Amazon DynamoDB Accelerator (DAX)
Amazon DynamoDB Accelerator (DAX) is a fully managed, highly available, in-memory cache for DynamoDB that delivers up to a 10x performance improvement – from milliseconds to microseconds – even at millions of requests per second. DAX does all the heavy lifting required to add in-memory acceleration to your DynamoDB tables, without requiring developers to manage cache invalidation, data population, or cluster management.
No latency percentile figures, unfortunately. Also still in preview.(tags: amazon dynamodb aws dax performance storage databases latency low-latency)
I Just Love This Juicero Story So Much
When we signed up to pump money into this juice company, it was because we thought drinking the juice would be a lot harder and more expensive. That was the selling point, because Silicon Valley is a stupid libertarian dystopia where investor-class vampires are the consumers and a regular person’s money is what they go shopping for. Easily opened bags of juice do not give these awful nightmare trash parasites a good bargain on the disposable income of credulous wellness-fad suckers; therefore easily opened bags of juice are a worse investment than bags of juice that are harder to open.
(tags: juicero juicebros techbros silicon-valley funny dystopia fruit bags juice)
Zeynep Tufekci: Machine intelligence makes human morals more important | TED Talk | TED.com
Machine intelligence is here, and we're already using it to make subjective decisions. But the complex way AI grows and improves makes it hard to understand and even harder to control. In this cautionary talk, techno-sociologist Zeynep Tufekci explains how intelligent machines can fail in ways that don't fit human error patterns — and in ways we won't expect or be prepared for. "We cannot outsource our responsibilities to machines," she says. "We must hold on ever tighter to human values and human ethics."
More relevant now that nVidia are trialing ML-based self-driving cars in the US...(tags: nvidia ai ml machine-learning scary zeynep-tufekci via:maciej technology ted-talks)
'Mathwashing,' Facebook and the zeitgeist of data worship
Fred Benenson: Mathwashing can be thought of using math terms (algorithm, model, etc.) to paper over a more subjective reality. For example, a lot of people believed Facebook was using an unbiased algorithm to determine its trending topics, even if Facebook had previously admitted that humans were involved in the process.
(tags: maths math mathwashing data big-data algorithms machine-learning bias facebook fred-benenson)
Build a Better Monster: Morality, Machine Learning, and Mass Surveillance
We built the commercial internet by mastering techniques of persuasion and surveillance that we’ve extended to billions of people, including essentially the entire population of the Western democracies. But admitting that this tool of social control might be conducive to authoritarianism is not something we’re ready to face. After all, we're good people. We like freedom. How could we have built tools that subvert it? As Upton Sinclair said, “It is difficult to get a man to understand something, when his salary depends on his not understanding it.” I contend that there are structural reasons to worry about the role of the tech industry in American political life, and that we have only a brief window of time in which to fix this.
(tags: advertising facebook google internet politics surveillance democracy maciej-ceglowski talks morality machine-learning)
Author: dailylinks
-
interesting recipe to try out:
2 oz blanco tequila 12 to 15 blueberries, plus a few more for garnish 2 basil sprigs 1 oz agave nectar Juice of 1 lime Muddle the blueberries and basil with the tequila in a shaker. Add the agave nectar and lime juice, and shake with ice. Pour into a rocks glass over fresh ice, and top with filtered water if desired. Garnish with a few blueberries.
(tags: blueberries basil margarita tequila recipes cocktails)
-
udp.c in the Linux kernel before 4.5 allows remote attackers to execute arbitrary code via UDP traffic that triggers an unsafe second checksum calculation during execution of a recv system call with the MSG_PEEK flag.
Snowden Documents Reveal Scope of Secrets Exposed to China in 2001 Spy Plane Incident
wow, this was a pretty major screwup
(tags: china us spying nsa ep-3e spy-planes surveillance snowden)
On what basis does FFFFOUND! recommend related images? - Quora
by the URL! totally not what I expected!
(tags: ffffound images similarity algorithms via:pheezy mltshp quora)
-
Lots and lots of shots of "Space: 1999" interiors. <3
Tackling decades of dereliction
regarding some seriously derelict houses on Connaught St in Phibsboro and the bureaucracy tomfoolery which has resulted in them not appearing on the Derelict Sites Register
Julia Evans on Twitter: "notes on this great "When the pager goes off" article"
'notes on this great "When the pager goes off" article from @incrementmag https://increment.com/on-call/when-the-pager-goes-off/ ' -- cartoon summarising a much longer article of common modern ops on-call response techniques. Still pretty consistent with the systems we used in Amazon
(tags: on-call ops incident-response julia-evans pager increment-mag)
Fans of chess were outraged when the queen piece was added
"scacchi alla rabiosa" ("madwoman's chess") faced a backlash from 16th-century gamergaters
(tags: gamergate funny 16th-century history chess gaming games queen)
Investigation finds inmates built computers and hid them in prison ceiling
Prisoners built computers from parts, hid them in the ceiling, and connected them to the administrative network. 'The Ohio Inspector General says investigators found an inmate used the computers to steal the identity of another inmate, and then submit credit card applications, and commit tax fraud. They also found inmates used the computers to create security clearance passes that gave them access to restricted areas.'
-
Funnily enough, this is exactly what Ross Anderson warned about 10 years ago re patient record digitisation in the UK. 'Occupational therapists working for an employer, doctors working for insurance companies, a dietitian, an optometrist or a dentist or their staff can view the [patient] record and see if individuals have a sexually transmitted disease, a mental illness, have had an abortion or are using Viagra.'
(tags: privacy heaith australia myhealthrecord data-protection data-privacy healthcare medicine)
Stiff Upper Lip by Alex Renton review – the damage boarding schools have done | Books | The Guardian
Holy shit:
Stiff Upper Lip is studded with startling stuff. Discussing the importance of football, for instance, in 19th-century public schools, he drops in the line that “in Charterhouse’s version a small boy was the ball”. I blithely went over that one, thinking he meant “a small boy was [expected to crouch on] the ball” or similar; but it was no typo. In a cheery kickabout on Good Friday, 1924, the Earl of Sussex’s son died from his injuries – _having been [used as] an actual football_.
(via Eva Wiseman)(tags: football public-schools uk school history murder insanity charterhouse alex-renton education)
Kenny Bastani on Twitter: "Visualization of a serverless event-driven architecture"
yup
(tags: funny gifs animation serverless aws architecture omgwtfbbq)
-
Awesome StackOverflow answer for detecting "similar" images -- promising approach to reimplement ffffound's similarity feature in mltshp, maybe
(tags: algorithms hashing comparison diff images similarity search ffffound mltshp)
Ubuntu on AWS gets serious performance boost with AWS-tuned kernel
interesting -- faster boots, CPU throttling resolved on t2.micros, other nice stuff
serviette/serviette.py at master · heathervm/serviette · GitHub
Delete tweets based on search terms. Wonder why you'd want that
(tags: twitter tweets delete privacy social-media)
How Google Book Search Got Lost – Backchannel
There are plenty of other explanations for the dampening of Google’s ardor: The bad taste left from the lawsuits. The rise of shiny and exciting new ventures with more immediate payoffs. And also: the dawning realization that Scanning All The Books, however useful, might not change the world in any fundamental way.
(tags: books reading google library lawsuits legal scanning book-search search)
Monk Gloats Over Yoga Championship - The Onion
One of the Onion's all-time classics. Still eminently quotable.
LHASA, TIBET—Employing the brash style that first brought him to prominence, Sri Dhananjai Bikram won the fifth annual International Yogi Competition yesterday with a world-record point total of 873.6. “I am the serenest!” Bikram shouted to the estimated crowd of 20,000 yoga fans, vigorously pumping his fists. “No one is serener than Sri Dhananjai Bikram—I am the greatest monk of all time!”
The Centennial Society's business reply pamphlet | Stop Junk Mail
The classic "office riot" pamphlet... 'The Centennial Society, a radical anti-consumerist movement, has come up with a more arty way of returning junk mail. Pre-paid envelopes can be used to send people working in the junk mail industry information about how to break free. No junk mailer really likes his job; wasting tonnes and tonnes of paper on useless advertisements makes few people feel good about themselves. The Business Reply Pamphlet shows them the way to freedom.'
(tags: riot offices junk-mail funny art centennial-society ads trash-the-gaff)
Things I Learned Managing Site Reliability for Some of the World’s Busiest Gambling Sites
Solid article proselytising runbooks/playbooks (or in this article's parlance, "Incident Models") for dev/ops handover and operational knowledge
(tags: ops process sre devops runbooks playbooks incident-models)
Spotify’s Love/Hate Relationship with DNS
omg somebody at Spotify really really loves DNS. They even store a DHT hash ring in it. whyyyyyyyyyyy
(tags: spotify networking architecture dht insane scary dns unbound ops)
-
In case you were thinking Lambda was potentially usable yet
(tags: lambda aws shitshow architecture serverless)
Research Blog: Federated Learning: Collaborative Machine Learning without Centralized Training Data
Great stuff from Google - this is really nifty stuff for large-scale privacy-preserving machine learning usage:
It works like this: your device downloads the current model, improves it by learning from data on your phone, and then summarizes the changes as a small focused update. Only this update to the model is sent to the cloud, using encrypted communication, where it is immediately averaged with other user updates to improve the shared model. All the training data remains on your device, and no individual updates are stored in the cloud. Federated Learning allows for smarter models, lower latency, and less power consumption, all while ensuring privacy. And this approach has another immediate benefit: in addition to providing an update to the shared model, the improved model on your phone can also be used immediately, powering experiences personalized by the way you use your phone.
Papers: https://arxiv.org/pdf/1602.05629.pdf , https://arxiv.org/pdf/1610.05492.pdf(tags: google ml machine-learning training federated-learning gboard models privacy data-privacy data-protection)
-
The denizens of /r/ireland have put together a map of their favourite tourist spots around the country. Some slightly odd choices but definitely a few that may be worth a visit. Thread: https://www.reddit.com/r/ireland/comments/5b0634/i_am_starting_a_rireland_recommended_map_for/
(tags: ireland tourist tourism attractions reddit)
-
amazing history of a key house sample -- the Pacific State loon
(tags: pacific-state loon birds samples house acid 808-state)
saitoha/libsixel: The new standard of SIXEL development
SIXEL is one of image formats for printer and terminal imaging introduced by Digital Equipment Corp. (DEC). Its data scheme is represented as a terminal-friendly escape sequence. So if you want to view a SIXEL image file, all you have to do is "cat" it to your terminal.
Wow. gif320 lives on!Smart TV hack embeds attack code into broadcast signal—no access required | Ars Technica
Awesome.
The proof-of-concept exploit uses a low-cost transmitter to embed malicious commands into a rogue [DVB-T] signal. That signal is then broadcast to nearby devices. It worked against two fully updated TV models made by Samsung. By exploiting two known security flaws in the Web browsers running in the background, the attack was able to gain highly privileged root access to the TVs. By revising the attack to target similar browser bugs found in other sets, the technique would likely work on a much wider range of TVs.
(tags: dvb-t tv security exploits samsung smart-tvs broadcast)
May's Brexit plan is falling apart and the press are talking about Easter eggs
Now the prime minister has embroiled herself in a negotiation in which we are at a disadvantage in terms of time and negotiating capacity. There will of course be no admission from Brexit MPs about this. They fixate on the one prediction economists got wrong - the surprising resilience of consumer spending - while ignoring everything their side was wrong about, like the fall in sterling, the announcement of a second Scottish independence referendum, the threat of a sudden hard border in Ireland or the crisis over Gibraltar. This is not point scoring. Unless there is a sober assessment of what is going right and wrong on both sides there can be no realistic negotiating posture. We are condemned to keep making the same mistakes again and again and working ourselves into ever-more disadvantageous positions.
When Boring is Awesome: Building a scalable time-series database on PostgreSQL
Nice. we built something along these lines atop MySQL before -- partitioning by timestamp is the key. (via Nelson)
(tags: database postgresql postgres timeseries tsd storage state via:nelson)
-
'A Desktop Viewer App for Tabular Data' -- pivot CSV data easily; works well with large files; free, from Antony Courtney
Garadget bans customer from accessing Cloud for negative Amazon review | Hacker News
yet another potential risk of IoT
(tags: iot fail garadget gadgets legal reviews amazon funny)
USA Address & Package Forwarding - Shipito
recommended by Eoin for Parcelmotel-style delivery forwarding
(tags: packages delivery parcels parcelmotel shipito via:eoin usa)
Bidding Website Rentberry May Be the Startup of Your Nightmares
omg this is horrible, grim-meathook-future stuff.
