Yammer Engineering – Resiliency at Yammer
Not content with adding Hystrix (circuit breakers, threadpooling, request time limiting, metrics, etc.) to their entire SOA stack, they’ve made it incredibly configurable by hooking in a web-based configuration UI, allowing dynamic on-the-fly reconfiguration by their ops guys of the circuit breakers and threadpools in production. Mad stuff
(tags: hystrix circuit-breakers resiliency yammer ops threadpools soa dynamic-configuration archaius netflix)
A network of ‘homes’, where children’s happiness was relentlessly destroyed
Stories of this sort will tumble out to the inquiry over the next 18 months, making it plain that the network of “homes” where children’s happiness had relentlessly, deliberately, systematically been destroyed, this archipelago of Catholic evil, had covered the entire island. These things should be kept in mind when next we hear it said that the social ills of today can be explained by reference to loss of faith in the traditional institutions of moral authority. This is the reverse of the truth and an insult to the victims of an unforgiveable sin.
(tags: horror care-homes politics catholicism religion ireland derry church abuse children)
Ukrainian police use cellphones to track protestors, court order shows
Protesters for weeks had suspected that the government was using location data from cellphones near the demonstration to pinpoint people for political profiling, and they received alarming confirmation when a court formally ordered a telephone company to hand over such data. […] Three cellphone companies — Kyivstar, MTS and Life — denied that they had provided the location data to the government or had sent the text messages. Kyivstar suggested that it was instead the work of a “pirate” cellphone tower set up in the area. In a ruling made public on Wednesday, a city court ordered Kyivstar to disclose to the police which cellphones were turned on during an antigovernment protest outside the courthouse on Jan. 10.
(tags: tech location-tracking tracking privacy ukraine cellphones mobile-phones civil-liberties)
-
Netflix open-source library to make using ZooKeeper from Java less of a PITA. I really wish I’d used this now, having reimplemented some key parts of it after failures in prod ;)
(tags: zookeeper netflix apache curator java libraries open-source)
Justin's Linklog Posts
10 Things We Forgot to Monitor
a list of not-so-common outage causes which are easy to overlook; swap rate, NTP drift, SSL expiration, fork rate, etc.
Irish Company Locates Office in Ireland
Hot on the heels of Dropbox, AirBnB, Twitter, Facebook and many others, Irish online ticket sales company Tito are amongst the latest in a long series of companies choosing to locate their offices in Ireland. “It just seemed to make sense,” said founder Paul Campbell, talking about the decision making process that led him to set up shop in the capital, Dublin. “Dublin is great. There’s something really familiar about it that I can’t quite put my finger on.”
Har har!(tags: ireland jokes funny tito hq tech-companies dublin via:oisin)
-
Sugru + neodymium magnets = WANT
(tags: sugru diy tools magnets want toget bike hacks fixing)
Capabilities of Movements and Affordances of Digital Media: Paradoxes of Empowerment | DMLcentral
Paradoxically, it’s possible that the widespread use of digital tools facilitates capabilities in some domains, such as organization, logistics, and publicity, while simultaneously engendering hindrances to [political] movement impacts on other domains, including those related to policy and electoral spheres.
(tags: society politics activism tech internet gezi-park tahrir-square euromaidan occupy)
-
Good description of the “hero coder” organisational antipattern.
Now imagine that most of the team is involved in fire-fighting. New recruits see the older recruits getting praised for their brave work in the line-of-fire and they want that kind of praise and reward too. Before long everyone is focused on putting out fires and it is no ones interest to step back and take on the risks that long-term DevOps-focused goals entail.
(tags: coding ops admin hero-coder hero-culture firefighting organisations teams culture)
Open-Sourcing Ssync: An Out-of-the-Box Distributed Rsync
a script to perform divide-and-conquer recursive rsync over SSH
(tags: recursion scripts rsync ssync ssh divide-and-conquer)
Improving compaction in Cassandra with cardinality estimation
nice use of HyperLogLog
(tags: hyperloglog hll algorithms cassandra bloom-filters sstables cardinality)
-
Ad company InMobi are using graphite heavily (albeit not as heavily as $work are), ran into the usual scaling issues, and chose to fix it in code by switching from a filesystem full of whisper files to a LevelDB per carbon-cache:
The carbon server is now able to run without breaking a sweat even when 500K metrics per minute is being pumped into it. This has been in production since late August 2013 in every datacenter that we operate from.
