Federated learning marks a milestone in enhancing collaborative model AI training. It is shifting the main approach to machine learning, moving away from the traditional centralized training methods towards more decentralized ones. Data is scattered, and we need to leverage it as training data where it exists.
This paradigm is nothing new. I was playing around with it in the 1990s. What’s old is new again… again. Federated learning allows for the collaborative training of machine learning models across multiple devices or servers, harnessing their collective data without needing to exchange or centralize it. Why should you care? Security and privacy, that’s why.
The post A change in the machine learning landscape appeared first on Computer Systems Design.
]]>Federated learning marks a milestone in enhancing collaborative model AI training. It is shifting the main approach to machine learning, moving away from the traditional centralized training methods towards more decentralized ones. Data is scattered, and we need to leverage it as training data where it exists.
This paradigm is nothing new. I was playing around with it in the 1990s. What’s old is new again… again. Federated learning allows for the collaborative training of machine learning models across multiple devices or servers, harnessing their collective data without needing to exchange or centralize it. Why should you care? Security and privacy, that’s why.
The post A change in the machine learning landscape appeared first on Computer Systems Design.
]]>C++ creator Bjarne Stroustrup has defended the widely used programming language in response to a Biden administration report that calls on developers to use memory-safe languages and avoid using vulnerable ones such as C++ and C.
In a March 15 response to an inquiry from InfoWorld, Stroustrup pointed out strengths of C++, which was designed in 1979. “I find it surprising that the writers of those government documents seem oblivious of the strengths of contemporary C++ and the efforts to provide strong safety guarantees,” Stroustrup said. “On the other hand, they seem to have realized that a programming language is just one part of a tool chain, so that improved tools and development processes are essential.”
The post C++ creator rebuts White House warning appeared first on Computer Systems Design.
]]>C++ creator Bjarne Stroustrup has defended the widely used programming language in response to a Biden administration report that calls on developers to use memory-safe languages and avoid using vulnerable ones such as C++ and C.
In a March 15 response to an inquiry from InfoWorld, Stroustrup pointed out strengths of C++, which was designed in 1979. “I find it surprising that the writers of those government documents seem oblivious of the strengths of contemporary C++ and the efforts to provide strong safety guarantees,” Stroustrup said. “On the other hand, they seem to have realized that a programming language is just one part of a tool chain, so that improved tools and development processes are essential.”
The post C++ creator rebuts White House warning appeared first on Computer Systems Design.
]]>The world has become “sensor-fied.”
Sensors on everything, including cars, factory machinery, turbine engines, and spacecraft, continuously collect data that developers leverage to optimize efficiency and power AI systems. So, it’s no surprise that time series—the type of data these sensors collect—is one of the fastest-growing categories of databases over the past five-plus years.
However, relational databases remain, by far, the most-used type of databases. Vector databases have also seen a surge in usage thanks to the rise of generative AI and large language models (LLMs). With so many options available to organizations, how do they select the right database to serve their business needs?
The post Evaluating databases for sensor data appeared first on Computer Systems Design.
]]>The world has become “sensor-fied.”
Sensors on everything, including cars, factory machinery, turbine engines, and spacecraft, continuously collect data that developers leverage to optimize efficiency and power AI systems. So, it’s no surprise that time series—the type of data these sensors collect—is one of the fastest-growing categories of databases over the past five-plus years.
However, relational databases remain, by far, the most-used type of databases. Vector databases have also seen a surge in usage thanks to the rise of generative AI and large language models (LLMs). With so many options available to organizations, how do they select the right database to serve their business needs?
The post Evaluating databases for sensor data appeared first on Computer Systems Design.
]]>The world has become “sensor-fied.”
Sensors on everything, including cars, factory machinery, turbine engines, and spacecraft, continuously collect data that developers leverage to optimize efficiency and power AI systems. So, it’s no surprise that time series—the type of data these sensors collect—is one of the fastest-growing categories of databases over the past five-plus years.
However, relational databases remain, by far, the most-used type of databases. Vector databases have also seen a surge in usage thanks to the rise of generative AI and large language models (LLMs). With so many options available to organizations, how do they select the right database to serve their business needs?
The post Evaluating databases for sensor data appeared first on Computer Systems Design.
]]>The world has become “sensor-fied.”
Sensors on everything, including cars, factory machinery, turbine engines, and spacecraft, continuously collect data that developers leverage to optimize efficiency and power AI systems. So, it’s no surprise that time series—the type of data these sensors collect—is one of the fastest-growing categories of databases over the past five-plus years.
However, relational databases remain, by far, the most-used type of databases. Vector databases have also seen a surge in usage thanks to the rise of generative AI and large language models (LLMs). With so many options available to organizations, how do they select the right database to serve their business needs?
The post Evaluating databases for sensor data appeared first on Computer Systems Design.
]]>Public cloud providers are often loathed for charging data transfer or “egress fees” for removing data from a specific cloud provider. If you move data out of a cloud provider, there’s a cost; for instance, you move inventory data from an inventory system residing in a public cloud provider to a supply chain system on premises or perhaps even on another public cloud provider.
This is the number one complaint about cloud providers that I hear. The fee is thought of as arbitrary and counterproductive to using the cloud with systems that exist outside of a specific provider. In some cases, it’s a reason applications are not in a cloud today.
