Realtime water level data across Ireland
Some very nice Dygraph-based time-series graphs in here, along with open CSV data. Good job!
(tags: open-data water-levels time-series data rivers ireland csv)
The Gardai haven't requested info on any Twitter accounts in the past 6 months
This seems to imply they haven't been investigating any allegations of cyber-bullying/harassment from "anonymous" Twitter handles, despite having the legal standing to do so. Enforcement is needed, not new laws
(tags: cyber-bullying twitter social-media enforcement gardai policing harassment online society law government)
QuakeNet IRC Network- Article - PRESS RELEASE: IRC NETWORKS UNDER SYSTEMATIC ATTACK FROM GOVERNMENTS
QuakeNet are not happy about GCHQ's DDoS attacks against them.
Yesterday we learned ... that GCHQ, the British intelligence agency, are performing persistent social and technological attacks against IRC networks. These attacks are performed without informing the networks and are targeted at users associated with politically motivated movements such as "Anonymous". While QuakeNet does not condone or endorse and actively forbids any illegal activity on its servers we encourage discussion on all topics including political and social commentary. It is apparent now that engaging in such topics with an opinion contrary to that of the intelligence agencies is sufficient to make people a target for monitoring, coercion and denial of access to communications platforms. The ... documents depict GCHQ operatives engaging in social engineering of IRC users to entrap themselves by encouraging the target to leak details about their location as well as wholesale attacks on the IRC servers hosting the network. These attacks bring down the IRC network entirely affecting every user on the network as well as the company hosting the server. The collateral damage and numbers of innocent people and companies affected by these forms of attack can be huge and it is highly illegal in many jurisdictions including the UK under the Computer Misuse Act.
-
Good to know; this generic anti-flap damping algorithm has a name.
A proportional-integral-derivative controller (PID controller) is a generic control loop feedback mechanism (controller) widely used in industrial control systems. A PID controller calculates an "error" value as the difference between a measured process variable and a desired setpoint. The controller attempts to minimize the error by adjusting the process control outputs.
(tags: control damping flapping pid-controller industrial error algorithms)
Category: Uncategorized
German IT Industry Looks for Boom from Snowden Revelations - SPIEGEL ONLINE
This is a great idea -- Neelie Kroes suggesting that there be a certification mark for EU companies who have top-of-the-line data protection practices.
(tags: data-protection privacy certification marks eu neelie-kroes)
GCHQ slide claiming that they DDoS'd anonymous' IRC servers
Mikko Hypponen: "This makes British Government the only Western government known to have launched DDoS attacks."
(tags: ddos history security gchq dos anonymous irc hacking)
RTE internal memo to unhappy staff re Pantigate
'I want to reassure you that RTÉ explored every option available to it, including right of reply. Legal advice was sought and all avenues were explored, including an offer to make a donation to a neutral charity.' And they folded. Notable lack of testicular fortitude by our national broadcaster.
(tags: fail rte leaks memos pantigate panti-bliss homophobia libel defamation ireland)
A looming breakthrough in indistinguishability obfuscation
'The team’s obfuscator works by transforming a computer program into what Sahai calls a “multilinear jigsaw puzzle.” Each piece of the program gets obfuscated by mixing in random elements that are carefully chosen so that if you run the garbled program in the intended way, the randomness cancels out and the pieces fit together to compute the correct output. But if you try to do anything else with the program, the randomness makes each individual puzzle piece look meaningless. This obfuscation scheme is unbreakable, the team showed, provided that a certain newfangled problem about lattices is as hard to solve as the team thinks it is. Time will tell if this assumption is warranted, but the scheme has already resisted several attempts to crack it, and Sahai, Barak and Garg, together with Yael Tauman Kalai of Microsoft Research New England and Omer Paneth of Boston University, have proved that the most natural types of attacks on the system are guaranteed to fail. And the hard lattice problem, though new, is closely related to a family of hard problems that have stood up to testing and are used in practical encryption schemes.' (via Tony Finch)
(tags: obfuscation cryptography via:fanf security hard-lattice-problem crypto science)
Little’s Law, Scalability and Fault Tolerance: The OS is your bottleneck. What you can do?
good blog post on Little's Law, plugging quasar, pulsar, and comsat, 3 new open-source libs offering Erlang-like lightweight threads on the JVM
(tags: jvm java quasar pulsar comsat littles-law scalability async erlang)
Target Hackers Broke in Via HVAC Company
Avivah Litan, a fraud analyst with Gartner Inc., said that although the current PCI standard does not require organizations to maintain separate networks for payment and non-payment operations (page 7), it does require merchants to incorporate two-factor authentication for remote network access originating from outside the network by personnel and all third parties.
Target shared the same network for outside contractor access and the critical POS devices. fail. (via Joe Feise)(tags: via:joe-feise hvac contractors fraud malware 2fa security networking payment pci)
Yahoo! moving EMEA operations to Dublin
Like many companies, the structure of Yahoo's business is driven by the needs of the business. There are a number of factors which influence decisions about the locations in which the business operates. To encourage more collaboration and innovation, we’re increasing our headcount in Dublin, thus continuing to bring more Yahoos together in fewer locations. Dublin is already the European home to many of the world’s leading global technology brands and has been a home for Yahoo for over a decade already.
Via Conor O'Neill
-
zero-install, one-click video chat, using WebRTC. nifty
(tags: conference webrtc chat collaboration video google-chrome conferencing)
Opinion: How can we get over ‘Pantigate’?
The fact that RTÉ had agreed to pay damages (€80,000 in total, according to reports yesterday) to the ‘injured parties’, only came to light in an email from the [far-right Catholic lobby group Iona Institute] to its members last Tuesday. Given the ramifications of the decision to make any kind of payment – regardless of the amount – both for the TV licence payer and those who voice contrarian opinions, the lack of coverage in print media as soon as the Iona email came to light marked a low point for print journalism in Ireland. Aside from a lead story on the damages printed in this paper last Wednesday and ongoing debate online, the media has been glacially slow with commentary and even reportage of the affair. The debacle has untold ramifications for public life in this country. That many liberal commentators may now baulk at the opportunity to speak and write openly and honestly about homophobia is the most obvious issue here. Most worrying of all, however, is the question that with a referendum on the introduction of gay marriage on the horizon, how can we expect the national broadcaster to facilitate even-handed debate on the subject when they’ve already found themselves cowed before reaching the first hurdle?
(tags: homophobia politics ireland libel dissent lobbying defamation law gay-marriage iona-institute journalism newspapers)
-
Rest.li is a REST+JSON framework for building robust, scalable service architectures using dynamic discovery and simple asynchronous APIs. Rest.li fills a niche for building RESTful service architectures at scale, offering a developer workflow for defining data and REST APIs that promotes uniform interfaces, consistent data modeling, type-safety, and compatibility checked API evolution.
The new underlying comms layer for Voldemort, it seems.(tags: voldemort d2 rest.li linkedin json rest http api frameworks java)
Hardened SSL Ciphers Using ELB and HAProxy
ELBs support the PROXY protocol
(tags: elb security proxying ssl tls https haproxy perfect-forward-secrecy aws ec2)
-
"A data scientist is a statistician who lives in San Francisco" - slide from Monkigras this year. lols
(tags: data-scientist statistics statistician funny jokes san-francisco tech monkigras)
The Million Dollar Deal - YouTube
My mate Luke's doc on the World Series of Poker -- now online in full. it's great.
A documentary about the World Series Of Poker in Las Vegas. Featuring Andrew Black, Donnacha O'Dea, Mike Magee, "Mad" Martyn Wilson, Mark Napolitano, Amarillo Slim, Scotty Nguyen, Dave "Devilfish" Ulliott & Matt Damon. Narrated by John Hurt. Directed by John Butler, Produced by Luke McManus
(tags: documentaries film poker world-series-of-poker mike-magee andrew-black donnacha-odea matt-damon)
How to invoke section 4 of the Data Protection Acts in Ireland
One wierd trick to get your personal data (in any format) from any random organisation, for only EUR6.35 and up to 40 days wait! Good to know.
Hospitals and doctors’ offices in Ireland will give a person their medical records if they ask for them. Mostly. Eventually. When they get to it. And, sometimes, if you pay them over €100 (for a large file). But, like so much else in the legal world, there is a set of magic words you can incant to place a 40 day deadline on the delivery of your papers and limit the cost to €6.35 -- you invoke the Data Protection Acts data access request procedure.
(tags: data-protection privacy data-retention dpa-section-4 data ireland medical law dpa)
Save 10% on rymdkapsel on Steam
rymdkapsel is a game where you take command of a space station and its minions. You will have to plan your expansion and manage your resources to explore the galaxy.
recommended by JK.(tags: steam games recommended space gaming)
Yammer Engineering - Resiliency at Yammer
Not content with adding Hystrix (circuit breakers, threadpooling, request time limiting, metrics, etc.) to their entire SOA stack, they've made it incredibly configurable by hooking in a web-based configuration UI, allowing dynamic on-the-fly reconfiguration by their ops guys of the circuit breakers and threadpools in production. Mad stuff
(tags: hystrix circuit-breakers resiliency yammer ops threadpools soa dynamic-configuration archaius netflix)
A network of ‘homes’, where children’s happiness was relentlessly destroyed
Stories of this sort will tumble out to the inquiry over the next 18 months, making it plain that the network of “homes” where children’s happiness had relentlessly, deliberately, systematically been destroyed, this archipelago of Catholic evil, had covered the entire island. These things should be kept in mind when next we hear it said that the social ills of today can be explained by reference to loss of faith in the traditional institutions of moral authority. This is the reverse of the truth and an insult to the victims of an unforgiveable sin.
(tags: horror care-homes politics catholicism religion ireland derry church abuse children)
Ukrainian police use cellphones to track protestors, court order shows
Protesters for weeks had suspected that the government was using location data from cellphones near the demonstration to pinpoint people for political profiling, and they received alarming confirmation when a court formally ordered a telephone company to hand over such data. [...] Three cellphone companies — Kyivstar, MTS and Life — denied that they had provided the location data to the government or had sent the text messages. Kyivstar suggested that it was instead the work of a “pirate” cellphone tower set up in the area. In a ruling made public on Wednesday, a city court ordered Kyivstar to disclose to the police which cellphones were turned on during an antigovernment protest outside the courthouse on Jan. 10.
(tags: tech location-tracking tracking privacy ukraine cellphones mobile-phones civil-liberties)
-
Netflix open-source library to make using ZooKeeper from Java less of a PITA. I really wish I'd used this now, having reimplemented some key parts of it after failures in prod ;)
(tags: zookeeper netflix apache curator java libraries open-source)
10 Things We Forgot to Monitor
a list of not-so-common outage causes which are easy to overlook; swap rate, NTP drift, SSL expiration, fork rate, etc.
Irish Company Locates Office in Ireland
Hot on the heels of Dropbox, AirBnB, Twitter, Facebook and many others, Irish online ticket sales company Tito are amongst the latest in a long series of companies choosing to locate their offices in Ireland. “It just seemed to make sense,” said founder Paul Campbell, talking about the decision making process that led him to set up shop in the capital, Dublin. “Dublin is great. There’s something really familiar about it that I can’t quite put my finger on.”
Har har!(tags: ireland jokes funny tito hq tech-companies dublin via:oisin)
-
Sugru + neodymium magnets = WANT
(tags: sugru diy tools magnets want toget bike hacks fixing)
Capabilities of Movements and Affordances of Digital Media: Paradoxes of Empowerment | DMLcentral
Paradoxically, it’s possible that the widespread use of digital tools facilitates capabilities in some domains, such as organization, logistics, and publicity, while simultaneously engendering hindrances to [political] movement impacts on other domains, including those related to policy and electoral spheres.
(tags: society politics activism tech internet gezi-park tahrir-square euromaidan occupy)
-
Good description of the "hero coder" organisational antipattern.
Now imagine that most of the team is involved in fire-fighting. New recruits see the older recruits getting praised for their brave work in the line-of-fire and they want that kind of praise and reward too. Before long everyone is focused on putting out fires and it is no ones interest to step back and take on the risks that long-term DevOps-focused goals entail.
(tags: coding ops admin hero-coder hero-culture firefighting organisations teams culture)
Open-Sourcing Ssync: An Out-of-the-Box Distributed Rsync
a script to perform divide-and-conquer recursive rsync over SSH
(tags: recursion scripts rsync ssync ssh divide-and-conquer)
Improving compaction in Cassandra with cardinality estimation
nice use of HyperLogLog
(tags: hyperloglog hll algorithms cassandra bloom-filters sstables cardinality)
-
Ad company InMobi are using graphite heavily (albeit not as heavily as $work are), ran into the usual scaling issues, and chose to fix it in code by switching from a filesystem full of whisper files to a LevelDB per carbon-cache:
The carbon server is now able to run without breaking a sweat even when 500K metrics per minute is being pumped into it. This has been in production since late August 2013 in every datacenter that we operate from.
Very nice. I hope this gets merged/supported.(tags: graphite scalability metrics leveldb storage inmobi whisper carbon open-source)
BBC News - Pair jailed over abusive tweets to feminist campaigner
When a producer from BBC Two's Newsnight programme tracked Nimmo down after he had sent the abuse, the former call centre worker told him: "The police will do nothing, it's only Twitter."
(tags: bbc bullying social-media twitter society uk trolls trolling abuse feminism cyberbullying)
If You Used This Secure Webmail Site, the FBI Has Your Inbox
TorMail was a Tor-based webmail system, and apparently its drives have been imaged and seized by the FBI. More info on the Freedom Hosting seizure:
The connection, if any, between the FBI obtaining Freedom Hosting’s data and apparently launching the malware campaign through TorMail and the other sites isn’t spelled out in the new document. The bureau could have had the cooperation of the French hosting company that Marques leased his servers from. Or it might have set up its own Tor hidden services using the private keys obtained from the seizure, which would allow it to adopt the same .onion addresses used by the original sites. The French company also hasn’t been identified. But France’s largest hosting company, OVH, announced on July 29, in the middle of the FBI’s then-secret Freedom Hosting seizure, that it would no longer allow Tor software on its servers. A spokesman for the company says he can’t comment on specific cases, and declined to say whether Freedom Hosting was a customer. “Wherever the data center is located, we conduct our activities in conformity with applicable laws, and as a hosting company, we obey search warrants or disclosure orders,” OVH spokesman Benjamin Bongoat told WIRED. “This is all we can say as we usually don’t make any comments on hot topics.”
(tags: fbi freedom-hosting hosting tor tormail seizures ovh colo servers)
Sky parental controls break many JQuery-using websites
An 11 hour outage caused by a false positive in Sky's anti-phishing filter; all sites using the code.jquery.com CDN for JQuery would have seen errors.
Sky still appears to be blocking code.jquery.com and all files served via the site, and more worryingly is that if you try to report the incorrect category, once signing in on the Sky website you an error page. We suspect the site was blocked due to being linked to by a properly malicious website, i.e. code.jquery.com and some javascript files were being used on a dodgy website and every domain mentioned was subsequently added to a block list.
(via Tony Finch)(tags: via:fanf sky filtering internet uk anti-phishing phish jquery javascript http web fps false-positives)
Coders performing code reviews of scientific projects: pilot study
'PLOS and Mozilla conducted a month-long pilot study in which professional developers performed code reviews on software associated with papers published in PLOS Computational Biology. While the developers felt the reviews were limited by (a) lack of familiarity with the domain and (b) lack of two-way contact with authors, the scientists appreciated the reviews, and both sides were enthusiastic about repeating the experiment. ' Actually sounds like it was more successful than this summary implies.
(tags: plos mozilla code-reviews coding science computational-biology biology studies)
-
The views expressed by [the Iona Institute] – especially in relation to gay people – are very much at odds with the liberal secular society that Ireland has become. Indeed, Rory O’Neill suggested that the only time he experiences homophobia is online or at the hands of Iona and Waters. When they’re done with that, they can ask why Iona is given so much room in the media. In any other country in the world, an organisation as litigious as Iona would never be asked to participate in anything.
(tags: homophobia ireland john-waters iona-institute politics catholicism religion libel defamation rte the-irish-times)
-
mine's a Smoky/Spicy/Medicinal, thanks
Cassandra: tuning the JVM for read heavy workloads
The cluster we tuned is hosted on AWS and is comprised of 6 hi1.4xlarge EC2 instances, with 2 1TB SSDs raided together in a raid 0 configuration. The cluster’s dataset is growing steadily. At the time of this writing, our dataset is 341GB, up from less than 200GB a few months ago, and is growing by 2-3GB per day. The workload on this cluster is very read heavy, with quorum reads making up 99% of all operations.
Some careful GC tuning here. Probably not applicable to anyone else, but good approach in general.(tags: java performance jvm scaling gc tuning cassandra ops)
Terms of Reference for the DCENR Internet Content Advisory Group
this is definitely one to send a consultation document response to
(tags: internet policing cyberbullying bullying antisocial free-speech governance children blocking filtering consultations dcenr)
Stupid Simple Things SF Techies Could Do To Stop Being Hated - Anil Dash
I've seen a lot of hand-wringing from techies in San Francisco and Silicon Valley saying "Why are we so hated?" now that there's been a more vocal contingent of people being critical of their lack of civic responsibility. Is it true that corruption and NIMBYism have kept affordable housing from being built? Sure. Is it true that members of the tech industry do contribute tax dollars to the city? Absolutely. But does that mean techies have done enough? Nope.
(tags: anil-dash politics society san-francisco gentrification helping tech community housing)
-
Some basic succinct data structures. [...] The main highlights are: a novel, broadword-based implementation of rank/select queries for up to 264 bits that is highly competitive with known 32-bit implementations on 64-bit architectures (additional space required is 25% for ranking and 12.5%-37.5% for selection); several Java structures using the Elias–Fano representation of monotone sequences for storing pointers, variable-length bit arrays, etc. Java code implementing minimal perfect hashing using around 2.68 bits per element (also using some broadword ideas); a few Java implementations of monotone minimal perfect hashing. Sux is free software distributed under the GNU Lesser General Public License.
