-
'AWS Assume Made Awesome' -- 'Here are Trek10, we work with many clients, and thus work with multiple AWS accounts on a regular (daily) basis. We needed a way to make managing all our different accounts easier. We create a standard Trek10 administrator role in our clients’ accounts that we can assume. For security we require that the role assumer have multifactor authentication enabled.'
-
'I would strongly encourage you to avoid repeating the mistakes of testing methodologies that focus entirely on max achievable throughput and then report some (usually bogus) latency stats at those max throughout modes. The techempower numbers are a classic example of this in play, and while they do provide some basis for comparing a small aspect of behavior (what I call the "how fast can this thing drive off a cliff" comparison, or "pedal to the metal" testing), those results are not very useful for comparing load carrying capacities for anything that actually needs to maintain some form of responsiveness SLA or latency spectrum requirements.' Some excellent advice here on how to measure and represent stack performance. Also: 'DON'T use or report standard deviation for latency. Ever. Except if you mean it as a joke.'
(tags: performance benchmarking testing speed gil-tene latency measurement hdrhistogram load-testing load)
Data Protection Mishap Leaves 55M Philippine Voters at Risk
Every registered voter in the Philippines is now susceptible to fraud and other risks after a massive data breach leaked the entire database of the Philippines’ Commission on Elections (COMELEC). While initial reports have downplayed the impact of the leak, our investigations showed a huge number of sensitive personally identifiable information (PII)–including passport information and fingerprint data–were included in the data dump. [....] Based on our investigation, the data dumps include 1.3 million records of overseas Filipino voters, which included passport numbers and expiry dates. What is alarming is that this crucial data is just in plain text and accessible to everyone. Interestingly, we also found a whopping 15.8 million record of fingerprints and a list of people running for office since the 2010 elections. In addition, among the data leaked were files on all candidates running on the election with the filename VOTESOBTAINED. Based on the filename, it reflects the number of votes obtained by the candidate. Currently, all VOTESOBTAINED file are set to have NULL as figure.
(tags: fingerprints biometrics philippines authentication data-dumps security hacks comelec e-voting pii passports voting)
The dark side of Guardian comments | Technology | The Guardian
Excellent data on abusive commenters
(tags: comments data guardian journalism abuse twitter racism sexism)
-
The saddest superhero ever
(tags: funny pintman dublin ireland alcoholics twitter history pubs)
Category: Uncategorized
Damien Mulley on Twitter: "Item Number 1 for the startup is our hoody."
Legendary Mulley tweetstorm on startup culture
(tags: startups funny damien-mulley twitter tweetstorms ireland)
Dan Luu reviews the Site Reliability Engineering book
voluminous! still looks great, looking forward to reading our copy (via Tony Finch)
(tags: books reading devops ops google sre dan-luu via:fanf)
Koyaanisqatsi trailer recreated using stock footage
'Koyannistocksi is a shot-by-shot remake of the trailer for Godfrey Reggio's Koyaanisqatsi using only stock footage. A testament to Reggio's influence on contemporary motion photography, and the appropriation of his aesthetic by others for commercial means.' Nailed it. This is why I find it hard to watch Koyaanisqatsi nowadays -- its imagery and style have been stolen by so many other filmmakers.
(tags: godfrey-reggio koyaanisqatsi ads remakes film stock-footage)
Neutered RNG let man rig million dollar lotteries | Ars Technica
A forensic examination found that the generator had code that was installed after the machine had been audited by a security firm that directed the generator not to produce random numbers on three particular days of the year if two other conditions were met. Numbers on those days would be drawn by an algorithm that Tipton could predict [...] All six prizes linked to Tipton were drawn on either Nov. 23 or Dec. 29 between 2005 and 2011.
(tags: prng randomness security hacks exploits lottery us audits holes)
-
I would only recommend 3d printing to someone who wanted a hobby, and wanted that hobby to be 3d printing, not "having parts made on a 3d printer". The printing itself is the activity. If you have any other primary motivation your parts will fail more often than they'll succeed.
(via burritojustice)(tags: via:burritojustice 3d-printing machines parts things hobbies open-source funny)
Internet mapping turned a remote farm into a digital hell
I think this a bit of a legal issue for MaxMind:
The trouble for the Taylor farm started in 2002, when a Massachusetts-based digital mapping company called MaxMind decided it wanted to provide “IP intelligence” to companies who wanted to know the geographic location of a computer to, for example, show the person using it relevant ads or to send the person a warning letter if they were pirating music or movies.
GCHQ intervenes to prevent catastrophically insecure UK smart meter plan - The Inquirer
GCHQ barged in after spooks cast their eyes over the plans and realised that power companies were proposing to use a single decryption key for communications from the 53 million smart meters that will eventually be installed in the UK.
holy crap.(tags: gchq security smart-meters power uk electricity gas infrastructure)
Irish drone register allowed access to personal details of 2,000 members
The breach, which allowed registered users to view names, addresses, email addresses and phone numbers of other people registered on the site, was brought to the attention of the authority on Sunday night. In a statement to TheJournal.ie, the IAA revealed it was aware of four users who downloaded the file.
Running Docker on AWS from the ground up
Advantages/disavantages section right at the bottom is good.
ECS, believe it or not, is one of the simplest Schedulers out there. Most of the other alternatives I’ve tried offer all sorts of fancy bells & whistles, but they are either significantly more complicated to understand (lots of new concepts), take too much effort to set up (lots of new technologies to install and run), are too magical (and therefore impossible to debug), or some combination of all three. That said, ECS also leaves a lot to be desired.
(tags: aws docker ecs ec2 schedulers)
Hungary proposes anti-crypto law
up to 2 years imprisonment for use of apps for encrypted communication
good example of Application-Level Keepalive beating SO_KEEPALIVE
we have now about 100 salt-minions which are installed in remote areas with 3G and satellite connections. We loose connectivity with all of those minions in about 1-2 days after installation, with test.ping reporting "minion did not return". The state was each time that the minions saw an ESTABLISHED TCP connection, while on the salt-master there were no connection listed at all. (Yes that is correct). Tighter keepalive settings were tried with no result. (OS is linux) Each time, restarting the salt-minion fixes the problem immediately. Obviously the connections are transparently proxied someplace, (who knows what happens with those SAT networks) so the whole tcp-keepalive mechanism of 0mq fails.
Also notes in the thread that the default TCP timeout for Azure Load Balancer is 4 minutes: https://azure.microsoft.com/en-us/blog/new-configurable-idle-timeout-for-azure-load-balancer/ . The default Linux TCP keepalive doesn't send until 2 hours after last connection use, and it's a system-wide sysctl (/proc/sys/net/ipv4/tcp_keepalive_time). Further, http://networkengineering.stackexchange.com/questions/7207/why-bgp-implements-its-own-keepalive-instead-of-using-tcp-keepalive notes "some firewalls filter TCP keepalives".(tags: tcp keep-alive keepalive protocol timeouts zeromq salt firewalls nat)
“Racist algorithms” and learned helplessness
Whenever I’ve had to talk about bias in algorithms, I’ve tried be careful to emphasize that it’s not that we shouldn’t use algorithms in search, recommendation and decision making. It’s that we often just don’t know how they’re making their decisions to present answers, make recommendations or arrive at conclusions, and it’s this lack of transparency that’s worrisome. Remember, algorithms aren’t just code. What’s also worrisome is the amplifier effect. Even if “all an algorithm is doing” is reflecting and transmitting biases inherent in society, it’s also amplifying and perpetuating them on a much larger scale than your friendly neighborhood racist. And that’s the bigger issue. [...] even if the algorithm isn’t creating bias, it’s creating a feedback loop that has powerful perception effects.
(tags: feedback bias racism algorithms software systems society)
The revenge of the listening sockets
More adventures in debugging the Linux kernel:
You can't have a very large number of bound TCP sockets and we learned that the hard way. We learned a bit about the Linux networking stack: the fact that LHTABLE is fixed size and is hashed by destination port only. Once again we showed a couple of powerful of System Tap scripts.
-
git for Cloud Storage. Create distributed, decentralized and versioned repositories that scale infinitely to 100s of millions of files and PBs of storage. Huge repos can be cloned on your local SSD for making changes, committing and pushing back. Oh yeah, and it dedupes too due to BLAKE2 Tree hashing. http://s3git.org
(tags: git ops storage cloud s3 disk aws version-control blake2)
BLAKE2: simpler, smaller, fast as MD5
'We present the cryptographic hash function BLAKE2, an improved version of the SHA-3 finalist BLAKE optimized for speed in software. Target applications include cloud storage, intrusion detection, or version control systems. BLAKE2 comes in two main flavors: BLAKE2b is optimized for 64-bit platforms, and BLAKE2s for smaller architectures. On 64-bit platforms, BLAKE2 is often faster than MD5, yet provides security similar to that of SHA-3. We specify parallel versions BLAKE2bp and BLAKE2sp that are up to 4 and 8 times faster, by taking advantage of SIMD and/or multiple cores. BLAKE2 has more benefits than just speed: BLAKE2 uses up to 32% less RAM than BLAKE, and comes with a comprehensive tree-hashing mode as well as an efficient MAC mode.'
(tags: crypto hash blake2 hashing blake algorithms sha1 sha3 simd performance mac)
When It Comes to Age Bias, Tech Companies Don’t Even Bother to Lie
HubSpot’s CEO and co-founder, Brian Halligan, explained to the New York Times that this age imbalance was not something he wanted to remedy, but in fact something he had actively cultivated. HubSpot was “trying to build a culture specifically to attract and retain Gen Y’ers,” because, “in the tech world, gray hair and experience are really overrated,” Halligan said. I gasped when I read that. Could anyone really believe this? Even if you did believe this, what CEO would be foolish enough to say it out loud? It was akin to claiming that you prefer to hire Christians, or heterosexuals, or white people. I assumed an uproar would follow. As it turned out, nobody at HubSpot saw this as a problem. Halligan didn’t apologize for his comments or try to walk them back. The lesson I learned is that when it comes to race and gender bias, the people running Silicon Valley at least pay lip service to wanting to do better — but with age discrimination they don’t even bother to lie.
(tags: hiring startups tech ageism age hubspot gen-y discrimination)
Gaeltacht development company defends sale of State seaweed company to Canadian multinational
FFS. Fine Gael government sells off more of our national assets for cheap:
Mr John O’Sullivan, chief executive of Bioatlantis Ltd in Co Kerry called on the Oireachtas environment committee to investigate the sale, or ask the Oireachtas public accounts committee to do so. Mr O’Sullivan said that his company had made a bid of €5.7 million for Arramara, comprising €1.5 million initially and €4.2 million in the post-investment phase, and had been given just 12 days to prepare the bid. He understood that two foreign companies – the Canadian Acadian Seaplants and French company Setalg – had been given over a year to prepare their bids. He said that Acadian’s bid was €1.8 million, and the French bid was €2 million, for initial purchase, and that the rating was “changed” when the final bids were in. No details had been released and the lack of transparency was “frightening” in relation to the final sale, he said.
(tags: seaweed acadian setalg arramara bioatlantis government ireland selloff gaeltacht unag)
-
Comprehensive surveillance appears as seemingly inexpensive because it is a solution that scales thanks to technology: troubleshooting at the press of a button. Directly linked with the aim of saving more and more, just as with the State in general. But classic investigative work, which is proven to work, is expensive and labor intensive. This leads to a failure by the authorities because of a faith in technology that is driven by economics.
(tags: tech surveillance techdirt terrorism brussels crypto going-dark)
So you're thinking of coming to Dublin...
A really excellent list of stuff to do/see/eat/drink in Ireland, from Colin @ 3FE. top notch recommendations! (also, god I need to get out more)
Nest Reminds Customers That Ownership Isn't What It Used to Be
EFF weigh in on the internet of shit:
Customers likely didn't expect that, 18 months after the last Revolv Hubs were sold, instead of getting more upgrades, the device would be intentionally, permanently, and completely disabled. .... Nest Labs and Google are both subsidiaries of Alphabet, Inc., and bricking the Hub sets a terrible precedent for a company with ambitions to sell self-driving cars, medical devices, and other high-end gadgets that may be essential to a person’s livelihood or physical safety.
(tags: nest legal tech google alphabet internetofshit iot law)
Primary Online Database: POD now (mostly) not compulsory (for now)
Ever since the introduction of the Primary Online Database of schoolchildren by the Department of Education, the Department and its Minister have been eager to point out that any parent who refused to allow a child’s data to be transferred would see that child’s education defunded. Well, for all children other than this week’s crop of new Junior Infants, that threat has now collapsed. This is despite the Minister and her department having claimed that the drastic threat of defunding was because it simply wasn’t possible to give grants without a child’s full data being transferred. [...] Oddly, as the prospect of defunding the education of 30% of the nation’s children in the run up to an election loomed large, the Department discovered it could, after all, pay for a child’s education without all its POD data.
(tags: pod law ireland data-protection privacy children school)
Wired on the new O'Reilly SRE book
"Site Reliability Engineering: How Google Runs Production Systems", by Chris Jones, Betsy Beyer, Niall Richard Murphy, Jennifer Petoff. Go Niall!
(tags: google sre niall-murphy ops devops oreilly books toread reviews)
Google's Nest killing off old devices
Google is making customers' existing devices useless, less than 2 years after the devices were available for sale, with only 2 months warning. This is one of the reasons I won't spend money on the Internet Of Things shitshow. '"Which hardware will Google choose to intentionally brick next?" asks Arlo Gilbert. "If they stop supporting Android will they decide that the day after warranty expires that your phone will go dark? Is your Nexus device safe? What about your Nest fire alarm? What about your Dropcam? What about your Chromecast device?"'
