My Journey to Airbnb — Anna Sulkina (opens in new tab)
My Journey to Airbnb — Anna Sulkina -- Listen Share Anna Sulkina has always been a traveler, and we’re lucky her travels have brought her to Airbnb. Anna is a Senior Director of Engineering, and she’s responsible for Application & Cloud infrastructure. She brings over two decade…
Scheduling in a changing world: Maximizing throughput with time-varying capacity (opens in new tab)
Scheduling in a changing world: Maximizing throughput with time-varying capacity February 11, 2026 Manish Purohit, Research Scientist, Google Research We introduce new, provably effective algorithms for scheduling jobs without interruptions on cloud infrastructure when machine a…
Beyond one-on-one: Authoring, simulating, and testing dynamic human-AI group conversations (opens in new tab)
Beyond one-on-one: Authoring, simulating, and testing dynamic human-AI group conversations February 10, 2026 Erzhen Hu, Student Researcher, and Ruofei Du, Interactive Perception & Graphics Lead, Google XR DialogLab is a research prototype that provides a unified interface to con…
DevSecOps-as-a-Service on Oracle Cloud Infrastructure by Data Intensity (opens in new tab)
Data Intensity’s DevSecOps-as-a-Service provides a solution for organizations that require the granular control of GitLab Self-Managed but wish to eliminate the operational burden of infrastructure maintenance. By hosting dedicated GitLab instances on Oracle Cloud Infrastructure (OCI), the service combines the security and customization of a self-managed environment with the convenience of a fully managed platform. This partnership enables teams to focus on software delivery while leveraging expert management for high availability and disaster recovery. ### The Benefits of GitLab Self-Managed * Offers complete ownership of data residency and instance configuration to meet strict regulatory and compliance requirements. * Enables deep customization and integration possibilities that are often restricted in standard SaaS environments. * Addresses the challenges of manual server management, upgrades, and high-availability scaling by offloading these tasks to a managed provider. ### Managed Service Features and Support * Provides 24/7 monitoring, alarming, and expert technical support for standalone GitLab instances. * Includes scheduled quarterly patching performed during customer-specified maintenance windows to minimize disruption. * Ensures business continuity through automated backups and professional disaster recovery protection. * Utilizes tiered architectures designed to scale based on specific user capacities and recovery time objectives. ### Infrastructure Optimization via OCI * Delivers significant cost efficiency, with organizations typically realizing 40-50% reductions in infrastructure spending compared to other hyperscalers. * Supports diverse deployment models, including Public Cloud, Government Cloud, EU Sovereign Clouds, and dedicated infrastructure behind a corporate firewall. * Maintains consistent pricing and operational tooling across hybrid, global, and regulated environments. ### Implementation and Migration * Data Intensity offers optional migration services to transition existing code repositories and configurations to the OCI environment seamlessly. * The service is specifically designed for organizations with predictable cost requirements and those lacking in-house infrastructure expertise. * Deployment planning involves tailored consultations to match specific compliance and data residency needs with OCI’s global region availability. This managed service is a recommended path for enterprise teams that need to prioritize data sovereignty and flexibility without sacrificing the speed of a turnkey solution. Organizations currently using or planning to adopt OCI can leverage this service to standardize their DevSecOps workflows while achieving significant infrastructure savings.
Grammarly’s AI Detector Agent Ranks #1 in Quality (opens in new tab)
Grammarly has launched a high-ranking AI detection tool specifically designed for students and educational institutions to address the growing complexity of machine-generated content. By integrating this detector into their existing ecosystem, the company aims to provide a reliable way to verify human authorship while protecting the integrity of a student's original voice. ### Implementing Reliable AI Detection (RAID) * Grammarly utilizes the RAID (Reliable AI Detection) framework to ensure the tool remains effective against evolving large language models (LLMs). * The detector focuses on minimizing false positives, which is critical in academic settings to avoid wrongful accusations of misconduct. * The system is benchmarked to provide high-performance accuracy, offering institutions a standardized metric for evaluating the authenticity of submitted work. ### Preserving Human Authorship and Voice * The widespread use of generative AI has created a climate of skepticism where students’ original work is frequently questioned by instructors and automated systems. * The detector provides a nuanced analysis that helps distinguish between legitimate AI-assisted refinement—such as grammar and clarity checks—and full AI content generation. * By offering transparent reporting, the tool helps students validate their personal writing process and defend the originality of their voice. ### Multi-Agent Integration and Ecosystem Support * AI detection is positioned as a single "agent" within a broader suite of writing, editing, and citation tools. * The tool is built to integrate seamlessly with institutional workflows and Learning Management Systems (LMS), ensuring it is accessible at the point of writing. * This holistic approach treats detection as part of a supportive writing environment rather than a punitive standalone feature, encouraging responsible AI use. To maintain trust in digital communication, institutions should adopt detection tools that prioritize reliability and transparency, ensuring that the transition to AI-integrated learning does not come at the expense of student confidence or academic honesty.