A landlord lists a rental space and potential tenants bid against one another to claim the lease. Tenants’ personal information is available to the landlord. The landlord then makes their final decision by weighing what the best offer is along with which bidder seems like they’d be the best tenant
(tags: grim-meathook-future horror renting rent tenancy rentberry libertarian homes startups)
Introducing the Faves & Flags roleplaying system | MetaTalk
awesome D&D-spoofing April Fool from MeFi
(tags: metafilter funny dungeons-and-dragons community spoofs rpg 1970s)
Watching the hearings, I learned my "Bernie bro" harassers may have been Russian bots
However, the rest of the abuse came from accounts purporting to be supporters of Vermont Independent Senator Bernie Sanders. And these were “people” with whom I believed I shared common values and policy interests. Almost all of the accounts presented as men — mostly young and white — and used sexist and misogynistic tones and words. I was called “mom” and “grandma” as epithets by these “young men.” I was called every vile sexualized name you can imagine. For some reason that I did not understand at the time, they liked to call me a “vagina.” (I now believe non-native English — i.e. Russian — speakers wrote the algorithms controlling these bots and perhaps imagined “vagina” to be the equivalent of the c-word when hurled at a woman.) Not being conversant in the mechanisms of Russian psychological warfare techniques at the time, it never occurred to me that, like the #MAGA bots, these “Bernie Bro” accounts were actually bots too. And the abuse from these accounts was much harder to dismiss. It went in further, emotionally speaking. The vitriol of the attacks felt like a painful betrayal. After all, “we” probably shared 99 percent of our political perspective; we just supported different candidates — which is something I said repeatedly in my attempts to appeal to reason with some of the attackers over the course of those long months. Nonetheless, even the mildest criticism of Sanders or comment of support for Clinton would bring out a swarm of these “Bernie Bro” accounts spouting off with abusive language and mockery.
(tags: bernie-bros abuse twitter russia security bots elections hilary-clinton)
-
'The bakeneko (???, "changed cat") is a type of Japanese y?kai, or supernatural creature. According to its name, it is a cat that has changed into a y?kai. It is often confused with the nekomata, another cat-like y?kai,[2] and the distinction between the two can often be quite ambiguous.' Reportedly, Totoro's catbus is a bakeneko, as is the Maneki Neko good luck totem.
(tags: superstitions cats catbus totoro bakeneko yokai japan history)
Who Discovered Why The Challenger Exploded?
Everyone knows Richard Feynman’s famous televised demonstration that the Challenger had exploded because its O-rings got stiff when they were cold -- but it wasn’t Feynman’s discovery. It was Sally Ride’s.' (via Tony Finch)
(tags: richard-feynman sally-ride history space challenger o-rings science engineering nasa)
UW professor: The information war is real, and we’re losing it
Starbird sighed. “I used to be a techno-utopian. Now I can’t believe that I’m sitting here talking to you about all this.”
Yep :((tags: journalism media news fake-news infowars twitter facebook)
How Do We Defeat Online Trolls? - The Atlantic
Another challenge is that no matter what solutions people devise to fight trolls, the trolls will fight back. Even among those who are optimistic that the trolls can be beaten back, and that civic discourse will prevail online, there are myriad unknowns ahead. “Online discourse is new, relative to the history of communication,” said Ryan Sweeney, the director of analytics at Ignite Social Media, in his response to the survey. “Technological evolution has surpassed the evolution of civil discourse. We’ll catch up eventually. I hope. We are in a defining time.”
Learn redis the hard way (in production) · trivago techblog
oh god this is pretty awful. this just reads like "don't try to use Redis at scale" to me
(tags: redis scalability ops architecture horror trivago php)
Deep Dive on Amazon EBS Elastic Volumes
'March 2017 AWS Online Tech Talks' -- lots about the new volume types
-
Expect to see a lot more cases of automated discrimination like this in the future. There is no way an auto-adjudication system would be allowed to have this staggering level of brokenness if it was dealing with the well-off:
State officials have said that between Oct. 1, 2013, when the MiDAS [automated unemployment insurance fraud detection] system came on line, and Aug. 7, 2015, when the state halted the auto-adjudication of fraud determinations and began to require some human review of MiDAS findings, the system had a 93% error rate and made false fraud findings affecting more than 20,000 unemployment insurance claims. Those falsely accused of fraud were subjected to quadruple penalties and aggressive collection techniques, including wage garnishment and seizure of income tax refunds. Some were forced into bankruptcy. The agency is now reviewing about 28,000 additional fraud determinations that were made during the relevant period, but which involved some human review. An unknown number of those fraud findings were also false.
(tags: fraud broken fail michigan detroit social-welfare us-politics computer-says-no automation discrimination fraud-detection)
The criminal exploits of "Prawo Jazdy"
Excellent policing folklore here.... 'Eventually a letter was sent to the Polish embassy to ask for the Polish government's assistance in bringing this rogue motorist to justice. Their reply was as swift as it was courteous. It said "Prawo Jazdy is Polish for driver's license".'
(tags: gardai policing ireland polish driving safety road-safety funny anecdotes)
Intuit and H&R Block Are Spending Millions to Keep Us From Having Simpler Tax Forms
I noticed this when I was living there -- it was nearly impossible to file a 1040 without help, and this is why:
Intuit spent more than $2 million lobbying last year, much of it spent on legislation that would permanently bar the government from offering taxpayers pre-filled returns. H&R Block spent $3 million, also directing some of their efforts toward the bill.
On the upside, with H&R Block it's reasonably easy. Just pretty unpleasant that it's a requirement and effectively private-sector taxation as a result.(tags: h-r-block intuit taxes us-politics lobbying scams usa)
-
The grugq on Putin vs France:
How modern conflicts play out in the informatics sphere, what I mean when I talk about cyber war, is happening in France. After France there will be Germany, then the Scandinavian countries have their elections. There is no chance that Putin attempting to shape the world to best suit Russian interests will abate. Currently, the strongest area that he can contend in is the informatics sphere, the cyber realm, where human perception of reality is shaped.
(tags: putin france elections russia cyber-war hacking security wikileaks)
-
Whitehat CCC hacker thoroughly pwns N26 bank -- there's a lot of small leaks and insecurities here. Sounds like N26 are dealing with them though
-
'For decades, the transaction concept has played a central role in database research and development. Despite this prominence, transactional databases today often surface much weaker models than the classic serializable isolation guarantee—and, by default, far weaker models than alternative,“strong but not serializable” models such as Snapshot Isolation. Moreover, the transaction concept requires the programmer’s involvement: should an application programmer fail to correctly use transactions by appropriately encapsulating functionality, even serializable transactions will expose programmers to errors. While many errors arising from these practices may be masked by low concurrency during normal operation, they are susceptible to occur during periods of abnormally high concurrency. By triggering these errors via concurrent access in a deliberate attack, a determined adversary could systematically exploit them for gain. In this work, we defined the problem of ACIDRain attacks and introduced 2AD, a lightweight dynamic analysis tool that uses traces of normal database activity to detect possible anomalous behavior in applications. To enable 2AD, we extended Adya’s theory of weak isolation to allow efficient reasoning over the space of all possible concurrent executions of a set of transactions based on a concrete history, via a new concept called an abstract history, which also applies to API calls. We then applied 2AD analysis to twelve popular self-hosted eCommerce applications, finding 22 vulnerabilities spread across all but one application we tested, affecting over 50% of eCommerce sites on the Internet today. We believe that the magnitude and the prevalence of these vulnerabilities to ACIDRain attacks merits a broader reconsideration of the success of the transaction concept as employed by programmers today, in addition to further pursuit of research in this direction. Based on our early experiences both performing ACIDRain attacks on self-hosted applications as well as engaging with developers, we believe there is considerable work to be done in raising awareness of these attacks—for example, via improved analyses and additional 2AD refinement rules (including analysis of source code to better highlight sources of error)—and in automated methods for defending against these attacks—for example, by synthesizing repairs such as automated isolation level tuning and selective application of SELECT FOR UPDATE mechanisms. Our results here—as well as existing instances of ACIDRain attacks in the wild—suggest there is considerable value at stake.'
(tags: databases transactions vulnerability security acidrain peter-bailis storage isolation acid)
Scientists made a detailed “roadmap” for meeting the Paris climate goals. It’s eye-opening. - Vox
tl;dr: this is not going to happen and we are fucked.
(tags: climate environment global-warming science roadmap future grim-meathook-future)
-
jomsdev notes: 'Last year, in the AofA’16 conference Robert Sedgewick proposed a new algorithm for cardinality estimation. Robert Sedgwick is a professor at Princeton with a long track of publications on combinatorial/randomized algorithms. He was a good friend of Philippe Flajolet (creator of Hyperloglog) and HyperBitBit it's based on the same ideas. However, it uses less memory than Hyperloglog and can provide the same results. On practical data, HyperBitBit, for N < 2^64 estimates cardinality within 10% using only 128 + 6 bits.'
(tags: algorithms programming cs hyperloglog estimation cardinality counting hyperbitbit)
The Gig Economy Celebrates Working Yourself to Death - The New Yorker
At the root of this is the American obsession with self-reliance, which makes it more acceptable to applaud an individual for working himself to death than to argue that an individual working himself to death is evidence of a flawed economic system. The contrast between the gig economy’s rhetoric (everyone is always connecting, having fun, and killing it!) and the conditions that allow it to exist (a lack of dependable employment that pays a living wage) makes this kink in our thinking especially clear.
(tags: capitalism culture gig-economy lyft fiverr work jobs employment self-reliance)
The Dead Data Scientists Society, a.k.a Sarmento’s Eleven
11 stereotypical data scientist roles, and their failings
(tags: data-science roles jobs stereotypes fail big-data)
US grand jury decides that a GIF counts as a deadly weapon in Twitter seizure case - The Verge
While this is certainly correct to prosecute, I still think that Twitter need to rethink their UI choices that allow a random stranger to fire graphic images at their targets without any opt-in requirement.
FBI investigators seized the account late last year after tracking him through his iPhone, and allege that Rivello sent several tweets and messages about his intentions to cause Eichenwald to have a seizure — including the text “You deserve a seizure for your post.” According to NBC News, other messages specifically say that "I hope this sends him into a seizure,” while others read "Spammed this at [Eichenwald] let's see if he dies."
(tags: images twitter epilepsy gifs nam-shub abuse social-media trolls)
Why American Farmers Are Hacking Their Tractors With Ukrainian Firmware
DRM working as expected:
To avoid the draconian locks that John Deere puts on the tractors they buy, farmers throughout America's heartland have started hacking their equipment with firmware that's cracked in Eastern Europe and traded on invite-only, paid online forums. Tractor hacking is growing increasingly popular because John Deere and other manufacturers have made it impossible to perform "unauthorized" repair on farm equipment, which farmers see as an attack on their sovereignty and quite possibly an existential threat to their livelihood if their tractor breaks at an inopportune time.
(via etienneshrdlu)(tags: hacking farming drm john-deere tractors firmware right-to-repair repair)
Don’t Get Trampled: The Puzzle For “Unicorn” Employees
'One of my sad predictions for 2017 is a bunch of big headline-worthy acquisitions and IPOs that leave a lot of hard working employees at these companies in a weird spot. They’ll be congratulated by everyone they know for their extraordinary success while scratching their heads wondering why they barely benefited. Of course, the reason is that these employees never understood their compensation in the first place (and they were not privy to the terms of all the financings before and after they were hired).'
(tags: share-options shares unicorns funding employment jobs compensation)
-
Huh, interesting development:
If it’s on company time, it’s the company’s dime. That’s the usual rule in the tech industry—that if employees use company resources to work on projects unrelated to their jobs, their employer can claim ownership of any intellectual property (IP) they create. But GitHub is throwing that out the window. Today the code-sharing platform announced a new policy, the Balanced Employee IP Agreement (BEIPA). This allows its employees to use company equipment to work on personal projects in their free time, which can occur during work hours, without fear of being sued for the IP. As long as the work isn’t related to GitHub’s own “existing or prospective” products and services, the employee owns it.
(tags: github law tech jobs work day-job side-projects hacking ip copyright)
Segment.com on cost savings using DynamoDB, autoscaling and ECS
great post. 1. DynamoDB hot shards were a big problem -- and it is terrible that diagnosing this requires a ticket to AWS support! This heat map should be a built-in feature. 2. ECS auto-scaling gets a solid thumbs-up. 3. Switching from ELB to ALB lets them set ports dynamically for individual ECS Docker containers, and then pack as many containers as will fit on a giant EC2 instance. 4. Terraform modules to automate setup and maintainance of ECS, autoscaling groups, and ALBs
(tags: terraform segment architecture aws dynamodb alb elb asg ecs docker)
-
LocalStack provides an easy-to-use test/mocking framework for developing Cloud applications. Currently, the focus is primarily on supporting the AWS cloud stack. LocalStack spins up the following core Cloud APIs on your local machine: API Gateway at http://localhost:4567; Kinesis at http://localhost:4568; DynamoDB at http://localhost:4569; DynamoDB Streams at http://localhost:4570; Elasticsearch at http://localhost:4571; S3 at http://localhost:4572; Firehose at http://localhost:4573; Lambda at http://localhost:4574; SNS at http://localhost:4575; SQS at http://localhost:4576 Additionally, LocalStack provides a powerful set of tools to interact with the cloud services, including a fully featured KCL Kinesis client with Python binding, simple setup/teardown integration for nosetests, as well as an Environment abstraction that allows to easily switch between local and remote Cloud execution.
The eigenvector of "Why we moved from language X to language Y"
this is actually quite interesting data
(tags: statistics programming languages golang go mysql coding)
-
“We should always be suspicious when machine learning systems are described as free from bias if it’s been trained on human-generated data,” Crawford said. “Our biases are built into that training data.” In the Chinese research it turned out that the faces of criminals were more unusual than those of law-abiding citizens. “People who had dissimilar faces were more likely to be seen as untrustworthy by police and judges. That’s encoding bias,” Crawford said. “This would be a terrifying system for an autocrat to get his hand on.” [...] With AI this type of discrimination can be masked in a black box of algorithms, as appears to be the case with a company called Faceception, for instance, a firm that promises to profile people’s personalities based on their faces. In its own marketing material, the company suggests that Middle Eastern-looking people with beards are “terrorists”, while white looking women with trendy haircuts are “brand promoters”.
