Justin's Linklog Posts
AWS re:Invent 2016: Lessons Learned from a Year of Using Spot Fleet (CMP205) – YouTube
Yelp talk about their Spot Fleet price optimization autoscaler app, FleetMiser
(tags: yelp scaling aws spot-fleet ops spot-instances money)
4 Wi-Fi Tips from Former Apple Wi-Fi Engineer
Good tips: use the same SSID for all radios; deal with congestion with more APs using less power; don’t use “Wide” channels on 2.4Ghz; and place antennae perpendicular to each other.
(tags: wifi 2.4ghz 5ghz networking hardware macs apple tips)
The hidden cost of QUIC and TOU
The recent movement to get all traffic encrypted has of course been great for the Internet. But the use of encryption in these protocols is different than in TLS. In TLS, the goal was to ensure the privacy and integrity of the payload. It’s almost axiomatic that third parties should not be able to read or modify the web page you’re loading over HTTPS. QUIC and TOU go further. They encrypt the control information, not just the payload. This provides no meaningful privacy or security benefits. Instead the apparent goal is to break the back of middleboxes [0]. The idea is that TCP can’t evolve due to middleboxes and is pretty much fully ossified. They interfere with connections in all kinds of ways, like stripping away unknown TCP options or dropping packets with unknown TCP options or with specific rare TCP flags set. The possibilities for breakage are endless, and any protocol extensions have to jump through a lot of hoops to try to minimize the damage.
(tags: quic tou protocols http tls security internet crypto privacy firewalls debugging operability)
Slicer: Auto-sharding for datacenter applications
Paper from Google describing one of their internal building block services:
A general purpose sharding service. I normally think of sharding as something that happens within a (typically data) service, not as a general purpose infrastructure service. What exactly is Slicer then? It has two key components: a data plane that acts as an affinity-aware load balancer, with affinity managed based on application-specified keys; and a control plane that monitors load and instructs applications processes as to which keys they should be serving at any one point in time. In this way, the decisions regarding how to balance keys across application instances can be outsourced to the Slicer service rather than building this logic over and over again for each individual back-end service. Slicer is focused exclusively on the problem of balancing load across a given set of backend tasks, other systems are responsible for adding and removing tasks.
interesting.(tags: google sharding slicer architecture papers)
Cherami: Uber Engineering’s Durable and Scalable Task Queue in Go – Uber Engineering Blog
a competing-consumer messaging queue that is durable, fault-tolerant, highly available and scalable. We achieve durability and fault-tolerance by replicating messages across storage hosts, and high availability by leveraging the append-only property of messaging queues and choosing eventual consistency as our basic model. Cherami is also scalable, as the design does not have single bottleneck. […] Cherami is completely written in Go, a language that makes building highly performant and concurrent system software a lot of fun. Additionally, Cherami uses several libraries that Uber has already open sourced: TChannel for RPC and Ringpop for health checking and group membership. Cherami depends on several third-party open source technologies: Cassandra for metadata storage, RocksDB for message storage, and many other third-party Go packages that are available on GitHub. We plan to open source Cherami in the near future.
(tags: cherami uber queueing tasks queues architecture scalability go cassandra rocksdb)
The Perfect Weapon: How Russian Cyberpower Invaded the U.S. – The New York Times
This is scary shit. It’s amazing how Russia has weaponised transparency, but I guess it’s not new to observers of “kompromat”: https://en.wikipedia.org/wiki/Kompromat
(tags: kompromat russia cyberpower cyberwar security trump us-politics dnc)
Did the Russians “hack” the election? A look at the established facts | Ars Technica
solid roundup. There’s a whole lot of evidence pointing Russia’s way, basically
(tags: usa russia hacking politics security us-politics trump)
-
good preso from Percona Live 2015 on the messiness of MySQL vs UTF-8 and utf8mb4
(tags: utf-8 utf8mb4 mysql storage databases slides booking.com character-sets)
-
A new data structure for accurate on-line accumulation of rank-based statistics such as quantiles and trimmed means. The t-digest algorithm is also very parallel friendly making it useful in map-reduce and parallel streaming applications. The t-digest construction algorithm uses a variant of 1-dimensional k-means clustering to product a data structure that is related to the Q-digest. This t-digest data structure can be used to estimate quantiles or compute other rank statistics. The advantage of the t-digest over the Q-digest is that the t-digest can handle floating point values while the Q-digest is limited to integers. With small changes, the t-digest can handle any values from any ordered set that has something akin to a mean. The accuracy of quantile estimates produced by t-digests can be orders of magnitude more accurate than those produced by Q-digests in spite of the fact that t-digests are more compact when stored on disk.
