Firms involved in biometric database in India contracted by Irish government
Two tech firms – one owned by businessman Dermot Desmond – involved in the creation of a controversial biometric database in India, are providing services for the Government’s public services card and passports. Known as the Aadhaar project, the Indian scheme is the world’s largest ever biometric database involving 1.2 billion citizens. Initially voluntary, it became mandatory for obtaining state services, for paying taxes and for opening a bank account. [...] Dermot Casey, a former chief technology officer of Storyful, said that if the Daon system was used to store the data and carry out the facial matching then the Government “appears to have purchased a biometric database system which can be extended to include voice, fingerprint and iris identification at a moment’s notice”. Katherine O’Keefe, a data protection consultant with Castlebridge, said if the departments were using images of people’s faces to single out or identify an individual, they were “by legal definition processing biometric data”.
(tags: biometrics databases aadhar id-cards ireland psc daon morpho)
Category: Uncategorized
-
racist tries to make a "Blue Lives Matter" tee shirt as gaeilge, accidentally writes "Black Lives Matter" instead. perfect
(tags: racists duh stupid translation fail daoine-gorme irish blm cops funny)
New Network Load Balancer – Effortless Scaling to Millions of Requests per Second | AWS Blog
Looks like the EC2 Networking team got their way and got to rewrite LBs in AWS
(tags: load-balancing aws elb alb nlb networking ec2 ops architecture)
The solution to the Voynich manuscript
To those who have studied medieval medicine, and possess a good knowledge of its origins, the classical physicians Galen (AD 129–210), Hippocrates (460–370 BC) and Soranus (AD 98–138) among them, the Voynich manuscript’s incorporation of an illustrated herbarium (collection of plant remedies), Zodiac charts, instructions on thermae (baths) and a diagram showing the influence of the Pleiades side by side will not be surprising. They are all in tune with contemporary medical treatises, part and parcel of the medieval world of health and healing. Bathing as a remedy is a time-honoured tradition: practised by the Greeks and the Romans, advocated by the classical physicians, and sustained during the Middle Ages. The central theme of the Voynich manuscript is just such an activity, and one of its chief characteristics is the presence of naked female figures immersed in some concoction or other. Classical and medieval medicine had separate divisions devoted to the complaints and diseases of women, mostly but not exclusively in the area of gynaecology, and covered other topics such as hygiene, food, purgatives, bloodletting, fumigations, tonics, tinctures and even cosmetics and perfumes: all involved “taking the waters”, by bathing or ingesting.
(tags: history voynich-manuscript codes medieval-medicine thermae herbaria)
-
You do not need to be a Stanford student or faculty or staff member to access the vast treasures of the Rumsey Map collection, nor do you need to visit the university or its new Center. Since 1996, the Rumsey collection’s online database has been open to all, currently offering anyone with an internet connection access to 67,000 maps from all over the globe, spanning five centuries of cartography.
(via Oisin)(tags: via:oisin maps art graphics open-access mapping history david-rumsey collections)
-
TJ McIntyre nails the problem here:
'Mandatory but not compulsory". This ill-judged hair-splitting seems likely to stick to Social Protection Minister Regina Doherty in the same way that "an Irish solution to an Irish problem" and "on mature recollection" did to politicians before her. The minister used that phrase to defend against the criticism that the public services card (PSC) is being rolled out as a national ID card by stealth, without any clear legal basis or public debate. She went on to say that the PSC is not compulsory as "nobody will drag you kicking and screaming to have a card". This is correct, but irrelevant. The Government's strategy is one of making the PSC effectively rather than legally compulsory - by cutting off benefits such as pensions and refusing driving licences and passports unless a person registers. Whether or not the PSC is required by law is immaterial if you cannot function in society without it.
(tags: psc id-cards ireland social-welfare id privacy data-protection)
The data for the Irish theory driving test is stored in the US
Prometric is the company which adminsters the test and they appear to store it on US-based servers
(tags: prometric data privacy data-protection driving-test ireland theory-test)
-
'It is our intention to open source all of Basho's products and all of the source code that they have been working on. We'll do this as quickly as we are able to organise it, and we would appreciate some input from the community on how you would like this done.'
Britta Blvd - The Marauders' Map
lovely bit of papercraft
(tags: harry-potter papercraft origami kids)
How to Easily Unsubscribe from Bulk Emails in Gmail - Unroll.me Alternative
nice Google Script which runs in the background and scrapes out unsubscribe links. I'm drowning in single-opt-in mainsleaze newsletters at this stage so this is very welcome
(tags: mainsleaze unsubscribe spam gmail google email one-bite-of-the-apple)
-
Log analyser and visualiser for the HotSpot JIT compiler. Inspect inlining decisions, hot methods, bytecode, and assembly. View results in the JavaFX user interface.
(tags: analysis java jvm performance tools debugging optimization jit)
-
'Reviews of U2F [Universal Second Factor] devices' -- ie. Yubico keys et al.
(tags: u2f totp oath otp one-time-passwords authentication devices gadgets security 2fa)
-
good set of tourist tips for a foodie Dublin weekender
(tags: dublin tourism food eating dining restaurants tips weekend)
Linux Load Averages: Solving the Mystery
Nice bit of OS archaeology by Brendan Gregg.
In 1993, a Linux engineer found a nonintuitive case with load averages, and with a three-line patch changed them forever from "CPU load averages" to what one might call "system load averages." His change included tasks in the uninterruptible state, so that load averages reflected demand for disk resources and not just CPUs. These system load averages count the number of threads working and waiting to work, and are summarized as a triplet of exponentially-damped moving sum averages that use 1, 5, and 15 minutes as constants in an equation. This triplet of numbers lets you see if load is increasing or decreasing, and their greatest value may be for relative comparisons with themselves.
(tags: load monitoring linux unix performance ops brendan-gregg history cpu)
-
Gabriel recently bought a distillery in Barbados, where he says the majority of his team is of African descent. “The sugar industry is a painful past for them, but my understanding, from my team, is that they do see it as the past,” Gabriel explained. “There was great suffering, but their take is like, ‘We built this island.’ They are reclaiming it, and we are seeing that in efforts to preserve farming land and not let it all go to tourism.” I rather liked this narrative, or at least the potential of it. Slavery was appalling across the board, but countries and cultures throughout the African Diaspora have managed their paths forward in ways that don’t mimic the American aftermath. A plurality of narratives was possible here, which was thrilling to me. I am often disappointed by the mainstream perception of one-note blackness. One could easily argue the root of colonization is far from removed in the Caribbean. But if I understood Gabriel, and if he accurately captured the sentiments of his Barbadian colleagues, plantation sugarcane offered career opportunities to some, and was perhaps not solely a distressing connection to a shared global history. We chewed on this thought, together, in silence.
(tags: history distilling rum barbados african-diaspora slavery american-history booze language etymology)
-
'Easy to use tool that automatically replaces some or even all on-demand AutoScaling group members with similar or larger identically configured spot instances in order to generate significant cost savings on AWS EC2, behaving much like an AutoScaling-backed spot fleet.'
(tags: asg autoscaling ec2 aws spot-fleet spot-instances cost-saving scaling)
Going Multi-Cloud with AWS and GCP: Lessons Learned at Scale
Metamarkets splits across AWS and GCP, going into heavy detail here
Cycling to work: major new study suggests health benefits are staggering
We found that cycling to work was associated with a 41% lower risk of dying overall compared to commuting by car or public transport. Cycle commuters had a 52% lower risk of dying from heart disease and a 40% lower risk of dying from cancer. They also had 46% lower risk of developing heart disease and a 45% lower risk of developing cancer at all.
(tags: cycling transport health medicine science commuting life statistics)
NASA's Sound Suppression Water System
If you’ve ever watched a rocket launch, you’ve probably noticed the billowing clouds around the launch pad during lift-off. What you’re seeing is not actually the rocket’s exhaust but the result of a launch pad and vehicle protection system known in NASA parlance as the Sound Suppression Water System. Exhaust gases from a rocket typically exit at a pressure higher than the ambient atmosphere, which generates shock waves and lots of turbulent mixing between the exhaust and the air. Put differently, launch ignition is incredibly loud, loud enough to cause structural damage to the launchpad and, via reflection, the vehicle and its contents. To mitigate this problem, launch operators use a massive water injection system that pours about 3.5 times as much water as rocket propellant per second. This significantly reduces the noise levels on the launchpad and vehicle and also helps protect the infrastructure from heat damage.
(tags: water rockets launch nasa space sound-suppression sound science)
The White Lies of Craft Culture - Eater
Besides field laborers, [Southern US] planter and urban communities both depended on proficient carpenters, blacksmiths, gardeners, stable hands, seamstresses, and cooks; the America of the 1700s and 1800s was literally crafted by people of color. Part of this hidden history includes the revelation that six slaves were critical to the operation of George Washington’s distillery, and that the eponymous Jack Daniel learned to make whiskey from an enslaved black man named Nathan “Nearest” Green. As Clay Risen reported for the New York Times last year, contrary to the predominant narrative that views whiskey as an ever “lily-white affair,” black men were the minds and hands behind American whiskey production. “In the same way that white cookbook authors often appropriated recipes from their black cooks, white distillery owners took credit for the whiskey,” he writes. Described as “the best whiskey maker that I know of” by his master, Dan Call, Green taught young Jack Daniel how to run a whiskey still. When Daniel later opened his own distillery, he hired two of Green’s sons. The popular image of moonshine is a product of the white cultural monopoly on all things ‘country’ Over time, that legacy was forgotten, creating a gap in knowledge about American distilling traditions — while English, German, Scottish, and Irish influences exist, that combination alone cannot explain the entirely of American distilling. As bourbon historian Michael Veach suggests, slave culture pieces together an otherwise puzzling intellectual history.
(tags: history craft-beer craft-culture food drink whiskey distilling black-history jack-daniels nathan-nearest-green)
Meet the Espresso Tonic, Iced Coffee's Bubbly New Cousin
Bit late on this one but YUM
To make the drink, Box Kite baristas simply load a glass with ice, fill it about three quarters of the way with chilled tonic, and then top it off with an espresso shot — typically from roasters like Madcap (MI) and Ritual (SF). Often, baristas pull the espresso shot directly on top of the tonic and ice mixture, forgoing the process of first pulling it into a cup and then pouring the espresso from cup to glass.
(tags: tonic-water recipes espresso coffee drinks cocktails)
-
Foursquare's open source repo, where they extract reusable components for open sourcing -- I like the approach of using a separate top level module path for OSS bits
(tags: open-source oss foursquare libraries maintainance coding git monorepos)
GTK+ switches build from Autotools to Meson
'The main change is that now GTK+ takes about ? of the time to build compared to the Autotools build, with likely bigger wins on older/less powerful hardware; the Visual Studio support on Windows should be at least a couple of orders of magnitude easier (shout out to Fan Chun-wei for having spent so, so many hours ensuring that we could even build on Windows with Visual Studio and MSVC); and maintaining the build system should be equally easier for everyone on any platform we currently support.' Looking at http://mesonbuild.com/ it appears to be Python-based and AL2-licensed open source. On the downside, though, the Meson file is basically a Python script, which is something I'm really not fond of :( more details at http://taint.org/2011/02/18/001527a.html .
-
good thread on fitting out a bike with crazy LED light tape; see also EL string. Apparently it'll run off a 4.5V (3xAAA) battery pack nowadays which makes it pretty viable!
(tags: bikes cycling safety led-lights el-tape led-tape hacks via:mathowie)
-
a beautifully-glitched photo of the moon by Giacomo Carmagnola; more on his art at http://www.bleaq.com/2015/giacomo-carmagnola . (Via Archillect)
(tags: via:archillect art giacomo-carmagnola glitch-art moon glitch images)
-
From the aptly-named Aliholic.com. Thanks, Elliot -- the last thing I needed was something to feed my addiction to cheap tat from China!
(tags: china aliexpress dealextreme gearbest gadgets buying tat aliholic stuff)
TIL you shouldn’t use conditioner if you get nuked
If you shower carefully with soap and shampoo, Karam says [Andrew Karam, radiation expert], the radioactive dust should wash right out. But hair conditioner has particular compounds called cationic surfactants and polymers. If radioactive particles have drifted underneath damaged scales of hair protein, these compounds can pull those scales down to create a smooth strand of hair. "That can trap particles of contamination inside of the scale," Karam says. These conditioner compounds are also oily and have a positive charge on one end that will make them stick to negatively charged sections of a strand of hair, says Perry Romanowski, a cosmetics chemist who has developed personal hygiene formulas and now hosts "The Beauty Brains" podcast on cosmetics chemistry. "Unlike shampoo, conditioners are meant to stay behind on your hair," Romanowski says. If the conditioner comes into contact with radioactive material, these sticky, oily compounds can gum radioactive dust into your hair, he says.
(tags: factoids conditioner surfactants nuclear-bombs fallout hair bizarre til via:boingboing)
-
During the late 1970s, [Professor Thomas J.] Allen undertook a project to determine how the distance between engineers’ offices affects the frequency of technical communication between them. The result of that research, produced what is now known as the Allen Curve, revealed that there is a strong negative correlation between physical distance and the frequency of communication between work stations. The finding also revealed the critical distance of 50 meters for weekly technical communication. With the fast advancement of internet and sharp drop of telecommunication cost, some wonder the observation of Allen Curve in today's corporate environment. In his recently co-authored book, Allen examined this question and the same still holds true. He says[2] "For example, rather than finding that the probability of telephone communication increases with distance, as face-to-face probability decays, our data show a decay in the use of all communication media with distance (following a "near-field" rise)." [p. 58]
Apparently a few years back in Google, some staff mined the promotion data, and were able to show a Allen-like curve that proved a strong correlation between distance from Jeff Dean's desk, and time to getting promoted.(tags: jeff-dean google history allen-curve work communication distance offices workplace teleworking remote-work)
-
Arq backup for OSX now supports B2 (as well as S3) as a storage backend. "it’s a super-cheap option ($.005/GB per month) for storing your backups." (that is less than half the price of $0.0125/GB for S3's Infrequent Access class)
After Charlottesville, I Asked My Dad About Selma
Dad told me that he didn’t think I was going to have to go through what he went through, but now he can see that he was wrong. “This fight is a never-ending fight,” he said. “There’s no end to it. I think after the ‘60s, the whole black revolution, Martin Luther King, H. Rap Brown, Stokely Carmichael and all the rest of the people, after that happened, people went to sleep,” he said. “They thought, ‘this is over.’”
(tags: selma charlottesville racism nazis america race history civil-rights 1960s)
Computer says no: Irish vet fails oral English test needed to stay in Australia
An Irish veterinarian with degrees in history and politics has been unable to convince a machine she can speak English well enough to stay in Australia. Louise Kennedy is a native English speaker, has excellent grammar and a broad vocabulary. She holds two university degrees – both obtained in English – and has been working in Australia as an equine vet on a skilled worker visa for the past two years. But she is now scrambling for other visa options after a computer-based English test – scored by a machine – essentially handed her a fail in terms of convincing immigration officers she can fluently speak her own language.
This is idiotic. Computer-based voice recognition is in no way reliable enough for this kind of job. It's automated Kafkaesque bureaucracy -- "computer says no". Shame on Oz (via James Kelleher)(tags: via:etienneshrdlu kafkaesque bureaucracy computer-says-no voice-recognition australia immigration english voice testing)
-
'By All Means, Compare These Shitheads to the Nazis'
(tags: mike-godwin nazis shitheads funny godwins-law internet)
-
produces a randomized permutation of a list, with exactly one cycle (which guarantees that we will reach every element of the list even though we’re traversing it in random order)
(tags: algorithms lists permutation random randomization cycles)
Working with multiple AWS accounts at Ticketea
AWS STS/multiple account best practice described
A general purpose counting filter
This paper introduces a new AMQ data structure, a Counting Quotient Filter, which addresses all of these shortcomings and performs extremely well in both time and space: CQF performs in-memory inserts and queries up to an order of magnitude faster than the original quotient filter structure from which it takes its inspiration, several times faster than a Bloom filter, and similarly to a cuckoo filter. The CQF structure is comparable or more space efficient than all of them too. Moreover, CQF does all of this while supporting counting, outperforming all of the other forms in both dimensions even though they do not. In short, CQF is a big deal!