(tags: bias ai racism politics big-data technology fascism crime algorithms faceception discrimination computer-says-no)
ASAP: Automatic Smoothing for Attention Prioritization in Streaming Time Series Visualization
Peter Bailis strikes again. 'Time series visualization of streaming telemetry (i.e., charting of key metrics such as server load over time) is increasingly prevalent in recent application deployments. Existing systems simply plot the raw data streams as they arrive, potentially obscuring large-scale deviations due to local variance and noise. We propose an alternative: to better prioritize attention in time series exploration and monitoring visualizations, smooth the time series as much as possible to remove noise while still retaining large-scale structure. We develop a new technique for automatically smoothing streaming time series that adaptively optimizes this trade-off between noise reduction (i.e., variance) and outlier retention (i.e., kurtosis). We introduce metrics to quantitatively assess the quality of the choice of smoothing parameter and provide an efficient streaming analytics operator, ASAP, that optimizes these metrics by combining techniques from stream processing, user interface design, and signal processing via a novel autocorrelation-based pruning strategy and pixel-aware preaggregation. We demonstrate that ASAP is able to improve users’ accuracy in identifying significant deviations in time series by up to 38.4% while reducing response times by up to 44.3%. Moreover, ASAP delivers these results several orders of magnitude faster than alternative optimization strategies.'
(tags: dataviz graphs metrics peter-bailis asap smoothing aggregation time-series tsd)
When the Children Crashed Dad’s BBC Interview: The Family Speaks - WSJ
Mr. Kelly describes his reaction as a mixture of surprise, embarrassment and amusement but also love and affection. The couple says they weren’t mad and didn’t scold the children. “I mean it was terribly cute,” Mr. Kelly said. “I saw the video like everybody else. My wife did a great job cleaning up a really unanticipated situation as best she possibly could... It was funny. If you watch the tape I was sort of struggling to keep my own laughs down. They’re little kids and that’s how things are.” “Yes I was mortified, but I also want my kids to feel comfortable coming to me,” Mr. Kelly said.
aww!(tags: cute family bbc interviews funny viral kids hippity-hoppity robert-kelly)
UN privacy watchdog says 'little or no evidence' that mass surveillance works | ZDNet
The United Nations' special rapporteur on privacy has lambasted a spate of new surveillance laws across Europe and the US, saying that there is "little or no evidence" that mass monitoring of communications works. In a report published this week, Prof. Joseph Cannataci, the first privacy watchdog to take up the post, said he was neither convinced of the effectiveness or the proportionality "of some of the extremely privacy-intrusive measures that have been introduced by new surveillance laws." He also said that bulk records collection, such as call and email metadata, runs the risk of "being hacked by hostile governments or organized crime." Cannataci singled out recently-passed laws in France, Germany, the UK and the US, all of which have pushed through new legislation in the wake of the threat from the so-called Islamic State. He said that the passed laws amount to "gesture-politics," which in his words, "have seen politicians who wish to be seen to be doing something about security, legislating privacy-intrusive powers into being -- or legalize existing practices -- without in any way demonstrating that this is either a proportionate or indeed an effective way to tackle terrorism." A rise in public support of increased surveillance powers is "predicated on the psychology of fear," he said, referring to the perceived threat of terrorism.
(tags: surveillance law privacy un joseph-cannataci watchdogs terrorism fear fud)
-
One of the most famous attributes of Lord British is that he is almost invincible. In every Ultima game in which he has appeared, he is designed to be almost impervious to a player's character predations. However, there are ways for a player thinking outside the box to assassinate him. This phenomenon is the origin of the Lord British Postulate which states: "If it exists as a living creature in an MMORPG, someone, somewhere, will try to kill it."[7] Virtually every MMO game displays numerous instances of this, with players attempting to kill (or, in the case of friendly NPCs, cause the death of) virtually every NPC or monster, howsoever powerful, meek, friendly, or ethereal.
Dinosaur Escape - BoardGameGeek
good kid's board game -- age 4+, 2-4 players.
The object of Dinosaur Escape is to get all three dinosaurs safely to Dinosaur Island before the volcano erupts! Work together to move the dinosaur movers around the board and uncover the matching dinosaurs under the fern tokens. On your turn, roll the die. If you roll a number, move any dinosaur mover the indicated number of spaces any direction on the path. Then turn over one fern token anywhere on the board. If you reveal rocks, bones or other items, flip the token back over. If you reveal a dinosaur, and the dinosaur mover of the same species is in the same habitat area, move the dinosaur moved and matching token to Dinosaur Island. You just helped a dinosaur escape! If you reveal a dinosaur but the dinosaur mover of the same species is not in the same habitat as the token, flip the token back over. Dinosaur movers and matching tokens must be in the same habitat to help a dinosaur escape! If you turn over the T-Rex, RUN! Move each of the dinosaur movers in play back to a start space. If you roll a volcano, place volcano piece number 1 in the stand on the board. If you can find and help all three lost dinosaurs escape to Dinosaur Island before completing the 3D volcano puzzle, you all win!
Fides Raising Gamers (age 2 - 5) | BoardGameGeek
some good boardgame reviews
[1606.08813] European Union regulations on algorithmic decision-making and a "right to explanation"
We summarize the potential impact that the European Union's new General Data Protection Regulation will have on the routine use of machine learning algorithms. Slated to take effect as law across the EU in 2018, it will restrict automated individual decision-making (that is, algorithms that make decisions based on user-level predictors) which "significantly affect" users. The law will also effectively create a "right to explanation," whereby a user can ask for an explanation of an algorithmic decision that was made about them. We argue that while this law will pose large challenges for industry, it highlights opportunities for computer scientists to take the lead in designing algorithms and evaluation frameworks which avoid discrimination and enable explanation.
oh this'll be tricky.(tags: algorithms accountability eu gdpr ml machine-learning via:daveb europe data-protection right-to-explanation)
-
“Targeted advertising allows a campaign to say completely different, possibly conflicting things to different groups. Is that democratic?” Berners-Lee said.
(tags: politics trump law elections polling advertising facebook micro-advertising)
-
Top for containers (ie Docker)
(tags: docker containers top ops go monitoring cpu)
-
It seems there have been 34 with serious consequences since 2008. Causes include:
- Omission of an underscore when transcribing an e-mail address led to the wrong subscriber information being provided and a search warrant being executed at the premises of an individual unconnected with the investigation. - A CSP's data warehouse system change affected how GMT and British Summer Time were treated. This was not communicated to staff using the data retention disclosure system. This led to a one hour error in subscriber information disclosed in relation to IP address usage. Of 98 potential disclosure errors identified, 94 were in fact incorrect and four returned the same results when re-run. Of the 94 incorrect disclosures, in three cases a search warrant was executed at premises relating to individuals unconnected with the investigation (and one individual was arrested). - Due to a technical fault causing a time zone conversion to be out by seven hours, a CSP voluntarily disclosed an incorrect IP address to a public authority. That led to a search warrant being executed at premises relating to individuals unconnected with the investigation.
In other words, timezones largely screw up everything, yet again.
a digital clock in Conway's Game of Life
I'm sure everyone has seen this amazing feat, but I wanted to make sure I had it bookmarked ;) Gliders and lightweight spaceships, apparently...
-
Excellent twitter thread on the topic. Pasted:
It is often said that everyone knew what was happening in such places, or about the rape of children by priests. That is not true. It is true that deep veins of knowledge existed across Irish society, at all levels, but not everyone knew. Or were allowed to know. Just like is always the case, the terrible things that were done were possible only because they were tolerated. They went unchecked. They were tolerated by those in positions of authority who either dared not, or did not wish to, challenge the power strictures that existed They were tolerated by those without power or position because they feared what speaking up might do to them and to their families That was an Ireland where challenging such vile abuse by power would see you become its victim. It was brutal and vicious. If you did not, or could not, conform to the demands of the powerful, you were in real danger. At best, ostracisation and excommunication. But many experience far worse than that. They found themselves in the very places we now acknowledge as hell holes. Locked up in institutions I always remember the late, great Mary Rafferty exposing the scale of such abusive institutionalisation. She pointed out that at one point in our relatively recent history, we led the world in one regard. Per capita, we locked up more people in psychiatric institutions than any other country on the planet. Only the Soviet Union came a distant second to us. That was how Ireland treated dissent or difference That what was happened to many who could not conform to a brutal demand to be somehow 'acceptable' to dogma & unaccountable power And it wasn't some ancient Ireland either. The last laundry closed in 1996. In 2002, when fighting for inquiries into child rape by priests and it's cover up by bishops, cardinals and popes, those same princes declared themselves above the rule of the law of this Republic insisting that the law of their church was superior to the law of this state. And their position was taken seriously by many. It took months of dogged battle by me and others to get past that bullshit. For our political and legal system to assert itself. The Ireland where the lives of women & children were controlled & brutalised by people who felt they had a God given right to do so is not some other country that existed back in some other time. It is this Ireland. We have changed a lot - but it is still this Ireland. The difference now is that we ALL know. That the truth is out, and that more is being revealed. And yes, undoubtedly there is more to come. So it is NOT true all past members of society, or even anything close to a majority, colluded with such abuses. That is a falsehood. It is also a falsehood to suggest that the church did what the state would not do, and provided as best it could. That is a lie. The Catholic Church captured control of what should have been arms of the state. Health, education and social care. And it exploited them. It used them to drive its own agendas, to enforce its own dogma. And at every turn it resisted any 'intrusion' into those realms by others. including the state. Look at the Mother & Child Scheme for eg, or the response to the first multi-denominational schools, and much more. Catholic orders defended themselves against accusations of appalling abuse of children in their institutions by claiming that the state did not give them enough money to feed, clothe and properly care for the children they detained in those places. This was a lie. in the same institutions where children went starving, clergy were well fed and housed. They went for nothing. Funded by the state and the forced labour of the children or women they detained. The Ryan Report debunked that lie in its entirety. Ryan found that religious orders maintained "bloated congregations" by bringing in more and more children, and therefore more and more money And now we know. Now the threat of brutal reprisal is lifted. Now is the time for truth, to own what has been done to so many vulnerable people in our Republic. To learn from it and ensure we identify how that same corrupting tendency manifests today. Because it does of course It may not be quite as vicious, but it prevails.Look at how power still treats a reasonable demand for accountability: Maurice McCabe for eg Look at how our education and health systems still allow religious dogma to exert extraordinary power over people's lives. We are a different Ireland, but are we different enough?
(tags: mother-and-baby-homes tuam ireland catholic-church abuse colm-o-gorman twitter history priests)
-
The original DoNotPay, created by Stanford student Joshua Browder, describes itself as “the world’s first robot lawyer”, giving free legal aid to users through a simple-to-use chat interface. The chatbot, using Facebook Messenger, can now help refugees fill in an immigration application in the US and Canada. For those in the UK, it helps them apply for asylum support.
(tags: government technology automation bots asylum forms facebook)
-
A google SRE annotates the Google SRE book with his own thoughts. The source material is great, but the commentary improves it alright. Particularly good for the error budget concept. Also: when did "runbooks" become "playbooks"? Don't particularly care either way, but needless renaming is annoying.
Upgrading WhatsApp Security – Medium
good advice. See also http://www.teenvogue.com/story/how-to-keep-messages-secure (via Zeynep Tufekci)
(tags: whatsapp security crypto via:zeynep)
How to stop Ubuntu Xenial (16.04) from randomly killing your big processes
ugh.
Unfortunately, a bug was recently introduced into the allocator which made it sometimes not try hard enough to free kernel cache memory before giving up and invoking the OOM killer. In practice, this means that at random times, the OOM killer would strike at big processes when the kernel tries to allocate, say, 16 kilobytes of memory for a new process’s thread stack?—?even when there are many gigabytes of memory in reclaimable kernel caches!
(tags: oom-killer ooms linux ops 16.04)
A Programmer’s Introduction to Unicode – Nathan Reed’s coding blog
Fascinating Unicode details -- a lot of which were new to me. Love the heat map of usage in Wikipedia:
One more interesting way to visualize the codespace is to look at the distribution of usage—in other words, how often each code point is actually used in real-world texts. Below is a heat map of planes 0–2 based on a large sample of text from Wikipedia and Twitter (all languages). Frequency increases from black (never seen) through red and yellow to white. You can see that the vast majority of this text sample lies in the BMP, with only scattered usage of code points from planes 1–2. The biggest exception is emoji, which show up here as the several bright squares in the bottom row of plane 1.
(tags: unicode coding character-sets wikipedia bmp emoji twitter languages characters heat-maps dataviz)
Martin Fowler's First Law of Distributed Object Design: Don’t
lol. I hadn't seen this one, but it's a good beatdown on distributed objects from back in 2003
(tags: distributed-objects dcom corba history martin-fowler laws rules architecture 2003)
Spammergate: The Fall of an Empire
Featuring this interesting reactive-block evasion tactic:
In that screenshot, a RCM co-conspirator describes a technique in which the spammer seeks to open as many connections as possible between themselves and a Gmail server. This is done by purposefully configuring your own machine to send response packets extremely slowly, and in a fragmented manner, while constantly requesting more connections. Then, when the Gmail server is almost ready to give up and drop all connections, the spammer suddenly sends as many emails as possible through the pile of connection tunnels. The receiving side is then overwhelmed with data and will quickly block the sender, but not before processing a large load of emails.
