-core-i9-10980xe-a-step-forward-for-ai-a-step-back-for-everything-else/">Intel Core i9-10980XE—a step forward for AI, a step back for everything else</a></li><li><a title="How to recognize AI snake oil" rel="nofollow" href="https://www.cs.princeton.edu/~arvindn/talks/MIT-STS-AI-snakeoil.pdf">How to recognize AI snake oil</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>408: Apollo's ARC</title>
  <link>https://techsnap.systems/408</link>
  <guid isPermaLink="false">2577b50c-e740-46c8-a75b-14f074cb812a</guid>
  <pubDate>Fri, 26 Jul 2019 00:15:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/2577b50c-e740-46c8-a75b-14f074cb812a.mp3" length="25365234" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We take a look at the amazing abilities of the Apollo Guidance Computer and Jim breaks down everything you need to know about the ZFS ARC.</itunes:subtitle>
  <itunes:duration>35:13</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We take a look at the amazing abilities of the Apollo Guidance Computer and Jim breaks down everything you need to know about the ZFS ARC. 
Plus an update on ZoL SIMD acceleration, your feedback, and an interesting new neuromorphic system from Intel. 
</description>
  <itunes:keywords>virtualization, openzfs, zfs, kvm, qemu, vhd, qcow, qcow2, ARC, memory, page cache, caching, ZFS on Linux, ZoL, SIMD, floating point, fpu, apollo, apollo anniversary, nasa, retro computing, magnetic core, core rope, AGC, apollo guidance computer, intel, dancing demon, kernel module, loihi, neuromorphic computing, text adventure, punch cards, Margaret Hamilton, neural networks, machine learning, ai, pohoiki, snapshots, sysadmin, trs-80, cloud, Chris Siebenmann,  DevOps, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We take a look at the amazing abilities of the Apollo Guidance Computer and Jim breaks down everything you need to know about the ZFS ARC. </p>

<p>Plus an update on ZoL SIMD acceleration, your feedback, and an interesting new neuromorphic system from Intel.</p><p>Links:</p><ul><li><a title="ZFS On Linux Has Figured Out A Way To Restore SIMD Support On Linux 5.0+" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=ZFS-On-Linux-Restoring-SIMD">ZFS On Linux Has Figured Out A Way To Restore SIMD Support On Linux 5.0+</a> &mdash; Those running ZFS On Linux (ZoL) on post-5.0 (and pre-5.0 supported LTS releases) have seen big performance hits to the ZFS encryption performance in particular. That came due to upstream breaking an interface used by ZFS On Linux and admittedly not caring about ZoL due to it being an out-of-tree user. But now several kernel releases later, a workaround has been devised. </li><li><a title="ZFS On Linux Runs Into A Snag With Linux 5.0" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=ZFS-On-Linux-5.0-Problem">ZFS On Linux Runs Into A Snag With Linux 5.0</a></li><li><a title="NixOS Takes Action After 1.2GB/s ZFS Encryption Speed Drops To 200MB/s With Linux 5.0+" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=NixOS-Linux-5.0-ZFS-FPU-Drop">NixOS Takes Action After 1.2GB/s ZFS Encryption Speed Drops To 200MB/s With Linux 5.0+</a> &mdash;  A NixOS developer reports that the functions no longer exported by Linux 5.0+ and previously used by ZoL for AVX/AES-NI support end up dropping the ZFS data-set encryption performance to 200MB/s where as pre-5.0 kernels ran around 1.2GB/s</li><li><a title="Linux 5.0 compat: SIMD compatibility · zfsonlinux/zfs@e5db313" rel="nofollow" href="https://github.com/zfsonlinux/zfs/commit/e5db31349484e5e859c7a942eb15b98d68ce5b4d">Linux 5.0 compat: SIMD compatibility · zfsonlinux/zfs@e5db313</a> &mdash; Restore the SIMD optimization for 4.19.38 LTS, 4.14.120 LTS,
and 5.0 and newer kernels.  This is accomplished by leveraging
the fact that by definition dedicated kernel threads never need
to concern themselves with saving and restoring the user FPU state.
Therefore, they may use the FPU as long as we can guarantee user
tasks always restore their FPU state before context switching back
to user space.</li><li><a title="no SIMD acceleration · Issue #8793 · zfsonlinux/zfs" rel="nofollow" href="https://github.com/zfsonlinux/zfs/issues/8793">no SIMD acceleration · Issue #8793 · zfsonlinux/zfs</a> &mdash; 4.14.x, 4.19.x, 5.x all have no SIMD acceleration, it is like a turtle. very slow.

</li><li><a title="Chris&#39;s Wiki :: ZFS on Linux still has annoying issues with ARC size" rel="nofollow" href="https://utcc.utoronto.ca/~cks/space/blog/linux/ZFSOnLinuxARCShrinkage">Chris's Wiki :: ZFS on Linux still has annoying issues with ARC size</a> &mdash; One of the frustrating things about operating ZFS on Linux is that the ARC size is critical but ZFS's auto-tuning of it is opaque and apparently prone to malfunctions, where your ARC will mysteriously shrink drastically and then stick there.