(tags: cqf counting-quotient-filters data-structures via:acolyer coding approximate bloom-filters)
consistent hashing with bounded loads
'an algorithm that combined consistent hashing with an upper limit on any one server’s load, relative to the average load of the whole pool.' Lovely blog post from Vimeo's eng blog on a new variation on consistent hashing -- incorporating a concept of overload-avoidance -- and adding it to HAProxy and using it in production in Vimeo. All sounds pretty nifty! (via Toby DiPasquale)
(tags: via:codeslinger algorithms networking performance haproxy consistent-hashing load-balancing lbs vimeo overload load)
AWS Lambda Deployment using Terraform – Build ACL – Medium
Fairly persuasive that production usage of Lambda is much easier if you go full Terraform to manage and deploy.
A complete picture of what it takes to deploy your Lambda function to production with the same diligence you apply to any other codebase using Terraform. [...] There are many cases where frameworks such as SAM or Serverless are not enough. You need more than that for a highly integrated Lambda function. In such cases, it’s easier to simply use Terraform.
(tags: infrastructure aws lambda serverless ops terraform sam)
GitHub - jorgebastida/awslogs: AWS CloudWatch logs for Humans™
This feature alone is a bit of a killer app:
$ awslogs get /var/log/syslog ip-10-1.* --start='2h ago' | grep ERROR
Nice.
-
a high-performance multiple regex matching library. It follows the regular expression syntax of the commonly-used libpcre library, yet functions as a standalone library with its own API written in C. Hyperscan uses hybrid automata techniques to allow simultaneous matching of large numbers (up to tens of thousands) of regular expressions, as well as matching of regular expressions across streams of data. Hyperscan is typically used in a DPI library stack. Hyperscan began in 2008, and evolved from a commercial closed-source product 2009-2015. First developed at Sensory Networks Incorporated, and later acquired and released as open source software by Intel in October 2015. Hyperscan is under a 3-clause BSD license. We welcome outside contributors.
This is really impressive -- state of the art in parallel regexp matching has improved quite a lot since I was last looking at it. (via Tony Finch)(tags: via:fanf regexps regular-expressions text matching pattern-matching intel open-source bsd c dpi scanning sensory-networks)
Beard vs Taleb: Scientism and the Nature of Historical Inquiry
The most interesting aspect of this Twitter war is that it is representative of a malaise that has stricken a good chunk of academics (mostly scientists, with a peppering of philosophers) and an increasing portion of the general public: scientism. I have co-edited an entire book, due out soon, on the topic, which features authors who are pro, con, and somewhere in the middle. Scientism is defined as the belief that the assumptions, methods of research, etc., of the natural sciences are the only ways to gather valuable knowledge or to answer meaningful questions. Everything else, to paraphrase Taleb, is bullshit. Does Taleb engage in scientism? Indubitably. I have already mentioned above his generalization from what one particular historian (Beard) said to “historians” tout court. But there is more, from his Twitter feed: “there is this absence of intellectual rigor in humanities.” “Are historians idiots? Let’s be polite and say that they are in the majority no rocket scientists and operate under a structural bias. It looks like an empirically rigorous view of historiography is missing.”
(tags: history science scientism nassim-taleb argument debate proof romans britain mary-beard)
-
A workplace-discrimination lawyer writes:
Stray remarks are not enough. But a widespread workplace discussion of whether women engineers are biologically capable of performing at the same level as their male counterparts could suffice to create a hostile work environment. As another example, envision the racial hostility of a workplace where employees, as Google put it, “feel safe” to espouse their “alternative view” that their African-American colleagues are not well-represented in management positions because they are not genetically predisposed for leadership roles. In short, a workplace where people “feel safe sharing opinions” based on gender (or racial, ethnic or religious) stereotypes may become so offensive that it legally amounts to actionable discrimination.
(tags: employment sexism workplace discrimination racism misogyny women beliefs)
a list of all the nuclear war scenarios stored in the W.O.P.R. computer
For fans of the movie WARGAMES: a list of all the nuclear war scenarios stored in the W.O.P.R. computer. (self.movies)
(via burritojustice)(tags: via:burritojustice wargames movies wopr global-thermonuclear-war wwiii)
Nextflow - A DSL for parallel and scalable computational pipelines
Data-driven computational pipelines Nextflow enables scalable and reproducible scientific workflows using software containers. It allows the adaptation of pipelines written in the most common scripting languages. Its fluent DSL simplifies the implementation and the deployment of complex parallel and reactive workflows on clouds and clusters.
GPLv3 licensed, open source(tags: computation workflows pipelines batch docker ops open-source)
BinaryAlert: Serverless, Real-time & Retroactive Malware Detection
This is a serverless stack built on AWS, deployed with Terraform. Not sure what to think about this -- it still makes me shudder a little
(tags: aws serverless lambda airbnb malware yara binaryalert architecture)
-
The node.js packaging system is being exploited by bad guys to steal auth tokens at build time. This is the best advice they can come up with:
Always check the name of packages you’re installing. You can look at the downloads number: if a package is popular but the downloads number is low, something is wrong.
:facepalm: What a mess. Security needs to become a priority....(tags: javascript security npm node packaging packages fail)
-
“’Just culture’ as a term emerged from air traffic control in the late 1990s, as concern was mounting that air traffic controllers were unfairly cited or prosecuted for incidents that happened to them while they were on the job,” Sidney Dekker, a professor, writer, and director of the Safety Science Innovation Lab at Griffith University in Australia, explains to Quartz in an email. Eurocontrol, the intergovernmental organization that focuses on the safety of airspace across Europe, has “adopted a harmonized ‘just culture’ that it encourages all member countries and others to apply to their air traffic control organizations.” [...] One tragic example of what can happen when companies don’t create a culture where employees feel empowered to raise questions or admit mistakes came to light in 2014, when an investigation into a faulty ignition switch that caused more than 100 deaths at GM Motors revealed a toxic culture of denying errors and deflecting blame within the firm. The problem was later attributed to one engineer who had not disclosed an obvious issue with the flawed switch, but many employees spoke of extreme pressure to put costs and delivery times before all other considerations, and to hide large and small concerns.
(via JG)(tags: just-culture atc air-traffic-control management post-mortems outages reliability air-canada disasters accidents learning psychological-safety work)
Dark forces, Brexit and Irexit
The EU have made it clear, as they have to, that there will be no frictionless borders between the union and the UK. Brexit will be dislocative. As smaller irish companies start to go to the wall post Brexit expect the calls for “something to be done” to start to include Irexit [an Irish exit from the EU a la Brexit]. But this way madness lies. [...] we export more in education services than in beverages ; we exportthree times or more manufactured goods than food; we export six times more in chemicals and related; value added by industry or by distribution and transport is more than 10 times that of agriculture. Seeking Irexit on the basis that it would be good for agribusiness is seeking to amputate a hand for a broken finger.
(tags: agribusiness ireland irexit brexit economics eu politics)
APOLLO 13 EARTH ORBITAL CHART | Artsy
Some nice catalogue details around this Apollo 13 AEO:
Apollo Earth Orbit Chart (AEO), Apollo Mission 13 for April 1970 Launch Date. March 3, 1970. Color Earth map, first edition. 13 by 42 inches. From the Catalogue: SIGNED and INSCRIBED: “JAMES LOVELL, Apollo 13 CDR and FRED HAISE, Apollo 13 LMP." Additionally INSCRIBED by HAISE with mission events: "Launch at 2:13 pm EST, April 11, 1970" and "Splash – April 17, 1970." He has marked the splashdown area with an "X." Circular plots in black represent the ground station communication coverage areas with the red circle being the tracking ship Vanguard in the Atlantic Ocean. Orbital paths show the full launch range azimuths of 72 to 108 degrees. The first orbit is plotted in light blue with the second orbit in dark blue. The planned TLI (TransLunar Injection) burn occurred on time during the mission and is plotted with a red dashed line. The point above the Earth as Apollo 13 headed toward the Moon is shown with a brown line and continues for 24 hours of mission elapsed time. This line moves over the Pacific Ocean and into the continental United States. Then it moves backwards (relative to the Earth’s rotation) over the Pacific Ocean and ends near the west coast of Africa. The Service Module explosion occurred some 32 hours after end point of the TLI brown line tracking plot.
(tags: aeo apollo history spaceflight collectibles antiques james-lovell fred-haise 1970 apollo-13 charts)
-
"pipelint.sh" -- command line Jenkins pipeline linting
Rule that patients must finish antibiotics course is wrong, study says
Patients have traditionally been told that they must complete courses of antibiotics, the theory being that taking too few tablets will allow the bacteria causing their disease to mutate and become resistant to the drug. But Martin Llewelyn, a professor in infectious diseases at Brighton and Sussex medical school, and colleagues claim that this is not the case. In an analysis in the British Medical Journal, the experts say “the idea that stopping antibiotic treatment early encourages antibiotic resistance is not supported by evidence, while taking antibiotics for longer than necessary increases the risk of resistance”.
(tags: health medicine antibiotics bmj bacteria)
Repair a Road or Footpath - Dublin City Council
how to report a pothole or other problem with a road or cycle path online. Keeping for future use
How the coffee-machine took down a factories control room : talesfromtechsupport
A coffee machine was plugged into both a secure network and also connected to the main wifi network, and became a vector for malware to take down the factory's control room. Security is hard
(tags: coffee-machines fail security networking wifi)
Ireland's staggering hypocrisy on climate change | Environment | The Guardian
The national climate policy is a greenwash – the country is certain to miss its 2020 emissions target and still handing out drilling licences
(tags: guardian green greenwashing ireland politics energy future climate-change nmp oil fossil-fuels)
EBS gp2 I/O BurstBalance exhaustion
when EBS volumes in EC2 exhaust their "burst" allocation, things go awry very quickly
(tags: performance aws ebs ec2 burst-balance ops debugging)
Breaking open the MtGox case, part 1
Earlier today news broke of an arrest in Greece of a Russian national suspected of running a large-scale money laundering operation focused on Bitcoin. The man has since been publicly identified as Alexander Vinnik, 38, and over $4 billion USD is said to have been trafficked through the operation since 2011. We won't beat around the bush with it: Vinnik is [WizSec's] chief suspect for involvement in the MtGox theft (or the laundering of the proceeds thereof).
The 38 Essential Dublin Restaurants
Irish Times resto reviewer @catherineeats with her 38 top recommendations for Dublin. a solid list
Kubernetes Best Practices // Speaker Deck
A lot of these are general Docker/containerisation best practices, too. (via Devops Weekly)
(tags: k8s kubernetes devops ops containers docker best-practices tips packaging)
terrible review for Solidity as a programming environment in HN
"Solidity/EVM is by far the worst programming environment I have ever encountered. It would be impossible to write even toy programs correctly in this language, yet it is literally called "Solidity" and used to program a financial system that manages hundreds of millions of dollars."
Via Tony Finch(tags: blockchain ethereum programming coding via:fanf funny fail floating-point money json languages bugs reliability)
"This War of Mine" review by survivor of the siege of Sarajevo
'Big Kudos to designers of this game. I can't imagine how much research it was for them to make this. It is as if they were in Sarajevo during whole Siege of Sarajevo, and they weren't doing anything else but taking notes. Will you like this game? Well, I do not know. If you want to know how a siege works, then YES. If you want to play great game with theme that is a bit dark, YES. If you want to play amazingly heavy solo or coop game, YES. But, also, I can see why someone would never play this game. My board game collection, before This war of mine, was just “The wall of fun”, and now, amongst other boxes, there is this one that is also fun, but different than any other. This is one really unique game.'
(tags: reviews siege sarajevo history war boardgames this-war-of-mine heavy)
Decoding the Enigma with Recurrent Neural Networks
I am blown away by this -- given that Recurrent Neural Networks are Turing-complete, they can actually automate cryptanalysis given sufficient resources, at least to the degree of simulating the internal workings of the Enigma algorithm given plaintext, ciphertext and key:
The model needed to be very large to capture all the Enigma’s transformations. I had success with a single-celled LSTM model with 3000 hidden units. Training involved about a million steps of batched gradient descent: after a few days on a k40 GPU, I was getting 96-97% accuracy!
(tags: machine-learning deep-learning rnns enigma crypto cryptanalysis turing history gpus gradient-descent)
-
Amazon Web Services Elastic Compute Cloud (EC2) Rescue for Linux is a python-based tool that allows for the automatic diagnosis of common problems found on EC2 Linux instances.
Most of the modules appear to be log-greppers looking for common kernel issues.
SECURITY ALERT - Critical bug in Parity's MultiSig-Wallet
'Together, we were able to determine that malicious actors had exploited a flaw in the Parity Multisig code, which allowed a known party to steal over 153,000 ETH from several projects including Edgeless Casino, Aeternity, and Swarm City.' by leaving "internal" (a visibility restricting keyword) off of the wallet contract, it was possible for attackers to steal millions from a "secure" multi-sig wallet in Ethereum: https://press.swarm.city/parity-multisig-wallet-exploit-hits-swarm-city-funds-statement-by-the-swarm-city-core-team-d1f3929b4e4e https://twitter.com/ncweaver/status/887821804038873088 : 'Time from "OMFG there is a bug" to "geez, someone steal $16M"? 2 hours. Gotta love JavaScript FunBukx, err Ethereum'
timeX.google.com provide non standard time · Issue #437 · systemd/systemd
Google ask systemd not to use timeX.google.com due to nonstandard ticking behaviour; systemd dev tells them to FO. lovely
-
Another systemd shitfest; 69 seconds to view the current boot log from a cold cache.
(tags: systemd systemdsucks logs fail bugs journald logging)
-
'AP Placement - A Job For the Work Experience Kid? | Scott Stapleton | WLPC EU Budapest 2016'
Xiaomi Mi robot vacuum cleaner
sounds like a decent enough vac at a low price point, word of mouth is good
Amazon Global Product Price Check
price compare across global Amazon sites, by ASIN. there are some major differences
(tags: prices amazon via:its price-check comparison shopping eu uk asin)
[LEGAL-303] ASF, RocksDB, and Facebook's BSD+patent grant licensing
Facebook's licensing includes a "nuclear option" if a user acts in a way interpreted by Facebook as competing with them; the ASF has marked the license as "Category-X", and may not be included in Apache projects as a result. Looks like RocksDB are going to relicense as dual GPLv2/ASL2 to clear this up, but React.js has not shown any plans to do so yet
(tags: react rocksdb licensing asl2 apache asf facebook open-source patents)
Will the last person at Basho please turn out the lights? • The Register
Basho, once a rising star of the NoSQL database world, has faded away to almost nothing [...] According to sources, the company, which developed the Riak distributed database, has been shedding engineers for months, and is now operating as a shadow of its former self, as at least one buy-out has fallen through.
Developer Experience Lessons Operating a Serverless-like Platform at Netflix
Very interesting writeup on how Netflix are finding operating a serverless scripting system; they offer scriptability in their backend and it's used heavily by devs to provide features. Lots of having to reinvent the wheel on packaging, deployment, versioning, and test/staging infrastructure
(tags: serverless dependencies packaging deployment versioning devex netflix developer-experience dev testing staging scripting)
OVH suffer 24-hour outage (The Register)
Choice quotes: ‘At 6:48pm, Thursday, June 29, in Room 3 of the P19 datacenter, due to a crack on a soft plastic pipe in our water-cooling system, a coolant leak causes fluid to enter the system'; ‘This process had been tested in principle but not at a 50,000-website scale’
(tags: postmortems ovh outages liquid-cooling datacenters dr disaster-recovery ops)
-
"With a sufficient number of users of an API, it doesn't matter what you promised in the contract, all observable behaviours of your interface will be depended upon by somebody."
(tags: laws funny apis reliability hyrum-wright hyrums-law compatibilty interfaces)
-
good tip for "aws s3 sync" performance
Novartis CAR-T immunotherapy strongly endorsed by FDA advisory panel
This is very exciting stuff, cytokine release syndrome risks notwithstanding.