Super-nice feature is that it’s mergeable, so amenable to parallel usage across multiple hosts if required. Java implementation, ASL licensing.(tags: data-structures algorithms java t-digest statistics quantiles percentiles aggregation digests estimation ranking)
How Putin’s cronies seized control of VKontakte
via Pinboard. grim
(tags: putin russia vk vkontacte social-media politics censorship totalitarianism)
Ask HN: Best current model routers for OpenWRT, DD-WRT, Tomato, etc.?
good hardware recommendations
A Yale history professor’s 20-point guide to defending democracy under a Trump presidency — Quartz
Good advice — let’s hope it doesn’t come to this. Example: ’17. Watch out for the paramilitaries: When the men with guns who have always claimed to be against the system start wearing uniforms and marching around with torches and pictures of a Leader, the end is nigh. When the pro-Leader paramilitary and the official police and military intermingle, the game is over.’
(tags: trump activism government politics us-politics right-wing history hitler nazis fascism)
Commentary: The ‘Irish’ Startup Attribution Problem
Why don’t Irish tech startup activity show up on a EU-wide comparisons? Turns out we tend to transition to a US-based model, with US-based management and EU-based operations and engineering, like $work does:
Successful Irish tech companies have a skewed geographic profile. This presents a data gathering problem for the data companies but its also a strong indicator of the market reality for Irish startups. The size of the local market and a focus on software business in particular means many Irish startups are transitioning to the US (some earlier and with more commitment than others), and getting backed by a spectrum of local and international VCs.
Correcting for this put Ireland’s tech venture investment in the second half of 2014 at $125m, midway between Sweden and Finland, 8th in Europe overall.
Hi-tech caves bring prehistoric Sistine chapel back to life
ooh, Lascaux 4 is finally opening:
St-Cyr added: “It’s impossible for anyone to see the original now, but this is the next best thing. What is lost in not having the real thing is balanced by the fact people can see so much more of the detail of the wonderful paintings and engravings.”
Contactless credit cards vulnerable to a range of scams
Johanson said it’s possible to use an RFID “gate antenna” — two electronic readers spanning a doorway, similar to the anti-theft gates in retail stores — to scan the credit cards of people passing through. With enough high-powered gates installed at key doorways in a city or across the country, someone could collect comprehensive information on people’s movements, buying habits and social patterns. “These days you can buy a $500 antenna to mount in doorways that can read every card that goes through it,” Johanson said.
Amazingly, these seem to be rife with holes — they still use the legacy EMV protocol, do not require online verification with backend systems, and allow replay attacks. A Journal.ie article today claims that attackers are sniffing EMV data, then replaying it against card readers in shops in Dublin, which while it may not be true, the attack certainly seems viable…(tags: rfid security scams emv wireless contactless credit-cards replay-attacks)
Counterfeit Macbook charger teardown: convincing outside but dangerous inside
rather dramatic differences
(tags: apple macbook chargers components hardware clones counterfeit)
Developer Preview – EC2 Instances (F1) with Programmable Hardware
this is frankly amazing. Elastic FPGAs!