</li><li><a title="Software woven into wire, Core rope and the Apollo Guidance Computer" rel="nofollow" href="http://www.righto.com/2019/07/software-woven-into-wire-core-rope-and.html">Software woven into wire, Core rope and the Apollo Guidance Computer</a> &mdash; One of the first computers to use integrated circuits, the Apollo Guidance Computer was lightweight enough and small enough to fly in space. An unusual feature that contributed to its small size was core rope memory, a technique of physically weaving software into high-density storage.</li><li><a title="Virtual Apollo Guidance Computer (AGC) software" rel="nofollow" href="https://github.com/virtualagc/virtualagc">Virtual Apollo Guidance Computer (AGC) software</a> &mdash; Since you are looking at this README file, you are in the "master" branch of the repository, which contains source-code transcriptions of the original Project Apollo software for the Apollo Guidance Computer (AGC) and Abort Guidance System (AGS), as well as our software for emulating the AGC, AGS, and some of their peripheral devices (such as the display-keyboard unit, or DSKY).</li><li><a title="The Underappreciated Power of the Apollo Computer - The Atlantic" rel="nofollow" href="https://www.theatlantic.com/science/archive/2019/07/underappreciated-power-apollo-computer/594121/">The Underappreciated Power of the Apollo Computer - The Atlantic</a> &mdash; Without the computers on board the Apollo spacecraft, there would have been no moon landing, no triumphant first step, no high-water mark for human space travel. A pilot could never have navigated the way to the moon, as if a spaceship were simply a more powerful airplane. The calculations required to make in-flight adjustments and the complexity of the thrust controls outstripped human capacities.</li><li><a title="Brains scale better than CPUs. So Intel is building brains | Ars Technica" rel="nofollow" href="https://arstechnica.com/science/2019/07/brains-scale-better-than-cpus-so-intel-is-building-brains/">Brains scale better than CPUs. So Intel is building brains | Ars Technica</a> &mdash; Neuromorphic engineering—building machines that mimic the function of organic brains in hardware as well as software—is becoming more and more prominent. The field has progressed rapidly, from conceptual beginnings in the late 1980s to experimental field programmable neural arrays in 2006, early memristor-powered device proposals in 2012, IBM's TrueNorth NPU in 2014, and Intel's Loihi neuromorphic processor in 2017. Yesterday, Intel broke a little more new ground with the debut of a larger-scale neuromorphic system, Pohoiki Beach, which integrates 64 of its Loihi chips.
</li><li><a title="Dancing Demon - YouTube" rel="nofollow" href="https://www.youtube.com/watch?v=6CCJFQ_bP0E">Dancing Demon - YouTube</a> &mdash; Written in 1979 by Leo Christopherson for the Radio Shack TRS-80 Model I computer. This is the best game ever for at that time.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We take a look at the amazing abilities of the Apollo Guidance Computer and Jim breaks down everything you need to know about the ZFS ARC. </p>

<p>Plus an update on ZoL SIMD acceleration, your feedback, and an interesting new neuromorphic system from Intel.</p><p>Links:</p><ul><li><a title="ZFS On Linux Has Figured Out A Way To Restore SIMD Support On Linux 5.0+" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=ZFS-On-Linux-Restoring-SIMD">ZFS On Linux Has Figured Out A Way To Restore SIMD Support On Linux 5.0+</a> &mdash; Those running ZFS On Linux (ZoL) on post-5.0 (and pre-5.0 supported LTS releases) have seen big performance hits to the ZFS encryption performance in particular. That came due to upstream breaking an interface used by ZFS On Linux and admittedly not caring about ZoL due to it being an out-of-tree user. But now several kernel releases later, a workaround has been devised. </li><li><a title="ZFS On Linux Runs Into A Snag With Linux 5.0" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=ZFS-On-Linux-5.0-Problem">ZFS On Linux Runs Into A Snag With Linux 5.0</a></li><li><a title="NixOS Takes Action After 1.2GB/s ZFS Encryption Speed Drops To 200MB/s With Linux 5.0+" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=NixOS-Linux-5.0-ZFS-FPU-Drop">NixOS Takes Action After 1.2GB/s ZFS Encryption Speed Drops To 200MB/s With Linux 5.0+</a> &mdash;  A NixOS developer reports that the functions no longer exported by Linux 5.0+ and previously used by ZoL for AVX/AES-NI support end up dropping the ZFS data-set encryption performance to 200MB/s where as pre-5.0 kernels ran around 1.2GB/s</li><li><a title="Linux 5.0 compat: SIMD compatibility · zfsonlinux/zfs@e5db313" rel="nofollow" href="https://github.com/zfsonlinux/zfs/commit/e5db31349484e5e859c7a942eb15b98d68ce5b4d">Linux 5.0 compat: SIMD compatibility · zfsonlinux/zfs@e5db313</a> &mdash; Restore the SIMD optimization for 4.19.38 LTS, 4.14.120 LTS,
and 5.0 and newer kernels.  This is accomplished by leveraging
the fact that by definition dedicated kernel threads never need
to concern themselves with saving and restoring the user FPU state.
Therefore, they may use the FPU as long as we can guarantee user
tasks always restore their FPU state before context switching back
to user space.</li><li><a title="no SIMD acceleration · Issue #8793 · zfsonlinux/zfs" rel="nofollow" href="https://github.com/zfsonlinux/zfs/issues/8793">no SIMD acceleration · Issue #8793 · zfsonlinux/zfs</a> &mdash; 4.14.x, 4.19.x, 5.x all have no SIMD acceleration, it is like a turtle. very slow.