The new treatment is known as CAR-T cell immunotherapy. It works by removing key immune system cells known as T cells from the patient so scientists can genetically modify them to seek out and attack only cancer cells. That's why some scientists refer to this as a "living drug." Doctors then infuse millions of the genetically modified T cells back into the patient's body so they can try to obliterate the cancer cells and hopefully leave healthy tissue unscathed. "It's truly a paradigm shift," said Dr. David Lebwohl, who heads the CAR-T Franchise Global Program at the drug company Novartis, which is seeking the FDA's approval for the treatment. "It represents a new hope for patients." The drug endorsed by the advisory panel is known as CTL019 or tisagenlecleucel. It was developed to treat children and young adults ages 3 to 25 who have relapsed after undergoing standard treatment for B cell acute lymphoblastic leukemia, which is the most common childhood cancer in the United States. While this blood cell cancer can be highly curable, some patients fail to respond to standard treatments; and a significant proportion of patients experience relapses that don't respond to follow-up therapies. "There is a major unmet medical need for treatment options" for these patients, Dr. Stephen Hunger, who helped study at the Children's Hospital of Philadelphia, told the committee. In the main study that the company submitted as evidence in seeking FDA approval, doctors at 25 sites in 11 countries administered the treatment to 88 patients. The patients, ages 3 to 23, had failed standard treatment or experienced relapses and failed to respond to follow-up standard treatment. CTL019 produced remissions in 83 percent of patients, the company told the committee.
(tags: car-t immunotherapy cancer novartis trials fda drugs t-cells immune-system medicine leukemia ctl019)
Chris's Wiki :: blog/sysadmin/UnderstandingIODNSIssue
On the ns-a1.io security screwup for the .io CCTLD:
Using data from glue records instead of looking things up yourself is common but not mandatory, and there are various reasons why a resolver would not do so. Some recursive DNS servers will deliberately try to check glue record information as a security measure; for example, Unbound has the harden-referral-path option (via Tony Finch). Since the original article reported seeing real .io DNS queries being directed to Bryant's DNS server, we know that a decent number of clients were not using the root zone glue records. Probably a lot more clients were still using the glue records, through.
(via Tony Finch)(tags: via:fanf dns security dot-io cctlds glue-records delegation)
-
'A Java Virtual Machine written in 100% JavaScript.' Wrapping outbound TCP traffic in websockets, mad stuff
(tags: jvm java javascript js hacks browser emulation websockets)
One Man's Plan to Make Sure Gene Editing Doesn't Go Haywire - The Atlantic
Open science - radical transparency where gene-editing and CRISPR is involved. Sounds great.
“For gene drive, the closed-door model is morally unacceptable. You don’t have the right to go into your lab and build something that is ineluctably designed to affect entire ecosystems. If it escapes into the wild, it would be expected to spread and affect people’s lives in unknown ways. Doing that in secret denies people a voice.”
Also this is a little scary:in 2015, he was shocked to read a paper, due to be published in ... Science, in which Californian researchers had inadvertently created a gene drive in fruit flies, without knowing what gene drives are. They developed it as a research tool for spreading a trait among lab populations, and had no ambitions to alter wild animals. And yet, if any of their insects had escaped, that’s what would have happened.
(tags: science openness open-source visibility transparency crispr gene-editing mice nantucket gene-drive)
AI Movie Posters - mickstorm.com
Neural-network generative movie posters. "What would you do to gave you?"
(tags: fun generators neural-networks funny movies posters)
Scheduled Tasks (cron) - Amazon EC2 Container Service
ECS now does cron jobs. But where does AWS Batch fit in? confusing
(tags: aws batch ecs cron scheduling recurrence ops)
-
Eater.com posts comically misinformed video about some kind of imaginary brit comfort food. John Gallagher's response thread is a virtuoso performance
(tags: mince-on-toast disgusting food funny wtf twitter)
Here’s every total solar eclipse happening in your lifetime
Excellent infographic (sadly, none in Ireland for the rest of my lifetime)
(tags: eclipse space maps science infographic solar-eclipse sun)
When Will Climate Change Make the Earth Too Hot For Humans?
The Earth has experienced five mass extinctions before the one we are living through now, each so complete a slate-wiping of the evolutionary record it functioned as a resetting of the planetary clock, and many climate scientists will tell you they are the best analog for the ecological future we are diving headlong into. Unless you are a teenager, you probably read in your high-school textbooks that these extinctions were the result of asteroids. In fact, all but the one that killed the dinosaurs were caused by climate change produced by greenhouse gas. The most notorious was 252 million years ago; it began when carbon warmed the planet by five degrees, accelerated when that warming triggered the release of methane in the Arctic, and ended with 97 percent of all life on Earth dead. We are currently adding carbon to the atmosphere at a considerably faster rate; by most estimates, at least ten times faster.
(tags: climate future grim climate-change extinction earth carbon anthropocene)
Burning Fossil Fuels Almost Ended All Life on Earth - The Atlantic
“what I like to talk about is ‘the Great Weirding’ and not just the Great Dying because the Great Dying seems to have been a relatively quick event at the very end. But if you just talk about the Great Dying you’re missing all of this other crazy stuff that led up to it,” he said. “The Earth was getting really weird in the Permian. So we’re getting these huge lakes with these negative pHs, which is really weird, we don’t know why that happened. Another thing is that the whole world turned red. Everything got red. You walk around today and you’re like, ‘Hey, there’s a red bed, I bet it’s Permian or Triassic.’ The planet started looking like Mars. So that’s really weird. We don’t know why it turned red. Then you have a supercontinent, which is weird in the first place. Plate tectonics has to be acting strangely when you have all the continents together. Eventually it rifts apart and we go back into normal plate tectonics mode, but during the Permian-Triassic everything’s jammed together. So there has to be something strange going on. And then at the end, the Earth opens up and there’s all these volcanoes. But we’re not talking about normal volcanoes, we’re talking about weird volcanoes.”
(tags: extinction history geology permian-era earth climate-change carbon-dioxide scary pangaea)
EU Prepares "Right to Repair" Legislation to Fight Short Product Lifespans
I 100% support this
(tags: right-to-repair repair eu law hacking planned-obsolescence hardware consumer)
Everybody lies: how Google search reveals our darkest secrets | Technology | The Guardian
What can we learn about ourselves from the things we ask online? US data scientist Seth Stephens?Davidowitz analysed anonymous Google search results, uncovering disturbing truths about [America's] desires, beliefs and prejudices
Fascinating. I find it equally interesting how flawed the existing methodologies for polling and surveying are, compared to Google's data, according to this(tags: science big-data google lying surveys polling secrets data-science america racism searching)
mozilla/sops: Secrets management stinks, use some sops!
sops is an editor of encrypted files that supports YAML, JSON and BINARY formats and encrypts with AWS KMS and PGP.
(tags: secrets encryption security kms pgp gpg editors configuration)
-
Some decent benchmark data on SQS:
We were looking at four values in the tests: total number of messages sent per second (by all nodes) total number of messages received per second 95th percentile of message send latency (how fast a message send call completes) 95th percentile of message processing latency (how long it takes between sending and receiving a message)
(tags: sqs benchmarking measurement aws latency)
The Guardian view on patient data: we need a better approach | Editorial | Opinion | The Guardian
The use of privacy law to curb the tech giants in this instance, or of competition law in the case of the EU’s dispute with Google, both feel slightly maladapted. They do not address the real worry. It is not enough to say that the algorithms DeepMind develops will benefit patients and save lives. What matters is that they will belong to a private monopoly which developed them using public resources. If software promises to save lives on the scale that drugs now can, big data may be expected to behave as big pharma has done. We are still at the beginning of this revolution and small choices now may turn out to have gigantic consequences later. A long struggle will be needed to avoid a future of digital feudalism. Dame Elizabeth’s report is a welcome start.
Hear hear.(tags: privacy law uk nhs data google deepmind healthcare tech open-source)
Why People With Brain Implants Are Afraid to Go Through Automatic Doors
In 2009, Gary Olhoeft walked into a Best Buy to buy some DVDs. He walked out with his whole body twitching and convulsing. Olhoeft has a brain implant, tiny bits of microelectronic circuitry that deliver electrical impulses to his motor cortex in order to control the debilitating tremors he suffers as a symptom of Parkinson’s disease. It had been working fine. So, what happened when he passed through those double wide doors into consumer electronics paradise? He thinks the theft-prevention system interfered with his implant and turned it off. Olhoeft’s experience isn’t unique. According to the Food and Drug Administration’s MAUDE database of medical device reports, over the past five years there have been at least 374 cases where electromagnetic interference was reportedly a factor in an injury involving medical devices including neural implants, pacemakers and insulin pumps. In those reports, people detailed experiencing problems with their devices when going through airport security, using massagers or simply being near electrical sources like microwaves, cordless drills or “church sound boards.”
(tags: internet-of-things iot best-buy implants parkinsons-disease emi healthcare devices interference)
-
This is an extremely detailed post on the state of dynamic checkers in C/C++ (via the inimitable Marc Brooker):
Recently we’ve heard a few people imply that problems stemming from undefined behaviors (UB) in C and C++ are largely solved due to ubiquitous availability of dynamic checking tools such as ASan, UBSan, MSan, and TSan. We are here to state the obvious — that, despite the many excellent advances in tooling over the last few years, UB-related problems are far from solved — and to look at the current situation in detail.
(tags: via:marc-brooker c c++ coding testing debugging dynamic-analysis valgrind asan ubsan tsan)
Talos Intelligence review of Nyetya and the M.E.Doc compromise
Our Threat Intelligence and Interdiction team is concerned that the actor in question burned a significant capability in this attack. They have now compromised both their backdoor in the M.E.Doc software and their ability to manipulate the server configuration in the update server. In short, the actor has given up the ability to deliver arbitrary code to the 80% of UA businesses that use M.E.Doc as their accounting software, along with any multinational corporations that leveraged the software. This is a significant loss in operational capability, and the Threat Intelligence and Interdiction team assesses with moderate confidence that it is unlikely that they would have expended this capability without confidence that they now have or can easily obtain similar capability in target networks of highest priority to the threat actor.
(tags: security malware nyetya notpetya medoc talos ransomware)
Use AWS WAF to Mitigate OWASP’s Top 10 Web Application Vulnerabilities
'describes how you can use AWS WAF, a web application firewall, to address the top application security flaws as named by the Open Web Application Security Project (OWASP). Using AWS WAF, you can write rules to match patterns of exploitation attempts in HTTP requests and block requests from reaching your web servers. This whitepaper discusses manifestations of these security vulnerabilities, AWS WAF–based mitigation strategies, and other AWS services or solutions that can help address these threats.'
-
Some Mac third party keyboards used to (or maybe still do for all I know) have a little feature where if you didn't type anything for a while they would themselves type 'welcome datacomp'.
(via RobS)(tags: via:rsynnott funny welcome-datacomp keyboards hardware fail ghost-typing haunted)
La història del gran tauró blanc de Tossa de Mar
Amazing pic and newspaper report regarding a great white shark which washed up on the beach at Tossa de Mar in the Costa Brava in the 1980s
(tags: tossa-de-mar costa-brava spain sharks nature great-white-shark 1980s history photos wildlife)
Why did Apple, Amazon, Google stocks crash to the same price today?
Nasdaq said in a statement that "certain third parties improperly propagated test data that was distributed as part of the normal evening test procedures." "For July 3, 2017, all production data was completed by 5:16 PM as expected per the early close of the markets," the statement continued. "Any data messages received post 5:16 PM should be deemed as test data and purged from direct data recipient's databases. UTP (Unlisted Trading Privileges) is asking all third parties to revert to Nasdaq Official Closing Prices effective at 5:16 PM."
(tags: testing fail stock-markets nasdaq test-data test production integration-testing test-in-prod)
Exactly-once Support in Apache Kafka – Jay Kreps
If you’re one of the people who think [exactly-once support is impossible], I’d ask you to take an actual look at what we actually know to be possible and impossible, and what has been built in Kafka, and hopefully come to a more informed opinion. So let’s address this in two parts. First, is exactly-once a theoretical impossibility? Second, how does Kafka support it.
(tags: exactly-once-delivery distributed kafka distcomp jay-kreps coding broadcast)
-
These are lovely! (via Ben)
Letters and Liquor illustrates the history of lettering associated with cocktails. From the 1690s to the 1990s, I’ve selected 52 of the most important drinks in the cocktail canon and rendered their names in period-inspired design. I post a new drink each week with history, photos and recipes. Don’t want to miss a single cocktail? Click here for email updates.
(tags: cocktails text letters typography graphics history booze)
Exactly-once Semantics is Possible: Here's How Apache Kafka Does it
How does this feature work? Under the covers it works in a way similar to TCP; each batch of messages sent to Kafka will contain a sequence number which the broker will use to dedupe any duplicate send. Unlike TCP, though—which provides guarantees only within a transient in-memory connection—this sequence number is persisted to the replicated log, so even if the leader fails, any broker that takes over will also know if a resend is a duplicate. The overhead of this mechanism is quite low: it’s just a few extra numeric fields with each batch of messages. As you will see later in this article, this feature add negligible performance overhead over the non-idempotent producer.
(tags: kafka sequence-numbers dedupe deduplication unique architecture distcomp streaming idempotence)
Top 5 ways to improve your AWS EC2 performance
A couple of bits of excellent advice from Datadog (although this may be a slightly old post, from Oct 2016): 1. Unpredictable EBS disk I/O performance. Note that gp2 volumes do not appear to need as much warmup or priming as before. 2. EC2 Instance ECU Mismatch and Stolen CPU. advice: use bigger instances The other 3 ways are a little obvious by comparison, but worth bookmarking for those two anyway.
(tags: ops ec2 performance datadog aws ebs stolen-cpu virtualization metrics tips)
Can The Best Financial Tips Fit On An Index Card? : All Tech Considered : NPR
'A couple of years ago, University of Chicago professor Harold Pollack did an online video chat with personal finance writer Helaine Olen. The topic was how regular people get steered into bad investments by financial advisers. Pollack said that the best personal finance advice "can fit on a 3-by-5 index card, and is available for free in the library — so if you're paying someone for advice, almost by definition, you're probably getting the wrong advice, because the correct advice is so straightforward." After they posted the video, the emails started pouring in — people wanted to know, where could they get this index card? What was this fantastic yet simple advice for managing their money?' These seem like pretty solid tips, and relatively portable to the Irish markets too. I need to take a look at this stuff...
(tags: finance money advice npr 401k pensions financial-advisors)
"Galway, the graveyard of ambition"
The etymology of this odd little phrase
(tags: galway ambition career life etymology phrases ireland)
swill’s tech leadership essentials – Medium
very useful tips and advice from Stephanie Williams (nee Dean), who was instrumental in setting up the ops teams in Amazon Dublin, by all accounts
(tags: management stephanie-dean stephanie-williams managing teams work hiring)
Don't Settle For Eventual Consistency
Quite an argument. Not sure I agree, but worth a bookmark anyway...
With an AP system, you are giving up consistency, and not really gaining anything in terms of effective availability, the type of availability you really care about. Some might think you can regain strong consistency in an AP system by using strict quorums (where the number of nodes written + number of nodes read > number of replicas). Cassandra calls this “tunable consistency”. However, Kleppmann has shown that even with strict quorums, inconsistencies can result.10 So when choosing (algorithmic) availability over consistency, you are giving up consistency for not much in return, as well as gaining complexity in your clients when they have to deal with inconsistencies.
(tags: cap-theorem databases storage cap consistency cp ap eventual-consistency)
Delivering Billions of Messages Exactly Once · Segment Blog
holy crap, this is exactly the wrong way to build a massive-scale deduplication system -- with a monster random-access "is this random UUID in the db" lookup
(tags: deduping architecture horror segment messaging kafka)
Mozilla Employee Denied Entry to the United States
Ugh. every non-USian tech worker's nightmare. curl developer Daniel Stenberg:
“I can’t think of a single valid reason why they would deny me travel, so what concerns me is that somehow someone did and then I’m worried that I’ll get trouble fixing that issue,” Stenberg said. “I’m a little worried since border crossings are fairly serious matters and getting trouble to visit the US in the future would be a serious blowback for me, both personally with friends and relatives there, and professionally with conferences and events there.”