-
USB DAC strongly recommended by Soren Ragsdale — EUR66
(tags: usb dac music audio hardware recommendations tips toget)
Trump’s lies have a purpose. They are an assault on democracy
Donald Trump’s media strategy as a form of Surkovian control via post-truth ‘destabilised perception’, through deliberate flooding with fake news:
By attacking the very notion of shared reality, the president-elect is making normal democratic politics impossible. When the truth is little more than an arbitrary personal decision, there is no common ground to be reached and no incentive to look for it. To men like Surkov, that is exactly as it should be. Government policy should not be set through democratic oversight; instead, the government should “manage” democracy, ensuring that people can express themselves without having any influence over the machinations of the state. According to a 2011 openDemocracy article by Richard Sakwa, a professor of Russian and European politics at the University of Kent, Surkov is “considered the main architect of what is colloquially known as ‘managed democracy,’ the administrative management of party and electoral politics.” “Surkov’s philosophy is that there is no real freedom in the world, and that all democracies are managed democracies, so the key to success is to influence people, to give them the illusion that they are free, whereas in fact they are managed,” writes Sakwa. “In his view, the only freedom is ‘artistic freedom.’”
(tags: post-truth lies donald-trump surkov breitbart pr media news propaganda fake-news)
PayWave & PayPass deletion via RFID antenna kill
remove RFID from a payment card with a single drilled hole
(tags: rfid banking cards debit-cards credit-cards)
Fast Forward Labs: Probabilistic Data Structure Showdown: Cuckoo Filters vs. Bloom Filters
Nice comparison of a counting Bloom filter and a Cuckoo Filter, implemented in Python:
This post provides an update by exploring Cuckoo filters, a new probabilistic data structure that improves upon the standard Bloom filter. The Cuckoo filter provides a few advantages: 1) it enables dynamic deletion and addition of items 2) it can be easily implemented compared to Bloom filter variants with similar capabilities, and 3) for similar space constraints, the Cuckoo filter provides lower false positives, particularly at lower capacities. We provide a python implementation of the Cuckoo filter here, and compare it to a counting Bloom filter (a Bloom filter variant).
(tags: algorithms probabilistic approximation bloom-filters cuckoo-filters sets estimation python)
-
Football Manager includes what is effectively a parallel universe, so they modelled the effects of Brexit on the UK Premier League: ‘In my own current “save”, Brexit kicked in at the end of season three. Unfortunately I got one of the hard options, where all non-homegrown players are now going through a work permit system, albeit one that’s slightly relaxed. It means I can no longer bring in that 19-year-old Italian keeper I’d been eyeing up as one for the future. Instead I have to wait for him to break into the Italian squad, and play 30% of their fixtures over the next two years. Then he’ll be mine. Meanwhile, my TV revenue has just dropped by a few million. Let’s hope that doesn’t continue, or I won’t even be able to afford him.’
(tags: brexit uk games gaming football-manager forecasts simulation)
Accidentally Quadratic — Rust hash iteration+reinsertion
It was recently discovered that some surprising operations on Rust’s standard hash table types could go quadratic.
Quite a nice unexpected accidental detour into O(n^2)(tags: big-o hashing robin-hood-hashing siphash algorithms hashtables rust)
Reproducible research: Stripe’s approach to data science
This is intriguing — using Jupyter notebooks to embody data analysis work, and ensure it’s reproducible, which brings better rigour similarly to how unit tests improve coding. I must try this.
Reproducibility makes data science at Stripe feel like working on GitHub, where anyone can obtain and extend others’ work. Instead of islands of analysis, we share our research in a central repository of knowledge. This makes it dramatically easier for anyone on our team to work with our data science research, encouraging independent exploration. We approach our analyses with the same rigor we apply to production code: our reports feel more like finished products, research is fleshed out and easy to understand, and there are clear programmatic steps from start to finish for every analysis.