</li><li><a title="Chris&#39;s Wiki :: ZFS on Linux still has annoying issues with ARC size" rel="nofollow" href="https://utcc.utoronto.ca/~cks/space/blog/linux/ZFSOnLinuxARCShrinkage">Chris's Wiki :: ZFS on Linux still has annoying issues with ARC size</a> &mdash; One of the frustrating things about operating ZFS on Linux is that the ARC size is critical but ZFS's auto-tuning of it is opaque and apparently prone to malfunctions, where your ARC will mysteriously shrink drastically and then stick there.
</li><li><a title="Software woven into wire, Core rope and the Apollo Guidance Computer" rel="nofollow" href="http://www.righto.com/2019/07/software-woven-into-wire-core-rope-and.html">Software woven into wire, Core rope and the Apollo Guidance Computer</a> &mdash; One of the first computers to use integrated circuits, the Apollo Guidance Computer was lightweight enough and small enough to fly in space. An unusual feature that contributed to its small size was core rope memory, a technique of physically weaving software into high-density storage.</li><li><a title="Virtual Apollo Guidance Computer (AGC) software" rel="nofollow" href="https://github.com/virtualagc/virtualagc">Virtual Apollo Guidance Computer (AGC) software</a> &mdash; Since you are looking at this README file, you are in the "master" branch of the repository, which contains source-code transcriptions of the original Project Apollo software for the Apollo Guidance Computer (AGC) and Abort Guidance System (AGS), as well as our software for emulating the AGC, AGS, and some of their peripheral devices (such as the display-keyboard unit, or DSKY).</li><li><a title="The Underappreciated Power of the Apollo Computer - The Atlantic" rel="nofollow" href="https://www.theatlantic.com/science/archive/2019/07/underappreciated-power-apollo-computer/594121/">The Underappreciated Power of the Apollo Computer - The Atlantic</a> &mdash; Without the computers on board the Apollo spacecraft, there would have been no moon landing, no triumphant first step, no high-water mark for human space travel. A pilot could never have navigated the way to the moon, as if a spaceship were simply a more powerful airplane. The calculations required to make in-flight adjustments and the complexity of the thrust controls outstripped human capacities.</li><li><a title="Brains scale better than CPUs. So Intel is building brains | Ars Technica" rel="nofollow" href="https://arstechnica.com/science/2019/07/brains-scale-better-than-cpus-so-intel-is-building-brains/">Brains scale better than CPUs. So Intel is building brains | Ars Technica</a> &mdash; Neuromorphic engineering—building machines that mimic the function of organic brains in hardware as well as software—is becoming more and more prominent. The field has progressed rapidly, from conceptual beginnings in the late 1980s to experimental field programmable neural arrays in 2006, early memristor-powered device proposals in 2012, IBM's TrueNorth NPU in 2014, and Intel's Loihi neuromorphic processor in 2017. Yesterday, Intel broke a little more new ground with the debut of a larger-scale neuromorphic system, Pohoiki Beach, which integrates 64 of its Loihi chips.
</li><li><a title="Dancing Demon - YouTube" rel="nofollow" href="https://www.youtube.com/watch?v=6CCJFQ_bP0E">Dancing Demon - YouTube</a> &mdash; Written in 1979 by Leo Christopherson for the Radio Shack TRS-80 Model I computer. This is the best game ever for at that time.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>399: Ethics in AI</title>
  <link>https://techsnap.systems/399</link>
  <guid isPermaLink="false">6a9e036e-abe5-4b0c-b727-2d3dab34ce1d</guid>
  <pubDate>Fri, 15 Mar 2019 19:30:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/6a9e036e-abe5-4b0c-b727-2d3dab34ce1d.mp3" length="27942893" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Machine learning promises to change many industries, but with these changes come dangerous new risks. Join Jim and Wes as they explore some of the surprising ways bias can creep in and the serious consequences of ignoring these problems.</itunes:subtitle>
  <itunes:duration>38:48</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Machine learning promises to change many industries, but with these changes come dangerous new risks. Join Jim and Wes as they explore some of the surprising ways bias can creep in and the serious consequences of ignoring these problems. 