(tags: curl travel mozilla esta us-politics usa immigration flying)
-
Interesting! We discussed similar ideas in $prevjob, good to see one hitting production globally.
RIPE Atlas probes form the backbone of the RIPE Atlas infrastructure. Volunteers all over the world host these small hardware devices that actively measure Internet connectivity through ping, traceroute, DNS, SSL/TLS, NTP and HTTP measurements. This data is collected and aggregated by the RIPE NCC, which makes the data publicly available. Network operators, engineers, researchers and even home users have used this data for a wide range of purposes, from investigating network outages to DNS anycasting to testing IPv6 connectivity. Anyone can apply to host a RIPE Atlas probe. If your application is successful (based on your location), we will ship you a probe free of charge. Hosts simply need to plug their probe into their home (or other) network. Probes are USB-powered and are connected to an Ethernet port on the host’s router or switch. They then automatically and continuously perform active measurements about the Internet’s connectivity, and this data is sent to the RIPE NCC, where it is aggregated and made publicly available. We also use this data to create several Internet maps and data visualisations. [....] The hardware of the first and second generation probes is a Lantronix XPort Pro module with custom powering and housing built around it. The third generation probe is a modified TP-Link wireless router (model TL-MR 3020) with a small USB thumb drive in it, but this probe does not support WiFi.
(via irldexter)(tags: via:irldexter ripe ncc probing active-monitoring networking ping traceroute dns testing http ipv6 anycast hardware devices isps)
"BBC English" was invented by a small team in the 1920s & 30s
Excellent twitter thread:
Today we speak of "BBC English" as a standard form of the language, but this form had to be invented by a small team in the 1920s & 30s. 1/ It turned out even within the upper-class London accent that became the basis for BBC English, many words had competing pronunciations. 2/ Thus in 1926, the BBC's first managing director John Reith established an "Advisory Committee on Spoken English" to sort things out. 3/ The committee was chaired by Irish playwright George Bernard Shaw, and also included American essayist Logan Pearsall Smith, 4/ novelist Rose Macaulay, lexicographer (and 4th OED editor) C.T. Onions, art critic Kenneth Clark, journalist Alistair Cooke, 5/ ghost story writer Lady Cynthia Asquith, and evolutionary biologist and eugenicist Julian Huxley. 6/ The 20-person committee held fierce debates, and pronunciations now considered standard were often decided by just a few votes.
(tags: bbc language english history rp received-pronunciation pronunciation john-reith)
How Did I “Hack” AWS Lambda to Run Docker Containers?
Running Docker containers in Lambda using a usermode-docker hack -- hacky as hell but fun ;) Lambda should really support native Docker though
Cadence: Microservice architecture beyond request/reply – @Scale
Uber’s request/reply handling middleware — based on the SWF API, it seems
(tags: swf apis microservices uber cadence asynchronous request-reply distcomp queueing middleware go)
-
A curated list of awesome services, solutions and resources for serverless / nobackend applications.
(tags: serverless lambda ops devops saas services architecture lists)
The Really Good Pickle Martini
The Really Good Pickle Martini 2 oz Gordon’s London dry gin; 1/4 oz Martini & Rossi extra dry vermouth; 1/4 oz pickle juice; Garnish: Skewered dill pickle slice; Glass: Cocktail Pour all the ingredients into a mixing glass with ice, and stir briskly with a bar spoon for about 1 minute. Strain into a chilled Martini glass. Garnish with a skewered dill pickle slice.
(tags: recipes pickles martini cocktails pickle-juice gin vermouth)
-
A little benchmark for top-k selection from a stream
(tags: algorithms benchmarks performance top-k streams streaming quickselect binary-heap priority-queue)
-
London has been running tube trains so long that the ground beneath parts of the city is now as much as 10°C hotter than it was in 1900.
(tags: london tube underground tfl engineering history temperature ventilation)
A Neural Network Turned a Book of Flowers Into Shockingly Lovely Dinosaur Art
DeepArt.io, 'powered by an algorithm developed by Leon Gatys and a team from the University of Tübingen in Germany', did a really amazing job here
Determinism in League of Legends
Once again, deterministic replay/reruns of online games proves useful. John Carmack wrote a .plan about this many years ago: https://raw.githubusercontent.com/ESWAT/john-carmack-plan-archive/master/by_day/johnc_plan_19981014.txt (via Nelson)
(tags: clock realtime time determinism testing replay games league-of-legends via:nelson)
How they did it: an analysis of emissions defeat devices in modern automobiles
Using CurveDiff, the team analysed 963 firmware images, for which analysis completed successfully for 924. 406 of the analysed images contained a defeat device, out of which 333 contained at least one active profile. In at least 268 images, the test detection affects the EGR. Firmware images released on Dec 3rd 2014 are used in VW Passat cars, and include the refinement to the defeat device to detect steering wheel angle that we discussed previously.
(tags: cars driving emissions diesel volkswagen law regulation firmware reverse-engineering)
-
excellent list (albeit from 2010)
How does language, memory and package size affect cold starts of AWS Lambda?
some datapoints -- java and C# have a hard time
(tags: java cold-start lambda serverless aws)
Science didn't understand my kids' rare disease until I decided to study it - YouTube
via Kevin Lyda: 'Sharon Terry essentially invented and promoted something akin to the GPL but for medical research. Here's a bunch of data and research and you can use it if you contribute back what you discover to everyone else.'
(tags: sharon-terry videos ted-talks genetic-alliance genes pxe-international pxe tedmed citizen-science licensing gpl gnu)
-
Oh man, this is awful. Poor guy. And this should have been there right from the start:
The moderator said that when he started, he was given just two weeks training and was required to use his personal Facebook account to log into the social media giant’s moderation system. “They should have let us use fake profiles,” he said, adding: “They never warned us that something like this could happen.” Facebook told the Guardian that as a result of the leak it is testing the use of administrative accounts that are not linked to personal profiles.
(tags: facebook security counter-terrorism moderation social-media role-accounts admin)
Screen time guidelines need to be built on evidence, not hype | Science | The Guardian
An open letter signed by about 100 scientists 'from different countries and academic fields with research expertise and experience in screen time, child development and evidence-based policy.'
If the government were to implement guidelines on screen-based technology at this point, as the authors of the letter suggest, this would be on the basis of little to no evidence. This risks the implementation of unnecessary, ineffective or even potentially harmful policies. For guidelines to have a meaningful impact, they need to be grounded in robust research evidence and acknowledge that children’s health and wellbeing is a complex issue affected by many other factors, such as socioeconomic status, relational poverty, and family environment – all of which are likely to be more relevant for children’s health and well-being than screens. For example, there is no consistent evidence that more screen time leads to less outdoor play; if anything the evidence indicates that screen time and physical outdoor activity are unrelated, and reductions in average time spent in outdoor play over time seem to be driven by other factors. Policy efforts to increase outdoor play that focus on screen time are therefore likely to be ineffective.
(via Damien Mulley)(tags: via:damienmulley science children psychology screens screen-time childhood development evidence policy health open-letters)
Could crafty beer giants crush small breweries before they take off? - Independent.ie
Grainne says:
“We’re getting feedback from publicans that says: ‘Look, I’m gonna take out your tap, I’d love to leave it in but I’m getting a cheque for €50,000’.
(tags: metalman brewing craft-beer ireland beer-wars pubs publicans competition)
-
What a great story.
As a child, he was into maths and geometry, the middle child with one sister 10 years older and another 10 years younger. “I heard about this incredible new thing called the internet,” he says, adding how, aged 12, he saw an advert for the Paris science museum where you could try the internet for free. “There were 15 computers and you queued to have an hour free if you bought an entry ticket. I bought an annual pass to the museum and every Saturday and Sunday I’d travel from one side of Paris to the other to get on the internet and see what it was about. I’d go on Yahoo, chat with people on the other side of the world. I didn’t speak great English then so it wasn’t brilliant chat ...”
(via Niall Murphy)(tags: france mounir-mahjoubi internet computers society macron politics security)
-
A sandboxed local environment that replicates the live AWS Lambda environment almost identically – including installed software and libraries, file structure and permissions, environment variables, context objects and behaviors – even the user and running process are the same.
(via og-aws)
Connemara shop in patents row with whiskey multinational
Beam Suntory own a trademark on the name "Connemara" -- utter fiasco. How was this granted? Connemara is a very well-known placename in Ireland
(tags: connemara ireland ip trademarks copyfight beam-suntory whiskey)
AWS Inter-Region Latency Monitoring
only averages, though, no percentiles
(tags: latency networking aws ops inter-region cross-region ping)
How Turla hackers (ab)used satellites to stay under the radar | Ars Technica
A very nifty hack. DVB-S broadcasts a subset of unencrypted IP traffic across a 600-mile radius:
The Turla attackers listen for packets coming from a specific IP address in one of these classes. When certain packets—say, a TCP/IP SYN packet—are identified, the hackers spoof a reply to the source using a conventional Internet line. The legitimate user of the link just ignores the spoofed packet, since it goes to an otherwise unopened port, such as port 80 or 10080. With normal Internet connections, if a packet hits a closed port, the end user will normally send the ISP some indication that something went wrong. But satellite links typically use firewalls that drop packets to closed ports. This allows Turla to stealthily hijack the connections. The hack allowed computers infected with Turla spyware to communicate with Turla C&C servers without disclosing their location. Because the Turla attackers had their own satellite dish receiving the piggybacked signal, they could be anywhere within a 600-mile radius. As a result, researchers were largely stopped from shutting down the operation or gaining clues about who was carrying it out. "It's probably one of the most effective methods of ensuring their operational security, or that nobody will ever find out the physical location of their command and control server," Tanase told Ars. "I cannot think of a way of identifying the location of a command server. It can be anywhere in the range of the satellite beam."
(tags: turla hacks satellite security dvb dvb-s tcpip command-and-control syn)
A Brief History of the UUID · Segment Blog
This is great, by Rick Branson. I didn't realise UUIDs came from Apollo
(tags: history distributed distcomp uuids ids coding apollo unix)
Turla’s watering hole campaign: An updated Firefox extension abusing Instagram
Pretty crazy.
The extension will look at each photo’s comment and will compute a custom hash value. If the hash matches 183, it will then run this regular expression on the comment in order to obtain the path of the bit.ly URL: (?:\\u200d(?:#|@)(\\w) Looking at the photo’s comments, there was only one for which the hash matches 183. This comment was posted on February 6, while the original photo was posted in early January. Taking the comment and running it through the regex, you get the following bit.ly URL: bit.ly/2kdhuHX Looking a bit more closely at the regular expression, we see it is looking for either @|# or the Unicode character \200d. This character is actually a non-printable character called ‘Zero Width Joiner’, normally used to separate emojis. Pasting the actual comment or looking at its source, you can see that this character precedes each character that makes the path of the bit.ly URL
(tags: security malware russia turla zwj unicode characters social-media instagram command-and-control)
-
decent enough tool builtin to OSX
Top-Secret NSA Report Details Russian Hacking Effort Days Before 2016 Election
RUSSIAN MILITARY INTELLIGENCE [GRU] executed a cyberattack on at least one U.S. voting software supplier and sent spear-phishing emails to more than 100 local election officials just days before last November’s presidential election, according to a highly classified intelligence report obtained by The Intercept. The top-secret National Security Agency document, which was provided anonymously to The Intercept and independently authenticated, analyzes intelligence very recently acquired by the agency about a months-long Russian intelligence cyber effort against elements of the U.S. election and voting infrastructure. The report, dated May 5, 2017, is the most detailed U.S. government account of Russian interference in the election that has yet come to light.
(tags: politics russia nsa leaks us-politics cyberattacks gru hacking elections spear-phishing phishing e-voting)
Drug Company Chairman to America: Go Fuck Yourself
'Mr. Coury [chairman of Mylan, makers of the EpiPen] replied that he was untroubled [by critics of 10x price-gouging price hikes]. He raised both his middle fingers and explained, using colorful language, that anyone criticizing Mylan, including its employees, ought to go copulate with themselves. Critics in Congress and on Wall Street, he said, should do the same. And regulators at the Food and Drug Administration? They, too, deserved a round of anatomically challenging self-fulfillment.'
(tags: mylan gfy fda us-politics healthcare medicine epipen nytimes)
-
"His face would suffuse, he would turn red, and he would get violent if people used the term "research" in his presence. You can imagine how he felt, then, about the term "mathematical". [....] I felt I had to do something to shield Wilson and the Air Force from the fact that I was really doing mathematics inside RAND"
(tags: rand funny history insane dr-strangelove 1950s dynamic-programming mathematics algorithms)
How The Intercept Outed Reality Winner
those printer-identifying secret yellow dots
(tags: printers metadata tracking documents reality-winner nsa leaks the-intercept)
Open Guide to Amazon Web Services
'A lot of information on AWS is already written. Most people learn AWS by reading a blog or a “getting started guide” and referring to the standard AWS references. Nonetheless, trustworthy and practical information and recommendations aren’t easy to come by. AWS’s own documentation is a great but sprawling resource few have time to read fully, and it doesn’t include anything but official facts, so omits experiences of engineers. The information in blogs or Stack Overflow is also not consistently up to date. This guide is by and for engineers who use AWS. It aims to be a useful, living reference that consolidates links, tips, gotchas, and best practices. It arose from discussion and editing over beers by several engineers who have used AWS extensively.'
(tags: amazon aws guides documentation ops architecture)
-
Coda Hale wrote a handy java library implementing a USL solver
(tags: usl scalability java performance optimization benchmarking measurement ops coda-hale)
EpiBone Grows New Bones Using Stem Cells
To grow EpiBone, Tandon explained, scientists take a CT scan of the bone they’ll need to engineer. This helps them create a 3D model. Then, from the model, a 3D printer produces a scaffold (this can be made out of protein and collagen from animal bones or synthetic material). After that, they take stem cells from the patient out of their fat, and those cells are put into the scaffold and then incubated. They regenerate, and form around the bone. This process results in a bone that the body will recognize as the patient’s. The crazy part is that it only takes three weeks to grow a bone that’s personalized to the individual patient.
(tags: stem-cells epibone bone body healing health medicine 3d-printing)
WHAT WENT WRONG IN BRITISH AIRWAYS DATACENTER IN MAY 2017?
A SPOF UPS. There was a similar AZ-wide outage in one of the Amazon DUB datacenters with a similar root cause, if I recall correctly -- supposedly redundant dual UPS systems were in fact interdependent, in that case, and power supply switchover wasn't clean enough to avoid affecting the servers.
Minutes later power was restored was resumed in what one source described as “uncontrolled fashion.” Instead of gradual restore, all power was restored at once resulting in a power surge. BA CEO Cruz told BBC Radio this power surge caused network hardware to fail. Also server hardware was damaged because of the power surge. It seems as if the UPS was the single point of failure for power feed of the IT equipment in Boadicea House . The Times is reporting that the same UPS was powering both Heathrow based datacenters. Which could be a double single point of failure if true (I doubt it is) The broken network stopped the exchange of messages between different BA systems and application. Without messaging, there is no exchange of information between various applications. BA is using Progress Software’s Sonic [enterprise service bus].
(via Tony Finch)(tags: postmortems ba airlines outages fail via:fanf datacenters ups power progress esb j2ee)
GDPR Advisors and Consultants - Data Compliance Europe
Simon McGarr's new consultancy:
Our consultancy helps our clients understand how EU privacy law applies to their organisations; delivers the practical and concrete steps needed to achieve legal compliance; and helps them manage their continuing obligations after GDPR comes into force. Our structured approach to GDPR provides a long-term data compliance framework to minimise the ongoing risk of potential fines for data protection breaches. Our continuing partnership provides regulator liaison, advisory consultancy, and external Data Protection Officer services.
(tags: gdpr simon-mcgarr law privacy eu europe data-protection regulation data)
An empirical study on the correctness of formally verified distributed systems
We must recognise that even formal verification can leave gaps and hidden assumptions that need to be teased out and tested, using the full battery of testing techniques at our disposal. Building distributed systems is hard. But knowing that shouldn’t make us shy away from trying to do the right thing, instead it should make us redouble our efforts in our quest for correctness.