'Devastating' bug pops secure doors at airports, hospitals
"A command injection vulnerability exists in this function due to a lack of any sanitisation on the user-supplied input that is fed to the system() call," Lawshae says.
:facepalm:(tags: security iot funny fail linux unix backticks system udp hid vertx edge)
Counting with domain specific databases — The Smyte Blog — Medium
whoa, pretty heavily engineered scalable counting system with Kafka, RocksDB and Kubernetes
(tags: kafka rocksdb kubernetes counting databases storage ops)
Is anyone concerned about the future of Nest?
wow, looks like Nest is fucked:
As a Nest engineer, I won't say any numbers that aren't public, but this company is already on deathwatch. Once that happens, most people will quickly have shiny paperweights because it's a constant firefight keeping these systems up. We have $340M in revenue, not profit, against a ~$500M budget. No new products since the purchase, and sales/growth numbers are dire. Our budget deal expires soon, and all the good engineers on my teams have discreetly indicated they are going to flee once their golden handcuffs unlock (many have already left despite sacrificing a lot of money to do so). Tony and his goons demand crazy timelines so much that "crunch time" has basically lost meaning. Just when your labor bears fruit, they swoop in, 180 the specs you just delivered on, then have the gall to call your team "incompetent" for not reading their mind and delivering on these brand-new specs. I waste most of my time in pointless meetings, or defending my teams so they don't flip their desks and walk out. People fall asleep in corners and cry in the bathrooms, health and marriages are suffering. Already the churn is insane, close to half the company if not more. Skilled engineers can tell the environment is toxic, so we're filling vacancies with mostly sub-par talent.
-
Publish JVM and Android libraries direct from github -- it'll build and package a lib on the fly, caching them via CDN
(tags: build github java maven gradle dependencies packaging libraries)
Illicit trade in prescription drugs a growing problem for Dublin’s north inner city
ughh. The latest scourge is Zopiclone, "zimmos", which are being dealt openly due to a bureaucratic loophole in enforcement.
A programming language for E. coli
Mind = blown.
MIT biological engineers have created a programming language that allows them to rapidly design complex, DNA-encoded circuits that give new functions to living cells. Using this language, anyone can write a program for the function they want, such as detecting and responding to certain environmental conditions. They can then generate a DNA sequence that will achieve it. "It is literally a programming language for bacteria," says Christopher Voigt, an MIT professor of biological engineering. "You use a text-based language, just like you're programming a computer. Then you take that text and you compile it and it turns it into a DNA sequence that you put into the cell, and the circuit runs inside the cell."
(tags: dna mit e-coli bacteria verilog programming coding biohacking science)
GitHub now supports "squash on merge"
yay. On the other hand -- http://www.thecaucus.net/#/content/caucus/tech_blog/516 is a good explanation of why not to adopt it. Pity GitHub haven't made it a per-review option...
-
Dynamic tracing tools for Linux, a la dtrace, ktrace, etc. Built using BPF, using kernel features in the 4.x kernel series, requiring at least version 4.1 of the kernel
US government commits to publish publicly financed software under Free Software licenses
Wow, this is significant:
At the end of last week, the White House published a draft for a Source Code Policy. The policy requires every public agency to publish their custom-build software as Free Software for other public agencies as well as the general public to use, study, share and improve the software. At the Free Software Foundation Europe (FSFE) we believe that the European Union, and European member states should implement similar policies. Therefore we are interested in your feedback to the US draft.
(tags: government open-source coding licenses fsf free-software source-code us-politics usa)
-
'used most commonly when coding integers whose upper-bound cannot be determined beforehand.'
(tags: data-structures algorithms elias-gamma-coding encoding coding numbers integers)
A Decade Of Container Control At Google
The big thing that can be gleaned from the latest paper out of Google on its container controllers is that the shift from bare metal to containers is a profound one – something that may not be obvious to everyone seeking containers as a better way – and we think cheaper way – of doing server virtualization and driving up server utilization higher. Everything becomes application-centric rather than machine-centric, which is the nirvana that IT shops have been searching for. The workload schedulers, cluster managers, and container controllers work together to get the right capacity to the application when it needs it, whether it is a latency-sensitive job or a batch job that has some slack in it, and all that the site recovery engineers and developers care about is how the application is performing and they can easily see that because all of the APIs and metrics coming out of them collect data at the application level, not on a per-machine basis. To do this means adopting containers, period. There is no bare metal at Google, and let that be a lesson to HPC shops or other hyperscalers or cloud builders that think they need to run in bare metal mode.
(tags: google containers kubernetes borg bare-metal ops)
How wet is a cycling commute in Ireland?
It turns out that you’ll get wet 3 times more often if you’re a Galway cyclist when compared to a Dubliner. Dublin is Ireland’s driest cycling city.
Some good data and visualization on this extremely important issue(tags: rain rainfall-radar ireland climate weather dublin galway cycling)
CNBC "How Secure Is Your Password" tester form is a spectacular security shitshow
It not only runs over HTTP, it also sends your password to a bunch of third-party ad trackers. omgwtfbbqfail
(tags: fail wtf funny cnbc clowns inept security passwords http ad-trackers)
Inside the GPO in 1916: Desmond FitzGerald’s eyewitness account
'First published 50 years ago, this first-hand account by the father of the future taoiseach Garrett FitzGerald created a storm by claiming that the rebel leaders sympathetically discussed the likelihood of the Germans putting a prince of their own on the Irish throne.' This is amazing -- the dispair and confusion is palpable. This is the first realistic-sounding account of what went on inside the GPO during the Easter Rising I've read, and the "German prince" gambit is pretty astonishing too.
(tags: easter-rising 1916 history gpo germany ireland desmond-fitzgerald royalty)
SmartThings Presence Detection using DD-WRT Router Script
neat trick -- using DD-WRT's arp tables and a cron job to detect presence of wifi devices (e.g. phones) and take action based on that. By using https://ifttt.com/maker , it should be feasible to wire up any IFTTT action when a device connects to my home wifi...
-
quite a reasonable position, I think
(tags: tor cloudflare abuse anonymity captchas)
Clampers have to clock off as hour change crashes system
DST strikes again:
The failure of the ParkbyText system, operated by National Controlled Parking Systems (NCPS), was described by one employee contacted by a midlands motorist unable to pay for his parking at a train station as a “Y2K moment”. The system failure caused early morning panic for thousands of drivers who tried unsuccessfully to use text messages or an app to pay for their parking ahead of returning to work after the bank holiday weekend.
Impact was that they had to stop enforcement until the day passed, I think.firehol/netdata: Real-time performance monitoring, done right!
Lovely Bootstrap-based UI, easy to install (via Mark Kenny)
(tags: via:markkenny linux monitoring ops netdata sysstat metrics graphing ui)
the murky origins of Truecrypt
Allegedly, Truecrypt, the disk encryption tool, was written by a multi-millionaire international arms dealer and criminal kingpin. Hell of an assertion, this!
Mass surveillance silences minority opinions, according to study - The Washington Post
This is excellent research, spot on.
Elizabeth Stoycheff, lead researcher of the study and assistant professor at Wayne State University, is disturbed by her findings. “So many people I've talked with say they don't care about online surveillance because they don't break any laws and don't have anything to hide. And I find these rationales deeply troubling,” she said. She said that participants who shared the “nothing to hide” belief, those who tended to support mass surveillance as necessary for national security, were the most likely to silence their minority opinions. “The fact that the 'nothing to hide' individuals experience a significant chilling effect speaks to how online privacy is much bigger than the mere lawfulness of one's actions. It's about a fundamental human right to have control over one's self-presentation and image, in private, and now, in search histories and metadata,” she said.
(tags: culture privacy psychology surveillance mass-surveillance via:snowden nothing-to-hide spiral-of-silence fear)
-
pretty sure I had this bookmarked previously, but this is the current URL -- SSL/TLS quality report
Observability at Twitter: technical overview, part II
Interesting to me mainly for this tidbit which makes my own prejudices:
“Pull” vs “push” in metrics collection: At the time of our previous blog post, all our metrics were collected by “pulling” from our collection agents. We discovered two main issues: * There is no easy way to differentiate service failures from collection agent failures. Service response time out and missed collection request are both manifested as empty time series. * There is a lack of service quality insulation in our collection pipeline. It is very difficult to set an optimal collection time out for various services. A long collection time from one single service can cause a delay for other services that share the same collection agent. In light of these issues, we switched our collection model from “pull” to “push” and increased our service isolation. Our collection agent on each host only collects metrics from services running on that specific host. Additionally, each collection agent sends separate collection status tracking metrics in addition to the metrics emitted by the services. We have seen a significant improvement in collection reliability with these changes. However, as we moved to self service push model, it becomes harder to project the request growth. In order to solve this problem, we plan to implement service quota to address unpredictable/unbounded growth.
(tags: pull push metrics tcp stacks monitoring agents twitter fault-tolerance)
These unlucky people have names that break computers
Pat McKenzie's name is too long to fit in Japanese database schemas; Janice Keihanaikukauakahihulihe'ekahaunaele's name was too long for US schemas; and Jennifer Null suffers from the obvious problem
(tags: databases design programming names coding japan schemas)
How we implemented the video player in Mail.Ru Cloud
We’ve recently added video streaming service to Mail.Ru Cloud. Development started with contemplating the new feature as an all-purpose “Swiss Army knife” that would both play files of any format and work on any device with the Cloud available. Video content uploaded to the Cloud mostly falls into one of the two categories: “movies/series” and “users’ videos”. The latter are the videos that users shoot with their phones and cameras, and these videos are most versatile in terms of formats and codecs. For many reasons, it is often a problem to watch these videos on other end-user devices without prior normalization: a required codec is missing, or the file size is too big to download, or whatever.
Mainly around using HLS (HTTP Live Streaming).(tags: hls http streaming video audio mail.ru players codecs)
A shot that rang round the world
The international impact of the Easter Rising has rarely been acknowledged. This rebellion did not only rattle British rule in Ireland — it inspired radical movements in Britain itself and across the globe, and it shook colonial rulers and states worldwide.
(tags: history easter-rising 1916 ireland revolution colonialism)
-
nice java impl of this efficient data structure, broken out from Project Reactor
(tags: scalability java timers hashed-wheel-timers algorithms data-structures)
SNES Code Injection -- Flappy Bird in Super Mario World
hand-injecting an entirely different game into Super Mario World on the SNES by exploiting buffer overflows BY HAND. this is legendary behaviour
(tags: games hacks exploits buffer-overflow snes code-injection amazing flappy-bird seth-bling video youtube)
-
built-in support for CI/CD deployment pipelines, driven from a checked-in DSL file. great stuff, very glad to see them going this direction. (via Eric)
(tags: via:eric jenkins ci cd deployment pipelines testing automation build)
Hey Microsoft, the Internet Made My Bot Racist, Too
All machine learning algorithms strive to exaggerate and perpetuate the past. That is, after all, what they are learning from. The fundamental assumption of every machine learning algorithm is that the past is correct, and anything coming in the future will be, and should be, like the past. This is a fine assumption to make when you are Netflix trying to predict what movie you’ll like, but is immoral when applied to many other situations. For bots like mine and Microsoft’s, built for entertainment purposes, it can lead to embarrassment. But AI has started to be used in much more meaningful ways: predictive policing in Chicago, for example, has already led to widespread accusations of racial profiling. This isn’t a little problem. This is a huge problem, and it demands a lot more attention then it’s getting now, particularly in the community of scientists and engineers who design and apply these algorithms. It’s one thing to get cursed out by an AI, but wholly another when one puts you in jail, denies you a mortgage, or decides to audit you.
(tags: machine-learning ml algorithms future society microsoft)
Tahoe LAFS accidentally lose Bitcoin wallet with loads of donations in it, get it back
But ECDSA private keys don't trigger the same protective instincts that we'd apply to, say, a bar of gold. One sequence of 256 random bits looks just as worthless as any other. And the cold hard unforgeability of these keys means we can't rely upon other humans to get our money back when we lose them. Plus, we have no experience at all with things that grow in value by four orders of magnitude, without any attention, in just three years. So we have a cryptocurrency-tool UX task in front of us: to avoid mistakes like the one we made, we must to either move these digital assets into solid-feeling physical containers, or retrain our perceptions to attach value to the key strings themselves.
(tags: backups cryptography bitcoin cryptocurrency ecdsa private-keys ux money)
Visual Representation of SQL Joins
useful bookmark to have (via Nelson)
Interesting Lottery Terminal Hack - Schneier on Security
Neat manual timing attack.
An investigator for the Connecticut Lottery determined that terminal operators could slow down their lottery machines by requesting a number of database reports or by entering several requests for lottery game tickets. While those reports were being processed, the operator could enter sales for 5 Card Cash tickets. Before the tickets would print, however, the operator could see on a screen if the tickets were instant winners. If tickets were not winners, the operator could cancel the sale before the tickets printed.
(tags: attacks security lottery connecticut kiosks)
-
A microservice saviour appears! In order to prevent such a terrible tragedy from occurring ever again during our lifetimes, `left-pad.io` has been created to provide all the functionality of `left-pad` AND the overhead of a TLS handshake and an HTTP request. Less code is better code, leave the heavy lifting to `left-pad.io`, The String Experts™.
(tags: humor javascript jokes npm packages left-pad strings microservices http)
Life360 testimonial for Prometheus
Now this is a BIG thumbs up:
'Prometheus has been known to us for a while, and we have been tracking it and reading about the active development, and at a point (a few months back) we decided to start evaluating it for production use. The PoC results were incredible. The monitoring coverage of MySQL was amazing, and we also loved the JMX monitoring for Cassandra, which had been sorely lacking in the past.'