(tags: stripe coding data-science reproducability science jupyter notebooks analysis data experiments)
Introducing Veneur: high performance and global aggregation for Datadog
neat — aggregation of histograms for Datadog statsd
(tags: datadog statsd metrics percentiles ops)
-
auditd -> go-audit -> elasticsearch at Slack
Irish eyes are crying: Tens of thousands of broadband modems wide open to hijacking
Eir ship vulnerable firmware images AGAIN. ffs
(tags: eircom eir fail firmware security zyxel d1000 tr-064)
“Solving Imaginary Scaling Issues” … “At Scale”
Amazing virtuoso performance — be sure to scroll up all the way to Chapter 1
(tags: scalability funny lol twitter oreilly)
Webhooks do’s and dont’s: what we learned after integrating +100 APIs
interesting tips
(tags: webhooks api http https architecture)
Dynamically Scale Applications on Amazon EMR with Auto Scaling
good call — new EMR feature
Testing@LMAX – Time Travel and the TARDIS
LMAX’ approach to acceptance/system-testing time-dependent code. We are doing something similar in Swrve too, so finding that LMAX have taken a similar approach is a great indicator
(tags: lmax testing system-tests acceptance-tests tests time)
Heineken refreshed by ‘craft beer’ ruling
scumbags. Attempting to pass off their pissy beer under alternative names to con consumers into buying it! ‘There will be no sanctions against Heineken for passing off non-craft beer as “locally produced”, the Food Safety Authority of Ireland (FSAI) has said. The FSAI and HSE launched a joint investigation last month after it emerged that Heineken Ireland had sold some of its products, including Foster’s lager, under craft-type names such as Blasket Blonde and Beanntrai Bru. Two well-known stouts, Beamish and Murphy’s, were also sold under craft-type names by the international brewing giant. C&C, a Tipperary-based drinks company, was also investigated after it admitted selling its Clonmel 1650 lager under a different name, Pana Cork, in Cork.’
Simple Queue Service FIFO Queues with Exactly-Once Processing & Deduplication
great, I’ve looked for this so many times. Only tricky limit I can spot is the 300 tps limit, and it’s US-East/US-West only for now
“Get In Control Of Your Workflows With Airflow”
good intro to Airflow usage preso
(tags: airflow presentations ops workflow scheduling scheduler)
Etsy Debriefing Facilitation Guide
by John Allspaw, Morgan Evans and Daniel Schauenberg; the Etsy blameless postmortem style crystallized into a detailed 27-page PDF ebook
(tags: etsy postmortems blameless ops production debriefing ebooks)
-
‘bike-shedding’, or needless arguing about trivial issues, actually dates back to 1957 as C. Northcote Parkinson’s ‘law of triviality’
(tags: triviality bikeshed bikeshedding management arguments decisions history)
Julia Evans reverse engineers Skyliner.io
simple usage of Docker, blue/green deploys, and AWS ALBs
(tags: docker alb aws ec2 blue-green-deploys deployment ops tools skyliner via:jgilbert)
IPBill ICRs are the perfect material for 21st-century blackmail
ICRs are the perfect material for blackmail, which makes them valuable in a way that traditional telephone records are not. And where potentially large sums of money are involved, corruption is sure to follow. Even if ICR databases are secured with the best available technology, they are still vulnerable to subversion by individuals whose jobs give them ready access. This is no theoretical risk. Just one day ago, it emerged that corrupt insiders at offshore call centres used by Australian telecoms were offering to sell phone records, home addresses, and other private details of customers. Significantly, the price requested was more if the target was an Australian “VIP, politician, police [or] celebrity.”
(tags: blackmail privacy uk-politics uk snooping surveillance icrs australia phone-records)
Docklands Print Commission 2016: Colin Martin
I love Colin’s work. just may spring for this one
(tags: colin-martin art prints etchings dublin history vinyl)
-
a low-cost online vendor in Ireland, recommended by @irldexter on ITS (along with webdoctor.ie): ‘For basic consultations I halved the cost €55 to engage a GP with https://www.webdoctor.ie/ down to €25 (for limited domains) and after paying €8.48 and €9.48 respectively for a Ventolin inhaler, I now get them for €3.50 at http://www.purepharmacy.ie/ (closer to mainland EU costs). I also benchmarked my parents medicine costs which worked out 40% cheaper too.’