(tags: formal-verification software coding testing tla+ chapar fuzzing verdi bugs papers)
After Seven Years, Microsoft Is Finally Fixing the "J" Email Bug
True story: when I started at Amazon, I thought people were using "J" instead of smileys as shorthand for "joking". Great job Microsoft! (via Tony Finch)
(tags: microsoft fail operating-systems monoculture character-sets j wingdings exchange email)
-
Pembrolizumab, marketed by Merck as Keytruda, is an anti-PD-1 immunotherapy drug now going through US trials, targeting malignancies with certain molecular characteristics. Good trial results vs melanoma here: http://www.nejm.org/doi/full/10.1056/NEJMoa1503093
(tags: cancer trials drugs pembro anti-pd-1 immunotherapy merck)
Scaling Amazon Aurora at ticketea
Ticketing is a business in which extreme traffic spikes are the norm, rather than the exception. For Ticketea, this means that our traffic can increase by a factor of 60x in a matter of seconds. This usually happens when big events (which have a fixed, pre-announced 'sale start time') go on sale.
(tags: scaling scalability ops aws aurora autoscaling asg)
-
The ability to measure physical activity through wrist-worn devices provides an opportunity for cardiovascular medicine. However, the accuracy of commercial devices is largely unknown. The aim of this work is to assess the accuracy of seven commercially available wrist-worn devices in estimating heart rate (HR) and energy expenditure (EE) and to propose a wearable sensor evaluation framework. We evaluated the Apple Watch, Basis Peak, Fitbit Surge, Microsoft Band, Mio Alpha 2, PulseOn, and Samsung Gear S2.
tl;dr: wrist-based calorie counters were inaccurate by up to 93% in tests.(tags: fitbit microsoft mio pulseon samsung-gear apple apple-watch basis gadgets health heart-rate calorie-counters)
-
a query language for APIs and a runtime for fulfilling those queries with your existing data. GraphQL provides a complete and understandable description of the data in your API, gives clients the power to ask for exactly what they need and nothing more, makes it easier to evolve APIs over time, and enables powerful developer tools.
Now being used by Facebook and Github -- looks quite interesting.
'I've Got Nothing to Hide' and Other Misunderstandings of Privacy by Daniel J. Solove :: SSRN
In this short essay, written for a symposium in the San Diego Law Review, Professor Daniel Solove examines the nothing to hide argument. When asked about government surveillance and data mining, many people respond by declaring: "I've got nothing to hide." According to the nothing to hide argument, there is no threat to privacy unless the government uncovers unlawful activity, in which case a person has no legitimate justification to claim that it remain private. The nothing to hide argument and its variants are quite prevalent, and thus are worth addressing. In this essay, Solove critiques the nothing to hide argument and exposes its faulty underpinnings.
Via Fred Logue(tags: law philosophy privacy security essay papers daniel-solove surveillance snooping)
-
Good post!
Much has been written on the pros and cons of microservices, but unfortunately I’m still seeing them as something being pursued in a cargo cult fashion in the growth-stage startup world. At the risk of rewriting Martin Fowler’s Microservice Premium article, I thought it would be good to write up some thoughts so that I can send them to clients when the topic arises, and hopefully help people avoid some of the mistakes I’ve seen. The mistake of choosing a path towards a given architecture or technology on the basis of so-called best practices articles found online is a costly one, and if I can help a single company avoid it then writing this will have been worth it.
(tags: architecture design microservices coding devops ops monolith)
Skot Olsen -- Blessed Saint Architeuthis
Classic piece of freaky squid-related art, now purchaseable on giclee for $200! (very tempted)
Saint Architeuthis is the patron saint of doomed sailors. While the origins of the saint remain unclear, it's recent history and worship are well documented. Whalers who turned their attention to catching giant squid and sea serpents in the 19th century, began asking Saint Architeuthis for mercy whenever a hunt would go awry, which was fairly frequent. When hunting for such animals, one would sometimes be thrown over board or a boat would sink exposing the men to whatever was in the water at the time. A sailor would ask Saint Architeuthis for the quick and relatively painless death of drowning, rather than the hideous demise of being ripped apart by the beak of the squid or chewed up in the sea serpent's hideous maw. Often, men would have visions of Saint Architeuthis who would appear before them in the form of a gigantic, yet benevolent squid wearing a bishop's mitre and carrying tools of the squid hunter's trade.
U.S. top court tightens patent suit rules in blow to 'patent trolls'
This is excellent news, and a death knell for the East Texas patent troll court (cf https://motherboard.vice.com/en_us/article/the-small-town-judge-who-sees-a-quarter-of-the-nations-patent-cases ):
The U.S. Supreme Court on Monday tightened rules for where patent lawsuits can be filed in a decision that may make it harder for so-called patent "trolls" to launch sometimes dodgy patent cases in friendly courts, a major irritant for high-tech giants like Apple and Alphabet Inc's Google. In a decision that upends 27 years of law governing patent infringement cases, the justices sided with beverage flavoring company TC Heartland LLC in its legal battle with food and beverage company Kraft Heinz Co (KHC.O). The justices ruled 8-0 that patent suits can be filed only in courts located in the jurisdiction where the targeted company is incorporated.
via Brad Fitzgerald(tags: via:bradfitz patents swpats east-texas law trolls supreme-court infringement)
-
hosted status page / downtime banner service
Government urged to declare if it wants mandatory ID cards
“The move from a voluntary or small-scale project of Public Services Cards to requiring all passport and driving licence applicant to present these cards is very significant.” Dr TJ McIntyre, a UCD law lecturer and chairman of the privacy advocacy group Digital Rights Ireland said on Sunday these measures marked the introduction of a “national ID card by stealth” and he believed it was being done “in a way which appears to be illegal”.
(tags: privacy government ireland id-cards law)
To Cite or to Steal? When a Scholarly Project Turns Up in a Gallery
What I was seeing was an announcement for a show by Jason Shulman at Cob Gallery called Photographs of Films. The press and interviews collected on the gallery’s website lauded a conceptual beauty and rigor in his work, but the only thing I could see was a rip-off. “Email for price list.” These images were unmistakably similar to the distinctive work I had been producing for years, and it was not long before friends started writing to let me know.
(tags: copyright art aggregation averaging images movies rip-offs jason-shulman jason-salavon kevin-l-ferguson)
Spotting a million dollars in your AWS account · Segment Blog
You can easily split your spend by AWS service per month and call it a day. Ten thousand dollars of EC2, one thousand to S3, five hundred dollars to network traffic, etc. But what’s still missing is a synthesis of which products and engineering teams are dominating your costs. Then, add in the fact that you may have hundreds of instances and millions of containers that come and go. Soon, what started as simple analysis problem has quickly become unimaginably complex. In this follow-up post, we’d like to share details on the toolkit we used. Our hope is to offer up a few ideas to help you analyze your AWS spend, no matter whether you’re running only a handful of instances, or tens of thousands.
Seeking medical abortions online is safe and effective, study finds | World news | The Guardian
Of the 1,636 women who were sent the drugs between the start of 2010 and the end of 2012, the team were able to analyse self-reported data from 1,000 individuals who confirmed taking the pills. All were less than 10 weeks pregnant. The results reveal that almost 95% of the women successfully ended their pregnancy without the need for surgical intervention. None of the women died, although seven women required a blood transfusion and 26 needed antibiotics. Of the 93 women who experienced symptoms for which the advice was to seek medical attention, 95% did so, going to a hospital or clinic. “When we talk about self-sought, self-induced abortion, people think about coat hangers or they think about tables in back alleys,” said Aiken. “But I think this research really shows that in 2017 self-sourced abortion is a network of people helping and supporting each other through what’s really a safe and effective process in the comfort of their own homes, and I think is a huge step forward in public health.”
(tags: health medicine abortion pro-choice data women-on-web ireland law repealthe8th)
The World Is Getting Hacked. Why Don’t We Do More to Stop It? - The New York Times
Zeynep Tufekci is (as usual!) on the money with this op-ed. I strongly agree with the following:
First, companies like Microsoft should discard the idea that they can abandon people using older software. The money they made from these customers hasn’t expired; neither has their responsibility to fix defects. Besides, Microsoft is sitting on a cash hoard estimated at more than $100 billion (the result of how little tax modern corporations pay and how profitable it is to sell a dominant operating system under monopolistic dynamics with no liability for defects). At a minimum, Microsoft clearly should have provided the critical update in March to all its users, not just those paying extra. Indeed, “pay extra money to us or we will withhold critical security updates” can be seen as its own form of ransomware. In its defense, Microsoft probably could point out that its operating systems have come a long way in security since Windows XP, and it has spent a lot of money updating old software, even above industry norms. However, industry norms are lousy to horrible, and it is reasonable to expect a company with a dominant market position, that made so much money selling software that runs critical infrastructure, to do more. Microsoft should spend more of that $100 billion to help institutions and users upgrade to newer software, especially those who run essential services on it. This has to be through a system that incentivizes institutions and people to upgrade to more secure systems and does not force choosing between privacy and security. Security updates should only update security, and everything else should be optional and unbundled.
More on this twitter thread: https://twitter.com/zeynep/status/863734133188681732(tags: security microsoft upgrades windows windows-xp zeynep-tufekci worms viruses malware updates software)
Fireside Chat with Vint Cerf & Marc Andreessen (Google Cloud Next '17) - YouTube
In which Vint Cerf calls for regulatory oversight of software engineering. "It's a serious issue now"
(tags: vint-cerf gcp regulation oversight politics law reliability systems)
don't use String.intern() in Java
String.intern is the gateway to native JVM String table, and it comes with caveats: throughput, memory footprint, pause time problems will await the users. Hand-rolled deduplicators/interners to reduce memory footprint are working much more reliably, because they are working on Java side, and also can be thrown away when done. GC-assisted String deduplication does alleviate things even more. In almost every project we were taking care of, removing String.intern from the hotpaths was the very profitable performance optimization. Do not use it without thinking, okay?
(tags: strings interning java performance tips)
Moom removed from sale due to patent violation claim | Hacker News
Well this sucks. Some scumbag applied for a patent on tiling window management in 2008, and it's been granted. I use Moom every day :(
(tags: moom patents bullshit swpat software window-management osx)
V2V and the challenge of cooperating technology
A great deal of effort and attention has gone into a mobile data technology that you may not be aware of. This is "Vehicle to Vehicle" (V2V) communication designed so that cars can send data to other cars. There is special spectrum allocated at 5.9ghz, and a protocol named DSRC, derived from wifi, exists for communications from car-to-car and also between cars and roadside transmitters in the infrastructure, known as V2I. This effort has been going on for some time, but those involved have had trouble finding a compelling application which users would pay for. Unable to find one, advocates hope that various national governments will mandate V2V radios in cars in the coming years for safety reasons. In December 2016, the U.S. Dept. of Transportation proposed just such a mandate. [....] "Connected Autonomous Vehicles -- Pick 2."
(tags: cars self-driving autonomous-vehicles v2v wireless connectivity networking security)
_Amazon Aurora: Design Considerations for High Throughput Cloud-Native Relational Databases_
'Amazon Aurora is a relational database service for OLTP workloads offered as part of Amazon Web Services (AWS). In this paper, we describe the architecture of Aurora and the design considerations leading to that architecture. We believe the central constraint in high throughput data processing has moved from compute and storage to the network. Aurora brings a novel architecture to the relational database to address this constraint, most notably by pushing redo processing to a multi-tenant scale-out storage service, purpose-built for Aurora. We describe how doing so not only reduces network traffic, but also allows for fast crash recovery, failovers to replicas without loss of data, and fault-tolerant, self-healing storage. We then describe how Aurora achieves consensus on durable state across numerous storage nodes using an efficient asynchronous scheme, avoiding expensive and chatty recovery protocols. Finally, having operated Aurora as a production service for over 18 months, we share the lessons we have learnt from our customers on what modern cloud applications expect from databases.'
(tags: via:rbranson aurora aws amazon databases storage papers architecture)
-
a guide for people who like travelling like a local and visiting hidden places off the beaten track. There are tips on where to rent a bike, the best bike path, the best coffee, the best craft shops, the coolest shops, the cheapest drinks, the most delicious pizza, the best izakaya, the cutest cafes, the best rooftop bar, the coolest hotels (and the cheap and cheerful hotels), the loveliest parks and soooo much more. It's a list of all of the places I frequent, making it a local insiders guide to Tokyo. Also included in the Hello Sandwich Tokyo Guide are language essentials and travel tips. It's the bloggers guide to Tokyo and if you'd like to visit the places seen on Hello Sandwich, then this guide is the zine for you.
(tags: shops tourism japan tokyo guidebooks)
-
A script and python module to check your AWS service limits and usage, and warn when usage approaches limits. Users building out scalable services in Amazon AWS often run into AWS' service limits - often at the least convenient time (i.e. mid-deploy or when autoscaling fails). Amazon's Trusted Advisor can help this, but even the version that comes with Business and Enterprise support only monitors a small subset of AWS limits and only alerts weekly. awslimitchecker provides a command line script and reusable package that queries your current usage of AWS resources and compares it to limits (hard-coded AWS defaults that you can override, API-based limits where available, or data from Trusted Advisor where available), notifying you when you are approaching or at your limits.
(via This Week in AWS)
Global ‘Wana’ Ransomware Outbreak Earned Perpetrators [just] $26,000 So Far
As thousands of organizations work to contain and clean up the mess from this week’s devastating Wana ransomware attack, the fraudsters responsible for releasing the digital contagion are no doubt counting their earnings and congratulating themselves on a job well done. But according to a review of the Bitcoin addresses hard-coded into Wana, it appears the perpetrators of what’s being called the worst ransomware outbreak ever have made little more than USD $26,000 so far from the scam.
(tags: money fraud ransomware wana brian-krebs bitcoin cryptocurrency viruses)
Physical separation of cyclists from traffic “crucial” to dropping injury rates, shows U.S. study
Citing a further study of differing types of cycling infrastructure in Canada, the editorial writes that an 89% increase in safety was noted on streets with physical separation over streets where no such infrastructure existed. Unprotected cycling space was found to be 53% safer. In 2014 there were 902 recorded cyclists fatalities in America and 35,206 serious injuries. Per kilometre cycled fatalities per 100 million kilometres cycled sat at 4.7. In the Netherlands and Denmark those rates sit at 1 and 1.1, respectively.
(tags: cycling infrastructure roads safety accidents cars statistics us canada)
Quividi - Leader in Attention Analytics
more "Anonymous Video Analytics" which is currently deployed in Dublin on-street billboards by a company called Orb with cameras pointing into public spaces. I am very curious whether this is legal under Irish DPA law given that sensitive personal data (your face) is being, while not _stored_ per se, _processed_ by this system without any provision for opt-in/opt-out.
(tags: advertising privacy technology tracking opt-in quividi orb)
Reddit Users Lose Real Money After Meme Currency Bot Dies
dogetipbot runs out of money in another cryptocurrency omnishambles. 'Very lies, such betrayal, WOW.'
(tags: bitcoin reddit doge dogetipbot bots memes ffs shambles dogecoin)
A federal court has ruled that an open-source license is an enforceable contract — Quartz
“Not so,” said Judge Jacqueline Scott Corley in her order on the motion on April 25. Corley said the GNU GPL “provides that the Ghostscript user agrees to its terms if the user does not obtain a commercial license. Plaintiff alleges that Defendant used Ghostscript, did not obtain a commercial license, and represented publicly that its use of Ghostscript was licensed under the GNL GPU. These allegations sufficiently plead the existence of a contract.”