Very nice. I hope this gets merged/supported.(tags: graphite scalability metrics leveldb storage inmobi whisper carbon open-source)
BBC News – Pair jailed over abusive tweets to feminist campaigner
When a producer from BBC Two’s Newsnight programme tracked Nimmo down after he had sent the abuse, the former call centre worker told him: “The police will do nothing, it’s only Twitter.”
(tags: bbc bullying social-media twitter society uk trolls trolling abuse feminism cyberbullying)
If You Used This Secure Webmail Site, the FBI Has Your Inbox
TorMail was a Tor-based webmail system, and apparently its drives have been imaged and seized by the FBI. More info on the Freedom Hosting seizure:
The connection, if any, between the FBI obtaining Freedom Hosting’s data and apparently launching the malware campaign through TorMail and the other sites isn’t spelled out in the new document. The bureau could have had the cooperation of the French hosting company that Marques leased his servers from. Or it might have set up its own Tor hidden services using the private keys obtained from the seizure, which would allow it to adopt the same .onion addresses used by the original sites. The French company also hasn’t been identified. But France’s largest hosting company, OVH, announced on July 29, in the middle of the FBI’s then-secret Freedom Hosting seizure, that it would no longer allow Tor software on its servers. A spokesman for the company says he can’t comment on specific cases, and declined to say whether Freedom Hosting was a customer. “Wherever the data center is located, we conduct our activities in conformity with applicable laws, and as a hosting company, we obey search warrants or disclosure orders,” OVH spokesman Benjamin Bongoat told WIRED. “This is all we can say as we usually don’t make any comments on hot topics.”
(tags: fbi freedom-hosting hosting tor tormail seizures ovh colo servers)
Sky parental controls break many JQuery-using websites
An 11 hour outage caused by a false positive in Sky’s anti-phishing filter; all sites using the code.jquery.com CDN for JQuery would have seen errors.
Sky still appears to be blocking code.jquery.com and all files served via the site, and more worryingly is that if you try to report the incorrect category, once signing in on the Sky website you an error page. We suspect the site was blocked due to being linked to by a properly malicious website, i.e. code.jquery.com and some javascript files were being used on a dodgy website and every domain mentioned was subsequently added to a block list.
(via Tony Finch)(tags: via:fanf sky filtering internet uk anti-phishing phish jquery javascript http web fps false-positives)
Coders performing code reviews of scientific projects: pilot study
‘PLOS and Mozilla conducted a month-long pilot study in which professional developers performed code reviews on software associated with papers published in PLOS Computational Biology. While the developers felt the reviews were limited by (a) lack of familiarity with the domain and (b) lack of two-way contact with authors, the scientists appreciated the reviews, and both sides were enthusiastic about repeating the experiment. ‘ Actually sounds like it was more successful than this summary implies.
(tags: plos mozilla code-reviews coding science computational-biology biology studies)
-
The views expressed by [the Iona Institute] – especially in relation to gay people – are very much at odds with the liberal secular society that Ireland has become. Indeed, Rory O’Neill suggested that the only time he experiences homophobia is online or at the hands of Iona and Waters. When they’re done with that, they can ask why Iona is given so much room in the media. In any other country in the world, an organisation as litigious as Iona would never be asked to participate in anything.
(tags: homophobia ireland john-waters iona-institute politics catholicism religion libel defamation rte the-irish-times)
-
mine’s a Smoky/Spicy/Medicinal, thanks
Cassandra: tuning the JVM for read heavy workloads
The cluster we tuned is hosted on AWS and is comprised of 6 hi1.4xlarge EC2 instances, with 2 1TB SSDs raided together in a raid 0 configuration. The cluster’s dataset is growing steadily. At the time of this writing, our dataset is 341GB, up from less than 200GB a few months ago, and is growing by 2-3GB per day. The workload on this cluster is very read heavy, with quorum reads making up 99% of all operations.