AWS Weekly Roundup: Claude Opus 4.6 in Amazon Bedrock, AWS Builder ID Sign in with Apple, and more (February 9, 2026) | Amazon Web Services (opens in new tab)
AWS Weekly Roundup: Claude Opus 4.6 in Amazon Bedrock, AWS Builder ID Sign in with Apple, and more (February 9, 2026) Here are the notable launches and updates from last week that can help you build, scale, and innovate on AWS. Last week’s launches Here are the launches that got…
Building Prometheus: How Backend Aggregation Enables Gigawatt-Scale AI Clusters (opens in new tab)
We’re sharing details of the role backend aggregation (BAG) plays in building Meta’s gigawatt-scale AI clusters like Prometheus. BAG allows us to seamlessly connect thousands of GPUs across multiple data centers and regions. Our BAG implementation is connecting two different net…
From Perimeter Security to Zero (opens in new tab)
Toss Payments transformed its security infrastructure from a vulnerable, single-layered legacy system into a robust "Defense in Depth" architecture spanning hybrid IDC and AWS environments. By integrating advanced perimeter defense, internal server monitoring, and container runtime security, the team established a comprehensive framework that prioritizes visibility and continuous verification. This four-year journey demonstrates that modern security requires moving beyond simple boundary protection toward a proactive, multi-layered strategy that assumes breaches can occur. ### Perimeter Defense and SSL/TLS Visibility * Addressed the critical visibility gap in legacy systems by implementing dedicated SSL/TLS decryption tools, allowing the team to analyze encrypted traffic for hidden malicious payloads. * Established a hybrid security architecture using a combination of physical DDoS protection, IPS, and WAF in IDC environments, complemented by AWS WAF and AI-based GuardDuty in the cloud. * Developed a collaborative merchant response process that moves beyond simple IP blocking; the system automatically detects malicious traffic from partners and provides them with detailed vulnerability reports and remediation guides (e.g., specific SQL injection points). ### Internal Network Security and "Assume Breach" Monitoring * Implemented **Wazuh**, an open-source security platform, in IDC environments to monitor lateral movement, collect centralized logs, and perform file integrity checks across diverse operating systems. * Leveraged **AWS GuardDuty** for intelligent threat detection in the cloud, focusing on malware scanning for EC2 instances and monitoring for suspicious process activities. * Established automated detection for privilege escalation and unauthorized access to sensitive system files, such as tracking instances where root privileges are obtained to modify the `/etc/passwd` file. ### Container Runtime Security as the Final Defense * Adopted **Falco**, a CNCF-hosted runtime security tool, to protect Kubernetes environments by monitoring system calls (syscalls) in real-time. * Configured specific security rules to detect "container escape" attempts, unauthorized access to sensitive files like `/etc/shadow`, and the execution of new or suspicious binaries within running containers. * Integrated **Falco Sidekick** to manage security events efficiently, ensuring that anomalous behaviors at the container level are instantly routed to the security team for response. ### Zero Trust and Continuous Verification * Shifted toward a Zero Trust model for the internal work network to ensure that all users and devices are continuously verified regardless of their location. * Focused on implementing dynamic access control and the principle of least privilege to minimize the potential impact of credential theft or device compromise. Organizations operating in hybrid cloud environments should move away from relying on a single perimeter and instead adopt a multi-layered defense strategy. True security resilience is achieved by gaining deep visibility into encrypted traffic and maintaining granular monitoring at the server and container levels to intercept threats that inevitably bypass initial defenses.
Why Demand for Designers Is on the Rise | Figma Blog (opens in new tab)
State of the Designer 2026: Designers are leaning into the messy middle Insights Research Report Design AI
How AI trained on birds is surfacing underwater mysteries (opens in new tab)
How AI trained on birds is surfacing underwater mysteries February 9, 2026 Lauren Harrell, Data Scientist, Google Research We describe how Perch 2.0, Google DeepMind's bioacoustics foundation model, trained on birds and other terrestrial animal vocalizations, transfers ‘whale’ t…
Our Multi-Agent Architecture for Smarter Advertising | Spotify Engineering (opens in new tab)
Our Multi-Agent Architecture for Smarter Advertising Introduction When we kicked this off, we weren’t trying to ship an “AI feature.” We were trying to fix a structural problem in how our ads business actually runs in software. On the business side, we have multiple ways of buyi…
In Search of Lost Reports: Kakao (opens in new tab)
잃어버린 리포트를 찾아서: 카카오 메시징 시스템의 경쟁 조건 문제와 안티 패턴 제거 과정
Creating the Cloud of the Future (opens in new tab)
들어가며 안녕하세요. 개발 서비스용 프라이빗 클라우드를 담당하고 있는 Cloud Service CBU 박영희입니다. LY Corporation은 서비스 개발에 필요한 인프라와 플랫폼을 제공하기 위한 프라이빗 클라우드를 내부에서 구축해 사용하고 있으며, LY Corporation으로 합병 전에 Yahoo! JAPAN과 LINE에서 사용하던 클라우드 서비스를 하나로 통합하고 있습니다. 새로운 통합 프라이빗 클라우드의 이름은 'Flava'입니다. 이 글에서는 클라우드 산업 전체가 어떻게 진화할지 말씀…
Continuous AI in practice: What developers can automate today with agentic CI (opens in new tab)
GitHub is the world's best developer experience and the only AI-powered platform with security incorporated into every step, so you can innovate with confidence.