(tags: open-source oss ghostscript gnu gpl licenses contracts law)
-
"The world's best portable wood-fired oven". Fergal has one and loves it. $299
Repair and Leasing Scheme - Peter Mc Verry Trust
Minister Simon Coveney and the Department of Housing have provided funding of €32 million in 2017 for the Repair and Leasing Programme and set a target of 800 units to be delivered this year (2017). A total of €140 million has been allocated to the repair and leasing scheme over the lifetime of Rebuilding Ireland. The Repair and Leasing Scheme at a Glance: Targets Properties Empty or Derelict for 1 Year or more Grants to Property owners of up to €40,000 to get properties back into use Lease Terms of 10, 15 or 20 Years State Guaranteed Rental Income for Duration of Lease Property and Tenants Managed by Approved Housing Bodies [the Peter McVerry Trust in D1, D3, D7 and D9]
(tags: peter-mcverry homelessness dublin housing repair derelict-buildings homes ireland property)
-
'Total Parent Control' for kids internet access at home. Dublin-based product, dedicated wifi AP with lots of child-oriented filtering capabilities
(tags: filtering security ikydz kids children internet wifi ap hardware blocking)
_Optimal Probabilistic Cache Stampede Prevention_ [pdf]
'When a frequently-accessed cache item expires, multiple requests to that item can trigger a cache miss and start regenerating that same item at the same time. This phenomenon, known as cache stampede, severely limits the performance of databases and web servers. A natural countermeasure to this issue is to let the processes that perform such requests to randomly ask for a regeneration before the expiration time of the item. In this paper we give optimal algorithms for performing such probabilistic early expirations. Our algorithms are theoretically optimal and have much better performances than other solutions used in real-world applications.' (via Marc Brooker)
(tags: via:marcbrooker caching caches algorithm probabilistic expiration vldb papers expiry cache-miss stampedes)
-
This looks nifty!
This project demonstrates how to get a natural language recognizer up and running and connect it to the Google Assistant. Along with everything the Google Assistant already does, you can add your own question and answer pairs. All in a handy little cardboard cube, powered by a Raspberry Pi.
(via sergio)(tags: voice google aiy-projects cardboard hacks raspberry-pi)
A Complete Timeline Of How Trump Supporters Tried — And Failed — To Hijack The French Election
it is glorious. vive la France
(tags: france trolls 4chan fail funny pathetic macron marine-le-pen fascism elections nazis)
The Food Lab: Maximize Flavor by Ultra-Smashing Your Burger | Serious Eats
drooooool
The great British Brexit robbery: how our democracy was hijacked | Technology | The Guardian
A map shown to the Observer showing the many places in the world where SCL and Cambridge Analytica have worked includes Russia, Lithuania, Latvia, Ukraine, Iran and Moldova. Multiple Cambridge Analytica sources have revealed other links to Russia, including trips to the country, meetings with executives from Russian state-owned companies, and references by SCL employees to working for Russian entities. Article 50 has been triggered. AggregateIQ is outside British jurisdiction. The Electoral Commission is powerless. And another election, with these same rules, is just a month away. It is not that the authorities don’t know there is cause for concern. The Observer has learned that the Crown Prosecution Service did appoint a special prosecutor to assess whether there was a case for a criminal investigation into whether campaign finance laws were broken. The CPS referred it back to the electoral commission. Someone close to the intelligence select committee tells me that “work is being done” on potential Russian interference in the referendum. Gavin Millar, a QC and expert in electoral law, described the situation as “highly disturbing”. He believes the only way to find the truth would be to hold a public inquiry. But a government would need to call it. A government that has just triggered an election specifically to shore up its power base. An election designed to set us into permanent alignment with Trump’s America. [....] This isn’t about Remain or Leave. It goes far beyond party politics. It’s about the first step into a brave, new, increasingly undemocratic world.
(tags: elections brexit trump cambridge-analytica aggregateiq scary analytics data targeting scl ukip democracy grim-meathook-future)
Online security won’t improve until companies stop passing the buck to the customer
100% agreed!
Giving good security advice is hard because very often individuals have little or no effective control over their security. The extent to which a customer is at risk of being defrauded largely depends on how good their bank’s security is, something customers cannot know. Similarly, identity fraud is the result of companies doing a poor job at verifying identity. If a criminal can fraudulently take out a loan using another’s name, address, and date of birth from the public record, that’s the fault of the lender – not, as Cifas, a trade organisation for lenders, claims, because customers “don’t take the same care to protect our most important asset – our identities”.
(tags: cifas uk passwords security regulation banking ncsc riscs advice)
-
eek. Things to look out for on your AWS setup:
So you’ve pwned an AWS account?—?congratulations?—?now what? You’re eager to get to the data theft, amirite? Not so fast whipper snapper, have you disrupted logging? Do you know what you have? Sweet! Time to get settled in. Maintaining persistence in AWS is only limited by your imagination but there are few obvious and oft used techniques everyone should know and watch for.
The Forgotten Story Of The Radium Girls
'The radium girls’ case was one of the first in which an employer was made responsible for the health of the company’s employees. It led to life-saving regulations and, ultimately, to the establishment of the Occupational Safety and Health Administration, which now operates nationally in the United States to protect workers. Before OSHA was set up, 14,000 people died on the job every year; today, it is just over 4,500. The women also left a legacy to science that has been termed “invaluable.”'
(tags: osha health safety radium poisoning regulation history us-politics free-market cancer radiation)
Netgear PR2000 Trek Travel Router and Range Extender
802.11n, compact, can be used as a router, range extender, AP or bridge; very handy when travelling. Recommended by a FOAF
(tags: recommendations toget routers netgear wireless wifi travel)
The unloved cocktails that deserve to be the toast of the bar | Life and style | The Guardian
The Aviation, Chrysanthemum, Dunhill, and the Army and Navy.
Baby laughing hysterically at ripping paper
classic Youtube unicorn chaser, saving for future use
(tags: unicorn-chaser youtube funny babies paper videos ffu)
The Dark Secret at the Heart of AI - MIT Technology Review
'The mysterious mind of [NVidia's self-driving car, driven by machine learning] points to a looming issue with artificial intelligence. The car’s underlying AI technology, known as deep learning, has proved very powerful at solving problems in recent years, and it has been widely deployed for tasks like image captioning, voice recognition, and language translation. There is now hope that the same techniques will be able to diagnose deadly diseases, make million-dollar trading decisions, and do countless other things to transform whole industries. But this won’t happen—or shouldn’t happen—unless we find ways of making techniques like deep learning more understandable to their creators and accountable to their users. Otherwise it will be hard to predict when failures might occur—and it’s inevitable they will. That’s one reason Nvidia’s car is still experimental. Already, mathematical models are being used to help determine who makes parole, who’s approved for a loan, and who gets hired for a job. If you could get access to these mathematical models, it would be possible to understand their reasoning. But banks, the military, employers, and others are now turning their attention to more complex machine-learning approaches that could make automated decision-making altogether inscrutable. Deep learning, the most common of these approaches, represents a fundamentally different way to program computers. “It is a problem that is already relevant, and it’s going to be much more relevant in the future,” says Tommi Jaakkola, a professor at MIT who works on applications of machine learning. “Whether it’s an investment decision, a medical decision, or maybe a military decision, you don’t want to just rely on a ‘black box’ method.”'
(tags: ai algorithms ml machine-learning legibility explainability deep-learning nvidia)
Prior Exposure Increases Perceived Accuracy of Fake News
In other words, repeated exposure to fake news renders it believable. Pennycook, Gordon and Cannon, Tyrone D and Rand, David G., _Prior Exposure Increases Perceived Accuracy of Fake News_ (April 30, 2017):
Collectively, our results indicate familiarity is used heuristically to infer accuracy. Thus, the spread of fake news is supported by persistent low-level cognitive processes that make even highly implausible and partisan claims more believable with repetition. Our results suggest that political echo chambers not only isolate one from opposing views, but also help to create incubation chambers for blatantly false (but highly salient and politicized) fake news stories.
(via Zeynep Tufekci) See also: http://www.rand.org/content/dam/rand/pubs/perspectives/PE100/PE198/RAND_PE198.pdf , _The Russian "Firehose of Falsehood" Propaganda Model_, from RAND.(tags: propaganda psychology fake-news belief facebook echo-chambers lies truth media)
How your selfie could affect your life insurance
Noping so hard. Imagine the levels of algorithmic discrimination inherent in this shit.
"Your face is something you wear all your life, and it tells a very unique story about you," says Karl Ricanek Jr., co-founder and chief data scientist at Lapetus Solutions Inc. in Wilmington, N.C. Several life insurance companies are testing Lapetus technology that uses facial analytics and other data to estimate life expectancy, he says. (Lapetus would not disclose the names of companies testing its product.) Insurers use life expectancy estimates to make policy approval and pricing decisions. Lapetus says its product, Chronos, would enable a customer to buy life insurance online in as little as 10 minutes without taking a life insurance medical exam.
(tags: discrimination computer-says-no algorithms selfies face lapetus photos life-insurance life-expectancy)
-
Experts have been warning for years about security blunders in the Signaling System 7 protocol – the magic glue used by cellphone networks to communicate with each other. [...] O2-Telefonica in Germany has confirmed to Süddeutsche Zeitung that some of its customers have had their bank accounts drained using a two-stage attack that exploits SS7. In other words, thieves exploited SS7 to intercept two-factor authentication codes sent to online banking customers, allowing them to empty their accounts. The thefts occurred over the past few months, according to multiple sources.
(tags: o2 telefonica germany ss7 mobile 2fa security hacks cellphones)
-
This is pretty excellent work -- paste a UNIX command line and it'll contextually inline manual page snippets to match, highlighting the matching part of the command line.
(tags: cli unix documentation explainshell shell scripting syntax manual-pages)
Sufjan Stevens - Carrie & Lowell Live on Vimeo
the entire concert set. This was the highlight concert for me in 2015
(tags: music video sufjan-stevens concerts 2015)
Exclusive: The Leaked Fyre Festival Pitch Deck Is Beyond Parody | Vanity Fair
This is the worst future ever.
As the pitch deck claims, within the first 48 hours of the social-media blitz, the Fyre Starters had reached “300 million social impressions”—impressions being the kind of dumb synonym one uses instead of the word “people,” in the same way someone at a bar tries to sound smart by saying he is “inebriated” instead of “drunk.” (And to be fair, an impression isn’t even a sentient person. It’s essentially reaching a person when they aren’t paying attention.) To pull off the 300 million impressions, McFarland and Ja Rule partnered with a P.R. agency, a creative agency, and Elliot Tebele, a once-random nobody who has created a social-media empire by siphoning other people’s jokes into the Instagram account @FuckJerry. One of the biggest deceits of the entire media campaign was that almost all of the 400 influencers who shared the promotional videos and photos never noted they were actually advertising something for someone else, which the Federal Trade Commission requires. This kind of advertising has been going on for years, and while the F.T.C. has threatened to crack down on online celebrities and influencers deceitfully failing to disclose that they are paid to post sponsorships, so far those threats have been completely ignored.
(tags: fyre fail grim influencers instagram ftc pr advertising festivals)
Towards true continuous integration – Netflix TechBlog – Medium
Netflix discuss how they handle the eternal dependency-management problem which arises with lots of microservices:
Using the monorepo as our requirements specification, we began exploring alternative approaches to achieving the same benefits. What are the core problems that a monorepo approach strives to solve? Can we develop a solution that works within the confines of a traditional binary integration world, where code is shared? Our approach, while still experimental, can be distilled into three key features: Publisher feedback?—?provide the owner of shared code fast feedback as to which of their consumers they just broke, both direct and transitive. Also, allow teams to block releases based on downstream breakages. Currently, our engineering culture puts sole responsibility on consumers to resolve these issues. By giving library owners feedback on the impact they have to the rest of Netflix, we expect them to take on additional responsibility. Managed source?—?provide consumers with a means to safely increment library versions automatically as new versions are released. Since we are already testing each new library release against all downstreams, why not bump consumer versions and accelerate version adoption, safely. Distributed refactoring?—?provide owners of shared code a means to quickly find and globally refactor consumers of their API. We have started by issuing pull requests en masse to all Git repositories containing a consumer of a particular Java API. We’ve run some early experiments and expect to invest more in this area going forward.
What I find interesting is that Amazon dealt effectively with the first two many years ago, in the form of their "Brazil" build system, and Google do the latter (with Refaster?). It would be amazing to see such a system released into an open source form, but maybe it's just too heavyweight for anyone other than a giant software company on the scale of a Google, Netflix or Amazon.(tags: brazil amazon build microservices dependencies coding monorepo netflix google refaster)
acksin/seespot: AWS Spot instance health check with termination and clean up support
When a Spot Instance is about to terminate there is a 2 minute window before the termination actually happens. SeeSpot is a utility for AWS Spot instances that handles the health check. If used with an AWS ELB it also handles cleanup of the instance when a Spot Termination notice is sent.
(tags: aws elb spot-instances health-checks golang lifecycle ops)
-
A simple and easy to use tool designed to significantly lower your Amazon AWS costs by automating the use of the spot market. Once enabled on an existing on-demand AutoScaling group, it launches an EC2 spot instance that is cheaper, at least as large and configured identically to your current on-demand instances. As soon as the new instance is ready, it is added to the group and an on-demand instance is detached from the group and terminated. It continuously applies this process, gradually replacing any on-demand instances with spot instances until the group only consists of spot instances, but it can also be configured to keep some on-demand instances running.
(tags: aws golang ec2 autoscaling asg spot-instances ops)
-
'Algorithms update bureaucracy’s long-standing strategy for evasion.'
The need to optimize yourself for a network of opaque algorithms induces a sort of existential torture. In The Utopia of Rules: On Technology, Stupidity, and the Secret Joys of Bureaucracy, anthropologist David Graeber suggests a fundamental law of power dynamics: “Those on the bottom of the heap have to spend a great deal of imaginative energy trying to understand the social dynamics that surround them — including having to imagine the perspectives of those on top — while the latter can wander about largely oblivious to much of what is going on around them. That is, the powerless not only end up doing most of the actual, physical labor required to keep society running, they also do most of the interpretive labor as well.” This dynamic, Graeber argues, is built into all bureaucratic structures. He describes bureaucracies as “ways of organizing stupidity” — that is, of managing and reproducing these “extremely unequal structures of imagination” in which the powerful can disregard the perspectives of those beneath them in various social and economic hierarchies. Employees need to anticipate the needs of bosses; bosses need not reciprocate. People of color are forced to learn to accommodate and anticipate the ignorance and hostility of white people. Women need to be acutely aware of men’s intentions and feelings. And so on. Even benevolent-seeming bureaucracies, in Graeber’s view, have the effect of reinforcing “the highly schematized, minimal, blinkered perspectives typical of the powerful” and their privileges of ignorance and indifference toward those positioned as below them.
(tags: algorithms bureaucracy democracy life society via:raycorrigan technology power)
Reverse engineering the 76477 "Space Invaders" sound effect chip from die photos
Now _this_ is reversing:
Remember the old video game Space Invaders? Some of its sound effects were provided by a chip called the 76477 Complex Sound Generation chip. While the sound effects1 produced by this 1978 chip seem primitive today, it was used in many video games, pinball games. But what's inside this chip and how does it work internally? By reverse-engineering the chip from die photos, we can find out. (Photos courtesy of Sean Riddle.) In this article, I explain how the analog circuits of this chip works and show how the hundreds of transistors on the silicon die form the circuits of this complex chip.
(tags: space-invaders games history reverse-engineering chips analog sound-effects)
-
mcfunley: 'I think at least 50% of my career has been either contributing to or unwinding one [Martin] Fowler-inspired disaster or another.' See also: continuous deployment, polyglot programming, microservices Relevant meme: https://twitter.com/mcfunley/status/857641303521206272/photo/1
(tags: funny quotes architecture architecture-astronauts martin-fowler cargo-cults coding design-patterns enterprise continuous-deployment cd polyglot-programming microservices experts)
Instead of containerization, give me strong config & deployment primitives
Reasonable list of things Docker does badly at the moment, and a call to fix them. I still think Docker/rkt are a solid approach, if not 100% there yet though
(tags: docker containers complaining whinge networking swarm deployment architecture build packaging)
Developing a time-series "database" based on HdrHistogram
Histogram aggregation is definitely a sensible way to store this kind of data
(tags: storage elasticsearch metrics hdrhistogram histograms tideways)
'What’s your ML Test Score? A rubric for ML production systems'
'Using machine learning in real-world production systems is complicated by a host of issues not found in small toy examples or even large offline research experiments. Testing and monitoring are key considerations for assessing the production-readiness of an ML system. But how much testing and monitoring is enough? We present an ML Test Score rubric based on a set of actionable tests to help quantify these issues.' Google paper on testable machine learning systems.