(via Tony Finch)(tags: via:fanf spam antispam gmail blocklists packets tcp networking)
The Occasional Chaos of AWS Lambda Runtime Performance
If our code has modest resource requirements, and can tolerate large changes in performance, then it makes sense to start with the least amount of memory necessary. On the other hand, if consistency is important, the best way to achieve that is by cranking the memory setting all the way up to 1536MB. It’s also worth noting here that CPU-bound Lambdas may be cheaper to run over time with a higher memory setting, as Jim Conning describes in his article, “AWS Lambda: Faster is Cheaper”. In our tests, we haven’t seen conclusive evidence of that behavior, but much more data is required to draw any strong conclusions. The other lesson learned is that Lambda benchmarks should be gathered over the course of days, not hours or minutes, in order to provide actionable information. Otherwise, it’s possible to see very impressive performance from a Lambda that might later dramatically change for the worse, and any decisions made based on that information will be rendered useless.
(tags: aws lambda amazon performance architecture ops benchmarks)
Google’s featured snippets are worse than fake news
omg the Obama coup one is INSANE
The State already knew about Tuam. Nothing ever changes in Ireland
Forensic archaeologists are combing through the soil in Tuam. Perhaps justice might be better served if forensic accountants were combing through the accounts of the Bon Secours Sisters. They sold healthy babies and let the rest to die.
(tags: nuns bon-secours history ireland tuam-babies tuam horror)
-
'The battle to protect cash is one full of ambiguities - it feels somewhat like trying to protect good ol' normal capitalism from a Minority Report surveillance-capitalism'
(tags: cash payment contactless surveillance banking banks credit-cards)
Palantir Provides the Engine for Donald Trump’s Deportation Machine
well what a surprise
(tags: palantir immigration peter-thiel deportation ice us-politics)
Eric Jonas: Extracting 25 TFLOPS from AWS Lambda, or #TheCloudIsTooDamnHard
nice Lambda use-case with some techie details
(tags: python aws lambda ops serverless architecture)
"I caused an outage" thread on twitter
Anil Dash: "What was the first time you took the website down or broke the build? I’m thinking of all the inadvertent downtime that comes with shipping." Sample response: 'Pushed a fatal error in lib/display.php to all of FB’s production servers one Friday night in late 2005. Site loaded blank pages for 20min.'
(tags: outages reliability twitter downtime fail ops post-mortem)
Facebook, patient zero in fake news epidemic, proudly advertises ability to sway elections
The online social network is highlighting the Toomey campaign's ability to make ads that performed exceptionally well on Facebook even as it downplays the ability of the site to influence elections. In the days following the President Donald Trump's election, Facebook CEO Mark Zuckerberg responded to the potential influence of fake news on the election as "a pretty crazy idea." Taking Facebook at its word means holding two contradictory beliefs at once: that the site can sway an election on behalf of paying customers, but doesn't exert influence when it comes to the spread of misinformation by independent profiteers.
(tags: facebook fake-news elections news pat-toomey republicans advertising)
S3 2017-02-28 outage post-mortem
The Amazon Simple Storage Service (S3) team was debugging an issue causing the S3 billing system to progress more slowly than expected. At 9:37AM PST, an authorized S3 team member using an established playbook executed a command which was intended to remove a small number of servers for one of the S3 subsystems that is used by the S3 billing process. Unfortunately, one of the inputs to the command was entered incorrectly and a larger set of servers was removed than intended. The servers that were inadvertently removed supported two other S3 subsystems. One of these subsystems, the index subsystem, manages the metadata and location information of all S3 objects in the region. This subsystem is necessary to serve all GET, LIST, PUT, and DELETE requests. The second subsystem, the placement subsystem, manages allocation of new storage and requires the index subsystem to be functioning properly to correctly operate. The placement subsystem is used during PUT requests to allocate storage for new objects. Removing a significant portion of the capacity caused each of these systems to require a full restart. While these subsystems were being restarted, S3 was unable to service requests. Other AWS services in the US-EAST-1 Region that rely on S3 for storage, including the S3 console, Amazon Elastic Compute Cloud (EC2) new instance launches, Amazon Elastic Block Store (EBS) volumes (when data was needed from a S3 snapshot), and AWS Lambda were also impacted while the S3 APIs were unavailable.
(tags: s3 postmortem aws post-mortem outages cms ops)
Phoenician Sun God in Eighteenth-Century Ireland? - Beachcombing's Bizarre History Blog
It is the most extraordinary inscription. This mill-stone rock, which once stood on the top of Tory Hill in County Kilkenny in Ireland, has been taken as proof of Carthaginian contact and settlement or at least trade with Ireland in antiquity. The words clearly read (give or take some distorted letters) Beli Dinose, a reference to the Carthaginian god Bel or Baal Dionysus. Extraordinary to think that Phoenicians, in the early centuries B.C. brought their nasty child-killing faith to the green hills of Ireland. Only of course they didn’t… At least not on this evidence. The stone celebrating ‘the lordly one’ actually has a rather different origin.
excellent tale.(tags: phoenicia dionysus baal history tory-hill kilkenny carthage gods typos fail archaeology graffiti)
3D-Printed Solar Systems, Moons and Planets
these are superb
-
Teleport enables teams to easily adopt the best SSH practices like: Integrated SSH credentials with your organization Google Apps identities or other OAuth identity providers. No need to distribute keys: Teleport uses certificate-based access with automatic expiration time. Enforcement of 2nd factor authentication. Cluster introspection: every Teleport node becomes a part of a cluster and is visible on the Web UI. Record and replay SSH sessions for knowledge sharing and auditing purposes. Collaboratively troubleshoot issues through session sharing. Connect to clusters located behind firewalls without direct Internet access via SSH bastions.
(tags: ssh teleport ops bastions security auditing oauth 2fa)
Manage DynamoDB Items Using Time to Live (TTL)
good call.
Many DynamoDB users store data that has a limited useful life or is accessed less frequently over time. Some of them track recent logins, trial subscriptions, or application metrics. Others store data that is subject to regulatory or contractual limitations on how long it can be stored. Until now, these customers implemented their own time-based data management. At scale, this sometimes meant that they ran a couple of Amazon Elastic Compute Cloud (EC2) instances that did nothing more than scan DynamoDB items, check date attributes, and issue delete requests for items that were no longer needed. This added cost and complexity to their application. In order to streamline this popular and important use case, we are launching a new Time to Live (TTL) feature today. You can enable this feature on a table-by-table basis, specifying an item attribute that contains the expiration time for the item.
Zeynep Tufekci: "Youtube is a crucial part of the misinfomation ecology"
This is so spot on. I hope Google address this issue --
YouTube is crucial part of the misinformation ecology. Not just a demand issue: its recommender algo is a "go down the rabbit hole" machine. You watch a Trump rally: you get suggested white supremacist videos, sometimes, auto-playing. Like a gateway drug theory of engagement. I've seen this work across the political spectrum. YouTube algo has discovered out-flanking and "red-pilling" is.. engaging. So it does.
This thread was in response to this Buzzfeed article on the same topic: https://www.buzzfeed.com/josephbernstein/youtube-has-become-the-content-engine-of-the-internets-dark(tags: youtube nazis alt-right lies politics google misinformation recommendations ai red-pill)
-
At dinner I asked some of the women to speak to me about this, how astronomy became so (relatively) egalitarian. And one topic became clear: role models. Astronomy has a long history of women active in the field, going all the way back to Caroline Herschel in the early 19th century. Women have made huge contributions to the field. Dava Sobel just wrote a book about the women who laid the foundations for the discovery of the expansion of the universe. Just a couple of weeks ago, papers ran obituaries of Vera Rubin, the remarkable observational astronomer who discovered the evidence for dark matter. I could mention Jocelyn Bell, whose discovery of pulsars got her advisor a Nobel (sic). The most famous astronomer I met growing up was Helen Hogg, the (adopted) Canadian astronomer at David Dunlap Observatory outside Toronto, who also did a fair bit of what we now call outreach. The women at the meeting spoke of this, a history of women contributing, of role models to look up to, of proof that women can make major contributions to the field. What can computing learn from this? It seems we're doing it wrong. The best way to improve the representation of women in the field is not to recruit them, important though that is, but to promote them. To create role models. To push them into positions of influence.
(tags: software women feminism role-models gender-balance egalitarianism astronomy computing rob-pike)
When DNNs go wrong – adversarial examples and what we can learn from them
Excellent paper.
[The] results suggest that classifiers based on modern machine learning techniques, even those that obtain excellent performance on the test set, are not learning the true underlying concepts that determine the correct output label. Instead, these algorithms have built a Potemkin village that works well on naturally occuring data, but is exposed as a fake when one visits points in space that do not have high probability in the data distribution.
(tags: ai deep-learning dnns neural-networks adversarial-classification classification classifiers machine-learning papers)
US immigration asking tech interview trivia questions now
what the absolute fuck. Celestine Omin on Twitter: "I was just asked to balance a Binary Search Tree by JFK's airport immigration. Welcome to America."
(tags: twitter celestine-omin us-politics immigration tests interviews bst trees data-structures algorithms)
X-Plan: Giving your kids a way out
Great idea -- an "escape hatch" for your teenage kids, so they can be extricated from scary/dodgy peer-pressure situations without losing face among their peers.
(tags: xplan escape escape-hatch parenting kids peer-pressure teens x-plan)
Cloudflare Reverse Proxies are Dumping Uninitialized Memory
This is a massive bug. C considered harmful! See also jgc's blog post: https://blog.cloudflare.com/incident-report-on-memory-leak-caused-by-cloudflare-parser-bug/
(tags: internet security cloudflare caching coding buffer-overflows c data-leak leaks)
In 1914, Feminists Fought For the Right to Forget Childbirth | Atlas Obscura
Wow, this is creepy.
Tracy and Leupp described twilight sleep as “a very fine balance in the states of consciousness,” which required “special knowledge of the use of drugs that cause it.” Once a woman had gone into labor, she was given a combination of morphine to dull the pain and scopolamine to dull her memory of the experience. (Today, scopolamine is sometimes called the “zombie drug” because its users become susceptible to suggestion but retain no memory of their actions.) These drugs had been used in the past as anesthetics, but few doctors had adopted them with enthusiasm. But the German clinic, the McClure’s article reported, had reached a technical breakthrough with scopolamine, which allowed the doctors to administer it with more precision and therefore with more success. Women who they treated with these drugs would retain muscle control and would follow orders from doctors, but would remember none of it. There were some strange conditions that went along with the use of these drugs. Because the women’s state of suspension was precarious, women in twilight sleep were kept in padded, crib-like beds, with eye masks blocking out the light and cotton balls in their ears blocking out sound. Sometimes they were fitted into straight-jacket-like shirts that limited the movement of their arms. When the birth was over, women also often experienced a moment of dissociation, as Carmody did: Had they really had a baby? Was the baby they’d been handed really theirs?
(tags: twilight-sleep childbirth history freiburg morphine scopolamine anaesthesia birth)
At the cost of security everywhere, Google dorking is still a thing | Ars Technica
I'd never heard of this term!
Maniac Killers of the Bangalore IT Department
On "techies" and their tenuous relationship with Indian society:
Technology was supposed to deliver India from poverty, but in Bangalore it’s also deepened the division between rich and poor, young and old, modern and traditional. As the city has grown richer, it’s also become unruly and unfamiliar. If the tech worker is the star of the Indian economy, then the techie is his shadow— spoiled, untrustworthy, adulterous, depressed, and sometimes just plain senseless. (“TECHIE WITH EARPHONES RUN OVER BY TRAIN.”) In one occupational boogeyman, Bangaloreans can see their future and their fears. [....] “TECHIE’S WIFE MURDERED” read the headlines in both the Hindu and the Bangalore Mirror. “TECHIE STABS FRIEND’S WIFE TO DEATH” ran in the Deccan Herald. To read the Indian newspapers regularly is to believe the software engineer is the country’s most cursed figure. Almost every edition carries a gruesome story involving a techie accused of homicide, rape, burglary, blackmail, assault, injury, suicide, or another crime. When techies are the victims, it’s just as newsworthy. The Times of India, the country’s largest English-language paper, has carried “TECHIE DIES IN FREAK ACCIDENT” and “MAN HELD FOR PUSHING TECHIE FROM TRAIN”; in the Hindu, readers found “TEACHER CHOPS OFF FINGERS OF TECHIE HUSBAND” and “TECHIE DIED AFTER BEING FORCE-FED CYANIDE.” A long-standing journalistic adage says, “If it bleeds, it leads.” In India, if it codes, it explodes.
(tags: crime tech india bangalore pune society techies work jobs)
Why Aren’t Baby Boomers Eating Pho? – Medium
'Their decidedly un-hygge reluctance to partake in comforting, clear-brothed Vietnamese soups most likely stems from the generation’s reckless spending habits?—?many bought homes in their early 20’s. Some even claim they have owned upwards of seven cars over the course of their lifetimes. Unbelievably, many have never ridden a bicycle post-childhood.'