(tags: sux succinct data-structures bits compression space coding)
Why sugar helped remove Victoria Line concrete flood
Sugar blocks concrete from setting. This I did not know
(tags: concrete london tube flooding sugar chemistry factoids)
Ukrainian government targeting protesters using threatening SMS messages
The government’s opponents said three recent actions had been intended to incite the more radical protesters and sow doubt in the minds of moderates: the passing of laws last week circumscribing the right of public assembly, the blocking of a protest march past the Parliament building on Sunday, and the sending of cellphone messages on Tuesday to people standing in the vicinity of the fighting that said, “Dear subscriber, you are registered as a participant in a mass disturbance.” [....] The phrasing of the message, about participating in a “mass disturbance,” echoed language in a new law making it a crime to participate in a protest deemed violent. The law took effect on Tuesday. And protesters were concerned that the government seemed to be using cutting-edge technology from the advertising industry to pinpoint people for political profiling. Three cellphone companies in Ukraine — Kyivstar, MTS and Life — denied that they had provided the location data to the government or had sent the text messages, the newspaper Ukrainskaya Pravda reported. Kyivstar suggested that it was instead the work of a “pirate” cellphone tower set up in the area.
(tags: targeting mobile-phones sms text-messaging via:tjmcintyre geotargeting protest ukraine privacy surveillance tech 1984)
UK porn filter blocks game update that contained 'sex' in URL
Staggeringly inept. The UK national porn filter blocks based on a regexp match of the URL against /.*sex.*/i -- the good old "Scunthorpe problem". Better, it returns a 404 response. This is also a good demonstration of how web filtering has unintended side effects, breaking third-party software updates with its false positives.
The update to online strategy game League of Legends was disrupted by the internet filter because the software attempted to access files that accidentally include the word “sex” in the middle of their file names. The block resulted in the update failing with “file not found” errors, which are usually created by missing files or broken updates on the part of the developers.
(tags: uk porn filtering guardian regular-expressions false-positives scunthorpe http web league-of-legends sex)
Register article on Amazon's attitude to open source
This article is frequently on target; this secrecy (both around open source and publishing papers) was one of the reasons I left Amazon.
Of the sources with whom we spoke, many indicated that Amazon's lack of participation was a key reason for why people left the company – or never joined at all. This is why Amazon's strategy of maintaining secrecy may derail the e-retailer's future if it struggles to hire the best talent. [...] "In many cases in the big companies and all the small startups, your Github profile is your resume," explained another former Amazonian. "When I look at developers that's what I'm looking for, [but] they go to Amazon and that resume stops ... It absolutely affects the quality of their hires." "You had no portfolio you could share with the world," said another insider on life after working at Amazon. "The argument this was necessary to attract talent and to retain talent completely fell on deaf ears."
(tags: amazon recruitment secrecy open-source hiring work research conferences)
Chinese Internet Traffic Redirected to Small Wyoming House
'That address — which is home to some 2,000 companies on paper — was the subject of a lengthy 2011 Reuters investigation that found that among the entities registered to the address were a shell company controlled by a jailed former Ukraine prime minister; the owner of a company charged with helping online poker operators evade an Internet gambling ban; and one entity that was banned from government contracts after selling counterfeit truck parts to the Pentagon.'
(tags: china internet great-firewall dns wyoming attacks security not-the-onion)
James Friend | PCE.js - Classic Mac OS in the Browser
This is a demo of PCE's classic Macintosh emulation, running System 7.0.1 with MacPaint, MacDraw, and Kid Pix. If you want to try out more apps and games see this demo.
Incredible. I remember using this version of MacPaint!(tags: javascript browser emulation mac macos macpaint macdraw claris kid-pix history desktop pce)
-
'Lightweight performance tools'.
Likwid stands for 'Like I knew what I am doing'. This project contributes easy to use command line tools for Linux to support programmers in developing high performance multi-threaded programs. It contains the following tools: likwid-topology: Show the thread and cache topology likwid-perfctr: Measure hardware performance counters on Intel and AMD processors likwid-features: Show and Toggle hardware prefetch control bits on Intel Core 2 processors likwid-pin: Pin your threaded application without touching your code (supports pthreads, Intel OpenMP and gcc OpenMP) likwid-bench: Benchmarking framework allowing rapid prototyping of threaded assembly kernels likwid-mpirun: Script enabling simple and flexible pinning of MPI and MPI/threaded hybrid applications likwid-perfscope: Frontend for likwid-perfctr timeline mode. Allows live plotting of performance metrics. likwid-powermeter: Tool for accessing RAPL counters and query Turbo mode steps on Intel processor. likwid-memsweeper: Tool to cleanup ccNUMA memory domains.
No kernel patching required. (via kellabyte)(tags: via:kellabyte linux performance testing perf likwid threading multithreading multicore mpi numa)
Backblaze Blog » What Hard Drive Should I Buy?
Because Backblaze has a history of openness, many readers expected more details in my previous posts. They asked what drive models work best and which last the longest. Given our experience with over 25,000 drives, they asked which ones are good enough that we would buy them again. In this post, I’ll answer those questions.
(tags: backblaze backup hardware hdds storage disks ops via:fanf)
Safe cross-thread publication of a non-final variable in the JVM
Scary, but potentially useful in future, so worth bookmarking. By carefully orchestrating memory accesses using volatile and non-volatile fields, one can ensure that a non-volatile, non-synchronized field's value is safely visible to all threads after that point due to JMM barrier semantics.
What you are looking to do is enforce a barrier between your initializing stores and your publishing store, without that publishing store being made to a volatile field. This can be done by using volatile access to other fields in the publication path, without using those variables in the later access paths to the published object.
(tags: volatile atomic java jvm gil-tene synchronization performance threading jmm memory-barriers)
Irish quango allegedly buys fake twitter followers
The Consumers Association of Ireland had a sudden jump from 300 to 3000 Twitter followers, mostly from Latin and South America -- with more followers in Brazil than Ireland. They are now blaming "hacking": http://www.independent.ie/irish-news/consumers-body-denies-buying-3000-twitter-fans-29931196.html
(tags: consumers quangos ireland politics twitter funny fake-followers latin-america south-america brazil social-media tech)
Big Red Kitchen on buying Irish honey
1. There is NO SUCH THING as "Organic Irish Honey" (due to EU directives making it impossible to certify); 2. In the absence of Organic the best thing you can look for is "Raw Irish honey" (which is of Irish origin, and not heated to very high temperatures, so it retains its antibacterial properties); 3. Blended honeys, or honeys which say EEC/Non EEC are NOT Irish, however they may be packed in Ireland; 4. Look for the NIHBS "Produced by Native Irish Honey Bees" or similar, for confirmation that the honey you are buying is indeed of Irish origin.
(tags: irish ireland honey buy-irish big-red-kitchen food organic-food)
More than 50% of Irish companies have "suffered a data breach" in 2013
The research, conducted among hundreds of Irish companies' IT managers by the Irish Computer Society, reveals that 51 per cent of Irish firms have suffered a data breach over the last year, a jump on 43 per cent recorded in 2012.
Wow, that's high.(tags: hacking security ireland ics data-breaches)
Irish Internet Providers Roll Out KickassTorrents Blockade
The lucrative whack-a-mole business continues -- mostly in response to High Court actions, although Eircom are just helping out. I bet a google for "kickass proxy" doesn't return anything useful at all, of course....
(tags: kat kickasstorrents bittorrent piracy copyright high-court ireland eircom filtering blocking)
Internet Censors Came For TorrentFreak & Now I’m Really Mad
TF are not happy about Sky blocking their blog.
There can be little doubt that little by little, piece by piece, big corporations and governments are taking chunks out of the free Internet. Today they pretend that the control is in the hands of the people, but along the way they are prepared to mislead and misdirect, even when their errors are pointed out to them. I’m calling on Sky, Symantec, McAfee and other ISPs about to employ filtering to categorize this site correctly as a news site or blog and to please start listening to people’s legitimate complaints about other innocent sites. It serves nobody’s interests to wrongfully block legitimate information.
(tags: censorship isps uk sky torrentfreak piracy copyright filtering blocking symantec filesharing)
Harry - A Tool for Measuring String Similarity
a small tool for comparing strings and measuring their similarity. The tool supports several common distance and kernel functions for strings as well as some exotic similarity measures. The focus of Harry lies on implicit similarity measures, that is, comparison functions that do not give rise to an explicit vector space. Examples of such similarity measures are the Levenshtein distance and the Jaro-Winkler distance. For comparison Harry loads a set of strings from input, computes the specified similarity measure and writes a matrix of similarity values to output. The similarity measure can be computed based on the granularity of characters as well as words contained in the strings. The configuration of this process, such as the input format, the similarity measure and the output format, are specified in a configuration file and can be additionally refined using command-line options. Harry is implemented using OpenMP, such that the computation time for a set of strings scales linear with the number of available CPU cores. Moreover, efficient implementations of several similarity measures, effective caching of similarity values and low-overhead locking further speedup the computation.
via kragen.(tags: via:kragen strings similarity levenshtein-distance algorithms openmp jaro-winkler edit-distance cli commandline hamming-distance compression)
-
A nice node.js app to perform continuous deployment from a GitHub repo via its webhook support, from Matt Sergeant
(tags: github node.js runit deployment git continuous-deployment devops ops)
-
yummy-looking recipe from Lily at amexicancook.ie
(tags: tacos mexican-food food recipes meat tacos-al-pastor)
Succinct Data Structures: Cramming 80,000 words into a Javascript file
a succinctly-encoded trie -- slow to encode, super-compact, but fast to look up
(tags: succinct-encoding tries coding performance compression data-structures algorithms)
Transport Minister planning to make hi-vis jackets mandatory for cyclists
The minister also spoke of a number of new transport initiatives, such as mandatory use of high visibility jackets by cyclists.
(tags: cycling safety law ireland leo-varadkar)
The Malware That Duped Target Has Been Found
a Windows 'RAM scraper' trojan known as Trojan.POSRAM, which was used to attack the Windows-based point-of-sales systems which the POS terminals are connected to. part of an operation called Kaptoxa. 'The code is based on a previous malicious tool known as BlackPOS that is believed to have been developed in 2013 in Russia, though the new variant was highly customized to prevent antivirus programs from detecting it' ... 'The tool monitors memory address spaces used by specific programs, such as payment application programs like pos.exe and PosW32.exe that process the data embossed in the magnetic strip of credit and debit cards data. The tool grabs the data from memory.' ... 'The siphoned data is stored on the system, and then every seven hours the malware checks the local time on the compromised system to see if it’s between the hours of 10 a.m. and 5 p.m. If so, it attempts to send the data over a temporary NetBIOS share to an internal host inside the compromised network so the attackers can then extract the data over an FTP ... connection.' http://www.pcworld.com/article/2088920/target-credit-card-data-was-sent-to-server-in-russia.html says the data was then transmitted to another US-based server, and from there relayed to Russia, and notes: 'At the time of its discovery, Trojan.POSRAM “had a zero percent antivirus detection rate, which means that fully updated antivirus engines on fully patched computers could not identify the software as malicious,” iSight said.' Massive AV fail.
(tags: kaptoxa trojans ram-scrapers trojan.posram posram point-of-sale security hacks target credit-cards pin ftp netbios smb)
Full iSight report on the Kaptoxa attack on Target
'POS malware is becoming increasingly available to cyber criminals' ... 'there is growing demand for [this kind of malware]'. Watch your credit cards...
(tags: debit-cards credit-cards security card-present attacks kaptoxa ram-scrapers trojans point-of-sale pos malware target)
-
Both Heartland Payment Systems and Hannaford Bros. were in fact certified PCI-compliant while the hackers were in their system. In August 2006, Wal-Mart was also certified PCI-compliant while unknown attackers were lurking on its network. [...] “This PCI standard just ain’t working,” says Litan, the Gartner analyst. “I wouldn’t say it’s completely pointless. Because you can’t say security is a bad thing. But they’re trying to patch a really weak [and] insecure payment system [with it].”
Basically, RAM scrapers have been in use in live attacks, sniffing credentials in the clear, since 2007. Ouch.(tags: ram-scrapers trojans pins pci-dss compliance security gartner walmart target)
ISPAI responds to TD Patrick O'Donovan's bizarre comments regarding "open source browsers"
ISPAI is rather dismayed and somewhat confused by the recent press release issued by Deputy Patrick O’Donovan (FG). He appears to be asking the Oireachtas Communications Committee (of which he is a member) to investigate: “the matter of tougher controls on the use of open source internet browsers and payment systems” which he claims “allow users to remain anonymous for illegal trade of drugs weapons and pornography.” Deputy O’Donovan would do well to ask the advice of industry experts on these matters given that legislating to curtail the use of such legitimate software or services, which may be misused by some, is neither practical nor logical. Whether or not a browser is open source bears no relevance to its ability to be the subject of anonymous use. Indeed, Deputy O’Donovan must surely be confusing and conflating different technical concepts? In tracing illegal activities, Law Enforcement Agencies and co-operating parties will use IP addresses – users’ choice of browser has little relevance to an investigation of criminal activity. Equally, it may be that the Deputy is uncomfortable with the concept of electronic payment systems but these underpin the digital economy which is bringing enormous benefit to Ireland. Yes, these may be misused by criminals but so are cash and traditional banking services. Restricting the growth of innovative financial services is not the solution to tackling cyber criminals who might be operating what he describes as “online supermarkets for illegal goods.” Tackling international cybercrime requires more specialist Law Enforcement resources at national level and improved international police cooperation supported by revision of EU legislation relating to obtaining server log evidence existing in other jurisdictions.
(tags: ispai open-source patrick-o-donovan fine-gael press-releases tor darknet crime)
-
I use it to modify Time Machine’s backup behavior using weighted reservoir sampling. I built Time Warp to preserve important backup snapshots and prevent Time Machine from deleting them.
via Aman. Nifty!(tags: backup python time-machine decay exponential-decay weighting algorithms snapshots ops)
Nominet now filtering .uk domain registrations for 'sex-crime content'
Amazing. Massive nanny-stateism of the 'something must be done' variety, with a 100% false-alarm hit rate, and it's now policy.
'Nominet have made a decision, based on a report by Lord Macdonald QC, that recommends that they check any domain registration that signals sex crime content or is in itself a sex crime. This is screening of domains within 48 hours of registration, and de-registration. The report says that such domains should be reported to the police.' [....] 'The report itself states [...] that in 2013 Nominet checked domains for key words used by the IWF, and as a result reported tens of thousands of domains to IWF for checking, all of which were false positives. Not one was, in fact, related to child sex abuse.'
(tags: filtering nominet false-positives nanny-state uk sex-crimes false-alarms domains iwf)
Tuning advice for HTTPS for nginx and HAProxy
from Ilya Grigorik. nginx version here: http://www.igvita.com/2013/12/16/optimizing-nginx-tls-time-to-first-byte/
A common error when using the Metrics library is to record Timer metrics on things like API calls, using the default settings, then to publish those to a time-series store like Graphite. Here's why this is a problem.
By default, a Timer uses an Exponentially Decaying Reservoir. The docs say:
'A histogram with an exponentially decaying reservoir produces quantiles which are representative of (roughly) the last five minutes of data. It does so by using a forward-decaying priority reservoir with an exponential weighting towards newer data. Unlike the uniform reservoir, an exponentially decaying reservoir represents recent data, allowing you to know very quickly if the distribution of the data has changed.'
This is more-or-less correct -- but the key phrase is 'roughly'. In reality, if the frequency of updates to such a timer drops off, it could take a lot longer, and if you stop updating a timer which uses this reservoir type, it'll never decay at all. The GraphiteReporter will dutifully capture the percentiles, min, max, etc. from that timer's reservoir every minute thereafter, and record those to Graphite using the current timestamp -- even though the data it was derived from is becoming more and more ancient.
Here's a demo. Note the long stretch of 800ms 99th-percentile latencies on the green line in the middle of this chart:

However, the blue line displays the number of events. As you can see, there were no calls to this API for that 8-hour period -- this one was a test system, and the user population was safely at home, in bed. So while Graphite is claiming that there's an 800ms latency at 7am, in reality the 800ms-latency event occurred 8 hours previously.
I observed the same thing in our production systems for various APIs which suffered variable invocation rates; if rates dropped off during normal operation, the high-percentile latencies hung around for far longer than they should have. This is quite misleading when you're looking at a graph for 10pm and seeing a high 99th-percentile latency, when the actual high-latency event occurred hours earlier. On several occasions, this caused lots of user confusion and FUD with our production monitoring, so we needed to fix it.
Here are some potential fixes.
Modify ExponentiallyDecayingReservoir to also call rescaleIfNeeded() inside getSnapshot() -- but based on this discussion, it appears the current behaviour is intended (at least for the mean measurement), so that may not be acceptable. Another risk of this is that it leaves us in a position where the percentiles displayed for time T may actually have occurred several minutes prior to that, which is still misleading (albeit less so).
Switch to sliding time window reservoirs, but those are unbounded in size -- so a timer on an unexpectedly-popular API could create GC pressure and out-of-memory scenarios. It's also the slowest reservoir type, according to the docs. That made it too risky for us to adopt in our production code as a general-purpose Timer implementation.
Update, Dec 2017: as of version 3.2.3 of Dropwizard Metrics, there is a new SlidingTimeWindowArrayReservoir reservoir implementation, which is a drop-in replacement for SlidingTimeWindowReservoir, with much more acceptable memory footprint and GC impact. It costs roughly 128 bits per stored measurement, and is therefore judged to be 'comparable with ExponentiallyDecayingReservoir in terms of GC overhead and performance'. (thanks to Bogdan Storozhuk for the tip)
What we eventually did in our code was to use this Reporter class instead of GraphiteReporter; it clears all Timer metrics' reservoirs after each write to Graphite. This is dumb and dirty, reaching across logical class boundaries, but at the same time it's simple and comprehensible behaviour: with this, we can guarantee that the percentile/min/max data recorded at timestamp T is measuring events in that timestamp's 1-minute window -- not any time before that. This is exactly what you want to see in a time-series graph like those in Graphite, so is a very valuable feature for our metrics, and one that others have noted to be important in comparable scenarios elsewhere.
Here's an example of what a graph like the above should look like (captured from our current staging stack):

Note that when there are no invocations, the reported 99th-percentile latency is 0, and each measurement doesn't stick around after its 1-minute slot.