This customer discontent is not lost on cloud providers, who are initiating a significant shift in their pricing strategies by reducing these charges. Google Cloud announced it would eliminate egress fees, a strategic move to attract customers from its larger competitors, AWS and Microsoft. This was not merely a pricing play but also a response to regulatory pressures, greater competition, and the significantly lower cost of hardware in the past several years. The cloud computing landscape has changed, and providers are continually looking for ways to differentiate themselves and attract more users.
The post Why public cloud providers are cutting egress fees appeared first on Computer Systems Design.
]]>Public cloud providers are often loathed for charging data transfer or “egress fees” for removing data from a specific cloud provider. If you move data out of a cloud provider, there’s a cost; for instance, you move inventory data from an inventory system residing in a public cloud provider to a supply chain system on premises or perhaps even on another public cloud provider.
This is the number one complaint about cloud providers that I hear. The fee is thought of as arbitrary and counterproductive to using the cloud with systems that exist outside of a specific provider. In some cases, it’s a reason applications are not in a cloud today.
This customer discontent is not lost on cloud providers, who are initiating a significant shift in their pricing strategies by reducing these charges. Google Cloud announced it would eliminate egress fees, a strategic move to attract customers from its larger competitors, AWS and Microsoft. This was not merely a pricing play but also a response to regulatory pressures, greater competition, and the significantly lower cost of hardware in the past several years. The cloud computing landscape has changed, and providers are continually looking for ways to differentiate themselves and attract more users.
The post Why public cloud providers are cutting egress fees appeared first on Computer Systems Design.
]]>Falco, the open-source, cloud-native, runtime security tool, recently graduated from the Cloud Native Computing Foundation’s incubation program. That means it’s considered stable and ready for use in production environments, including Azure. It joins many of the key components of a cloud-native platform including Helm, Envoy, etcd, KEDA, and Cloud Events.
I recently had a conversation with Loris Degioanni, the CTO and founder of cloud-native security company Sysdig and the creator of Falco, about the philosophy behind the project and how it’s being used across Kubernetes applications.
The post Securing Azure Kubernetes with Falco appeared first on Computer Systems Design.
]]>Falco, the open-source, cloud-native, runtime security tool, recently graduated from the Cloud Native Computing Foundation’s incubation program. That means it’s considered stable and ready for use in production environments, including Azure. It joins many of the key components of a cloud-native platform including Helm, Envoy, etcd, KEDA, and Cloud Events.
I recently had a conversation with Loris Degioanni, the CTO and founder of cloud-native security company Sysdig and the creator of Falco, about the philosophy behind the project and how it’s being used across Kubernetes applications.
The post Securing Azure Kubernetes with Falco appeared first on Computer Systems Design.
]]>Frank Crane wasn’t talking about open source when he famously said, “You may be deceived if you trust too much, but you will live in torment if you don’t trust enough.”
But that’s a great way to summarize today’s gap between how open source is actually being consumed, versus the zero trust patterns that enterprises are trying to codify into their DevSecOps practices.
Every study I see suggests that between 90% and 98% of the world’s software is open source. We’re all taking code written by other people—standing on the shoulders of giants—and building and modifying all that code, implicitly trusting every author, maintainer, and contributor that’s come before us.
The post Open source is not insecure appeared first on Computer Systems Design.
]]>Frank Crane wasn’t talking about open source when he famously said, “You may be deceived if you trust too much, but you will live in torment if you don’t trust enough.”
But that’s a great way to summarize today’s gap between how open source is actually being consumed, versus the zero trust patterns that enterprises are trying to codify into their DevSecOps practices.
Every study I see suggests that between 90% and 98% of the world’s software is open source. We’re all taking code written by other people—standing on the shoulders of giants—and building and modifying all that code, implicitly trusting every author, maintainer, and contributor that’s come before us.
The post Open source is not insecure appeared first on Computer Systems Design.
]]>The US federal government has released a software attestation form intended to ensure that software producers partnering with the government leverage minimum secure development techniques and tool sets.
The form was announced March 11 by the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA), which developed the form with the Office of Management and Budget (OMB). The form identifies minimum secure software development requirements a software producer must meet and attest to meeting. Software requires attestation if it was developed after September 14, 2022. Software developed prior to this date requires attestation if it was modified by major version changes after September 14, 2022. Attestation also is required if the producer delivers constant changes to the code.
The post Feds seek attestation on secure software appeared first on Computer Systems Design.
]]>The US federal government has released a software attestation form intended to ensure that software producers partnering with the government leverage minimum secure development techniques and tool sets.
The form was announced March 11 by the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA), which developed the form with the Office of Management and Budget (OMB). The form identifies minimum secure software development requirements a software producer must meet and attest to meeting. Software requires attestation if it was developed after September 14, 2022. Software developed prior to this date requires attestation if it was modified by major version changes after September 14, 2022. Attestation also is required if the producer delivers constant changes to the code.
The post Feds seek attestation on secure software appeared first on Computer Systems Design.
]]>The post OutSystems unveils no-code AI Agent Builder appeared first on Computer Systems Design.
]]>Low-code development platform provider OutSystems has released AI Agent Builder, a no-code tool for building custom generative AI agents using large language models (LLMs) from Azure OpenAI or Amazon Bedrock.
The post OutSystems unveils no-code AI Agent Builder appeared first on Computer Systems Design.
]]>The post OutSystems unveils no-code AI Agent Builder appeared first on Computer Systems Design.
]]>Low-code development platform provider OutSystems has released AI Agent Builder, a no-code tool for building custom generative AI agents using large language models (LLMs) from Azure OpenAI or Amazon Bedrock.
The post OutSystems unveils no-code AI Agent Builder appeared first on Computer Systems Design.
]]>