Some careful GC tuning here. Probably not applicable to anyone else, but good approach in general.(tags: java performance jvm scaling gc tuning cassandra ops)
Terms of Reference for the DCENR Internet Content Advisory Group
this is definitely one to send a consultation document response to
(tags: internet policing cyberbullying bullying antisocial free-speech governance children blocking filtering consultations dcenr)
Stupid Simple Things SF Techies Could Do To Stop Being Hated – Anil Dash
I’ve seen a lot of hand-wringing from techies in San Francisco and Silicon Valley saying “Why are we so hated?” now that there’s been a more vocal contingent of people being critical of their lack of civic responsibility. Is it true that corruption and NIMBYism have kept affordable housing from being built? Sure. Is it true that members of the tech industry do contribute tax dollars to the city? Absolutely. But does that mean techies have done enough? Nope.
(tags: anil-dash politics society san-francisco gentrification helping tech community housing)
-
Some basic succinct data structures. […] The main highlights are: a novel, broadword-based implementation of rank/select queries for up to 264 bits that is highly competitive with known 32-bit implementations on 64-bit architectures (additional space required is 25% for ranking and 12.5%-37.5% for selection); several Java structures using the Elias–Fano representation of monotone sequences for storing pointers, variable-length bit arrays, etc. Java code implementing minimal perfect hashing using around 2.68 bits per element (also using some broadword ideas); a few Java implementations of monotone minimal perfect hashing. Sux is free software distributed under the GNU Lesser General Public License.
(tags: sux succinct data-structures bits compression space coding)
Why sugar helped remove Victoria Line concrete flood
Sugar blocks concrete from setting. This I did not know
(tags: concrete london tube flooding sugar chemistry factoids)
Ukrainian government targeting protesters using threatening SMS messages
The government’s opponents said three recent actions had been intended to incite the more radical protesters and sow doubt in the minds of moderates: the passing of laws last week circumscribing the right of public assembly, the blocking of a protest march past the Parliament building on Sunday, and the sending of cellphone messages on Tuesday to people standing in the vicinity of the fighting that said, “Dear subscriber, you are registered as a participant in a mass disturbance.” [….] The phrasing of the message, about participating in a “mass disturbance,” echoed language in a new law making it a crime to participate in a protest deemed violent. The law took effect on Tuesday. And protesters were concerned that the government seemed to be using cutting-edge technology from the advertising industry to pinpoint people for political profiling. Three cellphone companies in Ukraine — Kyivstar, MTS and Life — denied that they had provided the location data to the government or had sent the text messages, the newspaper Ukrainskaya Pravda reported. Kyivstar suggested that it was instead the work of a “pirate” cellphone tower set up in the area.
(tags: targeting mobile-phones sms text-messaging via:tjmcintyre geotargeting protest ukraine privacy surveillance tech 1984)
UK porn filter blocks game update that contained ‘sex’ in URL
Staggeringly inept. The UK national porn filter blocks based on a regexp match of the URL against /.*sex.*/i — the good old “Scunthorpe problem”. Better, it returns a 404 response. This is also a good demonstration of how web filtering has unintended side effects, breaking third-party software updates with its false positives.
The update to online strategy game League of Legends was disrupted by the internet filter because the software attempted to access files that accidentally include the word “sex” in the middle of their file names. The block resulted in the update failing with “file not found” errors, which are usually created by missing files or broken updates on the part of the developers.
(tags: uk porn filtering guardian regular-expressions false-positives scunthorpe http web league-of-legends sex)
Register article on Amazon’s attitude to open source
This article is frequently on target; this secrecy (both around open source and publishing papers) was one of the reasons I left Amazon.
Of the sources with whom we spoke, many indicated that Amazon’s lack of participation was a key reason for why people left the company – or never joined at all. This is why Amazon’s strategy of maintaining secrecy may derail the e-retailer’s future if it struggles to hire the best talent. […] “In many cases in the big companies and all the small startups, your Github profile is your resume,” explained another former Amazonian. “When I look at developers that’s what I’m looking for, [but] they go to Amazon and that resume stops … It absolutely affects the quality of their hires.” “You had no portfolio you could share with the world,” said another insider on life after working at Amazon. “The argument this was necessary to attract talent and to retain talent completely fell on deaf ears.”