Another potential bug fix for a related issue, would be to add support to Metrics so that it can use Gil Tene's LatencyUtils package, and its HdrHistogram class, as a reservoir. (Update: however, I don't think this would address the "old data leaking into newer datapoints" problem as fully.) This would address some other bugs in the Exponentially Decaying Reservoir, as Gil describes:
'In your example of a system logging 10K operations/sec with the histogram being sampled every second, you'll be missing 9 out of each 10 actual outliers. You can have an outlier every second and think you have one roughly every 10. You can have a huge business affecting outlier happening every hour, and think that they are only occurring once a day.'
Eek.
Branchless hex-to-decimal conversion hack
via @simonebordet, on the mechanical-sympathy list: ((c & 0x1F) + ((c >> 6) * 0x19) – 0x10)
(tags: hacks one-liners coding performance optimization hex conversion numbers ascii)
A sampling profiler for your daily browsing - Google Groups
via Ilya Grigorik: Chrome Canary now has a built-in, always-on, zero-overhead code profiler. I want this in my server-side JVMs!
(tags: chrome tracing debugging performance profiling google sampling-profiler javascript blink v8)
-
from tonx. Good advice
-
'The web's only open collection of legal contracts and the best way to negotiate and sign documents online'. (via Kowalshki)
(tags: via:kowalshki business documents legal law contracts)
How an emulator-fueled robot reprogrammed Super Mario World on the fly
Suffice it to say that the first minute-and-a-half or so of this [speedrun] is merely an effort to spawn a specific set of sprites into the game's Object Attribute Memory (OAM) buffer in a specific order. The TAS runner then uses a stun glitch to spawn an unused sprite into the game, which in turn causes the system to treat the sprites in that OAM buffer as raw executable code. In this case, that code has been arranged to jump to the memory location for controller data, in essence letting the user insert whatever executable program he or she wants into memory by converting the binary data for precisely ordered button presses into assembly code (interestingly, this data is entered more quickly by simulating the inputs of eight controllers plugged in through simulated multitaps on each controller port).
oh. my. god. This is utterly bananas.(tags: games hacking omgwtfbbq hacks buffer-overrun super-mario snes security)
Nassim Taleb: retire Standard Deviation
Use the mean absolute deviation [...] it corresponds to "real life" much better than the first—and to reality. In fact, whenever people make decisions after being supplied with the standard deviation number, they act as if it were the expected mean deviation.' Graydon Hoare in turn recommends the median absolute deviation. I prefer percentiles, anyway ;)
(tags: statistics standard-deviation stddev maths nassim-taleb deviation volatility rmse distributions)
Mathematical Purity in Distributed Systems: CRDTs Without Fear
Via Tony Finch. Funnily enough, the example describes Swrve: mobile game analytics, backed by a CRDT-based eventually consistent data store ;)
(tags: storage crdts semilattice idempotency commutativity data-structures distcomp eventual-consistency)
-
some good data (and graphs) on baby names (via Ruth)
(tags: via:ruth babies naming graphs dataviz data usa names)
-
Crowdsourcing transcription of some WWI artifacts: 'The story of the British Army on the Western Front during the First World War is waiting to be discovered in 1.5 million pages of unit war diaries. We need your help to reveal the stories of those who fought in the global conflict that shaped the world we live in today.' (via Luke)
Map of Steamship Routes of the World, 1914
massive image. very cool (via burritojustice)
(tags: maps desktop images steamships shipping history 1914 travel world)
Google Fonts recently switched to using Zopfli
Google Fonts recently switched to using new Zopfli compression algorithm: the fonts are ~6% smaller on average, and in some cases up to 15% smaller! [...] What's Zopfli? It's an algorithm that was developed by the compression team at Google that delivers ~3~8% bytesize improvement when compared to gzip with maximum compression. This byte savings comes at a cost of much higher encoding cost, but the good news is, fonts are static files and decompression speed is exactly the same. Google Fonts pays the compression cost once and every clients gets the benefit of smaller download. If you’re curious to learn more about Zopfli: http://bit.ly/Y8DEL4
(tags: zopfli compression gzip fonts google speed optimization)
"Understanding the Robustness of SSDs under Power Fault", FAST '13 [paper]
Horrific. SSDs (including "enterprise-class storage") storing sync'd writes in volatile RAM while claiming they were synced; one device losing 72.6GB, 30% of its data, after 8 injected power faults; and all SSDs tested displayed serious errors including random bit errors, metadata corruption, serialization errors and shorn writes. Don't trust lone unreplicated, unbacked-up SSDs!
(tags: pdf papers ssd storage reliability safety hardware ops usenix serialization shorn-writes bit-errors corruption fsync)
Irish politician calls for ban on "open source browsers"
'Fine Gael TD for Limerick, Patrick O'Donovan has called for tougher controls on the use of open source internet browsers and payment systems which allow users to remain anonymous in the illegal trade of drugs, weapons and pornography.' Amazing. Yes, this is real.
(tags: open-source clueless omgwtfbbq fine-gael ireland fail funny tor inept)
Little-known Apollo 10 incident
'Apollo 10 had a little known incident in flight as evidenced by this transcript.' http://pic.twitter.com/NCZy7OdxDU
(tags: poo turds space spaceflight funny history apollo-10 apollo accidents)
-
As can be guessed, the higher the compression ratio, the more efficient FSE becomes compared to Huffman, since Huffman can't break the "1 bit per symbol" limit. FSE speed is also very stable, under all probabilities. I'm quite please with the result, especially considering that, since the invention of arithmetic coding in the 70's, nothing really new has been brought to this field. This is still beta stuff, so please consider this first release for testing purposes mostly.
Looking forward to this making it into a production release of some form.(tags: compression algorithms via:kragen fse finite-state-entropy-coding huffman arithmetic-coding)
-
A bug in a scheduled OS upgrade script caused live production DB servers to be upgraded while live. Fixes include fixing that script by verifying non-liveness on the host itself, and a faster parallel MySQL binary-log recovery command.
(tags: dropbox outage postmortems upgrades mysql)
Creative Commons event in Dublin this Friday
'Maximising Digital Creativity, Sharing and Innovation', Event organised by Creative Commons Ireland and Faculty of Law, University College Cork, Lecture Theatre, National Gallery of Ireland, Clare Street entrance, Dublin 2, Friday 17 January 2014, 9.45 a.m. to 1 p.m. (via Darius Whelan)
(tags: creative-commons ireland dublin events talks law copyright)
Growing up unvaccinated: A healthy lifestyle couldn’t prevent many childhood illnesses.
I understand, to a point, where the anti-vaccine parents are coming from. Back in the ’90s, when I was a concerned, 19-year-old mother, frightened by the world I was bringing my child into, I was studying homeopathy, herbalism, and aromatherapy; I believed in angels, witchcraft, clairvoyants, crop circles, aliens at Nazca, giant ginger mariners spreading their knowledge to the Aztecs, the Incas, and the Egyptians, and that I was somehow personally blessed by the Holy Spirit with healing abilities. I was having my aura read at a hefty price and filtering the fluoride out of my water. I was choosing to have past life regressions instead of taking antidepressants. I was taking my daily advice from tarot cards. I grew all my own veg and made my own herbal remedies. I was so freaking crunchy that I literally crumbled. It was only when I took control of those paranoid thoughts and fears about the world around me and became an objective critical thinker that I got well. It was when I stopped taking sugar pills for everything and started seeing medical professionals that I began to thrive physically and mentally.
Life on Mars: Irish man signs up for colony mission
Last week, a private space exploration company called Mars One announced that it has shortlisted 1,058 people from 200,000 applicants who wanted to travel to Mars. Roche is the only Irishman on the list. The catch? If he goes, he can never come back.
Mad stuff. Works at the Science Gallery, so a co-worker of a friend, to boot(tags: science-gallery dublin ireland mars-one mars one-way-trips exploration future space science joseph-roche)
UK NHS will soon require GPs pass confidential medical data to third parties
Specifically, unanonymised, confidential, patient-identifying data, for purposes of "admin, healthcare planning, and research", to be held indefinitely, via the HSCIC. Opt-outs may be requested, however
(tags: opt-out privacy medical data healthcare nhs uk data-privacy data-protection)
-
'why the fuck does my fridge need Twitter?'
(tags: twitter funny tech home fridges internet web appliances consume)
Visualisation of the Raft distributed consensus protocol
Very pretty
(tags: consensus raft visualization distributed distcomp algorithms)
Directv DCA2SR0 01 Deca II Connected Home Adapter
a John-Looney-recommended MoCA adapter, allowing legacy coax home wiring to be used to transmit ethernet
(tags: ethernet coax legacy wiring home-networking moca directv)
Bruce Schneier and Matt Blaze on TAO's Methods
An important point:
As scarily impressive as [NSA's TAO] implant catalog is, it's targeted. We can argue about how it should be targeted -- who counts as a "bad guy" and who doesn't -- but it's much better than the NSA's collecting cell phone location data on everyone on the planet. The more we can deny the NSA the ability to do broad wholesale surveillance on everyone, and force them to do targeted surveillance in individuals and organizations, the safer we all are.
(tags: nsa tao security matt-blaze bruce-schneier surveillance tempest)
How the NSA (may have) put a backdoor in RSA’s cryptography: A technical primer
An excellent description of how the Dual_EC_DRBG backdoor works
(tags: surveillance tech dual_ec_drbg nsa rsa security backdoors via:jgc elliptic-curves)
Who Made That Nigerian Scam? - NYTimes.com
The history behind the 419 advance-fee fraud scam.
According to Robert Whitaker, a historian at the University of Texas, an earlier version of the con, known as the Spanish Swindle or the Spanish Prisoner trick, plagued Britain throughout the 19th century.
True facts about Ocean Radiation and the Fukushima Disaster
solid science
(tags: fukushima japan radiation risk ocean disasters sieverts contamination sea fish science)
Packet Flight: Facebook News Feed @8X
good dataviz of a HTTP page load: 'this is a visualization of a Facebook News Feed load from the perspective of the client, over a 3G wireless connection. Different packet types have different shapes and colors.' (via John Harrington)
(tags: via:johnharrington visualization facebook dataviz networking tcp 3g)
URGENT: Input needed on EU copyright consultation - Boing Boing
The EC is looking for feedback -- but not much, and pretty sharpish.
Go to www.copywrongs.eu and answer the questions which are important to you. You do not have to answer all the questions, only the ones that matter to you. [...] The deadline is 5 February 2014. Until then, we should provide the European Commission with as many responses as possible!
Peter Norvig writes a program to play regex golf with arbitrary lists
In response to XKCD 1313. This is excellent. It's reminiscent of my SpamAssassin SOUGHT-ruleset regexp-discovery algorithm, described in http://taint.org/2007/03/05/134447a.html , albeit without the BLAST step intended to maximise pattern length and minimise false positives
(tags: python regex xkcd blast rule-discovery spamassassin rules regexps regular-expressions algorithms peter-norvig)
-
Beautiful d3.js dataviz of wind patterns and forecasts, projected against a vector Earth map
(tags: earth map visualization weather javascript d3.js dataviz wind forecasts maps)
-
Good description of Etsy's take on continuous deployment, committing directly to trunk, hidden with feature-flags, from Rafe Colburn
(tags: continuous-deployment coding agile deployment devops etsy rafe-colburn)
Dogs like to excrete in alignment with the Earth's magnetic field
Dogs preferred to excrete with the body being aligned along the North-south axis under calm magnetic field conditions.
(tags: dogs poo excrement shit magnetic-field earth zoology papers)
Paul Graham and the Manic Pixie Dream Hacker
Under Graham’s influence, Mark [Zuckerberg], like many in Silicon Valley, subscribes to the Manic Pixie Dream Hacker ideal, making self-started teenage hackers Facebook’s most desired recruiting targets, not even so much for their coding ability as their ability to serve as the faces of hacking culture. “Culture fit”, in this sense, is one’s ability to conform to the Valley’s boyish hacker fantasy, which is easier, obviously, the closer you are to a teenage boy. Like the Manic Pixie Dream Girl’s role of existing to serve the male film protagonist’s personal growth, the Manic Pixie Dream Hacker’s job is to embody the dream hacker role while growing the VC’s portfolio. This is why the dream hacker never ages, never visibly develops interests beyond hardware and code, and doesn’t question why nearly all the other people receiving funding look like him. Like the actress playing the pixie dream girl, the pixie dream boy isn’t being paid to question the role for which he has been cast. In this way, for all his supposed “disruptiveness”, the hacker pixie actually does exactly what he is told: to embody, while he can, the ideal hacker, until he is no longer young, mono-focused, and boyish-seeming enough to qualify for the role (at that point, vested equity may allow him to retire). And like in Hollywood, VCs will have already recruited newer, younger ones to play him.
(tags: hackers manic-pixie-dream-girl culture-fit silicon-valley mark-zuckerberg paul-graham y-combinator vc work investment technology recruitment facebook ageism equality sexism)
-
Flapjack aims to be a flexible notification system that handles: Alert routing (determining who should receive alerts based on interest, time of day, scheduled maintenance, etc); Alert summarisation (with per-user, per media summary thresholds); Your standard operational tasks (setting scheduled maintenance, acknowledgements, etc). Flapjack sits downstream of your check execution engine (like Nagios, Sensu, Icinga, or cron), processing events to determine if a problem has been detected, who should know about the problem, and how they should be told.
(tags: flapjack notification alerts ops nagios paging sensu)
We need your help to keep working for European digital rights in 2014
Grim. DRI are facing a 5-figure legal bill from the music industry - they need your donations to avoid shutdown
(tags: donations dri funding amicus-curiae law ireland digital-rights-ireland emi irma)
Replicant: Replicated State Machines Made Easy
The next time you reach for ZooKeeper, ask yourself whether it provides the primitive you really need. If ZooKeeper's filesystem and znode abstractions truly meet your needs, great. But the odds are, you'll be better off writing your application as a replicated state machine.
(tags: zookeeper paxos replicant replication consensus state-machines distcomp)
Dublin Cycle Planner needs a health warning - Irish Cycle
An extensive catalogue of shitty routing. Poor...
It’s expected that any new mapping and routing systems will have errors which will need to be ironed out but the level of issues with the NTA Cycle Planner is far beyond what you’d expect in a light and quiet beta launch. It’s beyond acceptable for a public PR launch directing people to a route planner with no clear warnings. It looks like a rush job which allows junior minister Alan Kelly to get his name in another press release before the end of the year.
Reflected hidden faces in photographs revealed in pupil
The pupil of the eye in a photograph of a face can be mined for hidden information, such as reflected faces of the photographer and bystanders, according to research led by Dr. Rob Jenkins, of the Department of Psychology at the University of York and published in PLOS ONE (open access).
(via Waxy)(tags: via:waxy future zoom-and-enhance privacy photography eyes photos)
Jesse Willms, the Dark Lord of the Internet - Taylor Clark - The Atlantic
“It was an out-and-out hijacking,” LeFevre told me. “They counterfeited our product, they pirated our Web site, and they basically directed all of their customer service to us.” At the peak of Willms’s sales, LeFevre says, dazzlesmile was receiving 1,000 calls a day from customers trying to cancel orders for a product it didn’t even sell. When irate consumers made the name dazzlesmile synonymous with online scamming, LeFevre’s sales effectively dropped to zero. Dazzlesmile sued Willms in November 2009; he later paid a settlement.
(tags: scams hijacking ads affiliate one-wierd-trick health dieting crime)
-
An exhaustive list from the UK's Open Rights Group
Netflix: Your Linux AMI: optimization and performance [slides]
a fantastic bunch of low-level kernel tweaks and tunables which Netflix have found useful in production to maximise productivity of their fleet. Interesting use of SCHED_BATCH process scheduler class for batch processes, in particular. Also, great docs on their experience with perf and SystemTap. Perf really looks like a tool I need to get to grips with...
(tags: netflix aws tuning ami perf systemtap tunables sched_batch batch hadoop optimization performance)
creepypasta, Slenderman, and Lovecraft
our use of networked computers is daily coloured by fear of infection and corruption, of predators and those who would assume our identity, of viruses and data-sucking catastrophes. What if something dark is able to breach that all-important final firewall, the gap between the central processing unit and the person sitting at the keyboard? What if it already has? That would be ‘a malign and particular suspension or defeat of those fixed laws of Nature which are our only safeguard’, without a doubt — but the unplumbed space haunted by demons and chaos is the network, not the cosmos. In using the internet to creep ourselves out recreationally, we begin to understand the real ways in which it haunts our fears.
(via etienneshrdlu)(tags: via:etienneshrdlu literature stories horror slenderman something-awful creepypasta copypasta lovecraft)
BitCoin exchange CoinBase uses MongoDB as their 'primary datastore'
'Coinbase uses MongoDB for their primary datastore for their web app, api requests, etc.'
(tags: coinbase mongodb reliability hn via:aphyr ops banking bitcoin)
Alex Payne — Bitcoin, Magical Thinking, and Political Ideology
Working in technology has an element of pioneering, and with new frontiers come those would prefer to leave civilization behind. But in a time of growing inequality, we need technology that preserves and renews the civilization we already have. The first step in this direction is for technologists to engage with the experiences and struggles of those outside their industry and community. There’s a big, wide, increasingly poor world out there, and it doesn’t need 99% of what Silicon Valley is selling. I’ve enjoyed the thought experiment of Bitcoin as much as the next nerd, but it’s time to dispense with the opportunism and adolescent fantasies of a crypto-powered stateless future and return to the work of building technology and social services that meaningfully and accountably improve our collective quality of life.
(tags: bitcoin business economics silicon-valley tech alex-payne writing libertarianism futurism crypto civilization frontier community)
MP Claire Perry tells UK that worrying about filter overblocking is a "load of cock"
the bottom line appears to be "think of the children" -- in other words, any degree of overblocking is acceptable as long as children cannot access porn:
The debate and letter confuse legal, illegal and potentially harmful content, all of which require very different tactics to deal with. Without a greater commitment to evidence and rational debate, poor policy outcomes will be the likely result. There's a pattern, much the same as the Digital Economy Act, or the Snooper's Charter. Start with moral panic; dismiss evidence; legislate; and finally, watch the policy unravel, either delivering unintended harms, even to children in this case, or simply failing altogether.
