.advertise@offshoreoiljobs.co.uk

.www.offshoreoiljobs.co.uk

Category: Electronics Engineering

Logs from the Edge

With Cloudflare Workers, our JavaScript environment at the edge, it is possible to send traffic logs to arbitrary locations. In this post we are going to discuss an example Worker implementation on how to achieve this. So if you are building or maintaining your own traffic logging/analytics environment, read on. To build the underlying script we are going to leverage sub requests. Sub requests, which can be spawned from the initial HTTP/S request, can be used to aggregate and compose…

Sharing LinkedIn’s Economic Graph Data with WomenConnect

In late October, LinkedIn’s Women in Tech (WIT) organization hosted its latest external WomenConnect event. For those who may be unfamiliar, WomenConnect is an event series that provides an opportunity for women who work in technology to share their stories and experiences, give advice, and further build their professional communities. At this event, the evening kicked off with personal stories from Erica Lockheimer, Head of Engineering for LinkedIn Learning and the executive sponsor for our WIT organization. Erica’s introduction helped…

How to Get a Better GAN (Almost) for Free: Introducing the Metropolis-Hastings GAN

By Ryan Turner, Jane Hung, Yunus Saatci, & Jason Yosinski Generative Adversarial Networks (GANs) have achieved impressive feats in realistic image generation and image repair. Art produced by a GAN has even been sold at auction for over $400,000! At Uber, GANs have myriad potential applications, including strengthening our machine learning (ML) models against adversarial attacks, learning simulators for traffic, ride requests, or demand patterns over time, and generating personalized order suggestions for Uber Eats. GANs consist of two models…

Food technology goes from the moon to grocery aisle, improving food production and quality, taste

Credit: CC0 Public Domain Technology originally developed in work with NASA to help lunar colonies may soon be heating the food found on many holiday dinner tables. Purdue University-affiliated startup Induction Food Systems has created a technology system to provide on-demand heating options for food and beverage manufacturers. George Sadler, a Purdue College of Agriculture alumnus who co-founded IFS, originally began working on the technology through a Small Business Innovation Research grant from NASA. He partnered with entrepreneur Francesco…

Know your SCM_RIGHTS

As TLS 1.3 was ratified earlier this year, I was recollecting how we got started with it here at Cloudflare. We made the decision to be early adopters of TLS 1.3 a little over two years ago. It was a very important decision, and we took it very seriously. It is no secret that Cloudflare uses nginx to handle user traffic. A little less known fact, is that we have several instances of nginx running. I won’t go into detail,…

Abstracting Sharding with Vitess and Distributed Deadlocks

Shortly after our first shard split, we saw a couple of brief outages in our service. All requests would hang for a minute, then fail, but everything would go back to normal afterwards. Our metrics showed us three facts: the Vitess transaction pool was full, QPS fell to zero, and MySQL thread count spiked. From our logs we also saw that Vitess was killing transactions after a minute. Once the pool was full no requests could be serviced for the…

Preventing Credential Compromise in AWS

by Will Bengtson Previously we wrote about a method for detecting credential compromise in your AWS environment. The methodology focused on a continuous learning model and first use principle. This solution still is reactive in nature — we only detect credential compromise after it has already happened.. Even with detection capabilities, there is a risk that exposed credentials can provide access to sensitive data and/or the ability to cause damage in our environment. Today, we would like to share two additional layers…

L4Drop: XDP DDoS Mitigations

Efficient packet dropping is a key part of Cloudflare’s distributed denial of service (DDoS) attack mitigations. In this post, we introduce a new tool in our packet dropping arsenal: L4Drop. Public domain image by US Air Force We’ve written about our DDoS mitigation pipeline extensively in the past, covering: Gatebot: analyzes traffic hitting our edge and deploys DDoS mitigations matching suspect traffic. bpftools: generates Berkeley Packet Filter (BPF) bytecode that matches packets based on DNS queries, p0F signatures, or tcpdump…

Neural egg separation: Extracting audio from noise

WHAT THE RESEARCH IS: A new method for identifying distinct images and sounds within noisy environments, a long-standing challenge for machine learning (ML) systems. Called Neural Egg Separation (NES) — a reference to separating egg whites and yolks — this approach isolates audio and visual sources through a series of comparisons between signals that are clear and ones that are obscured. HOW IT WORKS: Humans are inherently good at separating out individual sounds and visuals, such as hearing another person’s…

Stronger buildings could delay, but not stop, destruction alone

Even though no building material is fireproof, a few strategies could still allow more evacuation time during a future wildfire. Credit: Purdue University California’s deadly Camp Fire is now 100 percent contained, but low humidity and strong winds in the state mean that wildfires could strike again. Unfortunately, better building materials and planning can only offer so much protection, says a Purdue University natural hazards engineering expert. “Two possible strategies to mitigate a structure’s vulnerabilities to wildfire damage include…