</description>
  <itunes:keywords>machine learning, AI, expert systems, supervised learning, unsupervised learning, neural networks, bias, racism, zo, tay, reinforcement learning, python, algorithms, programming, data, privacy, server builds, plaintext offenders, CivicPlus, passwords, computer vision, natural language processing, classification, GloVe, word2vec, scikit-learn, Robyn Speer, ConceptNet, SysAdmin podcast, DevOps, TechSNAP, chatbot</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Machine learning promises to change many industries, but with these changes come dangerous new risks. Join Jim and Wes as they explore some of the surprising ways bias can creep in and the serious consequences of ignoring these problems.</p><p>Links:</p><ul><li><a title="Microsoft’s neo-Nazi sexbot was a great lesson for makers of AI assistants" rel="nofollow" href="https://www.technologyreview.com/s/610634/microsofts-neo-nazi-sexbot-was-a-great-lesson-for-makers-of-ai-assistants/">Microsoft’s neo-Nazi sexbot was a great lesson for makers of AI assistants</a> &mdash; What started out as an entertaining social experiment—get regular people to talk to a chatbot so it could learn while they, hopefully, had fun—became a nightmare for Tay’s creators. Users soon figured out how to make Tay say awful things. Microsoft took the chatbot offline after less than a day.</li><li><a title="Microsoft&#39;s Zo chatbot is a politically correct version of her sister Tay—except she’s much, much worse" rel="nofollow" href="https://qz.com/1340990/microsofts-politically-correct-chat-bot-is-even-worse-than-its-racist-one/">Microsoft's Zo chatbot is a politically correct version of her sister Tay—except she’s much, much worse</a> &mdash; A few months after Tay’s disastrous debut, Microsoft quietly released Zo, a second English-language chatbot available on Messenger, Kik, Skype, Twitter, and Groupme.</li><li><a title="How to make a racist AI without really trying | ConceptNet blog" rel="nofollow" href="http://blog.conceptnet.io/posts/2017/how-to-make-a-racist-ai-without-really-trying/">How to make a racist AI without really trying | ConceptNet blog</a> &mdash; Some people expect that fighting algorithmic racism is going to come with some sort of trade-off. There’s no trade-off here. You can have data that’s better and less racist. You can have data that’s better because it’s less racist. There was never anything “accurate” about the overt racism that word2vec and GloVe learned.</li><li><a title="Microsoft warned investors that biased or flawed AI could hurt the company’s image" rel="nofollow" href="https://qz.com/1542377/microsoft-warned-investors-that-biased-or-flawed-ai-could-hurt-the-companys-image/">Microsoft warned investors that biased or flawed AI could hurt the company’s image</a> &mdash; Notably, this addition comes after a research paper by MIT Media Lab graduate researcher Joy Buolamwini showed in February 2018 that Microsoft’s facial recognition algorithm’s was less accurate for women and people of color. In response, Microsoft updated its facial recognition models, and wrote a blog post about how it was addressing bias in its software.</li><li><a title="AI bias: It is the responsibility of humans to ensure fairness" rel="nofollow" href="https://www.information-age.com/ai-bias-123479217/">AI bias: It is the responsibility of humans to ensure fairness</a> &mdash; Amazon recently pulled the plug on its experimental AI-powered recruitment engine when it was discovered that the machine learning technology behind it was exhibiting bias against female applicants.</li><li><a title="California Police Using AI Program That Tells Them Where to Patrol, Critics Say It May Just Reinforce Racial Bias" rel="nofollow" href="https://www.newsweek.com/california-police-artificial-intelligence-predictive-policing-predpol-santa-1358508">California Police Using AI Program That Tells Them Where to Patrol, Critics Say It May Just Reinforce Racial Bias</a> &mdash; “The potential for bias to creep into the deployment of the tools is enormous. Simply put, the devil is in the data,” Vincent Southerland, executive director of the Center on Race, Inequality, and the Law at NYU School of Law, wrote for the American Civil Liberties Union last year.

</li><li><a title="A.I. Could Worsen Health Disparities" rel="nofollow" href="https://www.nytimes.com/2019/01/31/opinion/ai-bias-healthcare.html">A.I. Could Worsen Health Disparities</a> &mdash; A recent study found that some facial recognition programs incorrectly classify less than 1 percent of light-skinned men but more than one-third of dark-skinned women. What happens when we rely on such algorithms to diagnose melanoma on light versus dark skin?</li><li><a title="Responsible AI Practices" rel="nofollow" href="https://ai.google/education/responsible-ai-practices">Responsible AI Practices</a> &mdash; These questions are far from solved, and in fact are active areas of research and development. Google is committed to making progress in the responsible development of AI and to sharing knowledge, research, tools, datasets, and other resources with the larger community. Below we share some of our current work and recommended practices.</li><li><a title="The Ars Technica System Guide, Winter 2019: The one about the servers" rel="nofollow" href="https://arstechnica.com/gadgets/2019/03/the-ars-technica-system-guide-winter-2019-the-one-about-the-servers/">The Ars Technica System Guide, Winter 2019: The one about the servers</a> &mdash; The Winter 2019 Ars System Guide has returned to its roots: showing readers three real-world system builds we like at this precise moment in time. Instead of general performance desktops, this time around we're going to focus specifically on building some servers.</li><li><a title="Introduction to Python Development at Linux Academy" rel="nofollow" href="https://linuxacademy.com/devops/training/course/name/intro-to-python-development?utm_source=social&amp;utm_medium=twitter&amp;utm_campaign=2019_aprilcourselaunch">Introduction to Python Development at Linux Academy</a> &mdash; This course is designed to teach you how to program using Python. We'll cover the building blocks of the language, programming design fundamentals, how to use the standard library, third-party packages, and how to create Python projects. In the end, you should have a grasp of how to program.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Machine learning promises to change many industries, but with these changes come dangerous new risks. Join Jim and Wes as they explore some of the surprising ways bias can creep in and the serious consequences of ignoring these problems.