See https://www.openrightsgroup.org/blog/2013/talktalk-wordpress for a well-written exploration of a case of overblocking and its fallout. Talk Talk, one UK ISP, has filters which incorrectly dealt with IWF data and blocked WordPress.com's admin interface, resulting in all blogs there become unusable for their owners for over a week, with seemingly nobody able to diagnose and fix the problem competently.(tags: filtering overblocking uk politics think-of-the-children porn cam claire-perry open-rights-group false-positives talk-talk networking internet wordpress)
stereopsis : graphics : radix tricks
some nice super-optimized Radix Sort code which handles floating point values. See also http://codercorner.com/RadixSortRevisited.htm for more info on the histogramming/counter concept
(tags: sorting programming coding algorithms radix-sort optimization floating-point)
-
ie. "i18n", "a11y" etc.
According to Tex Texin, the first numeronym [..] was "S12n", the electronic mail account name given to Digital Equipment Corporation (DEC) employee Jan Scherpenhuizen by a system administrator because his surname was too long to be an account name. By 1985, colleagues who found Jan's name unpronounceable often referred to him verbally as "S12n". The use of such numeronyms became part of DEC corporate culture.[1]
(tags: numbers names etymology numeronyms history dec i18n a11y l10n s12n)
On undoing, fixing, or removing commits in git
Choose-your-own-adventure style. "Oh dear. This is going to get complicated." (via Tom)
(tags: via:tom cyoa git fixing revert source-control coding)
-
this is excellent!
The British Library has uploaded one million public domain scans from 17th-19th century books to Flickr! They're embarking on an ambitious programme to crowdsource novel uses and navigation tools for the huge corpus. Already, the manifest of image descriptions is available through Github. This is a remarkable, public spirited, archival project, and the British Library is to be loudly applauded for it!
(tags: british-library libraries public-domain art graphics images history 19th-century 17th-century 18th-century books crowdsourcing via:boingboing github)
-
Fantastic long-form blog post by Jay Kreps on this key concept. great stuff
(tags: coding databases log network kafka jay-kreps linkedin architecture storage)
Difference Engine: Obituary for software patents
The Economist reckons we're finally seeing the light at the end of the tunnel where the patent troll shakedown is concerned:
If the use of state consumer-protection laws to ward off frivolous patent suits were to catch on, it could give the trolls serious pause for thought—especially if their mass mailings of threatening letters to businesses were met by dozens of law suits from attorneys general demanding their presence in state courts across the land. One way or another, things are beginning to look ominous for those who would exploit the inadequacies of America’s patent system.
(tags: the-economist patents swpats trolls us east-texas law)
Load Balancer Testing with a Honeypot Daemon
nice post on writing BDD unit tests for infrastructure, in this case specifically a load balancer (via Devops Weekly)
(tags: load-balancers ops devops sysadmin testing unit-tests networking honeypot infrastructure bdd)
Karlin Lillington on DRI's looming victory in the European Court of Justice
If the full European Court of Justice (ECJ) accepts the opinion of its advocate general in a final ruling due early next year – and it almost always does – it will prove a huge vindication of Ireland’s small privacy advocacy group, Digital Rights Ireland (DRI). Its case against Irish retention laws, which began in 2006, forms the basis of this broader David v Goliath challenge and initial opinion. The advocate general’s advice largely upholds the key concerns put forward by DRI against Ireland’s laws. Withholding so much data about every citizen, including children, in case someone commits a future crime, is too intrusive into private life, and could allow authorities to create a “faithful and exhaustive map of a large portion of a person’s [private] conduct”. Retained data is so comprehensive that they could easily reveal private identities, which are supposed to remain anonymous. And the data, entrusted to third parties, is at too much risk of fraudulent or malicious use. Cruz Villalón argues that there must be far greater oversight to the retention process, and controls on access to data, and that citizens should have the right to be notified after the fact if their data has been scrutinised. The Irish Government had repeatedly waved off such concerns from Digital Rights Ireland in the past.
(tags: dri rights ireland internet surveillance data-retention privacy eu ecj law)
Meet the Robot Telemarketer Who Denies She's A Robot
Florida's spammers strike again - pushing the boundaries of intrusive direct sales and marketing
(tags: florida ai spam direct-marketing bots sales health-insurance)
DigitalOcean's guide to using Docker on their hosts
must give this a spin
(tags: lxc docker digital-ocean hosting ops)
-
Our children should be free to choose to study what really excites them, not subtly steered away from certain subjects because teachers believe in and propagate the stereotypes. Last year the IOP published a report "It's Different for Girls" which demonstrated that essentially half of state coeducational schools did not see a single girl progress to A-level physics. By contrast, the likelihood of girls progressing from single sex schools were two and a half times greater.
Amen to this.(tags: sexism schools teaching uk phyics girls children bias stereotypes)
-
'SBE is an OSI layer 6 representation for encoding and decoding application messages in binary format for low-latency applications.' Licensed under ASL2, C++ and Java supported.
(tags: sbe encoding codecs persistence binary low-latency open-source java c++ serialization)
-
'like inetd, but for WebSockets' -- 'a small command line tool that will wrap an existing command line interface program, and allow it to be accessed via a WebSocket. It provides a quick mechanism for allowing web-applications to interact with existing command line tools.' Awesome idea. BSD-licensed. (Via Mike Loukides)
(tags: websockets cli server tools unix inetd web http open-source)
-
a metric storage daemon, exposing both a carbon listener and a simple web service. Its aim is to become a simple, scalable and drop-in replacement for graphite's backend.
Pretty alpha for now, but definitely worth keeping an eye on to potentially replace our burgeoning Carbon fleet...(tags: graphite carbon cassandra storage metrics ops graphs service-metrics)
Twitter tech talk video: "Profiling Java In Production"
In this talk Kaushik Srenevasan describes a new, low overhead, full-stack tool (based on the Linux perf profiler and infrastructure built into the Hotspot JVM) we've built at Twitter to solve the problem of dynamically profiling and tracing the behavior of applications (including managed runtimes) in production.
Looks very interesting. Haven't watched it yet though(tags: twitter tech-talks video presentations java jvm profiling testing monitoring service-metrics performance production hotspot perf)
Spy agencies in covert push to infiltrate virtual world of online gaming
[MMOGs], the [NSA] analyst wrote, "are an opportunity!". According to the briefing notes, so many different US intelligence agents were conducting operations inside games that a "deconfliction" group was required to ensure they weren't spying on, or interfering with, each other.
(tags: spies spying games mmog online surveillance absurd east-germany funny warcraft)
Ryan Lizza: Why Won’t Obama Rein in the N.S.A.? : The New Yorker
Fantastic wrap-up of the story so far on the pervasive global surveillance story.
The history of the intelligence community, though, reveals a willingness to violate the spirit and the letter of the law, even with oversight. What’s more, the benefits of the domestic-surveillance programs remain unclear. Wyden contends that the N.S.A. could find other ways to get the information it says it needs. Even Olsen, when pressed, suggested that the N.S.A. could make do without the bulk-collection program. “In some cases, it’s a bit of an insurance policy,” he told me. “It’s a way to do what we otherwise could do, but do it a little bit more quickly.” In recent years, Americans have become accustomed to the idea of advertisers gathering wide swaths of information about their private transactions. The N.S.A.’s collecting of data looks a lot like what Facebook does, but it is fundamentally different. It inverts the crucial legal principle of probable cause: the government may not seize or inspect private property or information without evidence of a crime. The N.S.A. contends that it needs haystacks in order to find the terrorist needle. Its definition of a haystack is expanding; there are indications that, under the auspices of the “business records” provision of the Patriot Act, the intelligence community is now trying to assemble databases of financial transactions and cell-phone location information. Feinstein maintains that data collection is not surveillance. But it is no longer clear if there is a distinction.
(tags: nsa gchq surveillance spying privacy dianne-feinstein new-yorker journalism long-reads us-politics probable-cause)
Same Old Stories From Sean Sherlock
Sherlock’s record is spotty at best when it comes to engagement. Setting aside the 80,680 people who were ignored by the minister, he was hostile and counter productive to debate from the beginning, going so far as to threaten to pull out of a public debate because a campaigner against the ['Irish SOPA'] SI would be in attendance. His habit of blocking people online who publicly ask him tough yet legitimate questions has earned him the nickname “Sherblock”.
(tags: sean-sherlock sherblock labour ireland politics blocking filtering internet freedom copyright emi music law piracy debate twitter)
Smart Metering in the UK is FCUKED
Most utilities don’t want smart metering. In fact they seem to have used the wrong dictionary. It is difficult to find anything smart about the UK deployment, until you realise that the utilities use smart in the sense of “it hurts”. They consider they have a perfectly adequate business model which has no need for new technology. In many Government meetings, their reluctant support seems to be a veneer for the hope that it will all end in disaster, letting them go back to the world they know, of inflated bills and demands for money with menaces. [...] Even when smart meters are deployed, there is no evidence that any utility will use the resulting data to transform their business, rather than persecute the consumer. At a recent US conference a senior executive for a US utility which had deployed smart meters, stated that their main benefit was “to give them more evidence to blame the customer”. That’s a good description of the attitude displayed by our utilities.
(tags: smart-metering energy utilities uk services metering consumer)
Kelly "kellabyte" Sommers on Redis' "relaxed CP" approach to the CAP theorem
Similar to ACID properties, if you partially provide properties it means the user has to _still_ consider in their application that the property doesn't exist, because sometimes it doesn't. In you're fsync example, if fsync is relaxed and there are no replicas, you cannot consider the database durable, just like you can't consider Redis a CP system. It can't be counted on for guarantees to be delivered. This is why I say these systems are hard for users to reason about. Systems that partially offer guarantees require in-depth knowledge of the nuances to properly use the tool. Systems that explicitly make the trade-offs in the designs are easier to reason about because it is more obvious and _predictable_.
(tags: kellabyte redis cp ap cap-theorem consistency outages reliability ops database storage distcomp)
Building a Balanced Universe - EVE Community
Good blog post about EVE's algorithm to load-balance a 3D map of star systems
(tags: eve eve-online algorithms 3d space load-balancing sharding games)
Virtual Clock - Testing Patterns Encyclopedia
a nice pattern for unit tests which need deterministic time behaviour. Trying to think up a really nice API for this....
(tags: testing unit-tests time virtual-clock real-time coding)
We're sending out the wrong signals in bid to lure the big data bucks - Independent.ie
Simon McGarr on Ireland's looming data-protection train-crash.
Last week, during the debate of his proposals to increase fees for making a Freedom of Information request, Brendan Howlin was asked how one of his amendments would affect citizens looking for data from the State's electronic databases. His reply was to cheerfully admit he didn't even understand the question. "I have no idea what an SQL code is. Does anyone know what an SQL code is?" Unlike the minister, it probably isn't your job to know that SQL is the computer language that underpins the data industry. The amendment he had originally proposed would have effectively allowed civil servants to pretend that their computer files were made of paper when deciding whether a request was reasonable. His answer showed how the Government could have proposed such an absurd idea in the first place. Like it or not – fair or not – these are not the signals a country that wanted to build a long-term data industry would choose to send out. They are the sort of signals that Ireland used to send out about Financial Regulation. I think it's agreed, that approach didn't work out so well.
(tags: foi ireland brendan-howlin technology illiteracy sql civil-service government data-protection privacy regulation dpa)
-
good blog post writing up the 'flock -n -c' trick to ensure single-concurrent-process locking for cron jobs
What an RAF pilot can teach us about being safe on the road
Good article on road safety and visual perception, for both cyclists and drivers.
(tags: vision driving cycling tips cognitive-psychology safety hi-viz)
-
a modern HTTP benchmarking tool capable of generating significant load when run on a single multi-core CPU. It combines a multithreaded design with scalable event notification systems such as epoll and kqueue. An optional LuaJIT script can perform HTTP request generation, response processing, and custom reporting.
Written in C, ASL2 licensed.(tags: wrk benchmarking http performance testing lua load-testing load-generation)
Removing DRM Boosts Music Sales by 10%
Based on a working paper from University of Toronto researcher Laurina Zhang
Comparing album sales of four major labels before and after the removal of DRM reveals that digital music revenue increases by 10% when restrictions are removed. The effect goes up to 30% for long tail content, while top-selling albums show no significant jump. The findings suggest that dropping technical restrictions can benefit both artists and the major labels.
more details: http://inside.rotman.utoronto.ca/laurinazhang/files/2013/11/laurina_zhang_jmp_nov4.pdf , "Intellectual Property Strategy and the Long Tail: Evidence from the Recorded Music Industry", Laurina Zhang, November 4, 2013(tags: ip copyright drm mp3 music laurina-zhang research long-tail albums rights-management piracy)
100 Years of Breed “Improvement” | Science of Dogs
The English bulldog has come to symbolize all that is wrong with the dog fancy and not without good reason; they suffer from almost every possible disease. A 2004 survey by the Kennel Club found that they die at the median age of 6.25 years (n=180). There really is no such thing as a healthy bulldog. The bulldog’s monstrous proportions makes them virtually incapable of mating or birthing without medical intervention.
(via Bryan)(tags: dogs eugenics breeding horror science genetics traits animals pets bulldog pedigree)
SkyJack - autonomous drone hacking
Samy Kamkar strikes again. 'Using a Parrot AR.Drone 2, a Raspberry Pi, a USB battery, an Alfa AWUS036H wireless transmitter, aircrack-ng, node-ar-drone, node.js, and my SkyJack software, I developed a drone that flies around, seeks the wireless signal of any other drone in the area, forcefully disconnects the wireless connection of the true owner of the target drone, then authenticates with the target drone pretending to be its owner, then feeds commands to it and all other possessed zombie drones at my will.'
(tags: drones amazon hacking security samy-kamkar aircrack node raspberry-pi airborne-zombies)
-
Good article about emergent behaviour from networked malware: 'The metabot, therefore, is viral. You get followed because of who follows you. This tendency explains the strange geographical cluster among San Diego high school students. Perhaps one of those kids was being followed by a really popular account (like @Interscope records, perhaps, which follows hundreds of thousands of people), and through that link, the bot stumbled into this little circle of San Diego teens. All of this activity would have remained under the radar, of course, all part of the silent non-human web. Except something went awry. For some reason, Olivia got stuck in a weird loop, and the metabot kept spawning spambots that chose to follow her over and over, relentlessly. Maybe once the metabot reached the San Diego kids, a bug kicked in. Instead of negative feedback keeping her (and everyone else) from being followed too often, we got runaway positive feedback. The bots followed her because other bots followed her. And on and on. Which is, perhaps a kind of reasoning that we can understand: It's the core logic of fame and celebrity itself. Attention flows to Snooki because attention flowed to Snooki. Attention flows to Olivia because attention flowed to Olivia. Olivia and her friends weren't wrong when they thought she'd become suddenly famous. Her audience just wasn't human.'
(tags: socialnetworking spam twitter bots fame alexis-madrigal)
-
> reorg Ok, you reorganize all zero of your direct reports. Way to stay out of trouble, Hoss. Perhaps you'd like to coin an acronym?
(tags: amazon amazork via:jrauser sev2s reorgs work zachary-mason games interactive-fiction zork text-adventures)
-
y'know, for kids. now that would improve the slightly boring, functional helmet my middle kid wears...
(tags: helmets helmet-covers tail-wags safety cycling skating kids)
-
Wow, I didn't know about this. Great idea.
Need a flexible format to record, export, and analyze network performance data? Well, that's exactly what the HTTP Archive format (HAR) is designed to do! Even better, did you know that Chrome DevTools supports it? In this episode we'll take a deep dive into the format (as you'll see, its very simple), and explore the many different ways it can help you capture and analyze your sites performance. Join Ilya Grigorik and Peter Lubbers to find out how to capture HAR network traces in Chrome, visualize the data via an online tool, share the reports with your clients and coworkers, automate the logging and capture of HAR data for your build scripts, and even adapt it to server-side analysis use cases
(tags: capturing logging performance http debugging trace capture har archives protocols recording)
flood.io » Convert HAR to a JMeter JMX plan file
this is absolutely fantastic. Thanks flood.io!
(tags: har http archive jmeter jmx recording testing debugging captures conversion)
Who Is Watching the Watch Lists? - NYTimes.com
it might seem that current efforts to identify and track potential terrorists would be approached with caution. Yet the federal government’s main terrorist watch list has grown to at least 700,000 people, with little scrutiny over how the determinations are made or the impact on those marked with the terrorist label. “If you’ve done the paperwork correctly, then you can effectively enter someone onto the watch list,” said Anya Bernstein, an associate professor at the SUNY Buffalo Law School and author of “The Hidden Costs of Terrorist Watch Lists,” published by the Buffalo Law Review in May. “There’s no indication that agencies undertake any kind of regular retrospective review to assess how good they are at predicting the conduct they’re targeting.”
(tags: terrorism watchlists blacklists filtering safety air-travel government security dhs travel)
[JavaSpecialists 215] - StampedLock Idioms
a demo of Doug Lea's latest concurrent data structure in Java 8
-
lulz. (via John Handelaar)
(tags: funny little-johnny-tables companies registry uk plc)
Docker all the things at Atlassian: automation and wiring
A nice worked-through Docker example
(tags: docker infrastructure devops ops deployment lxc containers linux)
This Flaw In Facebook Lets You Create As Many Fake Likes As You Want - Business Insider
Really stupid -- Facebook infers a "like" for a site when you send a reference to a URL on that site. Obviously broken behaviour. (via http://www.forbes.com/sites/anthonykosner/2013/01/21/facebook-is-recycling-your-likes-to-promote-stories-youve-never-seen-to-all-your-friends/ )
(tags: facebook advertising bad-data social-graph duh)
Jury: Newegg infringes Spangenberg patent, must pay $2.3 million | Ars Technica
Newegg, an online retailer that has made a name for itself fighting the non-practicing patent holders sometimes called "patent trolls," sits on the losing end of a lawsuit tonight. An eight-person jury came back shortly after 7:00pm and found that the company infringed all four asserted claims of a patent owned by TQP Development, a company owned by patent enforcement expert Erich Spangenberg.
"patent enforcement expert". That's one way to put it. This is insanity.(tags: tech swpats patents newegg tqp crypto whitfield-diffie)
-
pretty strong argument. However, I think shlibs still have an advantage in that their pages are easier to share...
(tags: shared-libraries unix linux linker deployment)
Newegg trial: Crypto legend takes the stand, goes for knockout patent punch | Ars Technica
"We've heard a good bit in this courtroom about public key encryption," said Albright. "Are you familiar with that? "Yes, I am," said Diffie, in what surely qualified as the biggest understatement of the trial. "And how is it that you're familiar with public key encryption?" "I invented it."