Fault Domains and the Vegas Rule | Expedia Engineering Blog
I like this concept -- analogous to AWS' AZs -- limit blast radius of an outage by explicitly defining dependency scopes
(tags: aws az fault-domains vegas-rule blast-radius outages reliability architecture)
10 Most Common Reasons Kubernetes Deployments Fail
some real-world failure cases and how to fix them
(tags: kubernetes docker ops)
How-to Debug a Running Docker Container from a Separate Container
arguably this shouldn't be required -- building containers without /bin/sh, strace, gdb etc. is just silly
(tags: strace docker ops debugging containers)
4chan: The Skeleton Key to the Rise of Trump
This is the best article on chan culture and how it's taken over
(tags: 4chan 8chan somethingawful boards history internet trump alt-right)
-
'Containerized Data Analytics':
There are two bold new ideas in Pachyderm: Containers as the core processing primitive Version Control for data These ideas lead directly to a system that's much more powerful, flexible and easy to use. To process data, you simply create a containerized program which reads and writes to the local filesystem. You can use any tools you want because it's all just going in a container! Pachyderm will take your container and inject data into it. We'll then automatically replicate your container, showing each copy a different chunk of data. With this technique, Pachyderm can scale any code you write to process up to petabytes of data (Example: distributed grep). Pachyderm also version controls all data using a commit-based distributed filesystem (PFS), similar to what git does with code. Version control for data has far reaching consequences in a distributed filesystem. You get the full history of your data, can track changes and diffs, collaborate with teammates, and if anything goes wrong you can revert the entire cluster with one click! Version control is also very synergistic with our containerized processing engine. Pachyderm understands how your data changes and thus, as new data is ingested, can run your workload on the diff of the data rather than the whole thing. This means that there's no difference between a batched job and a streaming job, the same code will work for both!
(tags: analytics data containers golang pachyderm tools data-science docker version-control)
How Space Weather Can Influence Elections on Earth - Motherboard
oh, god -- I'm not keen on this take: how's about designing systems that recognise the risks?
"Everything was going fine, but then suddenly, there were an additional 4,000 votes cast. Because it was a local election, which are normally very small, people were surprised and asked, 'how did this happen?'" The culprit was not voter fraud or hacked machines. It was a single event upset (SEU), a term describing the fallout of an ionizing particle bouncing off a vulnerable node in the machine's register, causing it to flip a bit, and log the additional votes. The Sun may not have been the direct source of the particle—cosmic rays from outside the solar system are also in the mix—but solar-influenced space weather certainly contributes to these SEUs.
(tags: bit-flips science elections voting-machines vvat belgium bugs risks cosmic-rays)
4chan: The Skeleton Key to the Rise of Trump
ugh. what hath 4chan wrought
(tags: 4chan trump future grim-meathook-future boards nerds)
-
This is the best documentation on the topic I've seen in a while
(tags: hadoop map-reduce architecture coding java distcomp)
Riot Games Seek Court Justice After Internet Provider Deliberately Causes In-Game Lag
Pretty damning for Time-Warner Cable:
When it seemed that the service provider couldn’t sink any lower, they opted to hold Riot to a ‘lag ransom’. Following Riot’s complaints regarding the inexplicable lag the player base were experiencing, TWC offered to magically solve the issue, a hardball tactic to which Riot finally admitted defeat in August of 2015. Before the deal was finalised, lag and data-packet loss for League of Legends players were far above the standards Riot was aiming for. Miraculously, after the two tech companies reached an unpleasant deal, the numbers improved.
(tags: ftc fcc twc time-warner cable isps network-neutrality league-of-legends internet)
Instapaper Outage Cause & Recovery
Hard to see this as anything other than a pretty awful documentation fail by the AWS RDS service:
Without knowledge of the pre-April 2014 file size limit, it was difficult to foresee and prevent this issue. As far as we can tell, there’s no information in the RDS console in the form of monitoring, alerts or logging that would have let us know we were approaching the 2TB file size limit, or that we were subject to it in the first place. Even now, there’s nothing to indicate that our hosted database has a critical issue.
(tags: limits aws rds databases mysql filesystems ops instapaper risks)
'Software Engineering at Google'
20 pages of Google's software dev practices, with emphasis on the build system (since it was written by the guy behind Blaze). Naturally, some don't make a whole lot of sense outside of Google, but still some good stuff here
(tags: development engineering google papers software coding best-practices)
Getting Past Customs With Your Digital Privacy Intact
ffs. this is where we are
(tags: wired privacy cbp customs us-politics borders travel)
Why Shopify Payments prohibit sexual content
Interesting background info from a twitter thread:
@jennschiffer Breitbart uses Shopify Payments, which is built on top of Stripe, which is sponsored by Wells Fargo merchant services AFAIK. WF has underwriting rules that prohibit sexual content. The main reasons aren't b/c WF or Stripe are interested in policing morals. Historically there's a higher rate of chargebacks from porn sites, which is why banks are generally anti-sexual content. Imagine someone's partner finds a charge for pornhub on their credit cars and calls them out on it. The person will deny and file a CB. Once porn sites started getting shut down by banks, they would change their names or submit applications claiming to be fetish sites, etc So underwriting dept's decided the risk is too high and generally defer to no with anything sexual. Most processors aren't inclined to challenge this position on moral grounds since there's strong precedent against it... ...and it could jeapordize their entire payments system if they get shut off. There are exceptions of course and there are other prohibited uses that are allowed to continue.
Comparing Amazon Elastic Container Service and Google Kubernetes – Medium
nice intro to Kubernetes and container orchestration
(tags: kubernetes containers docker ops)
-
When our son turned 12, we gave him a phone and allowed him to use social media, with a condition: He had no right to privacy. We would periodically and without warning read his texts and go through his messenger app. We would follow him on Facebook, Instagram and Twitter (though we wouldn’t comment or tag him — we’re not monsters). We wouldn’t ambush him about what we read and we wouldn’t attempt to embarrass him. Anything that wasn’t dangerous or illegal, we would ignore.
Food for thought. But not yet!(tags: surveillance family kids privacy online social-media teenagers)
-
extremely detailed walkthrough
(tags: iphone travel security apple ios mobile burner-phones)
How eBay’s Shopping Cart used compression techniques to solve network I/O bottlenecks
compressing data written to MongoDB using LZ4_HIGH --dropped oplog write rates from 150GB/hour to 11GB/hour. Snappy and Gzip didn't fare too well by comparison
(tags: lz4 compression gzip json snappy scaling ebay mongodb)
Parable of the Polygons - a playable post on the shape of society
Our cute segregation sim is based off the work of Nobel Prize-winning game theorist, Thomas Schelling. Specifically, his 1971 paper, Dynamic Models of Segregation. We built on top of this, and showed how a small demand for diversity can desegregate a neighborhood. In other words, we gave his model a happy ending.
(tags: games society visualization diversity racism bias thomas-schelling segregation)
-
could be ordered by mail and built by a single carpenter. Pretty cool
(tags: architecture history housing us kit-houses mail-order houses)
What Vizio was doing behind the TV screen | Federal Trade Commission
This is awful:
Starting in 2014, Vizio made TVs that automatically tracked what consumers were watching and transmitted that data back to its servers. Vizio even retrofitted older models by installing its tracking software remotely. All of this, the FTC and AG allege, was done without clearly telling consumers or getting their consent. What did Vizio know about what was going on in the privacy of consumers’ homes? On a second-by-second basis, Vizio collected a selection of pixels on the screen that it matched to a database of TV, movie, and commercial content. What’s more, Vizio identified viewing data from cable or broadband service providers, set-top boxes, streaming devices, DVD players, and over-the-air broadcasts. Add it all up and Vizio captured as many as 100 billion data points each day from millions of TVs. Vizio then turned that mountain of data into cash by selling consumers’ viewing histories to advertisers and others. And let’s be clear: We’re not talking about summary information about national viewing trends. According to the complaint, Vizio got personal. The company provided consumers’ IP addresses to data aggregators, who then matched the address with an individual consumer or household. Vizio’s contracts with third parties prohibited the re-identification of consumers and households by name, but allowed a host of other personal details – for example, sex, age, income, marital status, household size, education, and home ownership. And Vizio permitted these companies to track and target its consumers across devices. That’s what Vizio was up to behind the screen, but what was the company telling consumers? Not much, according to the complaint. Vizio put its tracking functionality behind a setting called “Smart Interactivity.” But the FTC and New Jersey AG say that the generic way the company described that feature – for example, “enables program offers and suggestions” – didn’t give consumers the necessary heads-up to know that Vizio was tracking their TV’s every flicker. (Oh, and the “Smart Interactivity” feature didn’t even provide the promised “program offers and suggestions.”)
(tags: privacy ftc surveillance tv vizio ads advertising smart-tvs)
-
In Kalaallit Nunaat (Greenland), the Inuit people are known for carving portable maps out of driftwood to be used while navigating coastal waters. These pieces, which are small enough to be carried in a mitten, represent coastlines in a continuous line, up one side of the wood and down the other. The maps are compact, buoyant, and can be read in the dark.
(tags: maps inuit history sailing navigation coastlines greenland)
Trump and Staff Rethink Tactics After Stumbles - The New York Times
This sounds more like a medieval court than a modern democracy. Also this incredible gem:
Mr. Bannon remains the president’s dominant adviser, despite Mr. Trump’s anger that he was not fully briefed on details of the executive order he signed giving his chief strategist a seat on the National Security Council, a greater source of frustration to the president than the fallout from the travel ban.
(tags: stephen-bannon trump us-politics nsc)
Beringei: A high-performance time series storage engine | Engineering Blog | Facebook Code
Beringei is different from other in-memory systems, such as memcache, because it has been optimized for storing time series data used specifically for health and performance monitoring. We designed Beringei to have a very high write rate and a low read latency, while being as efficient as possible in using RAM to store the time series data. In the end, we created a system that can store all the performance and monitoring data generated at Facebook for the most recent 24 hours, allowing for extremely fast exploration and debugging of systems and services as we encounter issues in production. Data compression was necessary to help reduce storage overhead. We considered several existing compression schemes and rejected the techniques that applied only to integer data, used approximation techniques, or needed to operate on the entire dataset. Beringei uses a lossless streaming compression algorithm to compress points within a time series with no additional compression used across time series. Each data point is a pair of 64-bit values representing the timestamp and value of the counter at that time. Timestamps and values are compressed separately using information about previous values. Timestamp compression uses a delta-of-delta encoding, so regular time series use very little memory to store timestamps. From analyzing the data stored in our performance monitoring system, we discovered that the value in most time series does not change significantly when compared to its neighboring data points. Further, many data sources only store integers (despite the system supporting floating point values). Knowing this, we were able to tune previous academic work to be easier to compute by comparing the current value with the previous value using XOR, and storing the changed bits. Ultimately, this algorithm resulted in compressing the entire data set by at least 90 percent.
(tags: beringei compression facebook monitoring tsd time-series storage architecture)
St. Petersburg team operated a PRNG hack against Vegas slots
According to Willy Allison, a Las Vegas–based casino security consultant who has been tracking the Russian scam for years, the operatives use their phones to record about two dozen spins on a game they aim to cheat. They upload that footage to a technical staff in St. Petersburg, who analyze the video and calculate the machine’s pattern based on what they know about the model’s pseudorandom number generator. Finally, the St. Petersburg team transmits a list of timing markers to a custom app on the operative’s phone; those markers cause the handset to vibrate roughly 0.25 seconds before the operative should press the spin button. “The normal reaction time for a human is about a quarter of a second, which is why they do that,” says Allison, who is also the founder of the annual World Game Protection Conference. The timed spins are not always successful, but they result in far more payouts than a machine normally awards: Individual scammers typically win more than $10,000 per day. (Allison notes that those operatives try to keep their winnings on each machine to less than $1,000, to avoid arousing suspicion.) A four-person team working multiple casinos can earn upwards of $250,000 in a single week.
(tags: prng hacking security exploits randomness gambling las-vegas casinos slot-machines)
Data from pacemaker used to arrest man for arson, insurance fraud
Compton has medical conditions which include an artificial heart linked to an external pump. According to court documents, a cardiologist said that "it is highly improbable Mr. Compton would have been able to collect, pack and remove the number of items from the house, exit his bedroom window and carry numerous large and heavy items to the front of his residence during the short period of time he has indicated due to his medical conditions." After US law enforcement caught wind of this peculiar element to the story, police were able to secure a search warrant and collect the pacemaker's electronic records to scrutinize his heart rate, the demand on the pacemaker and heart rhythms prior to and at the time of the incident.
(tags: pacemakers health medicine privacy data arson insurance fraud heart)
LandSafe.org: if you aren't safe, we'll make noise for you
a Dead Man's Switch for border crossings; if you are detained and cannot make a "checkin", it'll make noise on your behalf so your friends and family know what's happened
(tags: safety borders dead-mans-switch landsafe tools)
"what's the inside story on these young fascist nazis"
Excellent explanatory twitter thread explaining where this movement came from (ie chan sites):
"what's the inside story on these young fascist nazis" a lot of them ended up in shock humor/lonely dude forums that nazi recruiters joined. this isn't a fucking puzzle box, we have all the history right here. dudes ended up on various sites crossing nerdy hobbies & resentment. a buncha fucking nerds had their various dipshit teenage beefs, many starting with resentment of women, and got radicalized. "how did they end up nazis?" a bunch of real nazis whispered poison in their ears while becoming their only community, their only "friends". they also used multiple levels of irony to make bigotry and fascism more acceptable by drowning it in "oh we're just joking"
-
'shift is a [web] application that helps you run schema migrations on MySQL databases'
(tags: databases mysql sql migrations ops square ddl percona)
-
a decent SBC which apparently has enough power to drive Plex transcoding
Amazon EC2 Container Service Plugin - Jenkins - Jenkins Wiki
neat, relatively new plugin to use ECS as a autoscaling node fleet in Jenkins
GitLab.com Database Incident - 2017/01/31
Horrible, horrible postmortem doc. This is the kicker:
So in other words, out of 5 backup/replication techniques deployed none are working reliably or set up in the first place.