(tags: metrics monitoring time-series prometheus testimonials life360 cassandra jmx mysql)
Microsoft terminates its Tay AI chatbot after she turns into a Nazi
'if you tell her "repeat after me" she will parrot back whatever you say, allowing you to put words into her mouth.'
what. the. fuck. Microsoft.
Javascript libraries and tools should bundle their code
If you have a million npm dependencies, distribute them in the dist package; aka. omnibus packages for JS
(tags: packaging omnibus npm webpack rollup dependencies coding javascript)
Ruby in Production: Lessons Learned — Medium
Based on the pain we've had trying to bring our Rails services up to the quality levels required, this looks pretty accurate in many respects. I'd augment this advice by saying: avoid RVM; use Docker.
Charity Majors - AWS networking, VPC, environments and you
'VPC is the future and it is awesome, and unless you have some VERY SPECIFIC AND CONVINCING reasons to do otherwise, you should be spinning up a VPC per environment with orchestration and prob doing it from CI on every code commit, almost like it’s just like, you know, code.'
(tags: networking ops vpc aws environments stacks terraform)
Angola’s Wikipedia Pirates Are Exposing the Problems With Digital Colonialism | Motherboard
Wikimedia and Facebook have given Angolans free access to their websites, but not to the rest of the internet. So, naturally, Angolans have started hiding pirated movies and music in Wikipedia articles and linking to them on closed Facebook groups, creating a totally free and clandestine file sharing network in a country where mobile internet data is extremely expensive.
(tags: facebook piracy africa hacks wikipedia angola internet)
-
This is a great point, and one I'll be quoting:
Any design that is hard to test is crap. Pure crap. Why? Because if it's hard to test, you aren't going to test it well enough. And if you don't test it well enough, it's not going to work when you need it to work. And if it doesn't work when you need it to work the design is crap.
Amen!(tags: testing tdd uncle-bob coding design testability unit-tests)
Modern Irish genome closely matches pre-Celt DNA, not Celtic
Radiocarbon dating shows that the bones discovered at McCuaig's go back to about 2000 B.C. That makes them hundreds of years older than the oldest artifacts generally considered to be Celtic — relics unearthed from Celt homelands of continental Europe, most notably around Switzerland, Austria and Germany. For a group of scholars who in recent years have alleged that the Celts, beginning from the middle of Europe, may never have reached Ireland, the arrival of the DNA evidence provides the biological certitude that the science has sometimes brought to criminal trials. “With the genetic evidence, the old model [of Celtic colonisation of Ireland] is completely shot,” John Koch, a linguist at the Center for Advanced Welsh and Celtic Studies at the University of Wales.
(tags: celts ireland history dna genetics genome carbon-dating bronze-age europe colonisation)
GCM XMPP delivery receipt not always received - Google Groups
Good to know:
'GCM delivery receipts don't have an SLA at this time. Having your connection open longer will increase the odds that delivery receipts will arrive. 10 seconds seems a bit short. I'm glad it works. I would recommend longer like 10 min or an hour. The real design of this system is for persistent connections, hence connections that setup and tear down frequently will have difficulty receiving delivery receipts.'
(tags: gcm xmpp receipts messaging push-notifications google)
The disturbingly simple way dozens of celebrities had their nude photos stolen
Basic phishing: 'Collins hacked over 100 people by sending emails that looked like they came from Apple and Google, such as “e-mail.protection318@icloud.com,” “noreply_helpdesk0118@outlook.com,” and “secure.helpdesk0019@gmail.com.” According to the government, Collins asked for his victims’ iCloud or Gmail usernames and passwords and “because of the victims’ belief that the email had come from their [Internet Service Providers], numerous victims responded by giving [them].”'
(tags: security phishing nudes fappening celebs gmail icloud apple)
RFC 7754 - Technical Considerations for Internet Service Blocking and Filtering
The Internet is structured to be an open communications medium. This openness is one of the key underpinnings of Internet innovation, but it can also allow communications that may be viewed as undesirable by certain parties. Thus, as the Internet has grown, so have mechanisms to limit the extent and impact of abusive or objectionable communications. Recently, there has been an increasing emphasis on "blocking" and "filtering", the active prevention of such communications. This document examines several technical approaches to Internet blocking and filtering in terms of their alignment with the overall Internet architecture. When it is possible to do so, the approach to blocking and filtering that is most coherent with the Internet architecture is to inform endpoints about potentially undesirable services, so that the communicants can avoid engaging in abusive or objectionable communications. We observe that certain filtering and blocking approaches can cause unintended consequences to third parties, and we discuss the limits of efficacy of various approaches.
(via Tony Finch)(tags: via:fanf blocking censorship filtering internet rfcs rfc isps)
-
'There are three easy to make mistakes in go. I present them here in the way they are often found in the wild, not in the way that is easiest to understand. All three of these mistakes have been made in Kubernetes code, getting past code review at least once each that I know of.'
Health of purebred vs mixed breed dogs: the actual data - The Institute of Canine Biology
This study found that purebred dogs have a significantly greater risk of developing many of the hereditary disorders examined in this study. No, mixed breed dogs are not ALWAYS healthier than purebreds; and also, purebreds are not "as healthy" as mixed breed dogs. The results of this study will surprise nobody who understands the basics of Mendelian inheritance. Breeding related animals increases the expression of genetic disorders caused by recessive mutations, and it also increases the probability of producing offspring that will inherit the assortment of genes responsible for a polygenic disorder.
In conclusion, go mutts.(tags: dogs breeding genetics hereditary-disorders science inheritance recessive-mutation data)
DeepMind founder Demis Hassabis on how AI will shape the future | The Verge
Good interview with Demis Hassabis on DeepMind, AlphaGo and AI:
I’d like to see AI-assisted science where you have effectively AI research assistants that do a lot of the drudgery work and surface interesting articles, find structure in vast amounts of data, and then surface that to the human experts and scientists who can make quicker breakthroughs. I was giving a talk at CERN a few months ago; obviously they create more data than pretty much anyone on the planet, and for all we know there could be new particles sitting on their massive hard drives somewhere and no-one’s got around to analyzing that because there’s just so much data. So I think it’d be cool if one day an AI was involved in finding a new particle.
(tags: ai deepmind google alphago demis-hassabis cern future machine-learning)
-
Good post on Dublin City Council's atrociously revisionist 1916-commemoration banner, celebrating Henry Grattan, Daniel O'Connell, Charles Stewart Parnell and John Redmond:
The banner is not showing parliamentary nationalists who might be included in a history of 1916 (Redmond might have been joined by John Dillon and Tom Kettle, for instance), but displaying the parliamentarian tradition in Irish political history. The people chosen all worked for change via political means, whether obtaining an independent Irish parliament from 1782-1801 (Grattan), working for Catholic Emancipation (Grattan and O’Connell), land reform (Parnell), or trying to repeal the Act of Union and obtain Home Rule (O’Connell, Parnell, Redmond). All were MPs in Westminster at some point. None openly espoused physical force. None aimed at establishing an independent Irish Republic. Putting the history of parliamentarianism on a banner labelled 1916 suggests that 1916 was in the parliamentarian tradition. That suggestion is very far from the truth.
(tags: parliamentarianism 1916 history revisionism dcc dublin politics)
-
a static type checker for Javascript, from Facebook
(tags: javascript code-analysis coding facebook types strong-types)
Wait and lock free alternatives to LongAdder and AtomicLong by qwwdfsad
interesting new lock-free low-level hacking
(tags: longadder doug-lea mechanical-sympathy lock-free performance atomic multithreading java jvm)
Annie West's walking trail maps
These are really beautiful (and actually quite practical)! Nice one Annie
(tags: annie-west maps prints ireland sligo benbulben trails via:broadsheet)
How to force Three to use 3G and 4G only (Android)
Using the hidden *#*#4636#*#* menu
-
'The shared SQL command line for AWS'. it's #chatopsy!
-
a free, multi-threaded compression utility with support for bzip2 compressed file format. lbzip2 can process standard bz2 files in parallel. It uses POSIX threading model (pthreads), which allows it to take full advantage of symmetric multiprocessing (SMP) systems. It has been proven to scale linearly, even to over one hundred processor cores. lbzip2 is fully compatible with bzip2 – both at file format and command line level. Files created by lbzip2 can be decompressed by all versions of bzip2 and other software supporting bz2 format. lbzip2 can decompress any bz2 files in parallel. All bzip2 command-line options are also accepted by lbzip2. This makes lbzip2 a drop-in replacement for bzip2.
Distribution of people's PIN codes, as a heatmap
Excellent use of a heatmap
(tags: security datavis pins passwords date-of-birth birthday atms banking)
Conversant ConcurrentQueue and Disruptor BlockingQueue
'Disruptor is the highest performing intra-thread transfer mechanism available in Java. Conversant Disruptor is the highest performing implementation of this type of ring buffer queue because it has almost no overhead and it exploits a particularly simple design. Conversant has been using this in production since 2012 and the performance is excellent. The BlockingQueue implementation is very stable, although we continue to tune and improve it. The latest release, 1.2.4, is 100% production ready. Although we have been working on it for a long time, we decided to open source our BlockingQueue this year to contribute something back to the community. ... its a drop in for BlockingQueue, so its a very easy test. Conversant Disruptor will crush ArrayBlockingQueue and LinkedTransferQueue for thread to thread transfers. In our system, we noticed a 10-20% reduction in overall system load and latency when we introduced it.'
(tags: disruptor blocking-queues queues queueing data-structures algorithms java conversant concurrency performance)
TeleGeography Submarine Cable Map 2015
Gorgeously-illustrated retro map of modern-day submarine cables. Prints available for $150 (via Conor Delaney)
(tags: via:conor-delaney data internet maps cables world telegeography mapping retro)
-
UK banks are getting press for evading liability and screwing the customer when scams and phishing occur
(tags: scams phishing uk banking banks liability terms-and-conditions barclays)
-
Nice approach from MongoDB:
we’ve recently gained momentum on standardizing our [cross-platform test] drivers. Human-readable, machine-testable specs, coded in YAML, prove which code conforms and which does not. These YAML tests are the Cat-Herd’s Crook: a tool to guide us all in the same direction.
(tags: mongodb testing unit-tests yaml multi-platform coding)
There’s Something Fishy About The Other Nefertiti
The last possibility and reigning theory is that Ms. Badri and Mr. Nelles elusive hacker partners are literally real hackers who stole a copy of the high resolution scan from the Museum’s servers. A high resolution scan must exist as a high res 3D printed replica is already available for sale online. Museum officials have dismissed the Other Nefertiti model as “of minor quality”, but that’s not what we are seeing in this highly detailed scan. Perhaps the file was obtained from someone involved in printing the reproduction, or it was a scan made of the reproduction? Indeed, the common belief in online 3D Printing community chatter is that the Kinect “story” is a fabrication to hide the fact that the model was actually stolen data from a commercial high quality scan. If the artists were behind a server hack, the legal ramifications for them are much more serious than scanning the object, which has few, if any legal precedents.
(tags: art history 3d-printing 3d nefertiti heists copyright data kinect)
Amaro 101: An Introduction to Italian Amari
some nice-sounding cocktail recipes for these tasty bitters
-
Prodigy software patents invoked in suit against GroupOn. Patent troll mode activated :( (via Paul Graham)
(tags: ibm patents swpats paul-graham patent-trolls prodigy groupon)
Nook DRM promises to kill book collection unless user takes action
yay, DRM. "It is important that you transfer your purchased NOOK Books to ensure access"
(tags: drm fail nook uk sainsburys)
March 2016's shocking global warming temperature record
Keep in mind that it took from the dawn of the industrial age until last October to reach the first 1.0 degree Celsius, and we’ve come as much as an extra 0.4 degrees further in just the last five months. Even accounting for the margin of error associated with these preliminary datasets, that means it’s virtually certain that February handily beat the record set just last month for the most anomalously warm month ever recorded. That’s stunning.
eek.(tags: global-warming climate-change 2016)
Protect me, I am the Donnybrook laundry
Mannix Flynn makes a persuasive case to preserve the last remaining Magdalene Laundry still standing:
Memory is something that fights an eternal battle with the passage of time and forgetfulness. Time is a great healer for those who can heal and those who are offered healing. There is no healing here. Time stands still like a festering wound in a well-to-do suburb as somebody attempts to erase a grave and mortal wrong. The McAleese report, the Justice for the Magdalenes, the hundreds of women still alive and their families should know of this place. Should be present here to witness what can only be witnessed by them. So that they can understand what’s lost, what cannot be given. What was taken from them for generations.
(tags: magdalenes injustice ireland history catholic-church abuse mannix-flynn)
10 things to avoid in docker containers
decent tips
(tags: best-practices docker ops containers tips)
-
The latest SSL security hole. 'DROWN shows that merely supporting SSLv2 is a threat to modern servers and clients. It allows an attacker to decrypt modern TLS connections between up-to-date clients and servers by sending probes to a server that supports SSLv2 and uses the same private key.'
(tags: drown attacks vulnerabilities sslv2 ssl tls security holes)
-
Excellent drawing books from Chris Judge and his brother Andrew. gotta get this: 'WELCOME TO DOODLETOWN, the home of the Doodles. It is a very nice town, except for one SMALL problem. Everything is half drawn with bits and pieces missing! The Doodles are going to need YOUR help. So grab a pen or a pencil and help finish the adventure!'