(via burritojustice)(tags: crypto tech security patents swpats pki whitfield-diffie history east-texas newegg patent-trolls)
SAMOA, an open source platform for mining big data streams
Yahoo!'s streaming machine learning platform, built on Storm, implementing:
As a library, SAMOA contains state-of-the-art implementations of algorithms for distributed machine learning on streams. The first alpha release allows classification and clustering. For classification, we implemented a Vertical Hoeffding Tree (VHT), a distributed streaming version of decision trees tailored for sparse data (e.g., text). For clustering, we included a distributed algorithm based on CluStream. The library also includes meta-algorithms such as bagging.
(tags: storm streaming big-data realtime samoa yahoo machine-learning ml decision-trees clustering bagging classification)
Spam-Friendly Registrar ‘Dynamic Dolphin’ Shuttered
yay (via Tony Finch)
(tags: dynamic-dolphin registrars dns spam scott-richter anti-spam brian-krebs)
Photographer wins $1.2 million from companies that took pictures off Twitter | Reuters
The jury found that Agence France-Presse and Getty Images willfully violated the Copyright Act when they used photos Daniel Morel took in his native Haiti after the 2010 earthquake that killed more than 250,000 people, Morel's lawyer, Joseph Baio, said
(tags: copyright twitter facebook social-media via:niall-harbison law getty-images afp daniel-morel haiti photography)
Failure Friday: How We Ensure PagerDuty is Always Reliable
Basically, they run the kind of exercise which Jesse Robbins invented at Amazon -- "Game Days". Scarily, they do these on a Friday -- living dangerously!
(tags: game-days testing failure devops chaos-monkey ops exercises)
-
beautiful German boardgame, suitable for playing with kids -- an adult moves a tealight candle around the board, while kids take turns moving gnomes around in the shadows behind tall "trees". recommended by JK
'No basis in law' : Gardai probe Ballyphehane group after raid
Freemen wackiness in Cork.
The house of one member of the group was raided by gardaí last week, but it is not thought that any arrests were made, according to an eyewitness. Gardaí broke down the front door of the house. The group, which appears to be part of the Freemen of the Land movement, which does not recognise the State, has attempted to hold 'trials' in Ballyphehane Community Centre. It attempted to summon HSE staff, gardaí, social workers, solicitors and others to appear to be tried by a self-selected jury earlier this month. The group handed out documents purporting to be a summons to HSE staff and garda stations, demanding that named people attend a trial by 'éire court' on Tuesday 5 November at 9am “to stand trial for their acts of terrorism against mothers, their offspring and others in our community”, according to the group's literature. This week the group has begun posting about UCC, saying the college is “a private for profit corporation, and a business partner of and partly owned by Pfizers and Bank of Ireland”. The group suggest that UCC bases its “authority” on Maritime Law. UCC has yet to respond to the group's allegations.
(tags: freemen crazy cork politics ireland hse gardai ucc law)
-
I'm trying to avoid doing this in order to avoid more power consumption and unpopular hardware in the house -- but if necessary, this is a good up-to-date homebuild design
Asynchronous logging versus Memory Mapped Files
Interesting article around using mmap'd files from Java using RandomAccessFile.getChannel().map(), which allows them to be accessed directly as a ByteBuffer. together with Atomic variable lazySet() operations, this provides pretty excellent performance results on low-latency writes to disk. See also: http://psy-lob-saw.blogspot.ie/2012/12/atomiclazyset-is-performance-win-for.html
(tags: atomic lazyset putordered jmm java synchronization randomaccessfile bytebuffers performance optimization memory disk queues)
-
a realtime processing engine, built on a persistent queue and a set of workers. 'The main goal is data availability and persistency. We created grape for those who cannot afford losing data'. It does this by allowing infinite expansion of the pending queue in Elliptics, their Dynamo-like horizontally-scaled storage backend.
(tags: kafka queue queueing storage realtime fault-tolerance grape cep event-processing)
How To Run a 5 Whys (With Humans, Not Robots)
'remember, there is no axe murderer. probably'
(tags: process management howto post-mortems five-whys 5-whys investigation)
The New Threat: Targeted Internet Traffic Misdirection
MITM attacks via BGP route hijacking now relatively commonplace on the internet, with 60 cases observed so far this year by Renesys
(tags: bgp mitm internet security routing attacks hijacking)
Software Detection of Currency
Steven J. Murdoch presents some interesting results indicating that the EURion constellation may have been obsoleted:
Recent printers, scanners and image manipulation software identify images of currency, will not process the image and display an error message linking to www.rulesforuse.org. The detection algorithm is not disclosed, however it is possible to test sample images as to whether they are identified as currency. This webpage shows an initial analysis of the algorithm's properties, based on results from the automated generation and testing of images. [...] Initially it was thought that the "Eurion constellation" was used to identify banknotes in the newly deployed software based system, since this has been confirmed to be the technique used by colour photocopiers, and was both necessary and sufficient to prevent an item being duplicated using the photocopier tested. However further investigation showed that the detection performed by software is different from the system used in colour photocopiers, and the Eurion constellation is neither necessary nor sufficent, and in fact it probably is not even a factor.
(tags: eurion algorithms photoshop security currency money euro copying obscurity reversing)
-
a simple-to-use, extensible, text-based data workflow tool that organizes command execution around data and its dependencies. Data processing steps are defined along with their inputs and outputs and Drake automatically resolves their dependencies. [...] Drake is similar to GNU Make, but designed especially for data workflow management. It has HDFS [and S3] support, allows multiple inputs and outputs, and includes a host of features designed to help you bring sanity to your otherwise chaotic data processing workflows.
Via Nelson. Looks interesting, although I'd like to see more features around retries, single-executor locking, parallelism, alerting/metrics, and unattended cron-like operation -- those are always the hard part when I wind up coding up a data pump.(tags: make data data-pump drake via:nelson pipelines workflow)
AK at re:Invent 2013: Getting Maximum Performance from Redshift
good Redshift tips
(tags: redshift aws amazon performance scaling s3 rdbms sql ops analytics)
Tintin And The Copyright Sharks - Falkvinge on Infopolicy
A rather sordid tale of IP acquisition and exploitation, from the sounds of it
(tags: tintin moulinsart belgium history herge ip copyright royalties rick-falkvinge)
IPSO representative trivialising impact of the Loyaltybuild data breach
A very worrying quote from Una Dillon of the Irish Payment Services Organisation in regard to the Loyaltybuild incident:
“I wouldn’t be overly concerned if one of my cards was caught up in this,” Dillon says. “Even in the worst-case scenario – one in which my card was used fraudulently – my card provider will refund me everything that is taken”.
This reflects a deep lack of understanding of (a) how identity fraud works, and (b) how card-fraud refunds in Ireland appear to work. (a): Direct misuse of credit card data is not always the result. Fraudsters may prefer to instead obtain separate credit through identity theft, ie. using other personal identifying data. (b): Visa debit cards have no credit limit -- your bank account can be cleared out in its entirety, and refunds can take a long time. For instance, http://www.askaboutmoney.com/showthread.php?t=174482 describes several cases, including one customer who waited 21 days for a refund. All in all it's trivialising a major risk for consumers. As I understand it, a separate statement from IPSO recommended that all customers of Loyaltybuild schemes need to monitor their bank accounts daily to keep an eye out for fraud, which is pretty absurd. Not impressive at all.(tags: loyaltybuild ipso money cards credit-cards visa debit-cards payment fraud identity-theft ireland)
-
There is really astonishingly little value in looking at someone’s GitHub projects out of context. For a start, GitHub has no way of customising your profile page, and what is shown by default is the projects with the most stars, and the projects you’ve recently pushed to. That is, GitHub picks your most popular repos and puts those at the top. You have no say about what you consider important, or worthwhile, or interesting, or well-engineered, or valuable. You just get what other people think is useful. Aside from which, GitHub displays a lot of useless stats about how many followers you have, and some completely psychologically manipulative stats about how often you commit and how many days it is since you had a day off. So really, your GitHub profile displays two things: how ‘influential’ you are, and how easily you can be coerced into constantly working. It’s honestly about as relevant to a decent hiring decision as your Klout score.
(tags: cv github open-source hiring career meritocracy work via:apyhr)
An Empirical Evaluation of TCP Performance in Online Games
In this paper, we have analyzed the performance of TCP in of ShenZhou Online, a commercial, mid-sized MMORPG. Our study indicates that, though TCP is full-fledged and robust, simply transmitting game data over TCP could cause unexpected performance problems. This is due to the following distinctive characteristics of game traffic: 1) tiny packets, 2) low packet rate, 3) application-limited traffic generation, and 4) bi-directional traffic. We have shown that because TCP was originally designed for unidirectional and network-limited bulk data transfers, it cannot adapt well to MMORPG traffic. In particular, the window-based congestion control mechanism and the fast retransmit algorithm for loss recovery are ineffective. This suggests that the selective acknowledgement option should be enabled whenever TCP is used, as it significantly enhances the loss recovery process. Furthermore, TCP is overkill, as not every game packet needs to be transmitted reliably and processed in an orderly manner. We have also shown that the degraded network performance did impact users' willingness to continue a game. Finally, a number of design guidelines have been proposed by exploiting the unique characteristics of game traffic.
via Nelson(tags: tcp games udp protocols networking internet mmos retransmit mmorpgs)
Column: The Loyaltybuild breach shows it’s time to take data protection seriously
What is afoot here is a rerun of the Celtic Tiger era “light touch regulation” of financial services. Ireland has again made a Faustian pact whereby we lure employers here on the understanding that they will not subject to too-stringent a regulatory system. As the Loyaltybuild breach has shown, this is a bargain that will probably end badly. And as with the financial services boom, it is making the Germans nervous. Perhaps we will listen to them this time.
(tags: fergal-crehan loyaltybuild celtic-tiger ireland dpa regulation data-protection privacy credit-cards)
-
Looks very alpha, but one to watch.
A JVM Implementation of the Raft Consensus Protocol
(tags: via:sbtourist raft jvm java consensus distributed-computing)
-
' A persistent key-value store for fast storage environments', ie. BerkeleyDB/LevelDB competitor, from Facebook.
RocksDB builds on LevelDB to be scalable to run on servers with many CPU cores, to efficiently use fast storage, to support IO-bound, in-memory and write-once workloads, and to be flexible to allow for innovation. We benchmarked LevelDB and found that it was unsuitable for our server workloads. Thebenchmark results look awesome at first sight, but we quickly realized that those results were for a database whose size was smaller than the size of RAM on the test machine - where the entire database could fit in the OS page cache. When we performed the same benchmarks on a database that was at least 5 times larger than main memory, the performance results were dismal. By contrast, we've published the RocksDB benchmark results for server side workloads on Flash. We also measured the performance of LevelDB on these server-workload benchmarks and found that RocksDB solidly outperforms LevelDB for these IO bound workloads. We found that LevelDB's single-threaded compaction process was insufficient to drive server workloads. We saw frequent write-stalls with LevelDB that caused 99-percentile latency to be tremendously large. We found that mmap-ing a file into the OS cache introduced performance bottlenecks for reads. We could not make LevelDB consume all the IOs offered by the underlying Flash storage.
Lots of good discussion at https://news.ycombinator.com/item?id=6736900 too.(tags: flash ssd rocksdb databases storage nosql facebook bdb disk key-value-stores lsm leveldb)
-
Colm McCarthaigh has open sourced Infima, 'a library for managing service-level fault isolation using Amazon Route 53'.
Infima provides a Lattice container framework that allows you to categorize each endpoint along one or more fault-isolation dimensions such as availability-zone, software implementation, underlying datastore or any other common point of dependency endpoints may share. Infima also introduces a new ShuffleShard sharding type that can exponentially increase the endpoint-level isolation between customer/object access patterns or any other identifier you choose to shard on. Both Infima Lattices and ShuffleShards can also be automatically expressed in Route 53 DNS failover configurations using AnswerSet and RubberTree.
(tags: infima colmmacc dns route-53 fault-tolerance failover multi-az sharding service-discovery)
-
The LatencyUtils package includes useful utilities for tracking latencies. Especially in common in-process recording scenarios, which can exhibit significant coordinated omission sensitivity without proper handling.
(tags: gil-tene metrics java measurement coordinated-omission latency speed service-metrics open-source)
High Performance Browser Networking
slides from Ilya Grigorik's tutorial on the topic at O'Reilly's Velocity conference. lots of good data and tips for internet protocol optimization
(tags: slides presentations ilya-grigorik performance http https tcp tutorials networking internet)
-
tl;dr: 'a lot to like'.
The grand design and originality thus of ‘Modernising Copyright’ thus is the injection of targeted flexibility into the legal framework – this is no mere echo of the Hargreaves Report in the UK, which backed away from Fair Use out of fear at the uncertainty it would necessarily entail. If the Report’s authors have their way, contested uses in Ireland will first be examined to see if they fit the exceptions spelled out in the EUCD, or checked against the innovation exception if they are derivative works/adaptations. Only if they have fallen at those two fences, will the fair use test be their last chance saloon.
-
'It can't just be Big Data, it has to be Fast Data: Reactor 1.0 goes GA':
Reactor provides the necessary abstractions to build high-throughput, low-latency--what we now call "fast data"--applications that absolutely must work with thousands, tens of thousands, or even millions of concurrent requests per second. Modern JVM applications must be built on a solid foundation of asynchronous and reactive components that efficiently manage the execution of a very large number of tasks on a very small number of system threads. Reactor is specifically designed to help you build these kinds of applications without getting in your way or forcing you to work within an opinionated pattern.
Featuring the LMAX Disruptor ringbuffer, the JavaChronicle fast persistent message-passing queue, Groovy closures, and Netty 4.0. This looks very handy indeed....(tags: disruptor reactive-programming reactor async libraries java jvm frameworks spring netty fast-data)
Backblaze Blog » How long do disk drives last?
According to Backblaze's data, 80% of drives last 4 years, and the median lifespan is projected to be 6 years
(tags: backblaze storage disk ops mtbf hardware failure lifespan)
Heirloom Chemistry Set by John Farrell Kuhns — Kickstarter
This is a beauty. I wonder if they can ship to Ireland?
To tell our story for this Kickstarter project, we really have to start in Christmas of 1959. Like many young scientists of the time, I received a Gilbert Chemistry set. This chemistry set provided me hours of great fun and learning as well as laying the foundation for my future as a research chemist. As I became an adult I wanted to share these types of experiences with my daughter, my nephews and nieces, and friends. But soon I became aware real chemistry sets were no longer available. Without real chemistry sets and opportunities for students to learn and explore, where would our future chemists come from? So .... I set out on a mission.
(tags: chemistry science chemistry-sets education play kickstarter)
Philippe Flajolet’s contribution to streaming algorithms [preso]
Nice deck covering HyperLogLog and its origins, plus a slide at the end covering the Flajolet/Wegman Adaptive Sampling algorithm ("how do you count the number of elements which appear only once in stream using constant size memory?")
(tags: algorithms sketching hyperloglog flajolet wegman adaptive-sampling sampling presentations slides)
3 Tacos or 4 Flautas Per Order Make a Healthy Diet in Greatest Scientific Study Ever
"In reality, [tacos and flautas] aren't bad meals," the report argues. "The error that many of us Mexicans [Gustavo note: and gabachos] commit is including these types of dishes in our regular diet without an appropriate balance of them and falling into excessively eating them; accompanied by a lack of physical activity, it creates bad eating habits." The good docs go on to note that people can eat tacos and flautas without negatively affecting their health, but "the key resides in controlling the quantity and frequency of eating these types of meals." They also make the point that overall, tacos and flautas have less grease than doughnuts, french fries and even some health bars, although they didn't specify which brands in the latter. In a subsequent blog post, the scientists go on to describe flautas as an "energy food" due to their composition, and conclude by recommending that a healthy diet can include three tacos al pastor or four flautas per order, "controlling the frequency of intake." So have at it, boyos, but in moderation. And I can already hear the skeptics: What about tacos de chicharrones? Why not focus on carne asada? Did they take into consideration chiles de mordida? Did they factor in horchata? And whither the burrito variable?
Jeff Dean - Taming Latency Variability and Scaling Deep Learning [talk]
'what Jeff Dean and team have been up to at Google'. Reducing request latency in a network SOA architecture using backup requests, etc., via Ilya Grigorik
(tags: youtube talks google low-latency soa architecture distcomp jeff-dean networking)
error-prone - Catch common Java mistakes as compile-time errors
It's common for even the best programmers to make simple mistakes. And commonly, a refactoring which seems safe can leave behind code which will never do what's intended. We're used to getting help from the compiler, but it doesn't do much beyond static type checking. Using error-prone to augment the compiler's static analysis, you can catch more mistakes before they cost you time, or end up as bugs in production. We use error-prone in Google's Java build system to eliminate classes of serious bugs from entering our code, and we've open-sourced it, so you can too!
Where your "full Irish" really comes from
This is really disappointing; many meats labelled as "Irish" are anything but. The only trustworthy mark is the Bord Bia "Origin Ireland" stamp -- I'll be avoiding any products without this in future.
Under European labelling law, country of origin is mandatory for beef, fish, olive oil, honey and fresh fruit and vegetables. Next month the EU will make it law to specify country of origin for the meat of pigs, chicken, sheep and goats, with a lead-in time of anywhere up to three years for food companies to comply. The pork rule, however, will only apply to fresh pork and not to processed meat, so consumers still won’t get a country-of-origin label on rashers, sausages or ham. In the meantime, the Bord Bia Origin-Ireland stamp is a guarantee that your Irish breakfast ingredients are indeed Irish.
(tags: bord-bia labelling eu country-of-origin meat pork food quality)
Killing Freedom of Information in Ireland
TheStory.ie will, in all likelihood, cease all FOI requests. And we will not seek funding from the public to support an immoral, cynical, unjustified and probably illegal FOI fee regime. We will not pay for information that the public already pays for. We will not support a system that perpetuates an outrageous infringement of citizen rights. The legislation was gutted in 2003 and it is being gutted again. More generally the number of requests from journalists from all news organisations in Ireland will fall as a result of these amendments, and the resulting efforts to shine a light on the administration of the State will certainly deteriorate. And secrecy will prevail.