(tags: recommendations pharmacy ireland doctors health medicine)
Rents dwarf Celtic Tiger era with ‘disastrous effect’ on society
“The scale of the challenge here remains depressing,” says the report. “It has never been viable to build apartment blocks in the vast majority of this country.” […] The report notes that the rise in living costs of almost three quarters in less than five years is “a symptom of strong demand for housing” as economic recovery continues and the population grows. “But there is nothing inevitable about housing costs rising with demand,” it says. “That only happens when supply fails to respond, and the complete absence of any meaningful level of construction over the past five years is a systemic failure in desperate need of policy solutions. “There is no more urgent task facing the Minister for Housing, his department and advisers, and the Housing Agency, than understanding why the costs of building, and building apartments in particular, is so dramatically out of line with our own incomes and indeed with the cost in other countries.”
-
I’m not remotely interested in shockingly good graphics, in murder simulators, in guns and knives and swords. I’m not that interested in adrenaline. My own life is thrilling enough. There is enough fear and hatred in the world to get my heart pounding. My Facebook feed and Twitter feed are enough for that. Walking outside in summer clothing is enough for that. I’m interested in care, in characters, in creation, in finding a path forward inside games that helps me find my path forward in life. I am interested in compassion and understanding. I’m interested in connecting. As Miranda July said, “all I ever wanted to know is how other people are making it through life.” I want to make games that help other people understand life. We are all overwhelmed with shock, with information, with change. The degree of interactivity in our lives is amazing and wonderful and I wouldn’t exchange it for anything, but it is also shocking and overwhelming and it’s causing us to dig in and try to find some peace by shutting each other out. On all sides of the political spectrum we’ve stopped listening to each other and I fear we are all leaning toward fascist thinking. We should be using this medium to help us adapt to our new, interactive lives. This is how we become relevant.
(tags: essay feminism society culture games gaming life art)
Tesco Bank: 20,000 customers lose money – BBC News
“Any financial loss that results from this fraudulent activity will be borne by the bank,” Mr Higgins said. “Customers are not at financial risk.”
Well, that would be surprising….-
Hooray for nuclear power. (via Ossian Smyth)
(tags: nukes nuclear-power power apple datacenters ireland ida)
-
Ivan’s Childhood, Andrei Rublev, Solaris, The Mirror, and Stalker — all viewable for free on YouTube thanks to Mosfilm. quality not great though….
Jeff Erickson’s Algorithms, Etc.
This page contains lecture notes and other course materials for various algorithms classes I have taught at the University of Illinois, Urbana-Champaign. The notes are numbered in the order I cover the material in a typical undergraduate class, wtih notes on more advanced material (indicated by the symbol ?) interspersed appropriately. […] In addition to the algorithms notes I have been maintaining since 1999, this page also contains new notes on “Models of Computation”, which cover a small subset of the material normally taught in undergraduate courses in formal languages and automata. I wrote these notes for a new junior-level course on “Algorithms and Models of Computation” that Lenny Pitt and I developed, which is now required for all undergraduate computer science and computer engineering majors at UIUC.
Via Tony Finch(tags: via:fanf book cs algorithms jeff-erickson uiuc)
How Macedonia Became A Global Hub For Pro-Trump Misinformation – BuzzFeed News
“I started the site for a easy way to make money,” said a 17-year-old who runs a site [from Veles] with four other people. “In Macedonia the economy is very weak and teenagers are not allowed to work, so we need to find creative ways to make some money. I’m a musician but I can’t afford music gear. Here in Macedonia the revenue from a small site is enough to afford many things.”
(tags: macedonia veles scams facebook misinformation donald-trump us-politics)
-
‘an antagonistic GSM base station [disguised] in the form of an innocuous office printer. It brings the covert design practice of disguising cellular infrastructure as other things – like trees and lamp-posts – indoors, while mimicking technology used by police and intelligence agencies to surveil mobile phone users.’