Reddit comments: https://www.reddit.com/r/linux/comments/5rd9em/gitlab_is_down_notes_on_the_incident_and_why_you/(tags: devops backups cloud outage incidents postmortem gitlab)
Supporting our Muslim sisters and brothers in tech - Inside Intercom
This is simply amazing:
Intercom is a dual-citizen company of a sort. We’ve had two offices from day zero. I moved to San Francisco from Ireland in 2011 and now hold a green card and live here. I set up our headquarters here, which contains all of our business functions. My cofounders set up our Dublin office, where our research and development teams are based. And we have over 150 people in each office now. We’d like to use this special position we’re in to try help anyone in our industry feeling unsafe and hurt right now. If you’re in tech, and you’re from one of the newly unfavored countries, or even if you’re not, but you’re feeling persecuted for being Muslim, we’d like to help you consider Dublin as a place to live and work. [....] – If you decide you want to look into moving seriously, we’ll retain our Dublin immigration attorneys for you, and pay your legal bills with them, up to €5k. We’ll do this for as many as we can afford. We should be able to do this for at least 50 people.
(tags: intercom muslim us-politics immigration dublin ireland)
Google - Site Reliability Engineering
The Google SRE book is now online, for free
A server with 24 years of uptime
wow. Stratus fault-tolerant systems ftw. 'This is a fault tolerant server, which means that hardware components are redundant. Over the years, disk drives, power supplies and some other components have been replaced but Hogan estimates that close to 80% of the system is original.' (via internetofshit, which this isn't)
Evolving MySQL Compression - Part 2 | Pinterest Engineering
generating a near-optimal external dictionary for Zlib deflate compression
Buzz Aldrin's travel expense claim form for Apollo 11
a mere $33.31
(tags: expenses apollo-11 buzz-aldrin funny forms)
An energy drink that contained radium was actually a thing in the 1920s
People who enjoy playing the cult post-apocalyptic game franchise Fallout are surely familiar with “Nuka Cola”. For those who don’t know, Nuka-Cola is a fictional soft drink that is omnipresent throughout the game. It glows with a sickly radioactive glow, and it satirizes America’s fascination with radium from the beginning of the 20th century. It may seem downright crazy, but a radioactive energy drink actually existed in the 1920s and people believed in its magical properties. [....] “RadiThor”, an energy drink produced from 1918 to 1928 by the Bailey Radium Laboratories in East New Jersey. William J. A. Bailey, a Harvard dropout, created the drink by simply dissolving ridiculous quantities of radium in water.
(tags: radithor radiation nuka-cola drinks soft-drinks history 1920s radium fallout)
Trump Tracker: All the Executive Orders Issued by the President
what is it, day 5? what an amazing shitshow
(tags: trump us-politics executive-orders tpp law)
-
Interesting article proposing a new discipline, focused on the data warehouse, from Maxime Beauchemin (creator and main committer on Apache Airflow and Airbnb’s Superset)
(tags: data-engineering engineering coding data big-data airbnb maxime-beauchemin data-warehouse)
-
'a specific type of flow diagram, in which the width of the arrows is shown proportionally to the flow quantity. Sankey diagrams put a visual emphasis on the major transfers or flows within a system. They are helpful in locating dominant contributions to an overall flow. Often, Sankey diagrams show conserved quantities within defined system boundaries. [....] One of the most famous Sankey diagrams is Charles Minard's Map of Napoleon's Russian Campaign of 1812. It is a flow map, overlaying a Sankey diagram onto a geographical map.'
Toyota's Gill Pratt: "No one is close to achieving true level 5 [self-driving cars]"
The most important thing to understand is that not all miles are the same. Most miles that we drive are very easy, and we can drive them while daydreaming or thinking about something else or having a conversation. But some miles are really, really hard, and so it’s those difficult miles that we should be looking at: How often do those show up, and can you ensure on a given route that the car will actually be able to handle the whole route without any problem at all? Level 5 autonomy says all miles will be handled by the car in an autonomous mode without any need for human intervention at all, ever. So if we’re talking to a company that says, “We can do full autonomy in this pre-mapped area and we’ve mapped almost every area,” that’s not Level 5. That’s Level 4. And I wouldn’t even stop there: I would ask, “Is that at all times of the day, is it in all weather, is it in all traffic?” And then what you’ll usually find is a little bit of hedging on that too. The trouble with this Level 4 thing, or the “full autonomy” phrase, is that it covers a very wide spectrum of possible competencies. It covers “my car can run fully autonomously in a dedicated lane that has no other traffic,” which isn’t very different from a train on a set of rails, to “I can drive in Rome in the middle of the worst traffic they ever have there, while it’s raining," which is quite hard. Because the “full autonomy” phrase can mean such a wide range of things, you really have to ask the question, “What do you really mean, what are the actual circumstances?” And usually you’ll find that it’s geofenced for area, it may be restricted by how much traffic it can handle, for the weather, the time of day, things like that. So that’s the elaboration of why we’re not even close.
(tags: autonomy driving self-driving cars ai robots toyota weather)
'Rules of Machine Learning: Best Practices for ML Engineering' from Martin Zinkevich
'This document is intended to help those with a basic knowledge of machine learning get the benefit of best practices in machine learning from around Google. It presents a style for machine learning, similar to the Google C++ Style Guide and other popular guides to practical programming. If you have taken a class in machine learning, or built or worked on a machine-learned model, then you have the necessary background to read this document.' Full of good tips, if you wind up using ML in a production service.
(tags: machine-learning ml google production coding best-practices)
-
Amazing how similar the Commodore 64 techniques were!
(tags: commodore-64 apple-ii history copy-protection assembly)
Facebook is censoring posts in Thailand that the government has deemed unsuitable | TechCrunch
Dictator-friendly censorship tools? no probs!
(tags: facebook censorship royalty thailand politics)
Who killed the curry house? | Bee Wilson | Life and style | The Guardian
This is fascinating, re "authenticity" of food:
The objection that curry house food was inauthentic was true, but also unfair. It’s worth asking what “authenticity” really means in this context, given that people in India – like humans everywhere – do not themselves eat a perfectly “authentic” diet. When I asked dozens of people, while on a recent visit to India, about their favourite comfort food, most of them – whether from Delhi, Bangalore or Mumbai – told me that what they really loved to eat, especially when drinking beer, was something called Indian-Chinese food. It is nothing a Chinese person would recognise, consisting of gloopy dishes of meat and noodles, thick with cornflour and soy sauce, but spiced with green chillis and vinegar to please the national palate. Indian-Chinese food – just like British curry house food – offers a salty night away from the usual home cooking. The difference is that Indian people accept Indian-Chinese food for the ersatz joy that it is, whereas many British curry house customers seem to have believed that recipe for their Bombay potatoes really did come from Bombay, and felt affronted to discover that it did not.
(tags: curry indian-food food chinese-food indian-chinese-food authenticity)
Banks biased against black fraud victims
We raised the issue of discrimination in 2011 with one of the banks and with the Commission for Racial Equality, but as no-one was keeping records, nothing could be proved, until today. How can this discrimination happen? Well, UK rules give banks a lot of discretion to decide whether to refund a victim, and the first responders often don’t know the full story. If your HSBC card was compromised by a skimmer on a Tesco ATM, there’s no guarantee that Tesco will have told anyone (unlike in America, where the law forces Tesco to tell you). And the fraud pattern might be something entirely new. So bank staff end up making judgement calls like “Is this customer telling the truth?” and “How much is their business worth to us?” This in turn sets the stage for biases and prejudices to kick in, however subconsciously. Add management pressure to cut costs, sometimes even bonuses for cutting them, and here we are.
(tags: discrimination racism fraud uk banking skimming security fca)
How a Machine Learns Prejudice - Scientific American
Agreed, this is a big issue.
If artificial intelligence takes over our lives, it probably won’t involve humans battling an army of robots that relentlessly apply Spock-like logic as they physically enslave us. Instead, the machine-learning algorithms that already let AI programs recommend a movie you’d like or recognize your friend’s face in a photo will likely be the same ones that one day deny you a loan, lead the police to your neighborhood or tell your doctor you need to go on a diet. And since humans create these algorithms, they're just as prone to biases that could lead to bad decisions—and worse outcomes. These biases create some immediate concerns about our increasing reliance on artificially intelligent technology, as any AI system designed by humans to be absolutely "neutral" could still reinforce humans’ prejudicial thinking instead of seeing through it.
(tags: prejudice bias machine-learning ml data training race racism google facebook)
Falsehoods Programmers Believe About CSVs
Much of my professional work for the last 10+ years has revolved around handing, importing and exporting CSV files. CSV files are frustratingly misunderstood, abused, and most of all underspecified. While RFC4180 exists, it is far from definitive and goes largely ignored. Partially as a companion piece to my recent post about how CSV is an encoding nightmare, and partially an expression of frustration, I've decided to make a list of falsehoods programmers believe about CSVs. I recommend my previous post for a more in-depth coverage on the pains of CSVs encodings and how the default tooling (Excel) will ruin your day.
(via Tony Finch)(tags: via:fanf csv excel programming coding apis data encoding transfer falsehoods fail rfc4180)
Final Fantasy 7: An oral history
Pretty amazing, particularly for this revelation:
Tetsuya Nomura (Character and battle visual director, Square Japan): OK, so maybe I did kill Aerith. But if I hadn’t stopped you, in the second half of the game, you were planning to kill everyone off but the final three characters the player chooses! Yoshinori Kitase (Director, Square Japan) No way! I wrote that? Where? Tetsuya Nomura (Character and battle visual director, Square Japan) In the scene where they parachute into Midgar. You wanted everyone to die there!
(tags: games history gaming aeris final-fantasy square-enix ff7 stories)
Building the plane on the way up
in 1977, Jet Propulsion Lab (JPL) scientists packed a Reed-Solomon encoder in each Voyager, hardware designed to add error-correcting bits to all data beamed back at a rate of efficiency 80 percent higher than an older method also included with Voyager. Where did the hope come in? When the Voyager probes were launched with Reed-Solomon encoders on board, no Reed-Solomon decoders existed on Earth.
(tags: reed-solomon encoding error-correction voyager vger history space nasa probes signalling)
Debugging Java Native Memory Leaks (evanjones.ca)
Using jemalloc to instrument the contents of the native heap and record stack traces of each chunk's allocators, so that leakers can be quickly identified (GZIPInputStream in this case). See also https://gdstechnology.blog.gov.uk/2015/12/11/using-jemalloc-to-get-to-the-bottom-of-a-memory-leak/ .
(tags: debugging memory jvm java leaks memory-leaks leak-checking jemalloc malloc native heap off-heap gzipinputstream)
Sanrio Introduces Rage-Filled Red Panda Character Aggretsuko
wut:
If you’ve always loved Hello Kitty but wish she also came with a deep well of rage, Sanrio has introduced just the character for you: Aggretsuko. An adorable 25-year-old red panda who works as an office associate, Aggretsuko is constantly taken advantage of and bothered by her boss and co-workers. So she deals with it by pounding beers and screaming death-metal karaoke.
(tags: sanrio hello-kitty aggretsuko funny japan anger rage death-metal karaoke)
PagerDuty Incident Response Documentation
This documentation covers parts of the PagerDuty Incident Response process. It is a cut-down version of our internal documentation, used at PagerDuty for any major incidents, and to prepare new employees for on-call responsibilities. It provides information not only on preparing for an incident, but also what to do during and after. It is intended to be used by on-call practitioners and those involved in an operational incident response process (or those wishing to enact a formal incident response process).
This is a really good set of processes -- quite similar to what we used in Amazon for high-severity outage response.(tags: ops process outages pagerduty incident-response incidents on-call)
The Irish Ether Drinking Craze
Dr. Kelly, desperate to become intoxicated while maintaining The Pledge, realized that not only could ether vapors be inhaled, but liquid ether could be swallowed. Around 1845 he began consuming tiny glasses of ether, and then started dispensing these to his patients and friends as a nonalcoholic libation. It wasn't long before it became a popular beverage, with one priest going so far as to declare that ether was "a liquor on which a man could get drunk with a clean conscience." In some respects ingesting ether is less damaging to the system than severe alcohol intoxication. Its volatility - ether is a liquid at room temperature but a gas at body temperature -dramatically speeds its effects. Dr. Ernest Hart wrote that "the immediate effects of drinking ether are similar to those produced by alcohol, but everything takes place more rapidly; the stages of excitement, mental confusion, loss of muscular control, and loss of consciousness follow each other so quickly that they cannot be clearly separated." Recovery is similarly rapid. Not only were ether drunks who were picked up by the police on the street often completely sober by the time they reached the station, but they suffered no hangovers. Ether drinking spread rapidly throughout Ireland, particularly in the North, and the substance soon could be purchased from grocers, druggists, publicans, and even traveling salesmen. Because ether was produced in bulk for certain industrial uses, it could also be obtained quite inexpensively. Its low price and rapid action meant than even the poorest could afford to get drunk several times a day on it. By the 1880s ether, distilled in England or Scotland, was being imported and widely distributed to even the smallest villages. Many Irish market towns would "reek of the mawkish fumes of the drug" on fair days when "its odor seems to cling to the very hedges and houses for some time."