The IPv6 Numeric IP Format is a Serious Usability Problem
strongly agreed!
(tags: ipv6 usability addressing networking ip colons addresses)
Proportional Representation in Ireland: How it Works
Excellent explanation of PR-STV and the Irish voting system. Don't be a Plumper! (via John O'Shea)
(tags: plumpers pr-stv pr voting ireland politics via:joshea)
Microsoft warns of risks to Irish operation in US search warrant case
“Our concern is that if we lose the case more countries across Europe or elsewhere are going to be concerned about having their data in Ireland, ” Mr Smith said, after testifying before the House judiciary committee. Asked what would happen to its Irish unit if the company loses the case or doesn’t convince Congress to pass updated legislation governing cross-border data held by American companies, the Microsoft executive said: “We’ll certainly face a new set of risks that we don’t face today.” He added that the issue could be resolved by an executive order by the White House or through international negotiations between the Irish Government or the European Union and the US.
(tags: microsoft data privacy us-politics surveillance usa)
How To Implement Secure Bitcoin Vaults
At the Bitcoin workshop in Barbados, Malte Möser will present our solution to the Bitcoin private key management problem. Specifically, our paper describes a way to create vaults, special accounts whose keys can be neutralized if they fall into the hands of attackers. Vaults are Bitcoin’s decentralized version of you calling your bank to report a stolen credit card -- it renders the attacker’s transactions null and void. And here’s the interesting part: in so doing, vaults demotivate key theft in the first place. An attacker who knows that he will not be able to get away with theft is less likely to attack in the first place, compared to current Bitcoin attackers who are guaranteed that their hacking efforts will be handsomely rewarded.
Maglev: A Fast and Reliable Software Network Load Balancer
Maglev is Google’s network load balancer. It is a large distributed software system that runs on commodity Linux servers. Unlike traditional hardware network load balancers, it does not require a specialized physical rack deployment, and its capacity can be easily adjusted by adding or removing servers. Network routers distribute packets evenly to the Maglev machines via Equal Cost Multipath (ECMP); each Maglev machine then matches the packets to their corresponding services and spreads them evenly to the service endpoints. To accommodate high and ever-increasing traffic, Maglev is specifically optimized for packet processing performance. A single Maglev machine is able to saturate a 10Gbps link with small packets. Maglev is also equipped with consistent hashing and connection tracking features, to minimize the negative impact of unexpected faults and failures on connection-oriented protocols. Maglev has been serving Google's traffic since 2008. It has sustained the rapid global growth of Google services, and it also provides network load balancing for Google Cloud Platform.
Something we argued for quite a lot in Amazon, back in the day....(tags: google paper scale ecmp load-balancing via:conall maglev lbs)
-
BrewDog releases their beer recipes for free. so cool! 'So here it is. The keys to our kingdom. Every single BrewDog recipe, ever. So copy them, tear them to pieces, bastardise them, adapt them, but most of all, enjoy them. They are well travelled but with plenty of miles still left on the clock. Just remember to share your brews, and share your results. Sharing is caring.'
(tags: brewing homebrew beer brewdog open-source free sharing)
National Children’s Science Centre due to open in 2018
Good for science fans, not so hot for real tennis fans.
The former real tennis court building close to the concert hall’s north wing would be used for temporary and visiting exhibitors, with a tunnel connecting it to the science centre. The National Children’s Science Centre is due to open in late 2018 and will also be known as the Exploration Station, said Dr Danny O’Hare, founding president of Dublin City University and chairman of the Exploration Station board since 2006.
(tags: real-tennis tennis nch dublin science kids planetarium)
Troy Hunt: Controlling vehicle features of Nissan LEAFs across the globe via vulnerable APIs
holy crap. Nissan expose a public API authenticated _solely_ using the car's VIN -- which is more or less public info; the API allows turning on/off AC, grabbing driving history, etc.
(tags: security fail nissan leaf cars apis vin authentication)
Argon2 code audits - part one - Infer
A pretty viable way to run Facebook's Infer dataflow static analysis tool (which is otherwise quite a bear to run).
(tags: infer facebook java clang errors static-analysis lint dataflow docker)
You could pay €40k in fund fees - even if you lose money - Independent.ie
High PRSA charges make them a pretty crappy retirement policy
(tags: prsa savings retirement money investment fees irish-life pensions)
Neutrino Software Load Balancer
eBay's software LB, supporting URL matching, comparable to haproxy, built using Netty and Scala. Used in their QA infrastructure it seems
(tags: netty scala ebay load-balancing load-balancers url http architecture)
This is Why People Fear the ‘Internet of Things’
Ugh. This is a security nightmare. Nice work Foscam...
Imagine buying an internet-enabled surveillance camera, network attached storage device, or home automation gizmo, only to find that it secretly and constantly phones home to a vast peer-to-peer (P2P) network run by the Chinese manufacturer of the hardware. Now imagine that the geek gear you bought doesn’t actually let you block this P2P communication without some serious networking expertise or hardware surgery that few users would attempt. This is the nightmare “Internet of Things” (IoT) scenario for any system administrator: The IP cameras that you bought to secure your physical space suddenly turn into a vast cloud network designed to share your pictures and videos far and wide. The best part? It’s all plug-and-play, no configuration necessary!
CharybdeFS: a new fault-injecting filesystem for software testing
a FUSE-based filesystem from ScyllaDB to test filesystem-related failure scenarios. great idea
(tags: fuse software testing scylladb filesystems disk charybdefs fault-injection tests)
The NSA’s SKYNET program may be killing thousands of innocent people
Death by Random Forest: this project is a horrible misapplication of machine learning. Truly appalling, when a false positive means death:
The NSA evaluates the SKYNET program using a subset of 100,000 randomly selected people (identified by their MSIDN/MSI pairs of their mobile phones), and a a known group of seven terrorists. The NSA then trained the learning algorithm by feeding it six of the terrorists and tasking SKYNET to find the seventh. This data provides the percentages for false positives in the slide above. "First, there are very few 'known terrorists' to use to train and test the model," Ball said. "If they are using the same records to train the model as they are using to test the model, their assessment of the fit is completely bullshit. The usual practice is to hold some of the data out of the training process so that the test includes records the model has never seen before. Without this step, their classification fit assessment is ridiculously optimistic." The reason is that the 100,000 citizens were selected at random, while the seven terrorists are from a known cluster. Under the random selection of a tiny subset of less than 0.1 percent of the total population, the density of the social graph of the citizens is massively reduced, while the "terrorist" cluster remains strongly interconnected. Scientifically-sound statistical analysis would have required the NSA to mix the terrorists into the population set before random selection of a subset—but this is not practical due to their tiny number. This may sound like a mere academic problem, but, Ball said, is in fact highly damaging to the quality of the results, and thus ultimately to the accuracy of the classification and assassination of people as "terrorists." A quality evaluation is especially important in this case, as the random forest method is known to overfit its training sets, producing results that are overly optimistic. The NSA's analysis thus does not provide a good indicator of the quality of the method.
(tags: terrorism surveillance nsa security ai machine-learning random-forests horror false-positives classification statistics)
Lasers reveal 'lost' Roman roads
UK open data success story, via Tony Finch:
This LIDAR data bonanza has proved particularly helpful to archaeologists seeking to map Roman roads that have been ‘lost’, some for thousands of years. Their discoveries are giving clues to a neglected chapter in the history of Roman Britain: the roads built to help Rome’s legions conquer and control northern England.
(tags: uk government lidar open-data data roman history mapping geodata)
-
Also known as "Graduate Student Descent", a common approach to hyperparameter tuning in machine learning -- ie. get an intern to sit there tweaking parameters until they find something approximating optimal performance
(tags: optimization funny terms terminology graduate-student-descent hyperparameters semisupervised-intern-descent tuning interns)
-
Valentine's Day cards for you and yours, from one of cinema's true visionaries. How do you communicate the depth of your desire? Say it with Cronenberg Valentines.
(tags: david-cronenberg horror gross naked-lunch movies valentines-day funny)
-
Let's see how long this lasts:
Today Sauce Labs is proud to open-source isign. isign can take an iOS app that was authorized to run only on one developer’s phone, and transform it so it can run on another developer’s phone. This is not a hack around Apple’s security. We figured out how Apple’s code signing works and re-implemented it in Python. So now you can use our isign utility anywhere – even on Linux!
-
'Indonesia's government has demanded that instant messaging apps remove stickers featuring same-sex couples, in the latest high-profile attempt to discourage visible homosexuality in the socially conservative country.' (via fuzzix)
Apollo 11 astronauts wrote on moon ship's walls, Smithsonian 3D scan reveals
The 3D scan is pretty awesome
(tags: scanning apollo history moon spaceflight 3d-scanning columbia apollo-command-module)
-
Apple outlaws third-party repairs with vague TouchID-related justifications:
Freelance photographer and self-confessed Apple addict Antonio Olmos says this happened to his phone a few weeks ago after he upgraded his software. Olmos had previously had his handset repaired while on an assignment for the Guardian in Macedonia. “I was in the Balkans covering the refugee crisis in September when I dropped my phone. Because I desperately needed it for work I got it fixed at a local shop, as there are no Apple stores in Macedonia. They repaired the screen and home button, and it worked perfectly.” He says he thought no more about it, until he was sent the standard notification by Apple inviting him to install the latest software. He accepted the upgrade, but within seconds the phone was displaying “error 53” and was, in effect, dead.
Now that is scummy.(tags: apple error-53 ios9 ios phones smartphones touchid via:boingboing)
-
good roundup of real-world clock skew links
(tags: clocks clock-skew ntp realtime time bugs distcomp reliability skew)
-
A critique of the "Redlock" locking algorithm from Redis by Martin Kleppman. antirez responds here: http://antirez.com/news/101
(tags: distributed locking redis algorithms coding distcomp redlock martin-kleppman zookeeper)
Submitting User Applications with spark-submit - AWS Big Data Blog
looks reasonably usable, although EMR's crappy UI is still an issue
-
Awesome post from Dan Luu with data from Google:
The cause [of some mystery widespread 250ms hangs] was kernel throttling of the CPU for processes that went beyond their usage quota. To enforce the quota, the kernel puts all of the relevant threads to sleep until the next multiple of a quarter second. When the quarter-second hand of the clock rolls around, it wakes up all the threads, and if those threads are still using too much CPU, the threads get put back to sleep for another quarter second. The phase change out of this mode happens when, by happenstance, there aren’t too many requests in a quarter second interval and the kernel stops throttling the threads. After finding the cause, an engineer found that this was happening on 25% of disk servers at Google, for an average of half an hour a day, with periods of high latency as long as 23 hours. This had been happening for three years. Dick Sites says that fixing this bug paid for his salary for a decade. This is another bug where traditional sampling profilers would have had a hard time. The key insight was that the slowdowns were correlated and machine wide, which isn’t something you can see in a profile.
(tags: debugging performance visualization instrumentation metrics dan-luu latency google dick-sites linux scheduler throttling kernel hangs)
View & diagnose Google Cloud Messaging (GCM) statistics
Looks like GCM now offers a way to determine if a message got delivered, via the GCM diagnostics console
(tags: gcm google push-notifications android messaging)
OnePlus 2 and OnePlus X damaging Deutsche Telekom SIM cards
I can confirm, there is a help forum from the "deutsche telekom", they say there is a feature called MEC (it's mainly for setting phone parameters to match their network), active on all their SIM cards, which is not correctly handled by any of the OnePlus Devices (one, two, x) so it writes constantly to flash memory, killing it arround 100.000 writes which is 3-6 weeks.
(via Mike Walsh on the Irish tech slack)(tags: via:itc oneplus phones sim-cards mec deutsche-telekom bugs flash)
Scala client composition with Traits vs implementing an abstract class - Stack Overflow
good Scala coding advice from Travis Brown
(tags: scala coding travis-brown inheritance oo languages traits)
The science behind "don't drink when pregnant" is rubbish
As the economist Emily Oster pointed out in her 2013 book Expecting Better, there is also no “proven safe” level of Tylenol or caffeine, and yet both are fine in moderation during pregnancy. Oster pored through reams of research on alcohol and pregnancy for her book and concluded that there is simply no scientific evidence that light drinking during pregnancy impacts a baby’s health. (In one frequently cited 2001 study that suggested light drinking in pregnancy increases the chances of a child displaying aggressive behaviors, the drinkers were also significantly likelier to have taken cocaine during pregnancy.)
My wife also followed the paper trail on this issue in the past. In the papers from which these recommendations were derived, the level of drinking at which any effects were observed in babies was when women consumed at least *9 units every day* for the entire pregnancy. That's an entire bottle of wine, daily!(tags: booze alcohol science facts papers medicine emily-oster babies pregnancy pre-pregnant research)
-
'“Spam emails are a large proportion of emails seen in SIGINT [signals intelligence],” reads part of a dense document from the Snowden archive, published by Boing Boing on Tuesday. “GCHQ would like to reduce the impact of spam emails on data storage, processing and analysis.”' (circa 2011). Steganography, anyone? (via Tony Finch)
(tags: spam anti-spam gchq funny boing-boing sigint snowden surveillance)
ECHR: Websites not liable for readers' comments
'Lawyers for [a Hungarian news] site said the comments concerned had been taken down as soon as they were flagged. They said making their clients liable for everything readers posted "would have serious adverse repercussions for freedom of expression and democratic openness in the age of Internet". The ECHR agreed. "Although offensive and vulgar, the incriminated comments did not constitute clearly unlawful speech; and they certainly did not amount to hate speech or incitement to violence," the judges wrote.'
research!rsc: Zip Files All The Way Down
quine.zip, quine.gz, and quine.tar.gz. Here's what happens when you mail it through bad AV software: https://twitter.com/FioraAeterna/status/694655296707297281
(tags: zip algorithms compression quines fun hacks gzip)
The Nuclear Missile Sites of Los Angeles
Great article by Geoff "bldgblog" Manaugh on the ruins of the Nike air-to-air missile emplacements dotted around California. I had absolutely no idea that these -- the 1958-era Nike-Hercules missiles, at least -- carried 30-kiloton nuclear warheads, intended to be detonated at 50,000 feet *above* the cities they were defending, in order to destroy in-flight bomber formations. Nuclear war was truly bananas.