(tags: gsm hardware art privacy surveillance hacks printers mobile-phones)
Testing Docker multi-host network performance – Percona Database Performance Blog
wow, Docker Swarm looks like a turkey right now if performance is important. Only “host” gives reasonably perf numbers
(tags: docker networking performance ops benchmarks testing swarm overlay calico weave bridge)
-
Subreddit devoted to becoming a software developer in Ireland, with a decent wiki
Great comment on the “realism” of space photos
In short, the answer to the question “is this what it would look like if I was there?” is almost always no, but that is true of every photograph. The photos taken from space cameras are no more fake or false than the photos taken from any camera. Like all photos they are a visual interpretation using color to display data. Most space photos have information online about how they were created, what filters were used, and all kinds of interesting details about processing. The discussion about whether a space photo is real or fake is meaningless. There’s no distinction between photoshopped and not. It’s a nuanced view but the nature of the situation demands it.
(tags: photography photos space cassini probes cameras light wavelengths science vision realism real)
-
LOL as DST bug uncovers spurious automated noise complaints:
In January last year the airport unearthed a scheme whereby campaigners were using automated software to generate complaints against the airport. Officials caught out the set-up when the two anti-Heathrow enthusiasts forgot to take into account the hour going back in October, and began complaining about flights that had not yet taken off or arrived.
(tags: bugs dst daylight-savings-time funny heathrow complaints automation noise)
Facebook scuppers Admiral Insurance plan to base premiums on your posts
Well, this is amazingly awful:
The Guardian claims to have further details of the kind of tell-tale signs that Admiral’s algorithmic analysis would have looked out for in Facebook posts. Good traits include “writing in short concrete sentences, using lists, and arranging to meet friends at a set time and place, rather than just ‘tonight’.” On the other hand, “evidence that the Facebook user might be overconfident—such as the use of exclamation marks and the frequent use of ‘always’ or ‘never’ rather than ‘maybe’—will count against them.”
The future is shitty.(tags: insurance facebook scoring computer-says-no algorithms text-analysis awful future)
MemC3: Compact and concurrent Memcache with dumber caching and smarter hashing
An improved hashing algorithm called optimistic cuckoo hashing, and a CLOCK-based eviction algorithm that works in tandem with it. They are evaluated in the context of Memcached, where combined they give up to a 30% memory usage reduction and up to a 3x improvement in queries per second as compared to the default Memcached implementation on read-heavy workloads with small objects (as is typified by Facebook workloads).
(tags: memcached performance key-value-stores storage databases cuckoo-hashing algorithms concurrency caching cache-eviction memory throughput)
Total Nightmare: USB-C and Thunderbolt 3
the coming incompatibility nightmare of USB-C cabling
(tags: usb usb-c thunderbolt apple cables hardware confusion)
Amazon ElastiCache for Redis Update – Sharded Clusters, Engine Improvements, and More | AWS Blog
Elasticache now supports sharding
(tags: elasticache sharding storage aws databases redis ops)
-
The square root staffing law is a rule of thumb derived from queueing theory, useful for getting an estimate of the capacity you might need to serve an increased amount of traffic.
(tags: ops capacity planning rules-of-thumb qed-regime efficiency architecture)
Measuring Docker IO overhead – Percona Database Performance Blog
See also https://www.percona.com/blog/2016/02/05/measuring-docker-cpu-network-overhead/ for the CPU/Network equivalent. The good news is that nowadays it’s virtually 0 when the correct settings are used
(tags: docker percona overhead mysql deployment performance ops containers)
React’s license: necessary and open?