(tags: ether history ireland northern-ireland ulster drugs bizarre)
-
Can't help feeling danah boyd is hitting the nail on the head here:
The Internet has long been used for gaslighting, and trolls have long targeted adversaries. What has shifted recently is the scale of the operation, the coordination of the attacks, and the strategic agenda of some of the players. For many who are learning these techniques, it’s no longer simply about fun, nor is it even about the lulz. It has now become about acquiring power. A new form of information manipulation is unfolding in front of our eyes. It is political. It is global. And it is populist in nature. The news media is being played like a fiddle, while decentralized networks of people are leveraging the ever-evolving networked tools around them to hack the attention economy.
(tags: danah-boyd news facebook social-media gaslighting trolls 4chan lulz gamergate fake-news)
World's top 100 cocktails of 2016
per Difford's Guide -- Amaretto Sour, Margarita, Bramble, Espresso Martini, Old-Fashioned, Negroni, White Lady and Manhattan up there.
Raising the Roof: Comments on the recent Newgrange ‘roof-box’ controversy
Instead of discussing recent site visits or photographs we’ll be looking at a recent controversy sparked by comments about the reconstruction of Newgrange and, in particular, three claims made in the media by an Irish archaeologist; 1. That the “roof-box” at Newgrange may not be an original feature, instead it was “fabricated” and has “not a shred of authenticity” 2. That two vitally important structural stones, both decorated with megalithic art, from Newgrange were lost after the excavation and 3. That the photographic evidence that backs up the existing restoration is either inaccessible or never existed at all. I hope to show why we can be sure none of these claims are sustainable and that in fact the winter solstice phenomenon at Newgrange is an original and central feature of the tomb.
(tags: history newgrange archaeology solstice ireland megalithic)
Leap Smear | Public NTP | Google Developers
Google offers public NTP service with leap smearing -- I didn't realise! (thanks Keith)
(tags: google clocks time ntp leap-smearing leap-second ops)
How and why the leap second affected Cloudflare DNS
The root cause of the bug that affected our DNS service was the belief that time cannot go backwards. In our case, some code assumed that the difference between two times would always be, at worst, zero. RRDNS is written in Go and uses Go’s time.Now() function to get the time. Unfortunately, this function does not guarantee monotonicity. Go currently doesn’t offer a monotonic time source.
So the clock went "backwards", s1 - s2 returned < 0, and the code couldn't handle it (because it's a little known and infrequent failure case). Part of the root cause here is cultural -- Google has solved the leap-second problem internally through leap smearing, and Go seems to be fundamentally a Google product at heart. The easiest fix in general in the "outside world" is to use "ntpd -x" to do a form of smearing. It looks like AWS are leap smearing internally (https://aws.amazon.com/blogs/aws/look-before-you-leap-the-coming-leap-second-and-aws/), but it is a shame they aren't making this a standard part of services running on top of AWS and a feature of the AWS NTP fleet.(tags: ntp time leap-seconds fail cloudflare rrdns go golang dns leap-smearing ntpd aws)
-
via twitter: "interesting conversation between author of a parenting book and the guy who introduced the concept of "flow"" -- summary, family life is interrupt-driven (via nagging) and fundamentally hard to align with "flow"
-
wow
(tags: dick-cheney pacemakers iot internetofshit wireless security via:jzdziarski)
AWS re:Invent 2016: Lessons Learned from a Year of Using Spot Fleet (CMP205) - YouTube
Yelp talk about their Spot Fleet price optimization autoscaler app, FleetMiser
(tags: yelp scaling aws spot-fleet ops spot-instances money)
4 Wi-Fi Tips from Former Apple Wi-Fi Engineer
Good tips: use the same SSID for all radios; deal with congestion with more APs using less power; don't use "Wide" channels on 2.4Ghz; and place antennae perpendicular to each other.
(tags: wifi 2.4ghz 5ghz networking hardware macs apple tips)
The hidden cost of QUIC and TOU
The recent movement to get all traffic encrypted has of course been great for the Internet. But the use of encryption in these protocols is different than in TLS. In TLS, the goal was to ensure the privacy and integrity of the payload. It's almost axiomatic that third parties should not be able to read or modify the web page you're loading over HTTPS. QUIC and TOU go further. They encrypt the control information, not just the payload. This provides no meaningful privacy or security benefits. Instead the apparent goal is to break the back of middleboxes [0]. The idea is that TCP can't evolve due to middleboxes and is pretty much fully ossified. They interfere with connections in all kinds of ways, like stripping away unknown TCP options or dropping packets with unknown TCP options or with specific rare TCP flags set. The possibilities for breakage are endless, and any protocol extensions have to jump through a lot of hoops to try to minimize the damage.
(tags: quic tou protocols http tls security internet crypto privacy firewalls debugging operability)
Slicer: Auto-sharding for datacenter applications
Paper from Google describing one of their internal building block services:
A general purpose sharding service. I normally think of sharding as something that happens within a (typically data) service, not as a general purpose infrastructure service. What exactly is Slicer then? It has two key components: a data plane that acts as an affinity-aware load balancer, with affinity managed based on application-specified keys; and a control plane that monitors load and instructs applications processes as to which keys they should be serving at any one point in time. In this way, the decisions regarding how to balance keys across application instances can be outsourced to the Slicer service rather than building this logic over and over again for each individual back-end service. Slicer is focused exclusively on the problem of balancing load across a given set of backend tasks, other systems are responsible for adding and removing tasks.
interesting.(tags: google sharding slicer architecture papers)
Cherami: Uber Engineering’s Durable and Scalable Task Queue in Go - Uber Engineering Blog
a competing-consumer messaging queue that is durable, fault-tolerant, highly available and scalable. We achieve durability and fault-tolerance by replicating messages across storage hosts, and high availability by leveraging the append-only property of messaging queues and choosing eventual consistency as our basic model. Cherami is also scalable, as the design does not have single bottleneck. [...] Cherami is completely written in Go, a language that makes building highly performant and concurrent system software a lot of fun. Additionally, Cherami uses several libraries that Uber has already open sourced: TChannel for RPC and Ringpop for health checking and group membership. Cherami depends on several third-party open source technologies: Cassandra for metadata storage, RocksDB for message storage, and many other third-party Go packages that are available on GitHub. We plan to open source Cherami in the near future.
(tags: cherami uber queueing tasks queues architecture scalability go cassandra rocksdb)
The Perfect Weapon: How Russian Cyberpower Invaded the U.S. - The New York Times
This is scary shit. It's amazing how Russia has weaponised transparency, but I guess it's not new to observers of "kompromat": https://en.wikipedia.org/wiki/Kompromat
(tags: kompromat russia cyberpower cyberwar security trump us-politics dnc)
Did the Russians “hack” the election? A look at the established facts | Ars Technica
solid roundup. There's a whole lot of evidence pointing Russia's way, basically
(tags: usa russia hacking politics security us-politics trump)
-
good preso from Percona Live 2015 on the messiness of MySQL vs UTF-8 and utf8mb4
(tags: utf-8 utf8mb4 mysql storage databases slides booking.com character-sets)
-
A new data structure for accurate on-line accumulation of rank-based statistics such as quantiles and trimmed means. The t-digest algorithm is also very parallel friendly making it useful in map-reduce and parallel streaming applications. The t-digest construction algorithm uses a variant of 1-dimensional k-means clustering to product a data structure that is related to the Q-digest. This t-digest data structure can be used to estimate quantiles or compute other rank statistics. The advantage of the t-digest over the Q-digest is that the t-digest can handle floating point values while the Q-digest is limited to integers. With small changes, the t-digest can handle any values from any ordered set that has something akin to a mean. The accuracy of quantile estimates produced by t-digests can be orders of magnitude more accurate than those produced by Q-digests in spite of the fact that t-digests are more compact when stored on disk.
Super-nice feature is that it's mergeable, so amenable to parallel usage across multiple hosts if required. Java implementation, ASL licensing.(tags: data-structures algorithms java t-digest statistics quantiles percentiles aggregation digests estimation ranking)
How Putin's cronies seized control of VKontakte
via Pinboard. grim
(tags: putin russia vk vkontacte social-media politics censorship totalitarianism)
Ask HN: Best current model routers for OpenWRT, DD-WRT, Tomato, etc.?
good hardware recommendations
A Yale history professor's 20-point guide to defending democracy under a Trump presidency — Quartz
Good advice -- let's hope it doesn't come to this. Example: '17. Watch out for the paramilitaries: When the men with guns who have always claimed to be against the system start wearing uniforms and marching around with torches and pictures of a Leader, the end is nigh. When the pro-Leader paramilitary and the official police and military intermingle, the game is over.'
(tags: trump activism government politics us-politics right-wing history hitler nazis fascism)
Commentary: The ‘Irish’ Startup Attribution Problem
Why don't Irish tech startup activity show up on a EU-wide comparisons? Turns out we tend to transition to a US-based model, with US-based management and EU-based operations and engineering, like $work does:
Successful Irish tech companies have a skewed geographic profile. This presents a data gathering problem for the data companies but its also a strong indicator of the market reality for Irish startups. The size of the local market and a focus on software business in particular means many Irish startups are transitioning to the US (some earlier and with more commitment than others), and getting backed by a spectrum of local and international VCs.
Correcting for this put Ireland's tech venture investment in the second half of 2014 at $125m, midway between Sweden and Finland, 8th in Europe overall.
Hi-tech caves bring prehistoric Sistine chapel back to life
ooh, Lascaux 4 is finally opening:
St-Cyr added: “It’s impossible for anyone to see the original now, but this is the next best thing. What is lost in not having the real thing is balanced by the fact people can see so much more of the detail of the wonderful paintings and engravings.”
Contactless credit cards vulnerable to a range of scams
Johanson said it's possible to use an RFID "gate antenna" — two electronic readers spanning a doorway, similar to the anti-theft gates in retail stores — to scan the credit cards of people passing through. With enough high-powered gates installed at key doorways in a city or across the country, someone could collect comprehensive information on people's movements, buying habits and social patterns. "These days you can buy a $500 antenna to mount in doorways that can read every card that goes through it," Johanson said.
Amazingly, these seem to be rife with holes -- they still use the legacy EMV protocol, do not require online verification with backend systems, and allow replay attacks. A Journal.ie article today claims that attackers are sniffing EMV data, then replaying it against card readers in shops in Dublin, which while it may not be true, the attack certainly seems viable...(tags: rfid security scams emv wireless contactless credit-cards replay-attacks)
Counterfeit Macbook charger teardown: convincing outside but dangerous inside
rather dramatic differences
(tags: apple macbook chargers components hardware clones counterfeit)
Developer Preview – EC2 Instances (F1) with Programmable Hardware
this is frankly amazing. Elastic FPGAs!
-
USB DAC strongly recommended by Soren Ragsdale -- EUR66
(tags: usb dac music audio hardware recommendations tips toget)
Trump’s lies have a purpose. They are an assault on democracy
Donald Trump's media strategy as a form of Surkovian control via post-truth 'destabilised perception', through deliberate flooding with fake news:
By attacking the very notion of shared reality, the president-elect is making normal democratic politics impossible. When the truth is little more than an arbitrary personal decision, there is no common ground to be reached and no incentive to look for it. To men like Surkov, that is exactly as it should be. Government policy should not be set through democratic oversight; instead, the government should “manage” democracy, ensuring that people can express themselves without having any influence over the machinations of the state. According to a 2011 openDemocracy article by Richard Sakwa, a professor of Russian and European politics at the University of Kent, Surkov is “considered the main architect of what is colloquially known as ‘managed democracy,’ the administrative management of party and electoral politics.” “Surkov’s philosophy is that there is no real freedom in the world, and that all democracies are managed democracies, so the key to success is to influence people, to give them the illusion that they are free, whereas in fact they are managed,” writes Sakwa. “In his view, the only freedom is ‘artistic freedom.’”
(tags: post-truth lies donald-trump surkov breitbart pr media news propaganda fake-news)
PayWave & PayPass deletion via RFID antenna kill
remove RFID from a payment card with a single drilled hole
(tags: rfid banking cards debit-cards credit-cards)
Fast Forward Labs: Probabilistic Data Structure Showdown: Cuckoo Filters vs. Bloom Filters
Nice comparison of a counting Bloom filter and a Cuckoo Filter, implemented in Python:
This post provides an update by exploring Cuckoo filters, a new probabilistic data structure that improves upon the standard Bloom filter. The Cuckoo filter provides a few advantages: 1) it enables dynamic deletion and addition of items 2) it can be easily implemented compared to Bloom filter variants with similar capabilities, and 3) for similar space constraints, the Cuckoo filter provides lower false positives, particularly at lower capacities. We provide a python implementation of the Cuckoo filter here, and compare it to a counting Bloom filter (a Bloom filter variant).
(tags: algorithms probabilistic approximation bloom-filters cuckoo-filters sets estimation python)
-
Football Manager includes what is effectively a parallel universe, so they modelled the effects of Brexit on the UK Premier League: 'In my own current “save”, Brexit kicked in at the end of season three. Unfortunately I got one of the hard options, where all non-homegrown players are now going through a work permit system, albeit one that’s slightly relaxed. It means I can no longer bring in that 19-year-old Italian keeper I’d been eyeing up as one for the future. Instead I have to wait for him to break into the Italian squad, and play 30% of their fixtures over the next two years. Then he’ll be mine. Meanwhile, my TV revenue has just dropped by a few million. Let’s hope that doesn’t continue, or I won’t even be able to afford him.'