(tags: war history la sf california nike-missiles missiles nuclear-war nike-hercules cold-war 1950s)
Exclusive: Snowden intelligence docs reveal UK spooks' malware checklist / Boing Boing
This is an excellent essay from Cory Doctorow on mass surveillance in the post-Snowden era, and the difference between HUMINT and SIGINT. So much good stuff, including this (new to me) cite for, "Goodhart's law", on secrecy as it affects adversarial classification:
The problem with this is that once you accept this framing, and note the happy coincidence that your paymasters just happen to have found a way to spy on everyone, the conclusion is obvious: just mine all of the data, from everyone to everyone, and use an algorithm to figure out who’s guilty. The bad guys have a Modus Operandi, as anyone who’s watched a cop show knows. Find the MO, turn it into a data fingerprint, and you can just sort the firehose’s output into ”terrorist-ish” and ”unterrorist-ish.” Once you accept this premise, then it’s equally obvious that the whole methodology has to be kept from scrutiny. If you’re depending on three ”tells” as indicators of terrorist planning, the terrorists will figure out how to plan their attacks without doing those three things. This even has a name: Goodhart's law. "When a measure becomes a target, it ceases to be a good measure." Google started out by gauging a web page’s importance by counting the number of links they could find to it. This worked well before they told people what they were doing. Once getting a page ranked by Google became important, unscrupulous people set up dummy sites (“link-farms”) with lots of links pointing at their pages.
(tags: adversarial-classification classification surveillance nsa gchq cory-doctorow privacy snooping goodharts-law google anti-spam filtering spying snowden)
Phone robot keeps annoying telemarketers talking for as long as possible
'Anderson encourages his readers to forward telemarketers to the robot, and is happy to send them recordings of the ensuing conversations. His instructions are below if you'd like to give it a shot.'
(tags: telemarketers script robodialing spam funny)
Why is Safe Harbour II such a challenge? - EDRi
The only possible deal that is immediately available is where the European Commission agrees a politically expeditious but legally untenable deal, creating a time bomb rather than a durable deal, to the benefit of no one. In absence of reforms before an agreement, individuals’ fundamental rights would remain under threat.
(tags: edri law eu ec ecj surveillance snooping us-politics safe-harbor)
-
interactive menu selection for the UNIX command line
(tags: cli linux unix grep menus selection ui interactive terminal)
-
It seems git's default behavior in many situations is -- despite communicating objectID by content-addressable hashes which should be sufficient to assure some integrity -- it may not actually bother to *check* them. Yes, even when receiving objects from other repos. So, enabling these configuration parameters may "slow down" your git operations. The return is actually noticing if someone ships you a bogus object. Everyone should enable these.
(tags: git security integrity error-checking dvcs version-control coding)
-
Good explanation and scipy code for the birthday paradox and hash collisions
(tags: hashing hashes collisions birthday-problem birthday-paradox coding probability statistics)
iPhone, iPad, Mac Buyer's Guide: Know When to Buy
sync up with the Apple product cycle when you're buying new hardware
(tags: hardware devices apple shopping mac ios iphone ipad releases schedule gadgets)
Seesaw: scalable and robust load balancing from Google
After evaluating a number of platforms, including existing open source projects, we were unable to find one that met all of our needs and decided to set about developing a robust and scalable load balancing platform. The requirements were not exactly complex - we needed the ability to handle traffic for unicast and anycast VIPs, perform load balancing with NAT and DSR (also known as DR), and perform adequate health checks against the backends. Above all we wanted a platform that allowed for ease of management, including automated deployment of configuration changes. One of the two existing platforms was built upon Linux LVS, which provided the necessary load balancing at the network level. This was known to work successfully and we opted to retain this for the new platform. Several design decisions were made early on in the project — the first of these was to use the Go programming language, since it provided an incredibly powerful way to implement concurrency (goroutines and channels), along with easy interprocess communication (net/rpc). The second was to implement a modular multi-process architecture. The third was to simply abort and terminate a process if we ended up in an unknown state, which would ideally allow for failover and/or self-recovery.
(tags: seesaw load-balancers google load-balancing vips anycast nat lbs go ops networking)
"What the hell have you built"
cut out and keep PNG for many occasions! "Why is Redis talking to MongoDB?"
(tags: mongodb redis funny architecture gifs png reactiongifs)
Schema evolution in Avro, Protocol Buffers and Thrift
Good description of this key feature of decent serialization formats
(tags: avro thrift protobuf schemas serialization coding interop compatibility)
ECB forcing Ireland to pay the bondholders was like a hostage situation | David McWilliams
At the time, many of us citizens thought the State was being craven in the face of the EU but it is now clear that Trichet’s ECB was prepared to let the Irish banks go to the wall, prompting a new bank run in 2010. This is like a hostage situation. The ECB was saying to the Irish government: you managed in September 2008 to prevent a bank run with the guarantee (which should always have been temporary and conditional) but now we are going to threaten you with another bank run – because we are still funding your banks and you must pay all the bondholders and add the cost to the national debt of the country. So the implicit threat was: “We will close the banks, cause a bank run and you will be left to pick up the pieces politically, socially and economically.”
(tags: banking ireland politics ecb eu bondholders jean-claude-trichet economics)
Three lessons from running Kubernetes in production
Wow, the deployment thing is pretty hacky
(tags: deployment ops kubernetes production)
Apollo 11 Mission on Technical Debt — Medium
'# TEMPORARY, I HOPE HOPE HOPE'
(tags: hacks technical-debt backlog prioritisation project-management apollo space history)
Pinboard: bookmarks for peakscale tagged 'postmortem'
Bookmarking so I can follow my own link from https://pinboard.in/u:jmason/t:post-mortems/
(tags: postmortem outages availability post-mortems)
Ireland’s first dedicated poutine place opened in Dublin today and it’s delish
SOUND THE POUTINE KLAXON
(tags: poutine canadia canada frozen-wastes food chips dublin)
-
Dropwizard for Go, basically:
a distributed programming toolkit for building microservices in large organizations. We solve common problems in distributed systems, so you can focus on your business logic.
(tags: microservices go golang http libraries open-source rpc circuit-breakers)
Meteor | What are the full list of short-codes for voicemail/diverts?
bookmarking for future use
In Phibsboro, a New Deli For a Changing Neighbourhood
"Bang Bang", new fancy deli on Leinster Road North
Tara Pilgrimage 2006 - Indymedia Ireland
OMG, this is hilarious. High drama among the arch-druids (via Lisa Carey)
Tim O'Reilly vs Paul Graham: fight!
'In his essay on Income Inequality, Paul Graham credited me for pre-publication feedback. Because he didn’t do much with my comments, I thought I’d publish them here.' ... 'Mostly, I think you are picking a fight with people who would mostly agree with you, and ignoring the real arguments about what inequality means and why it matters.'
(tags: inequality silicon-valley tech paul-graham tim-oreilly piketty politics economics wealth startups history work stock-options)
Fairytales much older than previously thought, say researchers
Analysis showed Jack and the Beanstalk was rooted in a group of stories classified as The Boy Who Stole Ogre’s Treasure, and could be traced back to when eastern and western Indo-European languages split – more than 5,000 years ago. Beauty and the Beast and Rumpelstiltskin to be about 4,000 years old. A folk tale called The Smith and the Devil was estimated to date back 6,000 years to the bronze age. The study employed phylogenetic analysis, which was developed to investigate evolutionary relationships between species, and used a tree of Indo-European languages to trace the descent of shared tales on it, to see how far they could be demonstrated to go back in time. Tehrani said: “We find it pretty remarkable these stories have survived without being written. They have been told since before even English, French and Italian existed. They were probably told in an extinct Indo-European language.”
(tags: history mythology stories folk-tales jack-and-the-beanstalk rumpelstiltskin language phylogenetic)
Transform your oyster travelcard with sugru!
probably totally dodgy where the Oyster rules are concerned, but still pretty damn cool
-
handy -- search Netflix in all regions, then show where the show/movie is available. Probably going to be less handy from now on now that Netflix is blocking region-spoofing
Why Eircode is a shambles, by someone who works in the transport industry
This is full of good points.
Without having a distinct SORT KEY for a geographically distinct area, a postcode is of no real benefit to any type of transport firm or agency. To take one example, Eircode have used the same sort key, F92, for Arranmore (Donegal’s largest inhabited island) and the north western Donegal mainland. Cill Rónáin, Inis Mór, the largest of the Aran Islands, has the same sort key H91, as Connemara and Galway City. Galway city and the Aran Islands may be in a relatively small geographical area, but keen eyes may have noticed that the Aran Islands are separated from the mainland by a small section of the Atlantic Ocean. Sort codes which ignore clear and obvious boundaries, like seas or oceans, need to be redesigned. In two seconds a [UK] website could tell a Hebridean that his delivery will take 4 days at a cost of fifty quid by using the first three characters of the postcode. The Eircode-using Irish equivalent website would need to lookup a large database to tell an Arranmore resident the cost and time for delivery – and they’d need the full exact code. Any mistake made here, and your estimated delivery time, and cost for delivery will be wrong.
(tags: postcodes eircode loc8code fail couriers delivery geodata geocoding galway aran-islands)
The Magnetic Air Bonsai Creates Surreal Levitating Plants
this is amazing. $200 on Kickstarter!
(tags: kickstarter bonsai plants gardening levitation air-bonsai cool)
AWS Certificate Manager – Deploy SSL/TLS-Based Apps on AWS
Very nifty -- autodeploys free wildcard certs to ELBs and Cloudfront. HN discussion thread is pretty good: https://news.ycombinator.com/item?id=10947186
(tags: ssl tls certificates ops aws cloudfront elb)
AWS re:Invent 2015 | (NET403) Another Day, Another Billion Packets - YouTube
Eric Brandwine details the internal workings of Amazon VPC
(tags: eric-brandwine vpc aws amazon networking security vlans sdn)
Unikernels are unfit for production - Blog - Joyent
Bryan Cantrill gives unikernels a 10-point dismissal. This is great
(tags: unikernels flavour-of-the-month devops joyent bryan-cantrill docker containers ops)
"So you have a mess on your hands" [png]
Excellent flowchart of how to fix common git screwups (via ITC slack)
(tags: git reference flowchart troubleshooting help coding via:itc)
Journalists, this GSOC story isn’t all about you, you know
Karlin Lillington in the Irish Times, going through journos for a shortcut:
All the hand-wringing from journalists, unions and media companies – even politicians and ministers – over the GSOC’s accessing of journalist’s call records? Oh, please. What wilful ignorance, mixed with blatant hypocrisy. Where have you all been for the past decade and a half, as successive Irish governments and ministers for justice supported and then rammed through legislation for mandatory call data retention for one of the longest periods in the world, with some of the weakest legal constraints and oversight?
(tags: karlin-lillington privacy data-protection dri law journalists gsoc surveillance data-retention)
-
Good plug for emrfs for encryption
Gilt Groupe Is a Cautionary Tale for Startup Employees Banking on Stock Options | Re/code
Good explanation of why RSUs are becoming increasingly common
(tags: rsus startups shares share-options work)
Powering your Amazon ECS Clusters with Spot Fleet
sounds feasible
-
Ughhhh.
Amazon Echo sends your WiFi password to Amazon. No option to disable. Trust us it's in an "encrypted file"
(tags: amazon echo wifi passwords security data-privacy data-protection)
21 of the most Stoneybatter things that have ever happened
ah, <3 the 'batter
(tags: stoneybatter dublin hipsters funny)
-
This is absolutely appalling. IP law gone mad:
DNC Parks & Resorts at Yosemite, Inc (a division of one of the largest privately owned companies in the world) used to have the concessions to operate various businesses around Yosemite National Park. Now that they've been fired, they're using some decidedly dubious trademark to force the Park Service to change the names of buildings and locations that have stood for as much as a century, including some that have been designated national landmarks. The Parks Service has caved to these requests as it readies the park for its centennial celebration. It will not only change the names of publicly owned landmarks -- such as the Ahwahnee hotel, Yosemite Lodge, the Wawona Hotel, Curry Village, and Badger Pass ski area -- it will also have to change all its signs, maps and guidebooks.
(tags: yosemite ip trademarks law fiasco national-parks usa)
-
'THE DRAGNET: How a man accused of million-dollar fraud uncovered a never before seen, secret surveillance device'
(tags: stingrays crime fraud surveillance mobile police imsi-catchers)
Introducing: The World's First Fully Functional 3D Printed Watch: The Christoph Laimer Tourbillon
wow
(tags: watches 3d-printing clocks things via:bruces)
-
Online chart maker for CSV and Excel data; make charts and dashboards online. One really nice feature is that charts made this way get permalinks, and can be easily inlined as PNGs or HTML5 divs. (See https://www.vividcortex.com/blog/analyzing-sparks-mpp-scalability-with-the-usl for an example.)