10 Things You Should Know About AWS
Some decent tips in here, mainly EC2-focussed
Tracing Brazil’s Guy Fawkes Masks
really fascinating, from Ethan Zuckerman:
The photo of workers making Guy Fawkes masks is something of a Rorschach test. If you’re primed to see the exploitative nature of global capitalism when you see people making a plastic mask, it’s there in the image. if you’re looking for the global spread of a protest movement, it’s there too, with a Brazilian factory making a local knock-off of a global icon to cash in on a national protest. Because the internet is a copying machine, it’s very bad at context. It’s easier to encounter the image of masks being manufactured devoid of accompanying details than it is to find the story behind the images. And given our tendency to ignore information in languages we don’t read, it’s easy to see how the masks come detached from their accompanying story. For me, the image is more powerful with context behind it. It’s possible to reflect on the irony of a Hollywood prop becoming an activist trope, the tensions between mass-production and anonymity and the individuality of one’s identity and grievance, the tensions between local and global, Warner Bros and Condal, intellectual property and piracy, all in the same image.
(tags: anonymous globalization manufacturing piracy knock-offs brazil ethan-zuckerman global local hollywood capitalism)
ReCreate Ireland - Creativity through Reuse
Great idea.
For creative groups, we aim to offer easy access to a rich and varied selection of textures, colours and shapes. Members are also be able to participate in creativity workshops facilitated by fully trained professional artists either in-house or on your own premises. We intend to be the first choice of teachers, early childhood educators and arts animators in the community. For businesses, ReCreate reduces the costs of moving on end-of-line materials. We are a professional, credible and reliable partner organisation and our aim is to divert approximately 115 metric tonnes of clean materials from landfill annually. All collections are free of charge.
(tags: recreate diy make-and-do recycling landfill art play scrap)
3D-Print Your Own 20-Million-Year-Old Fossils
When I get my hands on a 3-D printer, this will be high up my list of things to fabricate: a replica of a 20-million year old hominid skull.
With over 40 digitized fossils in their collection, you can explore 3D renders of fossils representing prehistoric animals, human ancestors, and even ancient tools. Captured using Autodesk software, an SLR camera, and often the original specimen (rather than a cast replica), these renderings bring us closer than most will ever get to holding ancient artifacts. And if you've got an additive manufacturing device at your disposal, you can even download Sketchfab plans to generate your own.
(tags: 3d-printing fossils africa history hominids replication fabrication sketchfab)
-
'A Tiny Seasonal Department Store', featuring the amazing cakes of Wildflour Bakery among others, at 5 Dame Lane, D2.
The tiny department store will be a wonderful seasonal gathering of Makers & Brothers favourite local and international brands. The Others in this project are a carefully considered bunch of partners from the worlds of flowers, food, fashion, beauty, homeware, gifts and more. Makers & Brothers & Others, the tiny department store, promises to be a unique, exciting and engaging retail environment. A place to explore, a seasonal store alive with wonder and served by experts. Kindly hosted by the Fumbally Exchange.
(tags: dublin shopping food cakes wildflour-bakery makers-and-brothers xmas)
Modernising (Irish) Copyright Katseries #2: linking & marshalling as exceptions
Good commentary on the recent CRC report's recommendations. See also http://ipkitten.blogspot.ie/2013/10/modernising-irish-copyright-katseries-1.html
"The Top 6 Reasons This Infographic Is Just Wrong Enough To Sound Convincing"
+1 to all of this, but especially #5 (polar area diagrams).
(tags: diagrams infographics infoviz visualisation data fail statistics)
Presto: Interacting with petabytes of data at Facebook
Presto has become a major interactive system for the company’s data warehouse. It is deployed in multiple geographical regions and we have successfully scaled a single cluster to 1,000 nodes. The system is actively used by over a thousand employees,who run more than 30,000 queries processing one petabyte daily. Presto is 10x better than Hive/MapReduce in terms of CPU efficiency and latency for most queries at Facebook. It currently supports a large subset of ANSI SQL, including joins, left/right outer joins, subqueries,and most of the common aggregate and scalar functions, including approximate distinct counts (using HyperLogLog) and approximate percentiles (based on quantile digest). The main restrictions at this stage are a size limitation on the join tables and cardinality of unique keys/groups. The system also lacks the ability to write output data back to tables (currently query results are streamed to the client).
(tags: facebook hadoop hdfs open-source java sql hive map-reduce querying olap)
Herbal supplements are often 'rice and weeds'
DNA tests show that many pills labeled as healing herbs are little more than powdered rice and weeds. [...] Among their findings were bottles of echinacea supplements, used by millions of Americans to prevent and treat colds, that contained ground up bitter weed, Parthenium hysterophorus, an invasive plant found in India and Australia that has been linked to rashes, nausea and flatulence.
(tags: herbal-remedies scams quality medicine dna testing fillers allergies st-johns-wort echinacea)
Scryer: Netflix’s Predictive Auto Scaling Engine
Scryer is a new system that allows us to provision the right number of AWS instances needed to handle the traffic of our customers. But Scryer is different from Amazon Auto Scaling (AAS), which reacts to real-time metrics and adjusts instance counts accordingly. Rather, Scryer predicts what the needs will be prior to the time of need and provisions the instances based on those predictions.
(tags: scaling infrastructure aws ec2 netflix scryer auto-scaling aas metrics prediction spikes)
Your Assignment for Today: Chew Gum
We have known about [the dental health benefits of xylitol in chewing gum] for a surprisingly long time. In the 1980s, a high-quality, randomized trial in Finland found that children who chewed xylitol-sweetened gum had as much as 60 percent fewer cavities compared with children who didn’t. A 1989-93 randomized study of children around age 10 in Belize showed an even greater benefit; chewing xylitol-sweetened gum decreased the risk of cavities by up to 70 percent, and a follow-up study showed that the benefit lasted for up to five years.
(tags: xylitol via:eoin health dentist teeth chewing-gum snacks medicine)
Mike Hearn - Google+ - The packet capture shown in these new NSA slides shows…
The packet capture shown in these new NSA slides shows internal database replication traffic for the anti-hacking system I worked on for over two years. Specifically, it shows a database recording a user login.
This kind of confirms my theory that the majority of interesting traffic for the NSA/GCHQ MUSCULAR sniffing system would have been inter-DC replication. Was, since it sounds like that stuff's all changing now to use end-to-end crypto...(tags: google crypto security muscular nsa gchq mike-hearn replication sniffing spying surveillance)
-
'This article will use NettoSphere, a framework build on top of the popular Netty Framework and Atmosphere with support of WebSockets, Server Side Events and Long-Polling. NettoSphere allows [async JVM framework] Atmosphere's applications to run on top of the Netty Framework.'
(tags: atmosphere netty async java scala websockets sse long-polling http demos games)
Pushing to 100,000 API clients simultaneously
This looks really nice -- it's quite similar to something I was hacking on a while back. Only problem is that it's AGPL-licensed... 'Pushpin makes it easy to create HTTP long-polling and streaming services using any web stack as the backend. It’s compatible with any framework, whether Django, Rails, ASP, or even PHP. Pushpin works as a reverse proxy, sitting in front of your server application and managing all of the open client connections.'
(tags: pushpin opensource agpl http long-polling reverse-proxy architecture callbacks)
European ruling raises questions over liability and online comment
'A recent ruling by the European Court of Human Rights (ECHR) has called into question [...] the liability of media organisations for online comment.' Delfi, a news website in Estonia, found liable for a user's comments by the ECHR
(tags: echr comments news web law regulation estonia delfi liability slander defamation)
Why Every Company Needs A DevOps Team Now - Feld Thoughts
Bookmarking particularly for the 3 "favourite DevOps patterns":
"Make sure we have environments available early in the Development process"; enforce a policy that the code and environment are tested together, even at the earliest stages of the project; “Wake up developers up at 2 a.m. when they break things"; and "Create reusable deployment procedures".
(tags: devops work ops deployment testing pager-duty)
There is NO spare capacity for Dublin's water supply
The problem in a nutshell is that for an uncomfortable amount of the year the demand outstrips what the system can comfortably supply. In the graph below you’ll see the red line (demand for water) matches and regularly exceeds the blue line (what’s produced).
(tags: drought water dublin mismanagement capacity dcc dublin-council graphs)
-
Circa 1800, the Cocktail was a “hair of the dog” morning drink that tamed spirits with water, sugar and bitters (patent medicine). The late 19th Century expanded the use of the word “cocktail” to encompass just about any mixed drink. Since then, the Old Fashioned—literally, the old-fashioned way of making a cocktail—has been our contemporary expression of the original drink. During the 20th Century, various bad ideas encrusted the Old Fashioned. Here we will strip off those barnacles to expose the amazingly simple and sublime drink beneath.
thanks to Ben for this one...(tags: recipe alcohol drinks cocktails old-fashioned bourbon bitters)
-
"We assess that Miranda is knowingly carrying material [...] the disclosure or threat of disclosure is designed to influence a government, and is made for the purpose of promoting a political or ideological cause. This therefore falls within the definition of terrorism."
(tags: security david-miranda journalism censorship terrorism the-guardian)
A Brief Tour of FLP Impossibility
One of the most important results in distributed systems theory was published in April 1985 by Fischer, Lynch and Patterson. Their short paper ‘Impossibility of Distributed Consensus with One Faulty Process’, which eventually won the Dijkstra award given to the most influential papers in distributed computing, definitively placed an upper bound on what it is possible to achieve with distributed processes in an asynchronous environment. This particular result, known as the ‘FLP result’, settled a dispute that had been ongoing in distributed systems for the previous five to ten years. The problem of consensus – that is, getting a distributed network of processors to agree on a common value – was known to be solvable in a synchronous setting, where processes could proceed in simultaneous steps. In particular, the synchronous solution was resilient to faults, where processors crash and take no further part in the computation. Informally, synchronous models allow failures to be detected by waiting one entire step length for a reply from a processor, and presuming that it has crashed if no reply is received. This kind of failure detection is impossible in an asynchronous setting, where there are no bounds on the amount of time a processor might take to complete its work and then respond with a message. Therefore it’s not possible to say whether a processor has crashed or is simply taking a long time to respond. The FLP result shows that in an asynchronous setting, where only one processor might crash, there is no distributed algorithm that solves the consensus problem.
(tags: distributed-systems flp consensus-algorithms algorithms distcomp papers proofs)
Find a separating hyperplane with this One Weird Kernel Trick
Terrible internet ad-spam recast as machine-learning spam
'37-year-old patriot discovers "weird" trick to end slavery to the Bayesian monopoly. Discover the underground trick she used to slash her empirical risk by 75% in less than 30 days... before they shut her down. Click here to watch the shocking video! Get the Shocking Free Report!'
(tags: funny via:hmason machine-learning spam wtf svms bayesian)
It’s time for Silicon Valley to ask: Is it worth it?
These companies and their technologies are built on data, and the data is us. If we are to have any faith in the Internet, we have to trust them to protect it. That’s a relationship dynamic that will become only more intertwined as the Internet finds its way into more aspects of our daily existences, from phones that talk to us to cars that drive themselves. The US’s surveillance programs threaten to destroy that trust permanently. America’s tech companies must stand up to this pervasive and corrosive surveillance system. They must ask that difficult question: “Is it worth it?”
(tags: silicon-valley tech nsa gchq spying surveillance internet privacy data-protection)
-
'a service discovery and orchestration tool that is decentralized, highly available, and fault tolerant. Serf runs on every major platform: Linux, Mac OS X, and Windows. It is extremely lightweight: it uses 5 to 10 MB of resident memory and primarily communicates using infrequent UDP messages [and an] efficient gossip protocol.'
(tags: clustering service-discovery ops linux gossip broadcast clusters)
"Effective Computation of Biased Quantiles over Data Streams" [paper]
Skew is prevalent in many data sources such as IP traffic streams.To continually summarize the distribution of such data, a high-biased set of quantiles (e.g., 50th, 90th and 99th percentiles) with finer error guarantees at higher ranks (e.g., errors of 5, 1 and 0.1 percent, respectively) is more useful than uniformly distributed quantiles (e.g., 25th, 50th and 75th percentiles) with uniform error guarantees. In this paper, we address the following two prob-lems. First, can we compute quantiles with finer error guarantees for the higher ranks of the data distribution effectively, using less space and computation time than computing all quantiles uniformly at the finest error? Second, if specific quantiles and their error bounds are requested a priori, can the necessary space usage and computation time be reduced? We answer both questions in the affirmative by formalizing them as the “high-biased” quantiles and the “targeted” quantiles problems, respectively, and presenting algorithms with provable guarantees, that perform significantly better than previously known solutions for these problems. We implemented our algorithms in the Gigascope data stream management system, and evaluated alternate approaches for maintaining the relevant summary structures.Our experimental results on real and synthetic IP data streams complement our theoretical analyses, and highlight the importance of lightweight, non-blocking implementations when maintaining summary structures over high-speed data streams.
Implemented as a timer-histogram storage system in http://armon.github.io/statsite/ .
(tags: statistics quantiles percentiles stream-processing skew papers histograms latency algorithms)
-
A C reimplementation of Etsy's statsd, with some interesting memory optimizations.
Statsite is designed to be both highly performant, and very flexible. To achieve this, it implements the stats collection and aggregation in pure C, using libev to be extremely fast. This allows it to handle hundreds of connections, and millions of metrics. After each flush interval expires, statsite performs a fork/exec to start a new stream handler invoking a specified application. Statsite then streams the aggregated metrics over stdin to the application, which is free to handle the metrics as it sees fit. This allows statsite to aggregate metrics and then ship metrics to any number of sinks (Graphite, SQL databases, etc). There is an included Python script that ships metrics to graphite.
(tags: statsd graphite statsite performance statistics service-metrics metrics ops)
34 Irish pubs listed in Michelin good food guide
if Linnane's and Cronin's are anything to go by, these will be worth a visit
-
A fax machine called my #twilio voice number, this is how @twilio transcribed it.... http://pic.twitter.com/RYh19Pg2pG
This is amazing. Machine talking to machine, with hilarious results(tags: twilio transcription machine audio fax hey-hey-hey you-know-its-hey funny)
-
Founded by Silent Circle and Lavabit. this is promising....
To bring the world our unique end-to-end encrypted protocol and architecture that is the 'next-generation' of private and secure email. As founding partners of The Dark Mail Alliance, both Silent Circle and Lavabit will work to bring other members into the alliance, assist them in implementing the new protocol and jointly work to proliferate the worlds first end-to-end encrypted 'Email 3.0' throughout the world's email providers. Our goal is to open source the protocol and architecture and help others implement this new technology to address privacy concerns against surveillance and back door threats of any kind.
(tags: privacy surveillance email smtp silent-circle lavabit dark-mail open-source standards crypto)
Ponies by Kij Johnson | Tor.com
A rather dark short story about little girls, peer pressure, and childhood. no fun for this dad of 3 girls :( (via Tatu Saloranta)
(tags: via:cowtowncoder writing fiction sf childhood peer-pressure tor ponies)
-
A Histogram that supports recording and analyzing sampled data value counts across a configurable integer value range with configurable value precision within the range. Value precision is expressed as the number of significant digits in the value recording, and provides control over value quantization behavior across the value range and the subsequent value resolution at any given level.
(tags: hdr histogram data-structures coding gil-tene sampling measuring)
Counterfactual Thinking, Rules, and The Knight Capital Accident
John Allspaw with an interesting post on the Knight Capital disaster
(tags: john-allspaw ops safety post-mortems engineering procedures)
Toyota's killer firmware: Bad design and its consequences
This is exactly what you do NOT want to read about embedded systems controlling acceleration in your car:
The Camry electronic throttle control system code was found to have 11,000 global variables. Barr described the code as “spaghetti.” Using the Cyclomatic Complexity metric, 67 functions were rated untestable (meaning they scored more than 50). The throttle angle function scored more than 100 (unmaintainable). Toyota loosely followed the widely adopted MISRA-C coding rules but Barr’s group found 80,000 rule violations. Toyota's own internal standards make use of only 11 MISRA-C rules, and five of those were violated in the actual code. MISRA-C:1998, in effect when the code was originally written, has 93 required and 34 advisory rules. Toyota nailed six of them. Barr also discovered inadequate and untracked peer code reviews and the absence of any bug-tracking system at Toyota.
On top of this, there was no error-correcting RAM in use; stack-killing recursive code; a quoted 94% stack usage; risks of unintentional RTOS task shutdown; buffer overflows; unsafe casting; race conditions; unchecked error code return values; and a trivial watchdog timer check. Crappy, unsafe coding.(tags: firmware horror embedded-systems toyota camry safety acceleration misra-c coding code-verification spaghetti-code cyclomatic-complexity realtime rtos c code-reviews bug-tracking quality)
-
The sounds were not, however, caused by ghosts but by a group of three or four men at least to some degree professionally trained, the FBI now believes, in tunneling: a close-knit and highly disciplined team, perhaps from the construction industry, perhaps even a disgruntled public works crew who decided to put their knowledge of the city’s underside to more lucrative work. After all, Rehder explained, their route into the bank was as much brute-force excavation as it was a retracing of the region’s buried waterways, accessing the neighborhood by way of the city’s complicated storm-sewer network, itself built along old creek beds that no longer appear on city maps. As LAPD lieutenant Doug Collisson, one of the men present on the day of the tunnel’s discovery, explained to the Los Angeles Times back in 1987, the crew behind the burglary “would have had to require some knowledge of soil composition and technical engineering. … The way the shaft itself was constructed, it was obviously well-researched and extremely sophisticated.” Rehder actually goes further, remarking that when Detective Dennis Pagenkopp “showed crime scene photos of the core bit holes” produced by the burglars’ boring upward into the vault “to guys who were in the concrete-coring business, they whistled with professional admiration.”
(tags: cities crime architecture digging tunnels subterranean la lapd banks via:bldgblog sewers)
Link without fear – Copyright in Ireland in a Digital Age
The Copyright Review Committee report has been published. Headline recommendations:
Ensure the right of free speech is a central element of the new copyright regime, including in the areas of parody and satire; Legalise legitimate forms of copying by introducing an explicit and broadly defined “Fair Use” policy. Ensure the extent of copyright ownership is balanced against the public good; Design a system which is clear to all parties, including end users; Design an enforcement mechanism which is easy to understand, transparent and accessible to all parties; Target penalties at those who infringe on copyright rather than on third parties such as intermediaries; Future-proof the new regime by basing it on applicable principles rather than rules relevant to today’s technology only; Make it easy for end-users to identify and engage with owners of copyright material.