</p><p>Links:</p><ul><li><a title="Microsoft’s neo-Nazi sexbot was a great lesson for makers of AI assistants" rel="nofollow" href="https://www.technologyreview.com/s/610634/microsofts-neo-nazi-sexbot-was-a-great-lesson-for-makers-of-ai-assistants/">Microsoft’s neo-Nazi sexbot was a great lesson for makers of AI assistants</a> &mdash; What started out as an entertaining social experiment—get regular people to talk to a chatbot so it could learn while they, hopefully, had fun—became a nightmare for Tay’s creators. Users soon figured out how to make Tay say awful things. Microsoft took the chatbot offline after less than a day.</li><li><a title="Microsoft&#39;s Zo chatbot is a politically correct version of her sister Tay—except she’s much, much worse" rel="nofollow" href="https://qz.com/1340990/microsofts-politically-correct-chat-bot-is-even-worse-than-its-racist-one/">Microsoft's Zo chatbot is a politically correct version of her sister Tay—except she’s much, much worse</a> &mdash; A few months after Tay’s disastrous debut, Microsoft quietly released Zo, a second English-language chatbot available on Messenger, Kik, Skype, Twitter, and Groupme.</li><li><a title="How to make a racist AI without really trying | ConceptNet blog" rel="nofollow" href="http://blog.conceptnet.io/posts/2017/how-to-make-a-racist-ai-without-really-trying/">How to make a racist AI without really trying | ConceptNet blog</a> &mdash; Some people expect that fighting algorithmic racism is going to come with some sort of trade-off. There’s no trade-off here. You can have data that’s better and less racist. You can have data that’s better because it’s less racist. There was never anything “accurate” about the overt racism that word2vec and GloVe learned.</li><li><a title="Microsoft warned investors that biased or flawed AI could hurt the company’s image" rel="nofollow" href="https://qz.com/1542377/microsoft-warned-investors-that-biased-or-flawed-ai-could-hurt-the-companys-image/">Microsoft warned investors that biased or flawed AI could hurt the company’s image</a> &mdash; Notably, this addition comes after a research paper by MIT Media Lab graduate researcher Joy Buolamwini showed in February 2018 that Microsoft’s facial recognition algorithm’s was less accurate for women and people of color. In response, Microsoft updated its facial recognition models, and wrote a blog post about how it was addressing bias in its software.</li><li><a title="AI bias: It is the responsibility of humans to ensure fairness" rel="nofollow" href="https://www.information-age.com/ai-bias-123479217/">AI bias: It is the responsibility of humans to ensure fairness</a> &mdash; Amazon recently pulled the plug on its experimental AI-powered recruitment engine when it was discovered that the machine learning technology behind it was exhibiting bias against female applicants.</li><li><a title="California Police Using AI Program That Tells Them Where to Patrol, Critics Say It May Just Reinforce Racial Bias" rel="nofollow" href="https://www.newsweek.com/california-police-artificial-intelligence-predictive-policing-predpol-santa-1358508">California Police Using AI Program That Tells Them Where to Patrol, Critics Say It May Just Reinforce Racial Bias</a> &mdash; “The potential for bias to creep into the deployment of the tools is enormous. Simply put, the devil is in the data,” Vincent Southerland, executive director of the Center on Race, Inequality, and the Law at NYU School of Law, wrote for the American Civil Liberties Union last year.

</li><li><a title="A.I. Could Worsen Health Disparities" rel="nofollow" href="https://www.nytimes.com/2019/01/31/opinion/ai-bias-healthcare.html">A.I. Could Worsen Health Disparities</a> &mdash; A recent study found that some facial recognition programs incorrectly classify less than 1 percent of light-skinned men but more than one-third of dark-skinned women. What happens when we rely on such algorithms to diagnose melanoma on light versus dark skin?</li><li><a title="Responsible AI Practices" rel="nofollow" href="https://ai.google/education/responsible-ai-practices">Responsible AI Practices</a> &mdash; These questions are far from solved, and in fact are active areas of research and development. Google is committed to making progress in the responsible development of AI and to sharing knowledge, research, tools, datasets, and other resources with the larger community. Below we share some of our current work and recommended practices.</li><li><a title="The Ars Technica System Guide, Winter 2019: The one about the servers" rel="nofollow" href="https://arstechnica.com/gadgets/2019/03/the-ars-technica-system-guide-winter-2019-the-one-about-the-servers/">The Ars Technica System Guide, Winter 2019: The one about the servers</a> &mdash; The Winter 2019 Ars System Guide has returned to its roots: showing readers three real-world system builds we like at this precise moment in time. Instead of general performance desktops, this time around we're going to focus specifically on building some servers.</li><li><a title="Introduction to Python Development at Linux Academy" rel="nofollow" href="https://linuxacademy.com/devops/training/course/name/intro-to-python-development?utm_source=social&amp;utm_medium=twitter&amp;utm_campaign=2019_aprilcourselaunch">Introduction to Python Development at Linux Academy</a> &mdash; This course is designed to teach you how to program using Python. We'll cover the building blocks of the language, programming design fundamentals, how to use the standard library, third-party packages, and how to create Python projects. In the end, you should have a grasp of how to program.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 353: Too Many Containers</title>
  <link>https://techsnap.systems/353</link>
  <guid isPermaLink="false">76cf88a2-f5d9-4dba-b314-f9f00e3767df</guid>
  <pubDate>Thu, 25 Jan 2018 16:00:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/76cf88a2-f5d9-4dba-b314-f9f00e3767df.mp3" length="31823746" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We introduce you to Kubernetes, what problems it solves, why everyone is talking about it, and where it came from. Also who shouldn’t be using Kubernetes, and the problems you can run into when scaling it.</itunes:subtitle>
  <itunes:duration>43:08</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We introduce you to Kubernetes, what problems it solves, why everyone is talking about it, and where it came from. Also who shouldn’t be using Kubernetes, and the problems you can run into when scaling it.