(tags: data javascript python tools visualization dataviz charts graphing web plotly plots graphs)
CRISPR Patents Spark Fight to Control Genome Editing | MIT Technology Review
Patents ruin everything, CRISPR edition
(tags: crispr algorithms gene-editing genetics genomics genes patents)
-
Nchan is a scalable, flexible pub/sub server for the modern web, built as a module for the Nginx web server. It can be configured as a standalone server, or as a shim between your application and tens, thousands, or millions of live subscribers. It can buffer messages in memory, on-disk, or via Redis. All connections are handled asynchronously and distributed among any number of worker processes. It can also scale to many nginx server instances with Redis. Messages are published to channels with HTTP POST requests or websockets, and subscribed also through websockets, long-polling, EventSource (SSE), old-fashioned interval polling, and more. Each subscriber can listen to up to 255 channels per connection, and can be optionally authenticated via a custom application url. An events meta channel is also available for debugging.
Also now supports HTTP/2. This used to be called the Nginx HTTP Push Module, and I used it with great results in that form. This is the way to do HTTP push in all its forms....(tags: nginx pubsub websockets sse http http-push http2 redis long-polling nchan)
David Bowie: Father Of The Sleng Teng Riddim
A great theory!
I don’t have contact information for Hiroko Okuda, but I am positive that the track she is referring to [as the source of the Casiotone MT-40 "rock" preset] is “Hang Onto Yourself” by David Bowie.
(tags: david-bowie sleng-teng-riddim riddims reggae casio presets samples history music trivia)
The Open Guide To Equity Compensation
A very US-oriented, but still useful, reference for all the aspects of stock options, RSUs, and other forms of equity compensation
(tags: equity startups money pay salary rsus stock-options stock)
About Microservices, Containers and their Underestimated Impact on Network Performance
shock horror, Docker-SDN layers have terrible performance. Still pretty lousy perf impacts from basic Docker containerization, presumably without "--net=host" (which is apparently vital)
(tags: docker performance network containers sdn ops networking microservices)
Netty @Apple: Large Scale Deployment/Connectivity
'Norman Maurer presents how Apple uses Netty for its Java based services and the challenges of doing so, including how they enhanced performance by participating in the Netty open source community. Maurer takes a deep dive into advanced topics like JNI, JVM internals, and others.'
(tags: apple netty norman-maurer java jvm async talks presentations)
-
excellent blueprint-style poster covering all the major cocktails
(tags: cocktails drinks engineering posters blueprints graphics pdf)
Introducing dumb-init, an init system for Docker containers
Yelp fixing one of the sillier shortcomings of Docker
(tags: docker tools yelp init containers signals unix linux dumb-init)
Can't sign in to Google calendar on my Samsung refrigerator
LOL, internet of broken things (via Dave Bolger)
(tags: internetofshit iot fail samsung google apis fridges connected future via:davebolger)
5 subtle ways you're using MySQL as a queue, and why it'll bite you
Excellent post from Percona. I particularly like that they don't just say "don't use MySQL" -- they give good advice on how it can be made work: 1) avoid polling; 2) avoid locking; and 3) avoid storing your queue in the same table as other data.
(tags: database mysql queueing queue messaging percona rds locking sql architecture)
BBC Digital Media Distribution: How we improved throughput by 4x
Replacing varnish with nginx. Nice deep-dive blog post covering kernel innards
The Importance of Tuning Your Thread Pools
Excellent blog post on thread pools, backpressure, Little's Law, and other Hystrix-related topics (PS: use Hystrix)
(tags: hystrix threadpools concurrency java jvm backpressure littles-law capacity)
-
good explanation of this new data structure for searching multidimensional data
(tags: search lucene bkd-trees searching data-structures)
The Guinness Brewer Who Revolutionized Statistics
William S. Gosset, discoverer of the Student's T-Test. Amazon should have taken note of this trick:
Upon completing his work on the t-distribution, Gosset was eager to make his work public. It was an important finding, and one he wanted to share with the wider world. The managers of Guinness were not so keen on this. They realized they had an advantage over the competition by using this method, and were not excited about relinquishing that leg up. If Gosset were to publish the paper, other breweries would be on to them. So they came to a compromise. Guinness agreed to allow Gosset to publish the finding, as long as he used a pseudonym. This way, competitors would not be able to realize that someone on Guinness’s payroll was doing such research, and figure out that the company’s scientifically enlightened approach was key to their success.
(tags: statistics william-gosset history guinness brewing t-test pseudonyms dublin)
How open-source software developers helped end the Ebola epidemic in Sierra Leone
Little known to the rest of the world, a team of open source software developers played a small but integral part in helping to stop the spread of Ebola in Sierra Leone, solving a payroll crisis that was hindering the fight against the disease. Emerson Tan from NetHope, a consortium of NGOs working in IT and development, told the tale at the Chaos Communications Congress in Hamburg, Germany. “These guys basically saved their country from complete collapse. I can’t overestimate how many lives they saved,” he said about his co-presenters, Salton Arthur Massally, Harold Valentine Mac-Saidu and Francis Banguara, who appeared over video link.
(tags: open-source software coding payroll sierra-leone ebola ccc)
-
A good review of RethinkDB! Hopefully not just because this test is contract work on behalf of the RethinkDB team ;)
I’ve run hundreds of test against RethinkDB at majority/majority, at various timescales, request rates, concurrencies, and with different types of failures. Consistent with the documentation, I have never found a linearization failure with these settings. If you use hard durability, majority writes, and majority reads, single-document ops in RethinkDB appear safe.
(tags: rethinkdb databases stores storage ops availability cap jepsen tests replication)
-
Metrics integration for OkHttp. looks quite nice
How Completely Messed Up Practices Become Normal
on Normalization of Deviance, with a few anecdotes from Silicon Valley. “The gradual process through which unacceptable practice or standards become acceptable. As the deviant behavior is repeated without catastrophic results, it becomes the social norm for the organization.”
(tags: normalization-of-deviance deviance bugs culture ops reliability work workplaces processes norms)
A critical analysis of the Legacy Verified SSL/TLS proposal by CloudFlare & Facebook
The history of real-world CA-based PKI is pretty awful
Incredibly Rare Underwater Footage of a Stray Giant Squid Swimming Around Toyama Bay in Japan
wow, this is great footage
(tags: giant-squid squid cephalopods japan video youtube)
-
hooray, Docker registry here at last
How to inspect SSL/TLS traffic with Wireshark 2
turns out it's easy enough -- Mozilla standardised a debugging SSL session-key logging file format which Wireshark and Chrome support
ImperialViolet - Juniper: recording some Twitter conversations
Adam Langley on the Juniper VPN-snooping security hole:
... if it wasn't the NSA who did this, we have a case where a US government backdoor effort (Dual-EC) laid the groundwork for someone else to attack US interests. Certainly this attack would be a lot easier given the presence of a backdoor-friendly RNG already in place. And I've not even discussed the SSH backdoor. [...]
(tags: primes ecc security juniper holes exploits dual-ec-drbg vpn networking crypto prngs)
Excellent post from Matthew Green on the Juniper backdoor
For the past several years, it appears that Juniper NetScreen devices have incorporated a potentially backdoored random number generator, based on the NSA's Dual_EC_DRBG algorithm. At some point in 2012, the NetScreen code was further subverted by some unknown party, so that the very same backdoor could be used to eavesdrop on NetScreen connections. While this alteration was not authorized by Juniper, it's important to note that the attacker made no major code changes to the encryption mechanism -- they only changed parameters. This means that the systems were potentially vulnerable to other parties, even beforehand. Worse, the nature of this vulnerability is particularly insidious and generally messed up. [....] The end result was a period in which someone -- maybe a foreign government -- was able to decrypt Juniper traffic in the U.S. and around the world. And all because Juniper had already paved the road. One of the most serious concerns we raise during [anti-law-enforcement-backdoor] meetings is the possibility that encryption backdoors could be subverted. Specifically, that a back door intended for law enforcement could somehow become a backdoor for people who we don't trust to read our messages. Normally when we talk about this, we're concerned about failures in storage of things like escrow keys. What this Juniper vulnerability illustrates is that the danger is much broader and more serious than that. The problem with cryptographic backdoors is not that they're the only way that an attacker can break intro our cryptographic systems. It's merely that they're one of the best. They take care of the hard work, the laying of plumbing and electrical wiring, so attackers can simply walk in and change the drapes.
(via Tony Finch)(tags: via:fanf crypto backdoors politics juniper dual-ec-drbg netscreen vpn)
-
good thread of AWS' shortcomings -- so many services still don't handle VPC for instance
Big Brother is born. And we find out 15 years too late to stop him - The Register
During the passage of RIPA, and in many debates since 2000, Parliament was asked to consider and require data retention by telephone companies, claiming that the information was vital to fighting crime and terrorism. But Prime Minister Tony Blair and successive Home Secretaries David Blunkett and Jack Straw never revealed to Parliament that at the same time, the government was constantly siphoning up and storing all telephone call records at NTAC. As a result, MPs and peers spent months arguing about a pretence, and in ignorance of the cost and human rights implications of what successive governments were doing in secret.
(tags: ripa big-brother surveillance preston uk gchq mi5 law snooping)
How to host Hugo static website generator on AWS Lambda
seriously, AWS. editing JSON files in a browser text box is an awful, awful user experience
-
A German bank offering a worldwide(?) bank account, using your smartphone (with push notifications etc.) as the main UI
The mystery of the power bank phone taking over Ghana
tl;dr: it's being used as a cheap, portable power bank
(tags: africa ghana battery phones power recharging gadgets)
Gardai find 70 stolen bikes in one house being readied for export
The Limerick Leader quoted other unnamed gardai who said they believed those who had stolen the bikes were selling them to a third party for shipment abroad, most likely to another country in Europe. “It would seem that he has his own network on the Continent and has a lucrative market for the bikes he sends on,” said one of the sources quoted in the report. “Some of the racing bikes would fetch large sums of money on the Continent.” Trucks were seen arriving and departing the house in Castletroy where the find was made. And while it was unclear exactly how gardai were informed of the suspicious activity, when a team of officers went to search the property they found the bikes in the back garden.
(tags: bikes theft limerick crime bike-theft ireland castletroy)
-
“Statistical regression to the mean predicts that patients selected for abnormalcy will, on the average, tend to improve. We argue that most improvements attributed to the placebo effect are actually instances of statistical regression.”
(tags: medicine science statistics placebo evidence via:hn regression-to-the-mean)
League of Legends win-rates vs latency analysed
It appears that more mechanically intensive champions are more affected by latency, while tankier champions or those with point-and-click abilities are less affected by latency.
(via Nelson)(tags: games league-of-legends latency ping gaming internet via:nelson)
-
via Tony Finch. 'In this post I will demonstrate how to do reservoir sampling orders of magnitude faster than the traditional “naive” reservoir sampling algorithm, using a fast high-fidelity approximation to the reservoir sampling-gap distribution.'
(tags: statistics reservoir-sampling sampling algorithms poisson bernoulli performance)
The Moral Failure of Computer Scientists - The Atlantic
Phillip Rogaway, a professor of CS at UC Davis, contends that computer scientists should stand up against the construction of surveillance states built using their work:
Waddell: In your paper, you compare the debate over nuclear science in the 1950s to the current debate over cryptography. Nuclear weapons are one of the most obvious threats to humanity today — do you think surveillance presents a similar type of danger? Rogaway: I do. It’s of a different nature, obviously. The threat is more indirect and more subtle. So with nuclear warfare, there was this visually compelling and frightening risk of going up in a mushroom cloud. And with the transition to a state of total surveillance, what we have is just the slow forfeiture of democracy.
(tags: ethics cryptography crypto surveillance politics phillip-rogaway morals speaking-out government)
-
This is basically terrifying. A catalog of race conditions and reliability horrors around the POSIX filesystem abstraction in Linux -- it's a wonder anything works. 'Where’s this documented? Oh, in some mailing list post 6-8 years ago (which makes it 12-14 years from today). The fs devs whose posts I’ve read are quite polite compared to LKML’s reputation, and they generously spend a lot of time responding to basic questions, but it’s hard for outsiders to troll [sic] through a decade and a half of mailing list postings to figure out which ones are still valid and which ones have been obsoleted! I don’t mean to pick on filesystem devs. In their OSDI 2014 talk, the authors of the paper we’re discussing noted that when they reported bugs they’d found, developers would often respond “POSIX doesn’t let filesystems do that”, without being able to point to any specific POSIX documentation to support their statement. If you’ve followed Kyle Kingsbury’s Jepsen work, this may sound familiar, except devs respond with “filesystems don’t do that” instead of “networks don’t do that”.I think this is understandable, given how much misinformation is out there. Not being a filesystem dev myself, I’d be a bit surprised if I don’t have at least one bug in this post.'
(tags: filesystems linux unix files operating-systems posix fsync osdi papers reliability)
[LUCENE-6917] Deprecate and rename NumericField/RangeQuery to LegacyNumeric - ASF JIRA
Interesting performance-related tweak going into Lucene -- based on the Bkd-Tree I think: https://users.cs.duke.edu/~pankaj/publications/papers/bkd-sstd.pdf . Being used for all numeric index types, not just multidimensional ones?