Here's hoping Sean Sherlock now does what he said he'd do, and acts on these recommendations.(tags: copyright law ireland reports fair-use free-speech satire parody copying copyfight ownership ip drm linking)
Storm at spider.io - London Storm Meetup 2013-06-18
Not just a Storm success story. Interesting slides indicating where a startup *stopped* using Storm as realtime wasn't useful to their customers
(tags: storm realtime hadoop cascading python cep spider.io anti-spam events architecture distcomp low-latency slides rabbitmq)
-
I like the impromptu docking station hack
Bruce Schneier On The Feudal Internet And How To Fight It
This is very well-put.
In its early days, there was a lot of talk about the "natural laws of the Internet" and how it would empower the masses, upend traditional power blocks, and spread freedom throughout the world. The international nature of the Internet made a mockery of national laws. Anonymity was easy. Censorship was impossible. Police were clueless about cybercrime. And bigger changes were inevitable. Digital cash would undermine national sovereignty. Citizen journalism would undermine the media, corporate PR, and political parties. Easy copying would destroy the traditional movie and music industries. Web marketing would allow even the smallest companies to compete against corporate giants. It really would be a new world order. Unfortunately, as we know, that's not how it worked out. Instead, we have seen the rise of the feudal Internet: Feudal security consolidates power in the hands of the few. These companies [like Google, Apple, Microsoft, Facebook etc.] act in their own self-interest. They use their relationship with us to increase their profits, sometimes at our expense. They act arbitrarily. They make mistakes. They're deliberately changing social norms. Medieval feudalism gave the lords vast powers over the landless peasants; we’re seeing the same thing on the Internet.
(tags: bruce-schneier politics internet feudal-internet google apple microsoft facebook government)
Russia: Hidden chips 'launch malware attacks from irons'
Cyber criminals are planting chips in electric irons and kettles to launch spam [jm: actually, malware] attacks, reports in Russia suggest. State-owned channel Rossiya 24 even showed footage of a technician opening up an iron included in a batch of Chinese imports to find a "spy chip" with what he called "a little microphone". Its correspondent said the hidden devices were mostly being used to spread viruses, by connecting to any computer within a 200m (656ft) radius which were using unprotected Wi-Fi networks. Other products found to have rogue components reportedly included mobile phones and car dashboard cameras.
(tags: wifi viruses spam malware security russia china toasters kettles appliances)
Asteroid "mining" with Linux and FOSS
Planetary Resources is a company with a sky-high (some might claim "pie in the sky") goal: to find and mine asteroids for useful minerals and other compounds. It is also a company that uses Linux and lots of free software. So two of the engineers from Planetary Resources, Ray Ramadorai and Marc Allen, gave a presentation at LinuxCon North America to describe how and why the company uses FOSS—along with a bit about what it is trying to do overall.
(tags: lwn mining planets asteroids space linux foss open-source)
Mac OS 10.9 – Infinity times your spam
a pretty stupid Mail.app IMAP bug hoses Fastmail:
Yes you read that right. It’s copying all the email from the Junk Folder back into the Junk Folder again!. This is legal IMAP, so our server proceeds to create a new copy of each message in the folder. It then expunges the old copies of the messages, but it’s happening so often that the current UID on that folder is up to over 3 million. It was just over 2 million a few days ago when I first emailed the user to alert them to the situation, so it’s grown by another million since. The only way I can think this escaped QA was that they used a server which (like gmail) automatically suppresses duplicates for all their testing, because this is a massively bad problem.
Google: Our Robot Cars Are Better Drivers Than Puny Humans | MIT Technology Review
One of those analyses showed that when a human was behind the wheel, Google’s cars accelerated and braked significantly more sharply than they did when piloting themselves. Another showed that the cars’ software was much better at maintaining a safe distance from the vehicle ahead than the human drivers were. “We’re spending less time in near-collision states,” said Urmson. “Our car is driving more smoothly and more safely than our trained professional drivers.”
(tags: google cars driving safety roads humans robots automation)
-
interesting new data structure, pending addition in Java 8. Basically an array of arrays which presents the API of a single List.
An ordered collection of elements. Elements can be added, but not removed. Goes through a building phase, during which elements can be added, and a traversal phase, during which elements can be traversed in order but no further modifications are possible.
(tags: spinedbuffer data-structures algorithms java jdk jvm java-8 arrays lists)
New political ideals ravaged by ... politics
Direct Democracy Ireland, the party linked to Freemen-on-the-land and the Christian Solidarity Party, is having a bit of a bumpy ride with party governance it sounds like
-
Ho ho.
Michael Hayden, former NSA and CIA boss, who famously argued that the only people complaining about NSA surveillance were internet shut-ins who couldn't get laid, apparently never learned that when you're in a public place, someone might overhear your phone calls. Entrepreneur and former MoveOn.org director Tom Matzzie just so happened to be on the Acela express train from DC to NY when he (1) spotted Hayden sitting behind him and (2) started overhearing a series of "off the record" phone calls with press about the story of the week: the revelations of the NSA spying on foreign leaders. Matzzie did what any self-respecting American would do: live-tweet the calls.
(tags: nsa michael-hayden twitter tom-matzzie funny irony trains interviewing public surveillance)
-
A tool to manage inter-container dependencies so that continuous delivery with Jenkins and Docker is feasible. Looks very helpful
(tags: docker provisioning vms containers dockerize jenkins continuous-delivery continuous-integration)
Is Google building a hulking floating data center in SF Bay?
Looks pretty persuasive, especially considering they hold a patent on the design
(tags: google data-centers bay-area ships containers shipping sea wave-power treasure-island)
Roma, Racism And Tabloid Policing: Interview With Gary Younge : rabble
[This case] shows the link between the popular and the state. This is tabloid journalism followed by tabloid policing. It’s also completely ignorant. I wrote my article on the Roma after covering the community for a week. I thought, “that’s interesting – there’s a range of phenotypes, ways of looking, that include Roma.” I mentioned two blonde kids by chance. I mentioned that Roma are more likely to speak the language of the country they’re in than Romani, more likely to have the religion of the country they’re in. But they have the basic aspect that is true for all identities – they know each other and other people know them. It’s not like I’m an expert on the Roma. I was covering them for a week and after the second day I knew Roma children had blonde hair and blue eyes. These people who took that kid away knew nothing. And on that basis they abducted a child.
(tags: roma racism ireland gary-younge tabloid journalist children hse gardai)
Experian Sold Consumer Data to ID Theft Service
This is what happens when you don't have strong controls on data protection/data privacy -- the US experience.
While [posing as a US-based private investigator] may have gotten the [Vietnam-based gang operating the massive identity fraud site Superget.info] past Experian and/or CourtVentures’ screening process, according to Martin there were other signs that should have alerted Experian to potential fraud associated with the account. For example, Martin said the Secret Service told him that the alleged proprietor of Superget.info had paid Experian for his monthly data access charges using wire transfers sent from Singapore. “The issue in my mind was the fact that this went on for almost a year after Experian did their due diligence and purchased” Court Ventures, Martin said. “Why didn’t they question cash wires coming in every month? Experian portrays themselves as the data-breach experts, and they sell identity theft protection services. How this could go on without them detecting it I don’t know. Our agreement with them was that our information was to be used for fraud prevention and ID verification, and was only to be sold to licensed and credentialed U.S. businesses, not to someone overseas.”
via Simon McGarr(tags: via:tupp_ed privacy security crime data-protection data-privacy experian data-breaches courtventures superget scams fraud identity identity-theft)
European Parliament passes a vote calling for the EU/US SWIFT agreement to be suspended
"the European Parliament has today sent a clear message that enough is enough. The revelations about NSA interception of SWIFT data make a mockery of the EU's agreement with the US, through which the bank data of European citizens is delivered to the US anti-terror system (TFTP). What is the purpose of an agreement like this, which was concluded in good faith, if the US authorities are going to circumvent its provisions? "The EU cannot continue to remain silent in the face of these ongoing revelations: it gives the impression we are little more than a lap dog of the US. If we are to have a healthy relationship with the US, based on mutual respect and benefit, EU governments must not be afraid of defending core EU values when they are infringed. EU leaders must finally take a clear and unambiguous stance on the NSA violations at this week's summit."
(tags: swift banking data eu us nsa interception surveillance snooping diplomacy)
Response to "Optimizing Linux Memory Management..."
A follow up to the LinkedIn VM-tuning blog post at http://engineering.linkedin.com/performance/optimizing-linux-memory-management-low-latency-high-throughput-databases --
Do not read in to this article too much, especially for trying to understand how the Linux VM or the kernel works. The authors misread the "global spinlock on the zone" source code and the interpretation in the article is dead wrong.
Making Storm fly with Netty | Yahoo Engineering
Y! engineer doubles the speed of Storm's messaging layer by replacing the zeromq implementation with Netty
(tags: netty async zeromq storm messaging tcp benchmarks yahoo clusters)
-
Service discovery a la Airbnb -- Nerve and Synapse: two external daemons that run on each node, Nerve to manage registration in Zookeeper, and Synapse to generate a haproxy configuration file from that, running on each host, allowing connections to all other hosts.
(tags: haproxy services ops load-balancing service-discovery nerve synapse airbnb)
The New York Review of Bots - @TwoHeadlines: Comedy, Tragedy, Chicago Bears
What is near-future late-capitalist dystopian fiction but a world where there is no discernible difference between corporations, nations, sports teams, brands, and celebrities? Adam was partly right in our original email thread. @TwoHeadlines is not generating jokes about current events. It is generating jokes about the future: a very specific future dictated by what a Google algorithm believes is important about humans and our affairs.
(tags: google-news google algorithms word-frequency twitter twoheadlines bots news emergent jokes)
-
'Welcome to the New York Review of Bots, a professional journal of automated-agent studies. We aspire to the highest standards of rigorous analysis, but will often just post things we liked that a computer made.'
(tags: robots bots tumblr ai word-frequency markov-chain random twitter)
How to lose $172,222 a second for 45 minutes
Major outage and $465m of trading loss, caused by staggeringly inept software management: 8 years of incremental bitrot, technical debt, and failure to have correct processes to engage an ops team in incident response. Hopefully this will serve as a lesson that software is more than just coding, at least to one industry
(tags: trading programming coding software inept fail bitrot tech-debt ops incident-response)
Basho and Seagate partner to deliver scale-out cloud storage breakthrough
Ha, cool. Skip the OS, write the Riak store natively to the drive. This sounds frankly terrifying ;)
The Seagate Kinetic Open Storage platform eliminates the storage server tier of traditional data center architectures by enabling applications to speak directly to the storage system, thereby reducing expenses associated with the acquisition, deployment, and support of hyperscale storage infrastructures. The platform leverages Seagate’s expertise in hardware and software storage systems integrating an open source API and Ethernet connectivity with Seagate hard drive technology.
Sorry, lobbyists! Europe’s post-Snowden privacy reform gets a major boost
Following months of revelations, and on the same day that France heard its citizens’ phone calls were being reportedly recorded en masse by the Americans, the Parliament’s committee gave a resounding thumbs-up to every single amendment proposed by industrious German Green MEP Jan Phillip Albrecht (pictured above).
lolz.(tags: lobbying tech surveillance privacy eu jan-phillip-albrecht ep spying)
NCCA Junior Cycle - Programming and Coding Consultation Page
the National Council for Curriculum and Assessment are looking for feedback on adding programming to the junior cycle (ie., early secondary school) in Ireland. Add your EUR.02!
(tags: ireland programming coding education schools)
Everything You Always Wanted to Know About Synchronization but Were Afraid to Ask
'the most exhaustive study of [multi-core] synchronization to date'
(tags: synchronization scalability cpus hardware papers via:fanf multicore cas)
WISH: A Monumental 11-Acre Portrait in Belfast by Jorge Rodríguez-Gerada
Must go up and visit this.
Unveiled several days ago in Belfast, Northern Ireland as part of the Belfast Festival, WISH is the latest public art project by Cuban-American artist Jorge Rodriguez-Gerada. The image depicted is of an anonymous Belfast girl and is so large it can only be viewed from the highest points in Belfast or an airplane. Several years in the making, WISH was first plotted on a grid using state-of-the-art Topcon GPS technology and 30,000 manually placed wooden stakes in Belfast’s Titanic Quarter. The portrait was then “drawn” with aid of volunteers who helped place nearly 8 million pounds of natural materials including soil, sand, and rock over a period of four weeks.
(tags: belfast ireland art portraits jorge-rodriguez-gerada land soil)
-
Autoremediation, ie. auto-replacement, of Cassandra nodes in production at Netflix
(tags: ops autoremediation outages remediation cassandra storage netflix chaos-monkey)
Barbarians at the Gateways - ACM Queue
I am a former high-frequency trader. For a few wonderful years I led a group of brilliant engineers and mathematicians, and together we traded in the electronic marketplaces and pushed systems to the edge of their capability.
Insane stuff -- FPGAs embedded in the network switches to shave off nanoseconds of latency.(tags: low-latency hft via:nelson markets stock-trading latency fpgas networking)
Online Algorithms in High-frequency Trading - ACM Queue
one-pass algorithms for computing mean, variance, and linear regression, from the HFT world.
(tags: linear-regression variance mean variability volatility stream-processing online algorithms hft trading)
"Toy Story 2" was almost entirely deleted by accident at one point
A stray "rm -rf" on the main network share managed to wipe out 90% of the movie's assets, and the backups were corrupt. Horrific backups war story
(tags: movies ops backups pixar recovery accidents rm-rf delete)
The Impossible Music of Black MIDI
excellently bananas. 8.49 million separate musical notes in a single 4-minute-long composition (via Paddy Benson)
(tags: music hardcore black-midi midi composition halp digital via:pbenson)
Bitcoin Mining Operating Margin
"The graph showing miners' revenue minus estimated electricity and bandwidth costs." -- down to -694% right now, oh dear
(tags: bitcoin via:peakscale economics mining profit revenue charts electricity bubble)
How to Read a Scientific Paper (About That Researcher With a Nematode in His Mouth) - Wired Science
Let’s rewind to September 2012. It was about then- according to this recently published report (paywall) in The American Journal of Tropical Medicine – that an “otherwise healthy, 36-year-old man” felt a rough patch in his mouth, a scaly little area his right cheek. It didn’t hurt. But then it didn’t stay there either. He started testing for it with his tongue. It traveled. It moved to the back of his mouth, then forward, coiled backwards again. In the language of science: “These rough patches would appear and disappear on a daily basis, giving the patient the indirect sense that there was an organism moving within the oral cavity.”
(tags: nematodes parasites biology medicine paper gross funny wired mouth)
"High Performance Browser Networking", by Ilya Grigorik, read online for free
Wow, this looks excellent. A must-read for people working on systems with high-volume, low-latency phone-to-server communications -- and free!
How prepared are you to build fast and efficient web applications? This eloquent book provides what every web developer should know about the network, from fundamental limitations that affect performance to major innovations for building even more powerful browser applications—including HTTP 2.0 and XHR improvements, Server-Sent Events (SSE), WebSocket, and WebRTC. Author Ilya Grigorik, a web performance engineer at Google, demonstrates performance optimization best practices for TCP, UDP, and TLS protocols, and explains unique wireless and mobile network optimization requirements. You’ll then dive into performance characteristics of technologies such as HTTP 2.0, client-side network scripting with XHR, real-time streaming with SSE and WebSocket, and P2P communication with WebRTC. Deliver optimal TCP, UDP, and TLS performance; Optimize network performance over 3G/4G mobile networks; Develop fast and energy-efficient mobile applications; Address bottlenecks in HTTP 1.x and other browser protocols; Plan for and deliver the best HTTP 2.0 performance; Enable efficient real-time streaming in the browser; Create efficient peer-to-peer videoconferencing and low-latency applications with real-time WebRTC transports
Via Eoin Brazil.(tags: book browser networking performance phones mobile 3g 4g hsdpa http udp tls ssl latency webrtc websockets ebooks via:eoin-brazil google http2 sse xhr ilya-grigorik)
Even the NSA is finding it hard to cope with spam
3 new Snowden leaks, covering acquisition of Yahoo address books, buddy lists, and email account activity, and how spammer activity required intervention to avoid losing useful data in the noise
(tags: spam spammers nsa snowden leaks anti-spam yahoo im mail)
-
slides (lots of slides) from Baron Schwartz' talk at Velocity in NYC.
(tags: slides monitoring metrics ops devops baron-schwartz pdf capacity)
-
Timestamps, as implemented in Riak, Cassandra, et al, are fundamentally unsafe ordering constructs. In order to guarantee consistency you, the user, must ensure locally monotonic and, to some extent, globally monotonic clocks. This is a hard problem, and NTP does not solve it for you. When wall clocks are not properly coupled to the operations in the system, causal constraints can be violated. To ensure safety properties hold all the time, rather than probabilistically, you need logical clocks.
(tags: clocks time distributed databases distcomp ntp via:fanf aphyr vector-clocks last-write-wins lww cassandra riak)
Reverse Engineering a D-Link Backdoor
Using the correct User-Agent: string, all auth is bypassed on several released models of D-Link and Planex routers. Horrific fail by D-Link
(tags: d-link security backdoors authorization reversing planex networking routers)
-
one of the most obvious inferences from the Snowden revelations published by the Guardian, New York Times and ProPublica recently is that the NSA has indeed been up to the business of inserting covert back doors in networking and other computing kit. The reports say that, in addition to undermining all of the mainstream cryptographic software used to protect online commerce, the NSA has been "collaborating with technology companies in the United States and abroad to build entry points into their products". These reports have, needless to say, been strenuously denied by the companies, such as Cisco, that make this networking kit. Perhaps the NSA omitted to tell DARPA what it was up to? In the meantime, I hear that some governments have decided that their embassies should no longer use electronic communications at all, and are returning to employing couriers who travel the world handcuffed to locked dispatch cases. We're back to the future, again.
(tags: politics backdoors snowden snooping networking cisco nsa gchq)
Azerbaijan accidentally publishes the results of its election before the polls open
The mistake came when an electoral commission accidentally published results showing a victory for Ilham Aliyev, the country’s long-standing President, a day before voting. Meydan TV, an online channel critical of the government, released a screenshot from a mobile app for the Azerbaijan Central Election Commission which showed that Mr Aliyev had received 72.76 per cent of the vote compared with 7.4 per cent for the opposition candidate, Jamil Hasanli. The screenshot also indicates that the app displayed information about how many people voted at various times during the day. Polls opened at 8am.