Plus how you can store files in others DNS resolver cache, Project Zero finds a new BitTorrent client flaw, and more.
</description>
  <content:encoded>
    <![CDATA[<p>We introduce you to Kubernetes, what problems it solves, why everyone is talking about it, and where it came from. Also who shouldn’t be using Kubernetes, and the problems you can run into when scaling it.</p>

<p>Plus how you can store files in others DNS resolver cache, Project Zero finds a new BitTorrent client flaw, and more.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li></ul><p>Links:</p><ul><li><a title="DNSFS. Store your files in others DNS resolver caches" rel="nofollow" href="https://blog.benjojo.co.uk/post/dns-filesystem-true-cloud-storage-dnsfs">DNSFS. Store your files in others DNS resolver caches</a> &mdash; The DNSFS code is a relatively simple system, every file uploaded is split into 180 byte chunks, and those chunks are “set” inside caches by querying the DNSFS node via the public resolver for a TXT record. After a few seconds the data is removed from DNSFS memory and the data is no longer on the client computer.</li><li><a title="BPF - the forgotten bytecode" rel="nofollow" href="https://blog.cloudflare.com/bpf-the-forgotten-bytecode/">BPF - the forgotten bytecode</a> &mdash; BPF is an absolutely marvelous and flexible way of filtering packets.</li><li><a title="dnsfs: Store your data in others DNS revolvers cache" rel="nofollow" href="https://github.com/benjojo/dnsfs">dnsfs: Store your data in others DNS revolvers cache</a> &mdash; Store your data in others DNS revolvers cache</li><li><a title="Unauthenticated LAN remote code execution in AsusWRT" rel="nofollow" href="https://raw.githubusercontent.com/pedrib/PoC/master/advisories/asuswrt-lan-rce.txt">Unauthenticated LAN remote code execution in AsusWRT</a> &mdash; However due to a number of coding errors, it is possible for an unauthenticated attacker in the LAN to achieve remote code execution in the router as the root user.</li><li><a title="AI is moving towards acceptance in cyber security, says Check Point" rel="nofollow" href="http://www.computerweekly.com/news/252433705/AI-is-moving-towards-acceptance-in-cyber-security-says-Check-Point">AI is moving towards acceptance in cyber security, says Check Point</a> &mdash; Artificial intelligence is well on its way to being a useful tool in the cyber security professional’s kit, but according to Check Point, there are still big challenges to overcome.</li><li><a title="Alphabet is launching a new CyberSecurity unit." rel="nofollow" href="https://www.linkedin.com/pulse/alphabet-launching-new-cybersecurity-unit-justin-sleight/">Alphabet is launching a new CyberSecurity unit.</a> &mdash; Alphabet, the parent company of Google, announced today that they will be launching Chronicle, a new business unit that will focus on Cyber Security, using their servers and infrastructure. The new organization hopes to focus on machine learning and artificial intelligence to assist in the fight against cybercrime moving forward.

</li><li><a title="Google Project Zero claims new BitTorrent flaw could enable cyber crooks get into users&#39; PCs" rel="nofollow" href="https://www.v3.co.uk/v3-uk/news/3024532/google-project-zero-claims-new-bittorrent-flaw-could-enable-cyber-crooks-get-into-users-pcs">Google Project Zero claims new BitTorrent flaw could enable cyber crooks get into users' PCs</a> &mdash; According to Project Zero, the client is vulnerable to a DNS re-binding attack that effectively tricks the PC into accepting requests via port 9091 from malicious websites that it would (and should) ordinarly ignore. </li><li><a title="CVE-2018-5702: Mitigate dns rebinding attacks against daemon by taviso · Pull Request #468" rel="nofollow" href="https://github.com/transmission/transmission/pull/468">CVE-2018-5702: Mitigate dns rebinding attacks against daemon by taviso · Pull Request #468</a></li><li><a title="Blizzard Fixes DNS Rebinding Flaw that Put All the Company&#39;s Users at Risk" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/blizzard-fixes-dns-rebinding-flaw-that-put-all-the-companys-users-at-risk/">Blizzard Fixes DNS Rebinding Flaw that Put All the Company's Users at Risk</a></li><li><a title="What is DNS rebinding, in layman&#39;s terms?" rel="nofollow" href="https://www.quora.com/What-is-DNS-rebinding-in-laymans-terms">What is DNS rebinding, in layman's terms?</a></li><li><a title="An Introduction to Kubernetes" rel="nofollow" href="https://www.digitalocean.com/community/tutorials/an-introduction-to-kubernetes">An Introduction to Kubernetes</a> &mdash; Kubernetes, at its basic level, is a system for managing containerized applications across a cluster of nodes. In many ways, Kubernetes was designed to address the disconnect between the way that modern, clustered infrastructure is designed, and some of the assumptions that most applications and services have about their environments.</li><li><a title="What is Kubernetes?" rel="nofollow" href="https://www.redhat.com/en/topics/containers/what-is-kubernetes">What is Kubernetes?</a> &mdash; Kubernetes was originally developed and designed by engineers at Google. Google was one of the early contributors to Linux container technology and has talked publicly about how everything at Google runs in containers. (This is the technology behind Google’s cloud services.) Google generates more than 2 billion container deployments a week—all powered by an internal platform: Borg. Borg was the predecessor to Kubernetes and the lessons learned from developing Borg over the years became the primary influence behind much of the Kubernetes technology.