(tags: machine-learning testing ml papers google)
-
So, ladies, let’s first put down the two-pound, pink dumbbells. We have been sold a false story about fitness, health (and its connection to weight loss). I was exercised by wolves. And I’m going to tell you all the secrets and tricks I learned by avoiding the fitness-industrial complex. Most of what I’ll say applies to men, but I have discovered that most of the outrageously wrong advice is given to women. [...] So, here: truth number one. Very few of us consider strength-training as essential exercise, but it is. It is especially crucial as one ages, because a natural part of the aging process is losing muscle. Women, especially, need to lift weights, and the trick to lifting weights is stressing muscles. And that weight has to be a real weight, progressively increased, and barring health issues, an average woman should not even bother with two pound weights because that won’t stress your muscles enough to benefit you. Exercise industry is surely partially to blame for why people don’t exercise regularly: they promise the wrong thing (weight loss) and then don’t push/guide people to do the right thing.
(tags: exercise health fitness weight-loss zeynep-tufekci strength aging weights training)
-
via Simon McGarr
(tags: via:tupp_ed piracy streaming dodgyboxes tv ecj eu)
-
Bring your content to life with our free resource for positive tourism related purposes. Our image, video and copy collections show people, landscapes and the Irish lifestyle across a range of experiences including festivals, activities, cities, rural life and food.
Interesting idea -- but the licensing terms aren't 100% clear. This would have been much easier if it was just CC licensed!(tags: open-data licensing ireland tourism via:damienmulley landscapes photos pictures content failte-ireland)
Here’s Why Juicero’s Press is So Expensive – Bolt Blog
Our usual advice to hardware founders is to focus on getting a product to market to test the core assumptions on actual target customers, and then iterate. Instead, Juicero spent $120M over two years to build a complex supply chain and perfectly engineered product that is too expensive for their target demographic. Imagine a world where Juicero raised only $10M and built a product subject to significant constraints. Maybe the Press wouldn’t be so perfectly engineered but it might have a fewer features and cost a fraction of the original $699. Or maybe with a more iterative approach, they would have quickly found that customers vary greatly in their juice consumption patterns, and would have chosen a per-pack pricing model rather than one-size-fits-all $35/week subscription. Suddenly Juicero is incredibly compelling as a product offering, at least to this consumer.
(tags: juicero design electronics hardware products startups engineering teardowns)
-
AWS Greengrass is software that lets you run local compute, messaging & data caching for connected devices in a secure way. With AWS Greengrass, connected devices can run AWS Lambda functions, keep device data in sync, and communicate with other devices securely – even when not connected to the Internet. Using AWS Lambda, Greengrass ensures your IoT devices can respond quickly to local events, operate with intermittent connections, and minimize the cost of transmitting IoT data to the cloud. AWS Greengrass seamlessly extends AWS to devices so they can act locally on the data they generate, while still using the cloud for management, analytics, and durable storage. With Greengrass, you can use familiar languages and programming models to create and test your device software in the cloud, and then deploy it to your devices. AWS Greengrass can be programmed to filter device data and only transmit necessary information back to the cloud. AWS Greengrass authenticates and encrypts device data at all points of connection using AWS IoT’s security and access management capabilities. This way data is never exchanged between devices when they communicate with each other and the cloud without proven identity.
(tags: aws cloud iot lambda devices offline synchronization architecture)
Immunotherapy Pioneer James Allison Has Unfinished Business with Cancer - MIT Technology Review
On the discovery and history of ipilimumab (trade named Yervoy), one of the first immunotherapy drugs
(tags: ipilimumab cancer yervoy immunotherapy medicine melanoma)
FactCheck: No, the reported side effects of the HPV vaccine do NOT outweigh the proven benefits
The Journal FactCheck team take a shortcut through Regret.ie's bullshit
(tags: hpv antivaxxers gardasil safety vaccination health medicine fact-checking)
Unroll.me sold your data to Uber
'Uber devoted teams to so-called competitive intelligence, purchasing data from Slice Intelligence, which collected customers' emailed Lyft receipts via Unroll.me and sold the data to Uber'. Also: 'Unroll.me allegedly "kept a copy of every single email that you sent or received" in "poorly secured S3 buckets"': https://news.ycombinator.com/item?id=14180463 Unroll.me CEO: 'felt bad “to see that some of our users were upset to learn about how we monetise our free service”.' https://www.theguardian.com/technology/2017/apr/24/unrollme-mail-unsubscription-service-heartbroken-sells-user-inbox-data-slice
(tags: uber unroll.me gmail google privacy data-protection lyft scumbags slice-intelligence)
Capturing all the flags in BSidesSF CTF by pwning Kubernetes/Google Cloud
good exploration of the issues with running a CTF challenge (or any other secure infrastructure!) atop Kubernetes and a cloud platform like GCE
(tags: gce google-cloud kubernetes security docker containers gke ctf hacking exploits)
How To Add A Security Key To Your Gmail (Tech Solidarity)
Excellent how-to guide for Yubikey usage on gmail
(tags: gmail yubikey security authentication google)
-
'Lyrebird is the first company to offer a technology to reproduce the voice of someone as accurately and with as little recorded audio. [..] Voice recordings are currently considered as strong pieces of evidence in our societies and in particular in jurisdictions of many countries. Our technology questions the validity of such evidence as it allows to easily manipulate audio recordings. This could potentially have dangerous consequences such as misleading diplomats, fraud and more generally any other problem caused by stealing the identity of someone else. By releasing our technology publicly and making it available to anyone, we want to ensure that there will be no such risks. We hope that everyone will soon be aware that such technology exists and that copying the voice of someone else is possible. More generally, we want to raise attention about the lack of evidence that audio recordings may represent in the near future.'
(tags: lyrebird audio technology scary ethics)
-
A C=64 demo in 256 bytes! Awesome work. Use of an LFSR number generator to create the melody is particularly clever (via Craig)
(tags: art programming computers demos demoscene c-64 via:craig lfsr algorithms)
Rules for Successful Hotel Wi-Fi - Wireless LAN Professionals
top wifi tips, via irldexter on ITC Slack
-
Simon McGarr on Twitter: "That time a priest and a nun and a guy who were on an Irish hospital board blocked cancer treatment that required contraception. https://t.co/A7alospojJ" This happened in 2003 in Dublin's Mater Hospital. useful the next time someone says that hospital board member ethos won't impact clinical care
(tags: cancer treatment contraception prolife trials medicine ethos mater-hospital boards governance)
-
'FREE WiFi Site Survey Software for MAC OS X & Windows'. Sadly reviews from pals are that it is 'shite' :(
(tags: osx wifi network survey netspot networking ops dataviz wireless)
On The Turing Completeness of PowerPoint (SIGBOVIK) - YouTube
omfg
(tags: funny powerpoint presentations via:zeynep turing-complete cs animations)
Peter Boylan: New maternity hospital should not be given to Sisters of Charity
I do not believe that ownership of the €300 million, state-of-the-art National Maternity Hospital should be gifted to the Sisters of Charity. A lot of other people appear to share my view. Secondly, a properly independent board needs to oversee the running of the new hospital. The Minister has the power to intervene to protect both the medical interests of women and their infants and the financial interests of the Irish taxpayer. He must now do so.
Dr Peter Boylan is chairman of the Institute of Obstetricians and Gynaecologists and a former master of the National Maternity Hospital. Nobody is more qualified on this(tags: peter-boylan law ireland maternity hospitals nuns state)
Amazon DynamoDB Accelerator (DAX)
Amazon DynamoDB Accelerator (DAX) is a fully managed, highly available, in-memory cache for DynamoDB that delivers up to a 10x performance improvement – from milliseconds to microseconds – even at millions of requests per second. DAX does all the heavy lifting required to add in-memory acceleration to your DynamoDB tables, without requiring developers to manage cache invalidation, data population, or cluster management.
No latency percentile figures, unfortunately. Also still in preview.(tags: amazon dynamodb aws dax performance storage databases latency low-latency)
I Just Love This Juicero Story So Much
When we signed up to pump money into this juice company, it was because we thought drinking the juice would be a lot harder and more expensive. That was the selling point, because Silicon Valley is a stupid libertarian dystopia where investor-class vampires are the consumers and a regular person’s money is what they go shopping for. Easily opened bags of juice do not give these awful nightmare trash parasites a good bargain on the disposable income of credulous wellness-fad suckers; therefore easily opened bags of juice are a worse investment than bags of juice that are harder to open.
(tags: juicero juicebros techbros silicon-valley funny dystopia fruit bags juice)
Zeynep Tufekci: Machine intelligence makes human morals more important | TED Talk | TED.com
Machine intelligence is here, and we're already using it to make subjective decisions. But the complex way AI grows and improves makes it hard to understand and even harder to control. In this cautionary talk, techno-sociologist Zeynep Tufekci explains how intelligent machines can fail in ways that don't fit human error patterns — and in ways we won't expect or be prepared for. "We cannot outsource our responsibilities to machines," she says. "We must hold on ever tighter to human values and human ethics."
More relevant now that nVidia are trialing ML-based self-driving cars in the US...(tags: nvidia ai ml machine-learning scary zeynep-tufekci via:maciej technology ted-talks)
'Mathwashing,' Facebook and the zeitgeist of data worship
Fred Benenson: Mathwashing can be thought of using math terms (algorithm, model, etc.) to paper over a more subjective reality. For example, a lot of people believed Facebook was using an unbiased algorithm to determine its trending topics, even if Facebook had previously admitted that humans were involved in the process.
(tags: maths math mathwashing data big-data algorithms machine-learning bias facebook fred-benenson)
Build a Better Monster: Morality, Machine Learning, and Mass Surveillance
We built the commercial internet by mastering techniques of persuasion and surveillance that we’ve extended to billions of people, including essentially the entire population of the Western democracies. But admitting that this tool of social control might be conducive to authoritarianism is not something we’re ready to face. After all, we're good people. We like freedom. How could we have built tools that subvert it? As Upton Sinclair said, “It is difficult to get a man to understand something, when his salary depends on his not understanding it.” I contend that there are structural reasons to worry about the role of the tech industry in American political life, and that we have only a brief window of time in which to fix this.
(tags: advertising facebook google internet politics surveillance democracy maciej-ceglowski talks morality machine-learning)
-
interesting recipe to try out:
2 oz blanco tequila 12 to 15 blueberries, plus a few more for garnish 2 basil sprigs 1 oz agave nectar Juice of 1 lime Muddle the blueberries and basil with the tequila in a shaker. Add the agave nectar and lime juice, and shake with ice. Pour into a rocks glass over fresh ice, and top with filtered water if desired. Garnish with a few blueberries.
(tags: blueberries basil margarita tequila recipes cocktails)
-
udp.c in the Linux kernel before 4.5 allows remote attackers to execute arbitrary code via UDP traffic that triggers an unsafe second checksum calculation during execution of a recv system call with the MSG_PEEK flag.
Snowden Documents Reveal Scope of Secrets Exposed to China in 2001 Spy Plane Incident
wow, this was a pretty major screwup
(tags: china us spying nsa ep-3e spy-planes surveillance snowden)
On what basis does FFFFOUND! recommend related images? - Quora
by the URL! totally not what I expected!
(tags: ffffound images similarity algorithms via:pheezy mltshp quora)
-
Lots and lots of shots of "Space: 1999" interiors. <3
Tackling decades of dereliction
regarding some seriously derelict houses on Connaught St in Phibsboro and the bureaucracy tomfoolery which has resulted in them not appearing on the Derelict Sites Register
Julia Evans on Twitter: "notes on this great "When the pager goes off" article"
'notes on this great "When the pager goes off" article from @incrementmag https://increment.com/on-call/when-the-pager-goes-off/ ' -- cartoon summarising a much longer article of common modern ops on-call response techniques. Still pretty consistent with the systems we used in Amazon
(tags: on-call ops incident-response julia-evans pager increment-mag)
Fans of chess were outraged when the queen piece was added
"scacchi alla rabiosa" ("madwoman's chess") faced a backlash from 16th-century gamergaters
(tags: gamergate funny 16th-century history chess gaming games queen)
Investigation finds inmates built computers and hid them in prison ceiling
Prisoners built computers from parts, hid them in the ceiling, and connected them to the administrative network. 'The Ohio Inspector General says investigators found an inmate used the computers to steal the identity of another inmate, and then submit credit card applications, and commit tax fraud. They also found inmates used the computers to create security clearance passes that gave them access to restricted areas.'
-
Funnily enough, this is exactly what Ross Anderson warned about 10 years ago re patient record digitisation in the UK. 'Occupational therapists working for an employer, doctors working for insurance companies, a dietitian, an optometrist or a dentist or their staff can view the [patient] record and see if individuals have a sexually transmitted disease, a mental illness, have had an abortion or are using Viagra.'
(tags: privacy heaith australia myhealthrecord data-protection data-privacy healthcare medicine)
Stiff Upper Lip by Alex Renton review – the damage boarding schools have done | Books | The Guardian
Holy shit:
Stiff Upper Lip is studded with startling stuff. Discussing the importance of football, for instance, in 19th-century public schools, he drops in the line that “in Charterhouse’s version a small boy was the ball”. I blithely went over that one, thinking he meant “a small boy was [expected to crouch on] the ball” or similar; but it was no typo. In a cheery kickabout on Good Friday, 1924, the Earl of Sussex’s son died from his injuries – _having been [used as] an actual football_.
(via Eva Wiseman)(tags: football public-schools uk school history murder insanity charterhouse alex-renton education)
Kenny Bastani on Twitter: "Visualization of a serverless event-driven architecture"
yup
(tags: funny gifs animation serverless aws architecture omgwtfbbq)
-
Awesome StackOverflow answer for detecting "similar" images -- promising approach to reimplement ffffound's similarity feature in mltshp, maybe
(tags: algorithms hashing comparison diff images similarity search ffffound mltshp)
Ubuntu on AWS gets serious performance boost with AWS-tuned kernel
interesting -- faster boots, CPU throttling resolved on t2.micros, other nice stuff
serviette/serviette.py at master · heathervm/serviette · GitHub
Delete tweets based on search terms. Wonder why you'd want that
(tags: twitter tweets delete privacy social-media)
How Google Book Search Got Lost – Backchannel
There are plenty of other explanations for the dampening of Google’s ardor: The bad taste left from the lawsuits. The rise of shiny and exciting new ventures with more immediate payoffs. And also: the dawning realization that Scanning All The Books, however useful, might not change the world in any fundamental way.
(tags: books reading google library lawsuits legal scanning book-search search)
Monk Gloats Over Yoga Championship - The Onion
One of the Onion's all-time classics. Still eminently quotable.
LHASA, TIBET—Employing the brash style that first brought him to prominence, Sri Dhananjai Bikram won the fifth annual International Yogi Competition yesterday with a world-record point total of 873.6. “I am the serenest!” Bikram shouted to the estimated crowd of 20,000 yoga fans, vigorously pumping his fists. “No one is serener than Sri Dhananjai Bikram—I am the greatest monk of all time!”
The Centennial Society's business reply pamphlet | Stop Junk Mail
The classic "office riot" pamphlet... 'The Centennial Society, a radical anti-consumerist movement, has come up with a more arty way of returning junk mail. Pre-paid envelopes can be used to send people working in the junk mail industry information about how to break free. No junk mailer really likes his job; wasting tonnes and tonnes of paper on useless advertisements makes few people feel good about themselves. The Business Reply Pamphlet shows them the way to freedom.'