(tags: lucene performance algorithms patches bkd-trees geodata numeric indexing)
Kevin Lyda's mega pension post
Cutting and pasting from Facebook for posterity... there are some really solid tips in here. 'Some people plan their lives out and then there are people like me who randomly do things and suddenly, in retrospect, it looks like a grand plan has come together. In reality it's more like my subconscious pulls in useful info and pokes me to go learn things as required. If you live/work in Ireland, the following "grand plan" might be useful. This year has apparently been "figure out how to retire" year. It started late last year with finally organising all my private Irish pensions (2 from employers, 1 personal). In the process I learned the following: * Many Irish pension plans allow you to start drawing down from them at age 50. There are downsides to this, but if you have several of them it allows you more room to avoid stock market downturns when you purchase annuities. * You can get 25% of each pension as a tax-free lump sum. I also learned a few property things. The key thing is that if you have a buy-to-let property you should *not* pay off its mortgage early. You can deduct 75% of the interest you pay against the taxes you'd owe for rental income. That means the interest you pay will essentially be close to or even under the rate of inflation. A residential mortgage might have a lower interest rate nominally, but the effective interest rate is higher. The Irish state pension is changing. If you are 68 after 2020 the rules have changed - and they're now much simpler. Work for 10 years and you get the minimum state pension (1/3 of a full pension). Work for 20, you get 2/3 of of a state pension. Work for 30, you get a full pension. But you can't collect it till you're 68 and remember that Irish employers can apparently force you to "retire" at 65 (ageism is legal). So you need to bridge those 3 years (or hope they change the law to stop employers from doing that). When I "retired" I kept a part time job for a number of reasons, but one was because I suspected I needed more PRSI credits for a pension. And it turns out this was correct. Part-time work counts as long as you make more than €38/week. And self-employment counts as long as you make more than €5,000/year. You can also make voluntary PRSI contributions (around €500/year but very situation dependent). If you've worked in Europe or the US or Canada or a few other countries, you can get credits for social welfare payments in those countries. But if you have enough here and you have enough for some pension in the other country, you can draw a pension from both. Lastly most people I've talked to about retirement this year have used the analogy of legs on a stool. Every source of post-retirement income is a leg on the stool - the more legs, the more secure your retirement. There are lots of options for legs: * Rental income. This is a little wobbly as legs go at least for me. But if you have more than one rental property - and better yet some commercial rental property - this leg firms up a bit. Still, it's a bit more work than most. * Savings. This isn't very tax-efficient, but it can help fill in blank spots some legs have (like rental income or age restrictions) or maximise another legs value (weathering downturns for stock-based legs). And in retirement you can even build savings up. Sell a house, the private pension lump sum, etc. But remember you're retired, go have fun. Savings won't do you much good when you're dead. * Stocks. I've cashed all mine in, but some friends have been more restrained in cashing in stocks they might have gotten from employers. This is a volatile leg, but it can pay off rather well if you know what you're doing. But be honest with yourself. I know I absolutely don't know what I'm doing on this so stayed away. * Government pension. This is generally a reliable source of income in retirement. It's usually not a lot, but it does tend to last from retirement to death and it shows up every month. You apply once and then it just shows up each month. If you've worked in multiple countries, you can hedge some bets by taking a pension in each country you qualify from. You did pay into them after all. * Private pension. This can also give you a solid source of income but you need to pay into it. And paying in during your 20s and 30s really pays off later. But you need to make your investments less risky as you get into your late 50s - so make sure to start looking at them then. And you need to provide yourself some flexibility for starting to draw it down in order to survive market drops. The crash in 2007 didn't fully recover until 2012 - that's 5 years. * Your home. Pay off your mortgage and your home can be a leg. Not having to pay rent/mortgage is a large expense removed and makes the other legs more effective. You can also "sell down" or look into things like reverse mortgages, but the former can take time and has costs while the latter usually seems to have a lot of fine print you should read up on. * Part-time work. I know a number of people who took part-time jobs when they retired. If you can find something that doesn't take a huge amount of time that you'd enjoy doing and that people will pay you for, fantastic! Do that. And it gets you out of the house and keeping active. For friends who are geeks and in my age cohort, I note that it will be 2037 around the time we hit 65. If you know why that matters, ka-ching!' Another particularly useful page about the state pension: "Six things every woman needs to know about the State pension", Irish Times, Dec 1 2015, https://www.irishtimes.com/business/personal-finance/six-things-every-woman-needs-to-know-about-the-state-pension-1.2448981 , which links to this page to get your state pension contribution record: http://www.welfare.ie/en/pages/secure/ RequestSIContributionRecord.aspx
(tags: pensions money life via:klyda stocks savings shares property ireland old-age retirement)
-
As Glynn Moody noted, if UK police, intelligence agencies, HMRC and others call all legally hack phones and computers, that also means that digital evidence can be easily and invisibly planted. This will undermine future court cases in the UK, which seems like a significant own goal...
(tags: hmrc police gchq uk hacking security law-enforcement evidence law)
Why We Chose Kubernetes Over ECS
3 months ago when we, at nanit.com, came to evaluate which Docker orchestration framework to use, we gave ECS the first priority. We were already familiar with AWS services, and since we already had our whole infrastructure there, it was the default choice. After testing the service for a while we had the feeling it was not mature enough and missing some key features we needed (more on that later), so we went to test another orchestration framework: Kubernetes. We were glad to discover that Kubernetes is far more comprehensive and had almost all the features we required. For us, Kubernetes won ECS on ECS’s home court, which is AWS.
(tags: kubernetes ecs docker containers aws ec2 ops)
Beachbum Berry — Latitude 29 Formula Orgeat
The legendary Jeff "Beachbum" Berry, tiki-cocktail wizard, has partnered with a Brooklyn-based orgeat maker to provide the key ingredient for an original Trader-Vic-style Mai Tai. may be a bit tricky to ship to Ireland though!
How to Spot Bitcoin Inventor Satoshi Nakamoto | MIT Technology Review
Emin Gün Sirer pours cold water on the "Craig Wright is Satoshi Nakamoto" theory
(tags: satoshi-nakamoto bitcoin anonymous nom-de-guerre crypto)
Dr TJ McIntyre: Fight against cybercrime needs funding, not more words - Independent.ie
Is the Irish policing system capable of tackling computer crime? A report this week from the Garda Inspectorate makes it clear that the answer is no. There is no Garda cybercrime unit, which is of serious concern given the threat posed by cybercrime to key national infrastructure such as energy, transport and telecommunications systems. [...] A combination of inadequate resources and increased workload have swamped the [Computer Crime Investigation Unit]. Today, almost every crime is a computer crime, in the sense that mobile phones, laptops and even devices such as game consoles are likely to contain evidence. The need to forensically inspect all these devices - using outdated equipment - has resulted in several-year delays and seem to have forced the unit into a position where it is running to stand still rather than responding to new developments.
(tags: via:tjmcintyre ireland cybercrime law policing hacking)
-
I keep having to google this, so here's a good one which works -- unlike Wolfram Alpha!
(tags: birthday birthday-paradox birthday-problem hashes hash-collision attacks security collisions calculators probability statistcs)
-
'At least for Europe it is obvious: All roads lead to Rome! You can reach the eternal city on almost 500.000 routes from all across the continent. Which road would you take? To approach one of the biggest unsolved quests of mobility, the first question we asked ourselves was: Where do you start, when you want to know every road to Rome? We aligned starting points in a 26.503.452 km² grid covering all of Europe. Every cell of this grid contains the starting point to one of our journeys to Rome. Now that we have our 486.713 starting points we need to find out how we could reach Rome as our destination. For this we created a algorithm that calculates one route for every trip. The more often a single street segment is used, the stronger it is drawn on the map. The maps as outcome of this project is somewhere between information visualization and data art, unveiling mobility and a very large scale.' Beautiful! Decent-sized prints available for 26 euros too.
Tools for debugging, testing and using HTTP/2
excellent, extensive list from Cloudflare
(tags: http http2 cloudflare tools cli ops testing debugging spdy)
AWS Api Gateway for Fun and Profit
good worked-through example of an API Gateway rewriting system
(tags: api-gateway aws api http services ops alerting alarming opsgenie signalfx)
EU counter-terror bill is 'indiscriminate' data sweep
"To identify if someone is travelling outside the EU, we don't need an EU PNR. This data are already easily available in the airline reservation system,” [Giovanni Buttarelli, the European data protection supervisor] said. EU governments want more information in the belief it will help law enforcement in tracking down terrorists and are demanding access to information, such as travel dates, travel itinerary, ticket information, contact details, baggage information, and payment information of anyone flying in or out of the EU. ... EU PNR data would be retained for up to five years
(tags: pnr eu law privacy data-protection europe counter-terrorism travel air-travel)
Fast Forward Labs: Fashion Goes Deep: Data Science at Lyst
this is more than just data science really -- this is proper machine learning, with deep learning and a convolutional neural network. serious business
(tags: lyst machine-learning data-science ml neural-networks supervised-learning unsupervised-learning deep-learning)
Why Percentiles Don’t Work the Way you Think
Baron Schwartz on metrics, percentiles, and aggregation. +1, although as a HN commenter noted, quantile digests are probably the better fix
(tags: performance percentiles quantiles statistics metrics monitoring baron-schwartz vividcortex)
-
Spotify wrote their own metrics store on ElasticSearch and Cassandra. Sounds very similar to Prometheus
(tags: cassandra elasticsearch spotify monitoring metrics heroic)
ELS: latency based load balancer, part 1
ELS measures the following things: Success latency and success rate of each machine; Number of outstanding requests between the load balancer and each machine. These are the requests that have been sent out but we haven’t yet received a reply; Fast failures are better than slow failures, so we also measure failure latency for each machine. Since users care a lot about latency, we prefer machines that are expected to answer quicker. ELS therefore converts all the measured metrics into expected latency from the client’s perspective.[...] In short, the formula ensures that slower machines get less traffic and failing machines get much less traffic. Slower and failing machines still get some traffic, because we need to be able to detect when they come back up again.
(tags: latency spotify proxies load-balancing els algorithms c3 round-robin load-balancers routing)
Low-latency journalling file write latency on Linux
great research from LMAX: xfs/ext4 are the best choices, and they explain why in detail, referring to the code
(tags: linux xfs ext3 ext4 filesystems lmax performance latency journalling ops)
-
nice 3D printed maps from this Irish company
-
"Irish police have no cybercrime unit, and 1/3 of police have no email." ffs!
(tags: cybercrime policing ireland gardai fraud privacy phishing hacking internet law)
A Gulp Workflow for Amazon Lambda
'any nontrivial development of Lambda functions will require a simple, automated build/deploy process that also fills a couple of Lambda’s gaps such as the use of node modules and environment variables.' See also https://medium.com/@AdamRNeary/developing-and-testing-amazon-lambda-functions-e590fac85df4#.mz0a4qk3j : 'I am psyched about Amazon’s new Lambda service for asynchronous task processing, but the ideal development and testing cycle is really left to the engineer. While Amazon provides a web-based console, I prefer an approach that uses Mocha. Below you will find the gritty details using Kinesis events as a sample input.'
(tags: lambda aws services testing deployment ops mocha gulp javascript)
"Hidden Technical Debt in Machine-Learning Systems" [pdf]
Another great paper about from Google, talking about the tradeoffs that must be considered in practice over the long term with running a complex ML system in production.
(tags: technical-debt ml machine-learning ops software production papers pdf google)
Introducing Netty-HTTP from Cask
netty-http library solves [Netty usability issues] by using JAX-RS annotations to build a HTTP path routing layer on top of netty. In addition, the library implements a guava service to manage the HTTP service. netty-http allows users of the library to just focus on writing the business logic in HTTP handlers without having to worry about the complexities of path routing or learning netty pipeline internals to build the HTTP service.
We've written something very similar, although I didn't even bother supporting JAX-RS annotations -- just a simple code-level DSL.The Locals Xmas Gift Guide 2015
some nice local gift suggestions from small businesses around Dublin. I'd love to get some of these, but I guess I'll have to settle for giving them instead ;)
(tags: gifts dublin ireland shopping xmas christmas the-locals)
Topics in High-Performance Messaging
'We have worked together in the field of high-performance messaging for many years, and in that time, have seen some messaging systems that worked well and some that didn't. Successful deployment of a messaging system requires background information that is not easily available; most of what we know, we had to learn in the school of hard knocks. To save others a knock or two, we have collected here the essential background information and commentary on some of the issues involved in successful deployments. This information is organized as a series of topics around which there seems to be confusion or uncertainty. Please contact us if you have questions or comments.'
(tags: messaging scalability scaling performance udp tcp protocols multicast latency)
Intercom Engineering Insights - Scale and Reliability 2015
next Intercom hiring^Wevent coming up, Dec 10th in Dublin, talking about how they scale and ops their ElasticSearch and Mongo clusters
(tags: elasticsearch mongodb intercom engineering talks dublin)
Control theory meets machine learning
'DB: Is there a difference between how control theorists and machine learning researchers think about robustness and error? BR: In machine learning, we almost always model our errors as being random rather than worst-case. In some sense, random errors are actually much more benign than worst-case errors. [...] In machine learning, by assuming average-case performance, rather than worst-case, we can design predictive algorithms by averaging out the errors over large data sets. We want to be robust to fluctuations in the data, but only on average. This is much less restrictive than the worst-case restrictions in controls. DB: So control theory is model-based and concerned with worst case. Machine learning is data based and concerned with average case. Is there a middle ground? BR: I think there is! And I think there's an exciting opportunity here to understand how to combine robust control and reinforcement learning. Being able to build systems from data alone simplifies the engineering process, and has had several recent promising results. Guaranteeing that these systems won't behave catastrophically will enable us to actually deploy machine learning systems in a variety of applications with major impacts on our lives. It might enable safe autonomous vehicles that can navigate complex terrains. Or could assist us in diagnostics and treatments in health care. There are a lot of exciting possibilities, and that's why I'm excited about how to find a bridge between these two viewpoints.'