</li><li><a title="Scaling Kubernetes to 2,500 Nodes" rel="nofollow" href="https://blog.openai.com/scaling-kubernetes-to-2500-nodes/">Scaling Kubernetes to 2,500 Nodes</a> &mdash; We’ve been running Kubernetes for deep learning research for over two years. While our largest-scale workloads manage bare cloud VMs directly, Kubernetes provides a fast iteration cycle, reasonable scalability, and a lack of boilerplate which makes it ideal for most of our experiments.</li><li><a title="Feedback: Talk more about Windows" rel="nofollow" href="https://slexy.org/view/s21GdmdxDs">Feedback: Talk more about Windows</a> &mdash; I listened to your intro to change management and it seemed like it will be very Linux centric ("everything is she"). I'm future segments, please try to include windows desktop and server OS as well.</li><li><a title="Question: Starting with Ansible Quick" rel="nofollow" href="https://slexy.org/view/s2sGYopuRw">Question: Starting with Ansible Quick</a> &mdash; Are there any way to get started other than writing a playbook and trying it out with trial and error?</li><li><a title="Ansible Best Practises: A project structure that outlines some best practises of how to use ansible" rel="nofollow" href="https://github.com/enginyoyen/ansible-best-practises">Ansible Best Practises: A project structure that outlines some best practises of how to use ansible</a> &mdash; A project structure that outlines some best practises of how to use ansible</li><li><a title="ansible-console: An Interactive REPL for Ansible" rel="nofollow" href="https://yobriefca.se/blog/2017/01/10/ansible-console-an-interactive-repl-for-ansible/">ansible-console: An Interactive REPL for Ansible</a> &mdash; omething found out recently is that Ansible has an interactive REPL of sorts in ansible-console for doing some adhoc things on a collection of hosts.</li><li><a title="Introduction To Ad-Hoc Commands — Ansible Documentation" rel="nofollow" href="http://docs.ansible.com/ansible/latest/intro_adhoc.html">Introduction To Ad-Hoc Commands — Ansible Documentation</a> &mdash; An ad-hoc command is something that you might type in to do something really quick, but don’t want to save for later.

</li><li><a title="About the security content of macOS High Sierra 10.13.3, Security Update 2018-001 Sierra, and Security Update 2018-001 El Capitan - Apple Support" rel="nofollow" href="https://support.apple.com/en-us/HT208465">About the security content of macOS High Sierra 10.13.3, Security Update 2018-001 Sierra, and Security Update 2018-001 El Capitan - Apple Support</a> &mdash; This document describes the security content of macOS High Sierra 10.13.3, Security Update 2018-001 Sierra, and Security Update 2018-001 El Capitan.

</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We introduce you to Kubernetes, what problems it solves, why everyone is talking about it, and where it came from. Also who shouldn’t be using Kubernetes, and the problems you can run into when scaling it.</p>

<p>Plus how you can store files in others DNS resolver cache, Project Zero finds a new BitTorrent client flaw, and more.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li></ul><p>Links:</p><ul><li><a title="DNSFS. Store your files in others DNS resolver caches" rel="nofollow" href="https://blog.benjojo.co.uk/post/dns-filesystem-true-cloud-storage-dnsfs">DNSFS. Store your files in others DNS resolver caches</a> &mdash; The DNSFS code is a relatively simple system, every file uploaded is split into 180 byte chunks, and those chunks are “set” inside caches by querying the DNSFS node via the public resolver for a TXT record. After a few seconds the data is removed from DNSFS memory and the data is no longer on the client computer.</li><li><a title="BPF - the forgotten bytecode" rel="nofollow" href="https://blog.cloudflare.com/bpf-the-forgotten-bytecode/">BPF - the forgotten bytecode</a> &mdash; BPF is an absolutely marvelous and flexible way of filtering packets.</li><li><a title="dnsfs: Store your data in others DNS revolvers cache" rel="nofollow" href="https://github.com/benjojo/dnsfs">dnsfs: Store your data in others DNS revolvers cache</a> &mdash; Store your data in others DNS revolvers cache</li><li><a title="Unauthenticated LAN remote code execution in AsusWRT" rel="nofollow" href="https://raw.githubusercontent.com/pedrib/PoC/master/advisories/asuswrt-lan-rce.txt">Unauthenticated LAN remote code execution in AsusWRT</a> &mdash; However due to a number of coding errors, it is possible for an unauthenticated attacker in the LAN to achieve remote code execution in the router as the root user.</li><li><a title="AI is moving towards acceptance in cyber security, says Check Point" rel="nofollow" href="http://www.computerweekly.com/news/252433705/AI-is-moving-towards-acceptance-in-cyber-security-says-Check-Point">AI is moving towards acceptance in cyber security, says Check Point</a> &mdash; Artificial intelligence is well on its way to being a useful tool in the cyber security professional’s kit, but according to Check Point, there are still big challenges to overcome.</li><li><a title="Alphabet is launching a new CyberSecurity unit." rel="nofollow" href="https://www.linkedin.com/pulse/alphabet-launching-new-cybersecurity-unit-justin-sleight/">Alphabet is launching a new CyberSecurity unit.</a> &mdash; Alphabet, the parent company of Google, announced today that they will be launching Chronicle, a new business unit that will focus on Cyber Security, using their servers and infrastructure. The new organization hopes to focus on machine learning and artificial intelligence to assist in the fight against cybercrime moving forward.