(tags: riot offices junk-mail funny art centennial-society ads trash-the-gaff)
Things I Learned Managing Site Reliability for Some of the World’s Busiest Gambling Sites
Solid article proselytising runbooks/playbooks (or in this article's parlance, "Incident Models") for dev/ops handover and operational knowledge
(tags: ops process sre devops runbooks playbooks incident-models)
Spotify’s Love/Hate Relationship with DNS
omg somebody at Spotify really really loves DNS. They even store a DHT hash ring in it. whyyyyyyyyyyy
(tags: spotify networking architecture dht insane scary dns unbound ops)
-
In case you were thinking Lambda was potentially usable yet
(tags: lambda aws shitshow architecture serverless)
Research Blog: Federated Learning: Collaborative Machine Learning without Centralized Training Data
Great stuff from Google - this is really nifty stuff for large-scale privacy-preserving machine learning usage:
It works like this: your device downloads the current model, improves it by learning from data on your phone, and then summarizes the changes as a small focused update. Only this update to the model is sent to the cloud, using encrypted communication, where it is immediately averaged with other user updates to improve the shared model. All the training data remains on your device, and no individual updates are stored in the cloud. Federated Learning allows for smarter models, lower latency, and less power consumption, all while ensuring privacy. And this approach has another immediate benefit: in addition to providing an update to the shared model, the improved model on your phone can also be used immediately, powering experiences personalized by the way you use your phone.
Papers: https://arxiv.org/pdf/1602.05629.pdf , https://arxiv.org/pdf/1610.05492.pdf(tags: google ml machine-learning training federated-learning gboard models privacy data-privacy data-protection)
-
The denizens of /r/ireland have put together a map of their favourite tourist spots around the country. Some slightly odd choices but definitely a few that may be worth a visit. Thread: https://www.reddit.com/r/ireland/comments/5b0634/i_am_starting_a_rireland_recommended_map_for/
(tags: ireland tourist tourism attractions reddit)
-
amazing history of a key house sample -- the Pacific State loon
(tags: pacific-state loon birds samples house acid 808-state)
saitoha/libsixel: The new standard of SIXEL development
SIXEL is one of image formats for printer and terminal imaging introduced by Digital Equipment Corp. (DEC). Its data scheme is represented as a terminal-friendly escape sequence. So if you want to view a SIXEL image file, all you have to do is "cat" it to your terminal.
Wow. gif320 lives on!Smart TV hack embeds attack code into broadcast signal—no access required | Ars Technica
Awesome.
The proof-of-concept exploit uses a low-cost transmitter to embed malicious commands into a rogue [DVB-T] signal. That signal is then broadcast to nearby devices. It worked against two fully updated TV models made by Samsung. By exploiting two known security flaws in the Web browsers running in the background, the attack was able to gain highly privileged root access to the TVs. By revising the attack to target similar browser bugs found in other sets, the technique would likely work on a much wider range of TVs.
(tags: dvb-t tv security exploits samsung smart-tvs broadcast)
May's Brexit plan is falling apart and the press are talking about Easter eggs
Now the prime minister has embroiled herself in a negotiation in which we are at a disadvantage in terms of time and negotiating capacity. There will of course be no admission from Brexit MPs about this. They fixate on the one prediction economists got wrong - the surprising resilience of consumer spending - while ignoring everything their side was wrong about, like the fall in sterling, the announcement of a second Scottish independence referendum, the threat of a sudden hard border in Ireland or the crisis over Gibraltar. This is not point scoring. Unless there is a sober assessment of what is going right and wrong on both sides there can be no realistic negotiating posture. We are condemned to keep making the same mistakes again and again and working ourselves into ever-more disadvantageous positions.
When Boring is Awesome: Building a scalable time-series database on PostgreSQL
Nice. we built something along these lines atop MySQL before -- partitioning by timestamp is the key. (via Nelson)
(tags: database postgresql postgres timeseries tsd storage state via:nelson)
-
'A Desktop Viewer App for Tabular Data' -- pivot CSV data easily; works well with large files; free, from Antony Courtney
Garadget bans customer from accessing Cloud for negative Amazon review | Hacker News
yet another potential risk of IoT
(tags: iot fail garadget gadgets legal reviews amazon funny)
USA Address & Package Forwarding - Shipito
recommended by Eoin for Parcelmotel-style delivery forwarding
(tags: packages delivery parcels parcelmotel shipito via:eoin usa)
Bidding Website Rentberry May Be the Startup of Your Nightmares
omg this is horrible, grim-meathook-future stuff.
A landlord lists a rental space and potential tenants bid against one another to claim the lease. Tenants’ personal information is available to the landlord. The landlord then makes their final decision by weighing what the best offer is along with which bidder seems like they’d be the best tenant
(tags: grim-meathook-future horror renting rent tenancy rentberry libertarian homes startups)
Introducing the Faves & Flags roleplaying system | MetaTalk
awesome D&D-spoofing April Fool from MeFi
(tags: metafilter funny dungeons-and-dragons community spoofs rpg 1970s)
Watching the hearings, I learned my "Bernie bro" harassers may have been Russian bots
However, the rest of the abuse came from accounts purporting to be supporters of Vermont Independent Senator Bernie Sanders. And these were “people” with whom I believed I shared common values and policy interests. Almost all of the accounts presented as men — mostly young and white — and used sexist and misogynistic tones and words. I was called “mom” and “grandma” as epithets by these “young men.” I was called every vile sexualized name you can imagine. For some reason that I did not understand at the time, they liked to call me a “vagina.” (I now believe non-native English — i.e. Russian — speakers wrote the algorithms controlling these bots and perhaps imagined “vagina” to be the equivalent of the c-word when hurled at a woman.) Not being conversant in the mechanisms of Russian psychological warfare techniques at the time, it never occurred to me that, like the #MAGA bots, these “Bernie Bro” accounts were actually bots too. And the abuse from these accounts was much harder to dismiss. It went in further, emotionally speaking. The vitriol of the attacks felt like a painful betrayal. After all, “we” probably shared 99 percent of our political perspective; we just supported different candidates — which is something I said repeatedly in my attempts to appeal to reason with some of the attackers over the course of those long months. Nonetheless, even the mildest criticism of Sanders or comment of support for Clinton would bring out a swarm of these “Bernie Bro” accounts spouting off with abusive language and mockery.
(tags: bernie-bros abuse twitter russia security bots elections hilary-clinton)
-
'The bakeneko (???, "changed cat") is a type of Japanese y?kai, or supernatural creature. According to its name, it is a cat that has changed into a y?kai. It is often confused with the nekomata, another cat-like y?kai,[2] and the distinction between the two can often be quite ambiguous.' Reportedly, Totoro's catbus is a bakeneko, as is the Maneki Neko good luck totem.
(tags: superstitions cats catbus totoro bakeneko yokai japan history)
Who Discovered Why The Challenger Exploded?
Everyone knows Richard Feynman’s famous televised demonstration that the Challenger had exploded because its O-rings got stiff when they were cold -- but it wasn’t Feynman’s discovery. It was Sally Ride’s.' (via Tony Finch)
(tags: richard-feynman sally-ride history space challenger o-rings science engineering nasa)
UW professor: The information war is real, and we’re losing it
Starbird sighed. “I used to be a techno-utopian. Now I can’t believe that I’m sitting here talking to you about all this.”
Yep :((tags: journalism media news fake-news infowars twitter facebook)
How Do We Defeat Online Trolls? - The Atlantic
Another challenge is that no matter what solutions people devise to fight trolls, the trolls will fight back. Even among those who are optimistic that the trolls can be beaten back, and that civic discourse will prevail online, there are myriad unknowns ahead. “Online discourse is new, relative to the history of communication,” said Ryan Sweeney, the director of analytics at Ignite Social Media, in his response to the survey. “Technological evolution has surpassed the evolution of civil discourse. We’ll catch up eventually. I hope. We are in a defining time.”
Learn redis the hard way (in production) · trivago techblog
oh god this is pretty awful. this just reads like "don't try to use Redis at scale" to me
(tags: redis scalability ops architecture horror trivago php)
Deep Dive on Amazon EBS Elastic Volumes
'March 2017 AWS Online Tech Talks' -- lots about the new volume types
-
Expect to see a lot more cases of automated discrimination like this in the future. There is no way an auto-adjudication system would be allowed to have this staggering level of brokenness if it was dealing with the well-off:
State officials have said that between Oct. 1, 2013, when the MiDAS [automated unemployment insurance fraud detection] system came on line, and Aug. 7, 2015, when the state halted the auto-adjudication of fraud determinations and began to require some human review of MiDAS findings, the system had a 93% error rate and made false fraud findings affecting more than 20,000 unemployment insurance claims. Those falsely accused of fraud were subjected to quadruple penalties and aggressive collection techniques, including wage garnishment and seizure of income tax refunds. Some were forced into bankruptcy. The agency is now reviewing about 28,000 additional fraud determinations that were made during the relevant period, but which involved some human review. An unknown number of those fraud findings were also false.
(tags: fraud broken fail michigan detroit social-welfare us-politics computer-says-no automation discrimination fraud-detection)
The criminal exploits of "Prawo Jazdy"
Excellent policing folklore here.... 'Eventually a letter was sent to the Polish embassy to ask for the Polish government's assistance in bringing this rogue motorist to justice. Their reply was as swift as it was courteous. It said "Prawo Jazdy is Polish for driver's license".'
(tags: gardai policing ireland polish driving safety road-safety funny anecdotes)
Intuit and H&R Block Are Spending Millions to Keep Us From Having Simpler Tax Forms
I noticed this when I was living there -- it was nearly impossible to file a 1040 without help, and this is why:
Intuit spent more than $2 million lobbying last year, much of it spent on legislation that would permanently bar the government from offering taxpayers pre-filled returns. H&R Block spent $3 million, also directing some of their efforts toward the bill.
On the upside, with H&R Block it's reasonably easy. Just pretty unpleasant that it's a requirement and effectively private-sector taxation as a result.(tags: h-r-block intuit taxes us-politics lobbying scams usa)
-
The grugq on Putin vs France:
How modern conflicts play out in the informatics sphere, what I mean when I talk about cyber war, is happening in France. After France there will be Germany, then the Scandinavian countries have their elections. There is no chance that Putin attempting to shape the world to best suit Russian interests will abate. Currently, the strongest area that he can contend in is the informatics sphere, the cyber realm, where human perception of reality is shaped.
(tags: putin france elections russia cyber-war hacking security wikileaks)
-
Whitehat CCC hacker thoroughly pwns N26 bank -- there's a lot of small leaks and insecurities here. Sounds like N26 are dealing with them though
-
'For decades, the transaction concept has played a central role in database research and development. Despite this prominence, transactional databases today often surface much weaker models than the classic serializable isolation guarantee—and, by default, far weaker models than alternative,“strong but not serializable” models such as Snapshot Isolation. Moreover, the transaction concept requires the programmer’s involvement: should an application programmer fail to correctly use transactions by appropriately encapsulating functionality, even serializable transactions will expose programmers to errors. While many errors arising from these practices may be masked by low concurrency during normal operation, they are susceptible to occur during periods of abnormally high concurrency. By triggering these errors via concurrent access in a deliberate attack, a determined adversary could systematically exploit them for gain. In this work, we defined the problem of ACIDRain attacks and introduced 2AD, a lightweight dynamic analysis tool that uses traces of normal database activity to detect possible anomalous behavior in applications. To enable 2AD, we extended Adya’s theory of weak isolation to allow efficient reasoning over the space of all possible concurrent executions of a set of transactions based on a concrete history, via a new concept called an abstract history, which also applies to API calls. We then applied 2AD analysis to twelve popular self-hosted eCommerce applications, finding 22 vulnerabilities spread across all but one application we tested, affecting over 50% of eCommerce sites on the Internet today. We believe that the magnitude and the prevalence of these vulnerabilities to ACIDRain attacks merits a broader reconsideration of the success of the transaction concept as employed by programmers today, in addition to further pursuit of research in this direction. Based on our early experiences both performing ACIDRain attacks on self-hosted applications as well as engaging with developers, we believe there is considerable work to be done in raising awareness of these attacks—for example, via improved analyses and additional 2AD refinement rules (including analysis of source code to better highlight sources of error)—and in automated methods for defending against these attacks—for example, by synthesizing repairs such as automated isolation level tuning and selective application of SELECT FOR UPDATE mechanisms. Our results here—as well as existing instances of ACIDRain attacks in the wild—suggest there is considerable value at stake.'
(tags: databases transactions vulnerability security acidrain peter-bailis storage isolation acid)
Scientists made a detailed “roadmap” for meeting the Paris climate goals. It’s eye-opening. - Vox
tl;dr: this is not going to happen and we are fucked.
(tags: climate environment global-warming science roadmap future grim-meathook-future)
-
jomsdev notes: 'Last year, in the AofA’16 conference Robert Sedgewick proposed a new algorithm for cardinality estimation. Robert Sedgwick is a professor at Princeton with a long track of publications on combinatorial/randomized algorithms. He was a good friend of Philippe Flajolet (creator of Hyperloglog) and HyperBitBit it's based on the same ideas. However, it uses less memory than Hyperloglog and can provide the same results. On practical data, HyperBitBit, for N < 2^64 estimates cardinality within 10% using only 128 + 6 bits.'
(tags: algorithms programming cs hyperloglog estimation cardinality counting hyperbitbit)
The Gig Economy Celebrates Working Yourself to Death - The New Yorker
At the root of this is the American obsession with self-reliance, which makes it more acceptable to applaud an individual for working himself to death than to argue that an individual working himself to death is evidence of a flawed economic system. The contrast between the gig economy’s rhetoric (everyone is always connecting, having fun, and killing it!) and the conditions that allow it to exist (a lack of dependable employment that pays a living wage) makes this kink in our thinking especially clear.
(tags: capitalism culture gig-economy lyft fiverr work jobs employment self-reliance)
The Dead Data Scientists Society, a.k.a Sarmento’s Eleven
11 stereotypical data scientist roles, and their failings
(tags: data-science roles jobs stereotypes fail big-data)
US grand jury decides that a GIF counts as a deadly weapon in Twitter seizure case - The Verge
While this is certainly correct to prosecute, I still think that Twitter need to rethink their UI choices that allow a random stranger to fire graphic images at their targets without any opt-in requirement.
FBI investigators seized the account late last year after tracking him through his iPhone, and allege that Rivello sent several tweets and messages about his intentions to cause Eichenwald to have a seizure — including the text “You deserve a seizure for your post.” According to NBC News, other messages specifically say that "I hope this sends him into a seizure,” while others read "Spammed this at [Eichenwald] let's see if he dies."
(tags: images twitter epilepsy gifs nam-shub abuse social-media trolls)
Why American Farmers Are Hacking Their Tractors With Ukrainian Firmware
DRM working as expected:
To avoid the draconian locks that John Deere puts on the tractors they buy, farmers throughout America's heartland have started hacking their equipment with firmware that's cracked in Eastern Europe and traded on invite-only, paid online forums. Tractor hacking is growing increasingly popular because John Deere and other manufacturers have made it impossible to perform "unauthorized" repair on farm equipment, which farmers see as an attack on their sovereignty and quite possibly an existential threat to their livelihood if their tractor breaks at an inopportune time.
(via etienneshrdlu)(tags: hacking farming drm john-deere tractors firmware right-to-repair repair)
Don’t Get Trampled: The Puzzle For “Unicorn” Employees
'One of my sad predictions for 2017 is a bunch of big headline-worthy acquisitions and IPOs that leave a lot of hard working employees at these companies in a weird spot. They’ll be congratulated by everyone they know for their extraordinary success while scratching their heads wondering why they barely benefited. Of course, the reason is that these employees never understood their compensation in the first place (and they were not privy to the terms of all the financings before and after they were hired).'
(tags: share-options shares unicorns funding employment jobs compensation)
-
Huh, interesting development:
If it’s on company time, it’s the company’s dime. That’s the usual rule in the tech industry—that if employees use company resources to work on projects unrelated to their jobs, their employer can claim ownership of any intellectual property (IP) they create. But GitHub is throwing that out the window. Today the code-sharing platform announced a new policy, the Balanced Employee IP Agreement (BEIPA). This allows its employees to use company equipment to work on personal projects in their free time, which can occur during work hours, without fear of being sued for the IP. As long as the work isn’t related to GitHub’s own “existing or prospective” products and services, the employee owns it.
(tags: github law tech jobs work day-job side-projects hacking ip copyright)