(tags: azerbaijan corruption fix elections voting voter-fraud)
-
According to EasyDNS:
Any registrar that has taken one of these sites offline that now impedes the registrants of those domains from simply getting their domain names out of there and back online somewhere else will then be subject to the TDRP – Transfer Dispute Resolution Policy and if they lose (which they will) they will be subject to TDRP fees assesed by the registry operator, and to quote the TDRP itself "Transfer dispute resolution fees can be substantial". This is why it is never a good idea to just react to pressure in the face of obnoxious bluster – in the very act of trying to diffuse any perceived culpability you end up opening yourself to real liability.
(tags: tdrp easydns dns registrars domains piracy law due-process)
Schneier on Security: Air Gaps
interesting discussion in the comments. "Patricia"'s process is particularly hair-raisingly complex, involving 3 separate machines and a multitude of VMs
(tags: air-gaps security networking bruce-schneier via:adulau)
New faculty positions versus new PhDs
The ever-plummeting chances of a PhD finding a faculty job:
Since 1982, almost 800,000 PhDs were awarded in science and engineering fields, whereas only about 100,000 academic faculty positions were created in those fields within the same time frame. The number of S&E PhDs awarded annually has also increased over this time frame, from ~19,000 in 1982 to ~36,000 in 2011. The number of faculty positions created each year, however, has not changed, with roughly 3,000 new positions created annually.
(via Javier Omar Garcia)(tags: via:javier career academia phd science work study research)
-
Sometimes good judgment can compel us to act illegally. Should a self-driving vehicle get to make that same decision?
(tags: ethics stories via:chris-horn the-atlantic driving cars law robots self-driving-vehicles)
-
'A Ruby gem providing "time travel" and "time freezing" capabilities, making it dead simple to test time-dependent code. It provides a unified method to mock Time.now, Date.today, and DateTime.now in a single call.' This is about the nicest mock-time library I've found so far. (via Ben)
(tags: time ruby testing coding unit-tests mocking timecop via:ben)
The 29 Stages Of A Twitterstorm
this is brilliant
(tags: uk twitter media funny pricehound racism outrage pitchforks rage social-media)
'Experience of software engineers using TLA+, PlusCal and TLC' [slides] [pdf]
by Chris Newcombe, an AWS principal engineer. Several Amazonians sharing their results in simulating tricky distributed-systems problems using formal methods
(tags: tla+ pluscal tlc formal-methods simulation proving aws amazon architecture design)
LinkBench: A database benchmark for the social graph
However, the gold standard for database benchmarking is to test the performance of a system on the real production workload, since synthetic benchmarks often don't exercise systems in the same way. When making decisions about a significant component of Facebook's infrastructure, we need to understand how a database system will really perform in Facebook's production workload. [....] LinkBench addresses these needs by replicating the data model, graph structure, and request mix of our MySQL social graph workload.
Mentioned in a presentation from Peter Bailis, http://www.hpts.ws/papers/2013/bailis-hpts-2013.pdf(tags: graph databases mysql facebook performance testing benchmarks workloads)
-
from the Percona toolkit. 'Conveniently summarizes the status and configuration of a server. It is not a tuning tool or diagnosis tool. It produces a report that is easy to diff and can be pasted into emails without losing the formatting. This tool works well on many types of Unix systems.' --- summarises OOM history, top, netstat connection table, interface stats, network config, RAID, LVM, disks, inodes, disk scheduling, mounts, memory, processors, and CPU.
(tags: percona tools cli unix ops linux diagnosis raid netstat oom)
How much can an extra hour's sleep change you?
What they discovered is that when the volunteers cut back from seven-and-a-half to six-and-a-half hours' sleep a night, genes that are associated with processes like inflammation, immune response and response to stress became more active. The team also saw increases in the activity of genes associated with diabetes and risk of cancer. The reverse happened when the volunteers added an hour of sleep.
-
some great phone cases from an Irish company, with nifty art by Irish illustrators and artists including Fatti Burke and Chris Judge
(tags: chris-judge fatti-burke illustrators art ireland iphone cases)
What drives JVM full GC duration
Interesting empirical results using JDK 7u21:
Full GC duration depends on the number of objects allocated and the locality of their references. It does not depend that much on actual heap size.
Reference locality has a surprisingly high effect.Rhizome | Occupy.here: A tiny, self-contained darknet
Occupy.here began two years ago as an experiment for the encampment at Zuccotti Park. It was a wifi router hacked to run OpenWrt Linux (an operating system mostly used for computer networking) and a small "captive portal" website. When users joined the wifi network and attempted to load any URL, they were redirected to http://occupy.here. The web software offered up a simple BBS-style message board providing its users with a space to share messages and files.
Nifty project from Dan Phiffer.Whatever Happened to "Due Process" ?
Mark Jeftovic is on fire after receiving yet another "take down this domain or else" mail from the City of London police:
We have an obligation to our customers and we are bound by our Registrar Accreditation Agreements not to make arbitrary changes to our customers settings without a valid FOA (Form of Authorization). To supersede that we need a legal basis. To get a legal basis something has to happen in court. [...] What gets me about all of this is that the largest, most egregious perpetrators of online criminal activity right now are our own governments, spying on their own citizens, illegally wiretapping our own private communications and nobody cares, nobody will answer for it, it's just an out-of-scope conversation that is expected to blend into the overall background malaise of our ever increasing serfdom. If I can't make various governments and law enforcement agencies get warrants or court orders before they crack my private communications then I can at least require a court order before I takedown my own customer.
(tags: city-of-london police takedowns politics mark-jeftovic easydns registrars dns via:tjmcintyre)
-
The problem with software patents, part XVII.
So you have a situation where even when the original patent holder donated the patent for "the public good," sooner or later, an obnoxious patent troll like IV comes along and turns it into a weapon. Again: AmEx patented those little numbers on your credit card, and then for the good of the industry and consumer protection donated the patent to a non-profit, who promised not to enforce the patent against banks... and then proceeded to sell the patent to Intellectual Ventures who is now suing banks over it.
(tags: intellectual-ventures scams patents swpats shakedown banking cvv american-express banks amex cmaf)
SPSC revisited part III - FastFlow + Sparse Data
holy moly. This is some heavily-optimized mechanical-sympathy Java code. By using a sparse data structure, cache-aligned fields, and wait-free low-level CAS concurrency primitives via sun.misc.Unsafe, a single-producer/single-consumer queue implementation goes pretty damn fast compared to the current state of the art
(tags: nitsanw optimization concurrency java jvm cas spsc queues data-structures algorithms)
Non-blocking transactional atomicity
interesting new distributed atomic transaction algorithm from Peter Bailis
(tags: algorithms database distributed scalability storage peter-bailis distcomp)
ZeroMQ: Helping us Block Malicious Domains in Real Time - Umbrella Security Labs
nice writeup of a ZeroMQ/Hadoop event processing pipeline architecture
(tags: zeromq hadoop event-processing architecture dns backend reputation)
Man sues RMV after driver's license mistakenly revoked by automated anti-terror false positive:
John H. Gass hadn’t had a traffic ticket in years, so the Natick resident was surprised this spring when he received a letter from the Massachusetts Registry of Motor Vehicles informing him to cease driving because his license had been revoked. [...] After frantic calls and a hearing with Registry officials, Gass learned the problem: An antiterrorism computerized facial recognition system that scans a database of millions of state driver’s license images had picked his as a possible fraud. “We send out 1,500 suspension letters every day," said Registrar Rachel Kaprielian. [...] “There are mistakes that can be made."
See also this New Scientist story. This story notes that the system's pretty widespread:
Massachusetts bought the system with a $1.5 million grant from the Department of Homeland Security. At least 34 states use such systems, which law enforcement officials say help prevent identity theft and ID fraud.
In my opinion, this kind of thing -- trial by inaccurate, false-positive-prone algorithm, is one of the most worrying things about the post-PRISM world.
When we created SpamAssassin, we were well aware of the risk of automated misclassification. Any machine-learning classifier will always make mistakes. The key is to carefully calibrate the expected false-positive/false-negative ratio so that the negative side-effects of a misclassification corresponds to the expected rate.
These anti-terrorism machine learning systems are calibrated to catch as many potential cases as possible, but by aiming to reduce false negatives to this degree, they become wildly prone to false positives. And when they're applied as a dragnet across all citizens' interactions with the state -- or even in the case of PRISM, all citizens' interactions that can be surveilled en masse -- it's going to create buckets of bureaucratic false-positive horror stories, as random innocent citizens are incorrectly tagged as criminals due to software bugs and poor calibration.
Rapid read protection in Cassandra 2.0.2
Nifty new feature -- if a request takes over the 99th percentile for requests to that server, it'll be repeated against another replica. Unnecessary for Voldemort, of course, which queries all replicas anyway!
(tags: cassandra nosql replication distcomp latency storage)
Attacking Tor: how the NSA targets users' online anonymity
As part of the Turmoil system, the NSA places secret servers, codenamed Quantum, at key places on the internet backbone. This placement ensures that they can react faster than other websites can. By exploiting that speed difference, these servers can impersonate a visited website to the target before the legitimate website can respond, thereby tricking the target's browser to visit a Foxacid server.
whoa, I missed this before.(tags: nsa gchq packet-injection attacks security backbone http latency)
GCHQ report on 'MULLENIZE' program to 'stain' anonymous electronic traffic
By modifying the User-Agent: header string, each HTTP transaction is "stained" to allow tracking. huh
(tags: gchq nsa snooping sniffing surveillance user-agent http browsers leaks)
Giving Docker/LXC containers a routable IP address
ugh, this is a mess. Docker, automate this crap
(tags: docker routing linux ops networking containers virtualization)
How the feds took down the Dread Pirate Roberts | Ars Technica
Well-written, comprehensive writeup of the Silk Road takedown, and the libertarian craziness of Ross William Ulbricht, it's alleged owner and operator
(tags: silk-road drugs crazy ross-william-ulbricht fbi libertarian murder tor)
Patent troll Lodsys chickens out, folds case rather than face Eugene Kaspersky
In Kaspersky's view, patent trolls are no better than the extortionists who cropped up in Russia after the fall of the Soviet Union, when crime ran rampant. Kaspersky saw more and more people becoming victims of various extortion schemes. US patent trolls seemed very similar. "Kaspersky's view was that paying patent trolls was like paying a protection racket," said Kniser. He wasn't going to do it.
yay! pity it didn't manage to establish precedent, though. But go Kaspersky!(tags: eugene-kaspersky shakedowns law east-texas swpats patents patent-trolls)
Sergio Bossa's thoughts about Datomic
good comments from Sergio, particularly about the scalability of the single transactor in the Datomic architecture. I agree it's a worrying design flaw
(tags: clojure nosql datomic sergio-bossa transactor spof architecture storage)
Codex Seraphinianus: A new edition of the strangest book in the world
Excited! one commenter claims a paperback of the new edition of Luigi Serafini's masterwork should cost about $75 when it comes out in a couple of months. sign me up, this is an amazing work
(tags: codex-seraphinianus art weird strange books luigi-serafini)
The Snowden files: why the British public should be worried about GCHQ
When the Guardian offered John Lanchester access to the GCHQ files, the journalist and novelist was initially unconvinced. But what the papers told him was alarming: that Britain is sliding towards an entirely new kind of surveillance society
(tags: john-lanchester gchq guardian surveillance snooping police-state nsa privacy government)
Groundbreaking Results for High Performance Trading with FPGA and x86 Technologies
The enhancement in performance was achieved by providing a fast-path where trades are executed directly by the FPGA under the control of trigger rules processed by the x86 based functions. The latency is reduced further by two additional techniques in the FPGA – inline parsing and pre-emption. As market data enters the switch, the Ethernet frame is parsed serially as bits arrive, allowing partial information to be extracted and matched before the whole frame has been received. Then, instead of waiting until the end of a potential triggering input packet, pre-emption is used to start sending the overhead part of a response which contains the Ethernet, IP, TCP and FIX headers. This allows completion of an outgoing order almost immediately after the end of the triggering market feed packet.
Insane stuff. (Via Martin Thompson)(tags: via:martin-thompson insane speed low-latency fpga fast-path trading stock-markets performance optimization ethernet)
Why Tellybug moved from Cassandra to Amazon DynamoDB
Summary: poor reliability, better latencies, and cheaper (!)
(tags: aws dynamodb cassandra nosql storage tellybug counters scalability reliability latency)
-
Interviews with 2 New York bike thieves (one bottom feeder, one professional), reviewing the current batch of bicycle locks. Summary: U-locks are good, when used correctly, particularly the Kryptonite New York Lock ($80). On the other hand, Dublin's recent spate of thefts are largely driven by wide availability of battery-powered angle grinders (thanks Lidl!), which, according to this article, are relatively quiet and extremely fast. :(
Fingerprints are Usernames, not Passwords
I could see some value, perhaps, in a tablet that I share with my wife, where each of us have our own accounts, with independent configurations, apps, and settings. We could each conveniently identify ourselves by our fingerprint. But biometrics cannot, and absolutely must not, be used to authenticate an identity. For authentication, you need a password or passphrase. Something that can be independently chosen, changed, and rotated. [...] Once your fingerprint is compromised (and, yes, it almost certainly already is, if you've crossed an international border or registered for a driver's license in most US states), how do you change it? Are you starting to see why this is a really bad idea?
(tags: biometrics apple security fingerprints passwords authentication authorization identity)
-
This is a pretty good summary of the salient points from the criminal complaint against Ross William Ulbricht -- I'd say it's pretty bad news for any users of the dodgy site, particularly given this:
"During the 60-day period from May 24, 2013 to July 23, 2013, there were approximately 1,217,218 communications sent between Silk Road users through Silk Road's private-message system."
According to the complaint, those are now in the FBI's hands -- likely unencrypted.(tags: crime silk-road drugs busts tor ross-william-ulbricht fbi)
-
ouch. some serious slagging here, along with taco science. (BTW we have the same problem with carne asada in Ireland, our taquerias use the cheater method too, sadly)
(tags: la tacos mexican food new-york slagging burritos taquerias carne-asada)
Edward Snowden's E-Mail Provider Defied FBI Demands to Turn Over SSL Keys, Documents Show
Levison lost [in secret court against the government's order]. In a work-around, Levison complied the next day by turning over the private SSL keys as an 11 page printout in 4-point type. The government called the printout “illegible” and the court ordered Levison to provide a more useful electronic copy.
Nice try though! Bottom line is they demanded the SSL private key. (via Waxy)(tags: government privacy security ssl tls crypto fbi via:waxy secrecy snooping)
Poisson Rouge: Crowdfunding Red Fish style
the fantastic French kids' site is now crowdfunding new work -- first off being a German Alphabet part of the site. My kids love their stuff, so -- bonne chance!
(tags: french poisson-rouge flash web kids children education)
How an Engineer Earned 1.25 Million Air Miles By Buying Pudding
An amazing hack. 'Air Miles are awesome, they can be used to score free flights, hotel stays and if you’re really lucky, the scorn and hatred of everyone you come in contact with who has to pay full price when they travel. The king of all virtually free travelers is one David Phillips, a civil engineer who teaches at the University of California, Davis. David came to the attention of the wider media when he managed to convert about 12,150 cups of Healthy Choice chocolate pudding [costing $3000] into over a million Air Miles. Ever since, David and his entire family have been travelling the world for next to nothing.' (via al3xandru)
(tags: via:al3xandru hacks cool pudding small-print air-miles free)
-
An adventure that takes you through several popular Java language features and shows how they compile to bytecode and eventually JIT to assembly code.
(tags: charles-nutter java jvm compilation reversing talks slides)
Model checking for highly concurrent code
Applied formal methods in order to test distributed systems -- specifically GlusterFS:
I'll use an example from my own recent experience. I'm developing a new kind of replication for GlusterFS. To make sure the protocol behaves correctly even across multiple failures, I developed a Murphi model for it. [...] I added a third failure [to the simulated model]. I didn't expect a three-node system to continue working if more than one of those were concurrent (the model allows the failures to be any mix of sequential and concurrent), but I expected it to fail cleanly without reaching an invalid state. Surprise! It managed to produce a case where a reader can observe values that go back in time. This might not make much sense without knowing the protocol involved, but it might give some idea of the crazy conditions a model checker will find that you couldn't possibly have considered. [...] So now I have a bug to fix, and that's a good thing. Clearly, it involves a very specific set of ill-timed reads, writes, and failures. Could I have found it by inspection or ad-hoc analysis? Hell, no. Could I have found it by testing on live systems? Maybe, eventually, but it probably would have taken months for this particular combination to occur on its own. Forcing it to occur would require a lot of extra code, plus an exerciser that would amount to a model checker running 100x slower across machines than Murphi does. With enough real deployments over enough time it would have happened, but the only feasible way to prevent that was with model checking. These are exactly the kinds of bugs that are hardest to fix in the field, and that make users distrust distributed systems, so those of us who build such systems should use every tool at our disposal to avoid them.
(tags: model-checking formal-methods modelling murphi distcomp distributed-systems glusterfs testing protocols)
Is Trypophobia a Real Phobia? | Popular Science
ie. "fear of small, clustered holes". Sounds like it's not so much a "phobia" as some kind of innate, visceral disgust response; I get it. 'As for who actually made the word up, that distinction probably belongs to a blogger in Ireland named Louise, Andrews says. According to an archived Geocities page, Louise settled on "trypophobia" (Greek for "boring holes" + "fear") after corresponding with a representative at the Oxford English Dictionary. Louise, Andrews and trypophobia Facebook group members have petitioned the dictionary to include the word. The term will need to be used for years and have multiple petitions and scholarly references before the dictionary accepts it, Andrews says. I, for one, would prefer to forget about it forever.'
(tags: disgusting revulsion fear phobias trypophobia holes ugh innate)
Common phobia you have never heard of: Fear of holes may stem from evolutionary survival response
"We think that everyone has trypophobic tendencies even though they may not be aware of it," said Dr Cole. "We found that people who don't have the phobia still rate trypophobic images as less comfortable to look at than other images. It backs up the theory that we are set-up to be fearful of things which hurt us in our evolutionary past. We have an innate predisposition to be wary of things that can harm us."
(tags: trypophobia holes fear aversion disgust ugh evolution innate)