(tags: control-theory interviews machine-learning ml worst-case self-driving-cars cs)
-
This is my bet: the age of dynamic languages is over. There will be no new successful ones. Indeed we have learned a lot from them. We’ve learned that library code should be extendable by the programmer (mixins and meta-programming), that we want to control the structure (macros), that we disdain verbosity. And above all, we’ve learned that we want our languages to be enjoyable. But it’s time to move on. We will see a flourishing of languages that feel like you’re writing in a Clojure, but typed. Included will be a suite of powerful tools that we’ve never seen before, tools so convincing that only ascetics will ignore.
(tags: programming scala clojure coding types strong-types dynamic-languages languages)
-
'IRC without netsplits' using Raft consensus
(tags: raft irc netsplits resilience fault-tolerance)
Inside China's Memefacturing Factories, Where The Hottest New Gadgets Are Made - BuzzFeed News
On a humid afternoon, Zhou went shopping for some of those very parts at a Bao An market. As he pulled his maroon minivan into a crowded parking lot, the full scale of Depu Electronics came into view: a three-story concrete behemoth roughly bigger than a Costco and roughly smaller than the Pentagon. Inside, it looked like the world’s largest Radio Shack going out of business sale: an endless series of booths with cables and circuit boards and plugs and ports and buttons and machines piled so high on tables that the faces of the clerks who were selling them were hidden from view. Each booth seemed to argue: We have exactly what you want and we have enough of it for all of your customers. Short of motorized wheels and molding, the market offered nearly everything an ambitious factory owner would need to build a hoverboard, just waiting to be bought, assembled, and shipped.
(tags: hoverboards memes china manufacturing future gadgets tat bao-an electronics)
One of the Largest Hacks Yet Exposes Data on Hundreds of Thousands of Kids | Motherboard
VTech got hacked, and millions of parents and 200,000 kids had their privacy breached as a result. Bottom line is summed up by this quote from one affected parent:
“Why do you need know my address, why do you need to know all this information just so I can download a couple of free books for my kid on this silly pad thing? Why did they have all this information?”
Quite. Better off simply not to have the data in the first place!(tags: vtech privacy data-protection data hacks)
Senior Anglo bondholders revealed in department note
In case you were wondering who Ireland's economy was wiped out for:
Among the major holders were a Dutch pension fund, ABP; another Dutch fund, PGGM; LGPI in Finland, which manages local government pensions; and a Swiss public entities pension. A number of major asset managers were also named, including JP Morgan in London; DeKA and ADIG, two German investment managers; and Robeco from the Netherlands. Big insurance companies, including Munich Re, Llmarinen from Finland and German giant Axa were also named, along with big banks such as BNP, SocGen, ING and Deutsche.
(tags: bondholders anglo economy ireland politics eu senior-bondholders)
-
a bunch of metrics for Dublin xmas-shopping capacity
re:Work - The five keys to a successful Google team
We learned that there are five key dynamics that set successful teams apart from other teams at Google: Psychological safety: Can we take risks on this team without feeling insecure or embarrassed? Dependability: Can we count on each other to do high quality work on time? Structure & clarity: Are goals, roles, and execution plans on our team clear? Meaning of work: Are we working on something that is personally important for each of us? Impact of work: Do we fundamentally believe that the work we’re doing matters?
(tags: teams google culture work management productivity hr)
-
75%. This is really quite tricky!
Art Meets Cartography: The 15,000-Year History of a River in Oregon Rendered in Data
this is really beautiful. Available as a printable, 17" x 38" PDF from http://www.oregongeology.org/pubs/ll/p-poster-willamette.htm
(tags: art data mapping geodata oregon rivers willamette-river history lidar)
Accretion Disc Series - Clint Fulkerson
available as prints -- vector art with a hint of the bacterial
(tags: algorithms art graphics vector bacteria petri-dish clint-fulkerson)
John Nagle on delayed ACKs and his algorithm
love it when things like this show up
(tags: networking performance scalability nagle tcp ip)
-
She thought they were a normal couple until she found a passport in a glovebox – and then her world shattered. Now she is finally getting compensation and a police apology for that surreal, state-sponsored deception. But she still lies awake and wonders: did he ever really love me?
I can't believe this was going on in the 2000s!(tags: surveillance police uk undercover scandals policing environmentalism greens)
Just use /dev/urandom to generate random numbers
Using SHA-1 [to generate random numbers] in this way, with a random seed and a counter, is just building a (perfectly sound) CSPRNG with, I believe, an 80-bit security level. If you trust the source of the random seed, e.g. /dev/urandom, you may as well just use /dev/urandom itself. If you don't, you're already in trouble. And if you somehow need a userspace PRNG, the usual advice about not rolling your own crypto unless you know what you're doing applies. (Especially for database IDs, the risk of collisions should be considered a security problem, ergo this should be considered crypto, until proven otherwise.) In this case, using BLAKE2 instead of SHA-1 would get you a higher security level and faster hashing. Or, in tptacek's words: http://sockpuppet.org/blog/2014/02/25/safely-generate-random-numbers/
(tags: random randomness urandom uuids tptacek hackernews prng)
Authenticated app packages on Sandstorm with PGP and Keybase
Nice approach to package authentication UX using Keybase/PGP.
When you go to install a package, Sandstorm verifies that the package is correctly signed by the Ed25519 key. It looks for a PGP signature in the metadata, and verifies that the PGP-signed assertion is for the correct app ID and the email address specified in the metadata. It queries the Keybase API to see what accounts the packager has proven ownership of, and lists them with their links on the app install page.
(tags: authentication auth packages sandstorm keybase pgp gpg security)
-
Floating car data (FCD), also known as floating cellular data, is a method to determine the traffic speed on the road network. It is based on the collection of localization data, speed, direction of travel and time information from mobile phones in vehicles that are being driven. These data are the essential source for traffic information and for most intelligent transportation systems (ITS). This means that every vehicle with an active mobile phone acts as a sensor for the road network. Based on these data, traffic congestion can be identified, travel times can be calculated, and traffic reports can be rapidly generated. In contrast to traffic cameras, number plate recognition systems, and induction loops embedded in the roadway, no additional hardware on the road network is necessary.
(tags: surveillance cars driving mobile-phones phones travel gsm monitoring anpr alpr traffic)
CiteSeerX — The Confounding Effect of Class Size on the Validity of Object-oriented Metrics
A lovely cite from @conor. Turns out the sheer size of an OO class is itself a solid fault-proneness metric
(tags: metrics coding static-analysis error-detection faults via:conor oo)
How a group of neighbors created their own Internet service | Ars Technica
Orcas Island, WA. impressive stuff
(tags: community diy internet wa wireless networking orcas-island)
Report: Everyone Should Get a Security Freeze
“Whether your personal information has been stolen or not, your best protection against someone opening new credit accounts in your name is the security freeze (also known as the credit freeze), not the often-offered, under-achieving credit monitoring. Paid credit monitoring services in particular are not necessary because federal law requires each of the three major credit bureaus to provide a free credit report every year to all customers who request one. You can use those free reports as a form of do-it-yourself credit monitoring.”
(tags: us credit credit-freeze security phishing brian-krebs)
Even the LastPass Will be Stolen, Deal with It
ugh, quite a long list of LastPass security issues
(tags: lastpass hacking security via:securitay exploits passwords)
Signs Point to Unencrypted Communications Between Terror Suspects
News emerging from Paris — as well as evidence from a Belgian ISIS raid in January — suggests that the ISIS terror networks involved were communicating in the clear, and that the data on their smartphones was not encrypted.
(tags: paris terrorism crypto via:schneier isis smartphones)
Global Continuous Delivery with Spinnaker
Netflix' CD platform, post-Atlas. looks interesting
(tags: continuous-delivery aws netflix cd devops ops atlas spinnaker)
-
by reordering items to optimize locality. Via aphyr's dad!
(tags: caches cache-friendly optimization data-locality performance coding algorithms)
Reporting Error Leads To Speculation That Terrorists Used PS4s To Plan Paris Attacks
lol. Nice work, Forbes
(tags: forbes fail ps4 crypto terrorism reporting msm speculation hysteria)
Did you know that Dublin Airport is recording your phone's data? - Newstalk
Ugh. Queue tracking using secret MAC address tracking in Dublin Airport:
"I think the fundamental issue is one of consent. Dublin Airport have been tracking individual MAC addresses since 2012 and there doesn't appear to be anywhere in the airport where they warn passengers that this is this occurring. "If they have to signpost CCTV, then mobile phone tracking should at a very minimum be sign-posted for passengers," he continues.
And how long are MAC addresses retained for, I wonder?(tags: mac-addresses dublin-airport travel privacy surveillance tracking wifi phones cctv consent)
Pinboard on the Next Economy Conference (with tweets)
Maciej Ceglowski went to an O'Reilly SV-boosterish conference and produced these excellent tweets
(tags: twitter conferences oreilly silicon-valley new-economy future lyft uber unions maciej-ceglowski)
Our Generation Ships Will Sink / Boing Boing
Kim Stanley Robinson on the feasibility of interstellar colonization: 'There is no Planet B! Earth is our only possible home!'
(tags: earth future kim-stanley-robinson sf space)
The impact of Docker containers on the performance of genomic pipelines [PeerJ]
In this paper, we have assessed the impact of Docker containers technology on the performance of genomic pipelines, showing that container “virtualization” has a negligible overhead on pipeline performance when it is composed of medium/long running tasks, which is the most common scenario in computational genomic pipelines. Interestingly for these tasks the observed standard deviation is smaller when running with Docker. This suggests that the execution with containers is more “homogeneous,” presumably due to the isolation provided by the container environment. The performance degradation is more significant for pipelines where most of the tasks have a fine or very fine granularity (a few seconds or milliseconds). In this case, the container instantiation time, though small, cannot be ignored and produces a perceptible loss of performance.
(tags: performance docker ops genomics papers)
Three quarters of cars stolen in France 'electronically hacked' - Telegraph
The astonishing figures come two months after computer scientists in the UK warned that thousands of cars – including high-end brands such as Porsches and Maseratis - are at risk of electronic hacking. Their research was suppressed for two years by a court injunction for fear it would help thieves steal vehicles to order. The kit required to carry out such “mouse jacking”, as the French have coined the practice, can be freely purchased on the internet for around £700 and the theft of a range of models can be pulled off “within minutes,” motor experts warn.
(tags: hacking security security-through-obscurity mouse-jacking cars safety theft crime france smart-cars)
-
Awesome new mock DynamoDB implementation:
An implementation of Amazon's DynamoDB, focussed on correctness and performance, and built on LevelDB (well, @rvagg's awesome LevelUP to be precise). This project aims to match the live DynamoDB instances as closely as possible (and is tested against them in various regions), including all limits and error messages. Why not Amazon's DynamoDB Local? Because it's too buggy! And it differs too much from the live instances in a number of key areas.
We use DynamoDBLocal in our tests -- the availability of that tool is one of the key reasons we have adopted Dynamo so heavily, since we can safely test our code properly with it. This looks even better.(tags: dynamodb testing unit-tests integration-testing tests ops dynalite aws leveldb)
Alarm design: From nuclear power to WebOps
Imagine you are an operator in a nuclear power control room. An accident has started to unfold. During the first few minutes, more than 100 alarms go off, and there is no system for suppressing the unimportant signals so that you can concentrate on the significant alarms. Information is not presented clearly; for example, although the pressure and temperature within the reactor coolant system are shown, there is no direct indication that the combination of pressure and temperature mean that the cooling water is turning into steam. There are over 50 alarms lit in the control room, and the computer printer registering alarms is running more than 2 hours behind the events. This was the basic scenario facing the control room operators during the Three Mile Island (TMI) partial nuclear meltdown in 1979. The Report of the President’s Commission stated that, “Overall, little attention had been paid to the interaction between human beings and machines under the rapidly changing and confusing circumstances of an accident” (p. 11). The TMI control room operator on the day, Craig Faust, recalled for the Commission his reaction to the incessant alarms: “I would have liked to have thrown away the alarm panel. It wasn’t giving us any useful information”. It was the first major illustration of the alarm problem, and the accident triggered a flurry of human factors/ergonomics (HF/E) activity.
A familiar topic for this ex-member of the Amazon network monitoring team...(tags: ergonomics human-factors ui ux alarms alerts alerting three-mile-island nuclear-power safety outages ops)
An Analysis of Reshipping Mule Scams
We observed that the vast majority of the re-shipped packages end up in the Moscow, Russia area, and that the goods purchased with stolen credit cards span multiple categories, from expensive electronics such as Apple products, to designer clothes, to DSLR cameras and even weapon accessories. Given the amount of goods shipped by the reshipping mule sites that we analysed, the annual revenue generated from such operations can span between 1.8 and 7.3 million US dollars. The overall losses are much higher though: the online merchant loses an expensive item from its inventory and typically has to refund the owner of the stolen credit card. In addition, the rogue goods typically travel labeled as “second hand goods” and therefore custom taxes are also evaded. Once the items purchased with stolen credit cards reach their destination they will be sold on the black market by cybercriminals. [...] When applying for the job, people are usually required to send the operator copies of their ID cards and passport. After they are hired, mules are promised to be paid at the end of their first month of employment. However, from our data it is clear that mules are usually never paid. After their first month expires, they are never contacted back by the operator, who just moves on and hires new mules. In other words, the mules become victims of this scam themselves, by never seeing a penny. Moreover, because they sent copies of their documents to the criminals, mules can potentially become victims of identity theft.
(tags: crime law cybercrime mules shipping-scams identity-theft russia moscow scams papers)