(tags: brexit uk games gaming football-manager forecasts simulation)
Accidentally Quadratic — Rust hash iteration+reinsertion
It was recently discovered that some surprising operations on Rust’s standard hash table types could go quadratic.
Quite a nice unexpected accidental detour into O(n^2)(tags: big-o hashing robin-hood-hashing siphash algorithms hashtables rust)
Reproducible research: Stripe’s approach to data science
This is intriguing -- using Jupyter notebooks to embody data analysis work, and ensure it's reproducible, which brings better rigour similarly to how unit tests improve coding. I must try this.
Reproducibility makes data science at Stripe feel like working on GitHub, where anyone can obtain and extend others’ work. Instead of islands of analysis, we share our research in a central repository of knowledge. This makes it dramatically easier for anyone on our team to work with our data science research, encouraging independent exploration. We approach our analyses with the same rigor we apply to production code: our reports feel more like finished products, research is fleshed out and easy to understand, and there are clear programmatic steps from start to finish for every analysis.
(tags: stripe coding data-science reproducability science jupyter notebooks analysis data experiments)
Introducing Veneur: high performance and global aggregation for Datadog
neat -- aggregation of histograms for Datadog statsd
(tags: datadog statsd metrics percentiles ops)
-
auditd -> go-audit -> elasticsearch at Slack
Irish eyes are crying: Tens of thousands of broadband modems wide open to hijacking
Eir ship vulnerable firmware images AGAIN. ffs
(tags: eircom eir fail firmware security zyxel d1000 tr-064)
"Solving Imaginary Scaling Issues" ... "At Scale"
Amazing virtuoso performance -- be sure to scroll up all the way to Chapter 1
(tags: scalability funny lol twitter oreilly)
Webhooks do’s and dont’s: what we learned after integrating +100 APIs
interesting tips
(tags: webhooks api http https architecture)
Dynamically Scale Applications on Amazon EMR with Auto Scaling
good call -- new EMR feature
Testing@LMAX – Time Travel and the TARDIS
LMAX' approach to acceptance/system-testing time-dependent code. We are doing something similar in Swrve too, so finding that LMAX have taken a similar approach is a great indicator
(tags: lmax testing system-tests acceptance-tests tests time)
Heineken refreshed by ‘craft beer’ ruling
scumbags. Attempting to pass off their pissy beer under alternative names to con consumers into buying it! 'There will be no sanctions against Heineken for passing off non-craft beer as “locally produced”, the Food Safety Authority of Ireland (FSAI) has said. The FSAI and HSE launched a joint investigation last month after it emerged that Heineken Ireland had sold some of its products, including Foster’s lager, under craft-type names such as Blasket Blonde and Beanntrai Bru. Two well-known stouts, Beamish and Murphy’s, were also sold under craft-type names by the international brewing giant. C&C, a Tipperary-based drinks company, was also investigated after it admitted selling its Clonmel 1650 lager under a different name, Pana Cork, in Cork.'
Simple Queue Service FIFO Queues with Exactly-Once Processing & Deduplication
great, I've looked for this so many times. Only tricky limit I can spot is the 300 tps limit, and it's US-East/US-West only for now
"Get In Control Of Your Workflows With Airflow"
good intro to Airflow usage preso
(tags: airflow presentations ops workflow scheduling scheduler)
Etsy Debriefing Facilitation Guide
by John Allspaw, Morgan Evans and Daniel Schauenberg; the Etsy blameless postmortem style crystallized into a detailed 27-page PDF ebook
(tags: etsy postmortems blameless ops production debriefing ebooks)
-
'bike-shedding', or needless arguing about trivial issues, actually dates back to 1957 as C. Northcote Parkinson's 'law of triviality'
(tags: triviality bikeshed bikeshedding management arguments decisions history)
Julia Evans reverse engineers Skyliner.io
simple usage of Docker, blue/green deploys, and AWS ALBs
(tags: docker alb aws ec2 blue-green-deploys deployment ops tools skyliner via:jgilbert)
IPBill ICRs are the perfect material for 21st-century blackmail
ICRs are the perfect material for blackmail, which makes them valuable in a way that traditional telephone records are not. And where potentially large sums of money are involved, corruption is sure to follow. Even if ICR databases are secured with the best available technology, they are still vulnerable to subversion by individuals whose jobs give them ready access. This is no theoretical risk. Just one day ago, it emerged that corrupt insiders at offshore call centres used by Australian telecoms were offering to sell phone records, home addresses, and other private details of customers. Significantly, the price requested was more if the target was an Australian "VIP, politician, police [or] celebrity."
(tags: blackmail privacy uk-politics uk snooping surveillance icrs australia phone-records)
Docklands Print Commission 2016: Colin Martin
I love Colin's work. just may spring for this one
(tags: colin-martin art prints etchings dublin history vinyl)
-
a low-cost online vendor in Ireland, recommended by @irldexter on ITS (along with webdoctor.ie): 'For basic consultations I halved the cost €55 to engage a GP with https://www.webdoctor.ie/ down to €25 (for limited domains) and after paying €8.48 and €9.48 respectively for a Ventolin inhaler, I now get them for €3.50 at http://www.purepharmacy.ie/ (closer to mainland EU costs). I also benchmarked my parents medicine costs which worked out 40% cheaper too.'
(tags: recommendations pharmacy ireland doctors health medicine)
Rents dwarf Celtic Tiger era with ‘disastrous effect’ on society
“The scale of the challenge here remains depressing,” says the report. “It has never been viable to build apartment blocks in the vast majority of this country.” [...] The report notes that the rise in living costs of almost three quarters in less than five years is “a symptom of strong demand for housing” as economic recovery continues and the population grows. “But there is nothing inevitable about housing costs rising with demand,” it says. “That only happens when supply fails to respond, and the complete absence of any meaningful level of construction over the past five years is a systemic failure in desperate need of policy solutions. “There is no more urgent task facing the Minister for Housing, his department and advisers, and the Housing Agency, than understanding why the costs of building, and building apartments in particular, is so dramatically out of line with our own incomes and indeed with the cost in other countries.”
-
I'm not remotely interested in shockingly good graphics, in murder simulators, in guns and knives and swords. I'm not that interested in adrenaline. My own life is thrilling enough. There is enough fear and hatred in the world to get my heart pounding. My Facebook feed and Twitter feed are enough for that. Walking outside in summer clothing is enough for that. I'm interested in care, in characters, in creation, in finding a path forward inside games that helps me find my path forward in life. I am interested in compassion and understanding. I'm interested in connecting. As Miranda July said, "all I ever wanted to know is how other people are making it through life." I want to make games that help other people understand life. We are all overwhelmed with shock, with information, with change. The degree of interactivity in our lives is amazing and wonderful and I wouldn't exchange it for anything, but it is also shocking and overwhelming and it's causing us to dig in and try to find some peace by shutting each other out. On all sides of the political spectrum we've stopped listening to each other and I fear we are all leaning toward fascist thinking. We should be using this medium to help us adapt to our new, interactive lives. This is how we become relevant.
(tags: essay feminism society culture games gaming life art)
Tesco Bank: 20,000 customers lose money - BBC News
"Any financial loss that results from this fraudulent activity will be borne by the bank," Mr Higgins said. "Customers are not at financial risk."
Well, that would be surprising....-
Hooray for nuclear power. (via Ossian Smyth)
(tags: nukes nuclear-power power apple datacenters ireland ida)
-
Ivan's Childhood, Andrei Rublev, Solaris, The Mirror, and Stalker -- all viewable for free on YouTube thanks to Mosfilm. quality not great though....
Jeff Erickson's Algorithms, Etc.
This page contains lecture notes and other course materials for various algorithms classes I have taught at the University of Illinois, Urbana-Champaign. The notes are numbered in the order I cover the material in a typical undergraduate class, wtih notes on more advanced material (indicated by the symbol ?) interspersed appropriately. [...] In addition to the algorithms notes I have been maintaining since 1999, this page also contains new notes on "Models of Computation", which cover a small subset of the material normally taught in undergraduate courses in formal languages and automata. I wrote these notes for a new junior-level course on "Algorithms and Models of Computation" that Lenny Pitt and I developed, which is now required for all undergraduate computer science and computer engineering majors at UIUC.
Via Tony Finch(tags: via:fanf book cs algorithms jeff-erickson uiuc)
How Macedonia Became A Global Hub For Pro-Trump Misinformation - BuzzFeed News
“I started the site for a easy way to make money,” said a 17-year-old who runs a site [from Veles] with four other people. “In Macedonia the economy is very weak and teenagers are not allowed to work, so we need to find creative ways to make some money. I’m a musician but I can’t afford music gear. Here in Macedonia the revenue from a small site is enough to afford many things.”
(tags: macedonia veles scams facebook misinformation donald-trump us-politics)
-
'an antagonistic GSM base station [disguised] in the form of an innocuous office printer. It brings the covert design practice of disguising cellular infrastructure as other things - like trees and lamp-posts - indoors, while mimicking technology used by police and intelligence agencies to surveil mobile phone users.'
(tags: gsm hardware art privacy surveillance hacks printers mobile-phones)
Testing Docker multi-host network performance - Percona Database Performance Blog
wow, Docker Swarm looks like a turkey right now if performance is important. Only "host" gives reasonably perf numbers
(tags: docker networking performance ops benchmarks testing swarm overlay calico weave bridge)
-
Subreddit devoted to becoming a software developer in Ireland, with a decent wiki
Great comment on the "realism" of space photos
In short, the answer to the question “is this what it would look like if I was there?” is almost always no, but that is true of every photograph. The photos taken from space cameras are no more fake or false than the photos taken from any camera. Like all photos they are a visual interpretation using color to display data. Most space photos have information online about how they were created, what filters were used, and all kinds of interesting details about processing. The discussion about whether a space photo is real or fake is meaningless. There's no distinction between photoshopped and not. It's a nuanced view but the nature of the situation demands it.
(tags: photography photos space cassini probes cameras light wavelengths science vision realism real)
-
LOL as DST bug uncovers spurious automated noise complaints:
In January last year the airport unearthed a scheme whereby campaigners were using automated software to generate complaints against the airport. Officials caught out the set-up when the two anti-Heathrow enthusiasts forgot to take into account the hour going back in October, and began complaining about flights that had not yet taken off or arrived.
(tags: bugs dst daylight-savings-time funny heathrow complaints automation noise)
Facebook scuppers Admiral Insurance plan to base premiums on your posts
Well, this is amazingly awful:
The Guardian claims to have further details of the kind of tell-tale signs that Admiral's algorithmic analysis would have looked out for in Facebook posts. Good traits include "writing in short concrete sentences, using lists, and arranging to meet friends at a set time and place, rather than just 'tonight'." On the other hand, "evidence that the Facebook user might be overconfident—such as the use of exclamation marks and the frequent use of 'always' or 'never' rather than 'maybe'—will count against them."
The future is shitty.(tags: insurance facebook scoring computer-says-no algorithms text-analysis awful future)
MemC3: Compact and concurrent Memcache with dumber caching and smarter hashing
An improved hashing algorithm called optimistic cuckoo hashing, and a CLOCK-based eviction algorithm that works in tandem with it. They are evaluated in the context of Memcached, where combined they give up to a 30% memory usage reduction and up to a 3x improvement in queries per second as compared to the default Memcached implementation on read-heavy workloads with small objects (as is typified by Facebook workloads).
(tags: memcached performance key-value-stores storage databases cuckoo-hashing algorithms concurrency caching cache-eviction memory throughput)
Total Nightmare: USB-C and Thunderbolt 3
the coming incompatibility nightmare of USB-C cabling
(tags: usb usb-c thunderbolt apple cables hardware confusion)
Amazon ElastiCache for Redis Update – Sharded Clusters, Engine Improvements, and More | AWS Blog
Elasticache now supports sharding
(tags: elasticache sharding storage aws databases redis ops)
-
The square root staffing law is a rule of thumb derived from queueing theory, useful for getting an estimate of the capacity you might need to serve an increased amount of traffic.
(tags: ops capacity planning rules-of-thumb qed-regime efficiency architecture)
Measuring Docker IO overhead - Percona Database Performance Blog
See also https://www.percona.com/blog/2016/02/05/measuring-docker-cpu-network-overhead/ for the CPU/Network equivalent. The good news is that nowadays it's virtually 0 when the correct settings are used
(tags: docker percona overhead mysql deployment performance ops containers)
React’s license: necessary and open?
Luis Villa: 'Is the React license elegant? No. Should you be worried about using it? Probably not. If anything, Facebook’s attempt to give users an explicit patent license should probably be seen as a good faith gesture that builds some confidence in their ecosystem. But yeah, don’t use it if your company intends to invest heavily in React and also sue Facebook over unrelated patents. That… would be dumb. :)'
(tags: luis-villa open-source react facebook patents swpats licensing licenses bsd)
-
Writeup of their Consul-based service discovery system, a bit similar to smartstack. Good description of the production problems that they saw with Consul too, and also they figured out that strong consistency isn't actually what you want in a service discovery system ;) HN comments are good too: https://news.ycombinator.com/item?id=12840803
(tags: consul api microservices service-discovery dns load-balancing l7 tcp distcomp smartstack stripe cap-theorem scalability)