Luis Villa: ‘Is the React license elegant? No. Should you be worried about using it? Probably not. If anything, Facebook’s attempt to give users an explicit patent license should probably be seen as a good faith gesture that builds some confidence in their ecosystem. But yeah, don’t use it if your company intends to invest heavily in React and also sue Facebook over unrelated patents. That… would be dumb. :)’
(tags: luis-villa open-source react facebook patents swpats licensing licenses bsd)
-
Writeup of their Consul-based service discovery system, a bit similar to smartstack. Good description of the production problems that they saw with Consul too, and also they figured out that strong consistency isn’t actually what you want in a service discovery system ;) HN comments are good too: https://news.ycombinator.com/item?id=12840803
(tags: consul api microservices service-discovery dns load-balancing l7 tcp distcomp smartstack stripe cap-theorem scalability)
Here’s Why Facebook’s Trending Algorithm Keeps Promoting Fake News – BuzzFeed News
Kalina Bontcheva leads the EU-funded PHEME project working to compute the veracity of social media content. She said reducing the amount of human oversight for Trending heightens the likelihood of failures, and of the algorithm being fooled by people trying to game it. “I think people are always going to try and outsmart these algorithms — we’ve seen this with search engine optimization,” she said. “I’m sure that once in a while there is going to be a very high-profile failure.” Less human oversight means more reliance on the algorithm, which creates a new set of concerns, according to Kate Starbird, an assistant professor at the University of Washington who has been using machine learning and other technology to evaluate the accuracy of rumors and information during events such as the Boston bombings. “[Facebook is] making an assumption that we’re more comfortable with a machine being biased than with a human being biased, because people don’t understand machines as well,” she said.
(tags: facebook news gaming adversarial-classification pheme truth social-media algorithms ml machine-learning media)
seriot.ch – Parsing JSON is a Minefield ????
Crockford chose not to version [the] JSON definition: ‘Probably the boldest design decision I made was to not put a version number on JSON so there is no mechanism for revising it. We are stuck with JSON: whatever it is in its current form, that’s it.’ Yet JSON is defined in at least six different documents.
“Boldest”. ffs. :facepalm:(tags: bold courage json parsing coding data formats interchange fail standards confusion)
mjg59 | Fixing the IoT isn’t going to be easy
We can’t easily fix the already broken devices, we can’t easily stop more broken devices from being shipped and we can’t easily guarantee that we can fix future devices that end up broken. The only solution I see working at all is to require ISPs to cut people off, and that’s going to involve a great deal of pain. The harsh reality is that this is almost certainly just the tip of the iceberg, and things are going to get much worse before they get any better.
-
This is shocking:
At the end of the panel on artificial intelligence, a young black woman asked [Sebastian Thrun, CEO of the education startup Udacity, who is best known for founding Google X] whether bias in machine learning “could perpetuate structural inequality at a velocity much greater than perhaps humans can.” She offered the example of criminal justice, where “you have a machine learning tool that can identify criminals, and criminals may disproportionately be black because of other issues that have nothing to do with the intrinsic nature of these people, so the machine learns that black people are criminals, and that’s not necessarily the outcome that I think we want.” In his reply, Thrun made it sound like her concern was one about political correctness, not unconscious bias. “Statistically what the machines do pick up are patterns and sometimes we don’t like these patterns. Sometimes they’re not politically correct,” Thrun said. “When we apply machine learning methods sometimes the truth we learn really surprises us, to be honest, and I think it’s good to have a dialogue about this.”
“the truth”! Jesus. We are fucked(tags: google googlex bias racism implicit-bias machine-learning ml sebastian-thrun udacity inequality policing crime)
-
Holy shit.
Using a proxy, remove “securityQuestion0” and “securityQuestion1” from the post data.
Massive facepalm. -
amazing architectural-oddities Tumblr (via Present and Correct)
(tags: tumblr art photography architecture weird odd)
-
I’ve had the privilege of experiencing a few different management levels (responsibilities? jobs?) at Etsy since I’ve joined. At each stage, I felt like the job of being a manager totally changed. What I did day-to-day changed, what was hard about it changed, how I measured my own success changed, and though I feel like the experiences built on one another, it continues to be an enormous shift in brainpower each time the gig changes a bit. Given how intangible (and often hidden) management work can be, I’ve outlined some highlights of what my work has been like as a manager over the last four years. (Obvious, major caveat: this is just my experience, and there’s lots in here that is unique to this particular work environment, hierarchy, requirements, and challenges!)