</li><li><a title="Google Project Zero claims new BitTorrent flaw could enable cyber crooks get into users&#39; PCs" rel="nofollow" href="https://www.v3.co.uk/v3-uk/news/3024532/google-project-zero-claims-new-bittorrent-flaw-could-enable-cyber-crooks-get-into-users-pcs">Google Project Zero claims new BitTorrent flaw could enable cyber crooks get into users' PCs</a> &mdash; According to Project Zero, the client is vulnerable to a DNS re-binding attack that effectively tricks the PC into accepting requests via port 9091 from malicious websites that it would (and should) ordinarly ignore. </li><li><a title="CVE-2018-5702: Mitigate dns rebinding attacks against daemon by taviso · Pull Request #468" rel="nofollow" href="https://github.com/transmission/transmission/pull/468">CVE-2018-5702: Mitigate dns rebinding attacks against daemon by taviso · Pull Request #468</a></li><li><a title="Blizzard Fixes DNS Rebinding Flaw that Put All the Company&#39;s Users at Risk" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/blizzard-fixes-dns-rebinding-flaw-that-put-all-the-companys-users-at-risk/">Blizzard Fixes DNS Rebinding Flaw that Put All the Company's Users at Risk</a></li><li><a title="What is DNS rebinding, in layman&#39;s terms?" rel="nofollow" href="https://www.quora.com/What-is-DNS-rebinding-in-laymans-terms">What is DNS rebinding, in layman's terms?</a></li><li><a title="An Introduction to Kubernetes" rel="nofollow" href="https://www.digitalocean.com/community/tutorials/an-introduction-to-kubernetes">An Introduction to Kubernetes</a> &mdash; Kubernetes, at its basic level, is a system for managing containerized applications across a cluster of nodes. In many ways, Kubernetes was designed to address the disconnect between the way that modern, clustered infrastructure is designed, and some of the assumptions that most applications and services have about their environments.</li><li><a title="What is Kubernetes?" rel="nofollow" href="https://www.redhat.com/en/topics/containers/what-is-kubernetes">What is Kubernetes?</a> &mdash; Kubernetes was originally developed and designed by engineers at Google. Google was one of the early contributors to Linux container technology and has talked publicly about how everything at Google runs in containers. (This is the technology behind Google’s cloud services.) Google generates more than 2 billion container deployments a week—all powered by an internal platform: Borg. Borg was the predecessor to Kubernetes and the lessons learned from developing Borg over the years became the primary influence behind much of the Kubernetes technology.</li><li><a title="Scaling Kubernetes to 2,500 Nodes" rel="nofollow" href="https://blog.openai.com/scaling-kubernetes-to-2500-nodes/">Scaling Kubernetes to 2,500 Nodes</a> &mdash; We’ve been running Kubernetes for deep learning research for over two years. While our largest-scale workloads manage bare cloud VMs directly, Kubernetes provides a fast iteration cycle, reasonable scalability, and a lack of boilerplate which makes it ideal for most of our experiments.</li><li><a title="Feedback: Talk more about Windows" rel="nofollow" href="https://slexy.org/view/s21GdmdxDs">Feedback: Talk more about Windows</a> &mdash; I listened to your intro to change management and it seemed like it will be very Linux centric ("everything is she"). I'm future segments, please try to include windows desktop and server OS as well.</li><li><a title="Question: Starting with Ansible Quick" rel="nofollow" href="https://slexy.org/view/s2sGYopuRw">Question: Starting with Ansible Quick</a> &mdash; Are there any way to get started other than writing a playbook and trying it out with trial and error?</li><li><a title="Ansible Best Practises: A project structure that outlines some best practises of how to use ansible" rel="nofollow" href="https://github.com/enginyoyen/ansible-best-practises">Ansible Best Practises: A project structure that outlines some best practises of how to use ansible</a> &mdash; A project structure that outlines some best practises of how to use ansible</li><li><a title="ansible-console: An Interactive REPL for Ansible" rel="nofollow" href="https://yobriefca.se/blog/2017/01/10/ansible-console-an-interactive-repl-for-ansible/">ansible-console: An Interactive REPL for Ansible</a> &mdash; omething found out recently is that Ansible has an interactive REPL of sorts in ansible-console for doing some adhoc things on a collection of hosts.</li><li><a title="Introduction To Ad-Hoc Commands — Ansible Documentation" rel="nofollow" href="http://docs.ansible.com/ansible/latest/intro_adhoc.html">Introduction To Ad-Hoc Commands — Ansible Documentation</a> &mdash; An ad-hoc command is something that you might type in to do something really quick, but don’t want to save for later.

</li><li><a title="About the security content of macOS High Sierra 10.13.3, Security Update 2018-001 Sierra, and Security Update 2018-001 El Capitan - Apple Support" rel="nofollow" href="https://support.apple.com/en-us/HT208465">About the security content of macOS High Sierra 10.13.3, Security Update 2018-001 Sierra, and Security Update 2018-001 El Capitan - Apple Support</a> &mdash; This document describes the security content of macOS High Sierra 10.13.3, Security Update 2018-001 Sierra, and Security Update 2018-001 El Capitan.

</li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