(tags: business engineering management career lara-hogan managing)
JG Ballard, on the “pram in the hall”
Cyril Connolly, the 50s critic and writer, said that the greatest enemy of creativity is the pram in the hall, but I think that was completely wrong. It was the enemy of a certain kind of dilettante life that he aspired to, the man of letters, but for the real novelist the pram in the hall is the greatest ally – it brings you up sharp and you realise what reality is all about. My children were a huge inspiration for me. Watching three young minds creating their separate worlds was a very enriching experience.
(tags: writing creativity jg-ballard quotes pram-in-the-hall children kids parenting biography)
50% of American Adults Are in Police Facial-Recognition Databases
holy crap this is going to be a serious problem
(tags: facial-recognition ml algorithms policing us-politics future dystopia)
Danger is Everwhere Docter Noel Zone Halloween costume
may need this, depending on kiddie preferences this year ;)
(tags: noel-zone danger-is-everywhere books costumes halloween)
A Guide to Communication, Shotcalling, and Etiquette in Competitive Overwatch
Excellent post on team voice comms tactics. Many tips here
(tags: voice voice-comms gaming overwatch communication strats)
-
Love the ‘decade of’ dig at FB and Amazon — ‘we were doing it first’ ;) Great details on how Google have built out and improved their DC networking. Includes a hint that they now use DCTCP (datacenter-optimized TCP congestion control) on their internal hosts….
(tags: datacenter google presentation networks networking via:irldexter ops sre clos-networks fabrics switching history datacenters)
Cloudy Gamer: Playing Overwatch on Azure’s new monster GPU instances
pretty amazing. full 60FPS, 2560×1600, everything on Epic quality, streaming from Azure, for $2 per hour
Anti-Brexit traitors outed on twitter
oh god this is funny. Louise Mensch and various UKIPpers fall for transparent pisstake involving “taking Article 50 out of the ring binder and shredding it. It now goes straight from 49 to 51” etc.
Image Synthesis from Yahoo’s open_nsfw
What makes an image NSFW, according to Yahoo? I explore this question with a clever new visualization technique
Deep Dream applied to an NSFW classifier. This is a bit NSFW, as it happens
Sean O’Dowd on Twitter: “damn someone at apple needs a hug”
stack trace leads with a symbol called “_thereIsNoSadnessLikeTheDeathOfOptimism”
-
interesting presentation describing how to architect Airflow ETL setups; see also https://gtoonstra.github.io/etl-with-airflow/principles.html
_Airport Noise NIMBYism: An Empirical Investigation_
‘Generally, a very small number of people account for a disproportionately high share of the total number of noise complaints. In 2015, for example, 6,852 of the 8,760 complaints submitted to Ronald Reagan Washington National Airport originated from one residence in the affluent Foxhall neighborhood of northwest Washington, DC. The residents of that particular house called Reagan National to express irritation about aircraft noise an average of almost 19 times per day during 2015.’ Somebody needs help.
ETL best practices with Airflow
good advice on how to ETL
(tags: etl airflow documentation best-practices batch architecture)
New Scientist: Home abortions are safe – we should let women do it themselves
the Women on Web approach is backed by a column in New Scientist: ‘It’s also safer than many other medicines that we are allowed to buy from pharmacies without a prescription, such as Viagra in the UK. So why can’t women get abortion pills from pharmacies and manage the process themselves at home if they choose? It might sound radical but it’s already widespread in countries where abortion is illegal, with women buying the pills from online pharmacies. While some countries, such as Poland, are trying to tighten their already strict abortion laws, the advent of mail-order abortion pills means the law is becoming almost irrelevant.’
(tags: new-scientist safety abortion pro-choice medicine mifepristone pills poland ireland repealthe8th)
What $50 buys you at Huaqiangbei, the world’s most fascinating electronics market
This is amazing — what a wonderland! For instance:
Six dollars for: a GSM chipset, a CPU, an LCD screen, a battery, a PCB, a metal housing, a molded silicone watch band, a MicroUSB cable, and a box. And the labor to assemble and test all of that.
(tags: gadgets crap shenzen huaqiangbei shopping hardware china)