(tags: amazon recruitment secrecy open-source hiring work research conferences)
Chinese Internet Traffic Redirected to Small Wyoming House
‘That address — which is home to some 2,000 companies on paper — was the subject of a lengthy 2011 Reuters investigation that found that among the entities registered to the address were a shell company controlled by a jailed former Ukraine prime minister; the owner of a company charged with helping online poker operators evade an Internet gambling ban; and one entity that was banned from government contracts after selling counterfeit truck parts to the Pentagon.’
(tags: china internet great-firewall dns wyoming attacks security not-the-onion)
James Friend | PCE.js – Classic Mac OS in the Browser
This is a demo of PCE’s classic Macintosh emulation, running System 7.0.1 with MacPaint, MacDraw, and Kid Pix. If you want to try out more apps and games see this demo.
Incredible. I remember using this version of MacPaint!(tags: javascript browser emulation mac macos macpaint macdraw claris kid-pix history desktop pce)
-
‘Lightweight performance tools’.
Likwid stands for ‘Like I knew what I am doing’. This project contributes easy to use command line tools for Linux to support programmers in developing high performance multi-threaded programs. It contains the following tools: likwid-topology: Show the thread and cache topology likwid-perfctr: Measure hardware performance counters on Intel and AMD processors likwid-features: Show and Toggle hardware prefetch control bits on Intel Core 2 processors likwid-pin: Pin your threaded application without touching your code (supports pthreads, Intel OpenMP and gcc OpenMP) likwid-bench: Benchmarking framework allowing rapid prototyping of threaded assembly kernels likwid-mpirun: Script enabling simple and flexible pinning of MPI and MPI/threaded hybrid applications likwid-perfscope: Frontend for likwid-perfctr timeline mode. Allows live plotting of performance metrics. likwid-powermeter: Tool for accessing RAPL counters and query Turbo mode steps on Intel processor. likwid-memsweeper: Tool to cleanup ccNUMA memory domains.
No kernel patching required. (via kellabyte)(tags: via:kellabyte linux performance testing perf likwid threading multithreading multicore mpi numa)
Backblaze Blog » What Hard Drive Should I Buy?
Because Backblaze has a history of openness, many readers expected more details in my previous posts. They asked what drive models work best and which last the longest. Given our experience with over 25,000 drives, they asked which ones are good enough that we would buy them again. In this post, I’ll answer those questions.
(tags: backblaze backup hardware hdds storage disks ops via:fanf)
Safe cross-thread publication of a non-final variable in the JVM
Scary, but potentially useful in future, so worth bookmarking. By carefully orchestrating memory accesses using volatile and non-volatile fields, one can ensure that a non-volatile, non-synchronized field’s value is safely visible to all threads after that point due to JMM barrier semantics.
What you are looking to do is enforce a barrier between your initializing stores and your publishing store, without that publishing store being made to a volatile field. This can be done by using volatile access to other fields in the publication path, without using those variables in the later access paths to the published object.
(tags: volatile atomic java jvm gil-tene synchronization performance threading jmm memory-barriers)
Irish quango allegedly buys fake twitter followers
The Consumers Association of Ireland had a sudden jump from 300 to 3000 Twitter followers, mostly from Latin and South America — with more followers in Brazil than Ireland. They are now blaming “hacking”: http://www.independent.ie/irish-news/consumers-body-denies-buying-3000-twitter-fans-29931196.html
(tags: consumers quangos ireland politics twitter funny fake-followers latin-america south-america brazil social-media tech)
Big Red Kitchen on buying Irish honey
1. There is NO SUCH THING as “Organic Irish Honey” (due to EU directives making it impossible to certify); 2. In the absence of Organic the best thing you can look for is “Raw Irish honey” (which is of Irish origin, and not heated to very high temperatures, so it retains its antibacterial properties); 3. Blended honeys, or honeys which say EEC/Non EEC are NOT Irish, however they may be packed in Ireland; 4. Look for the NIHBS “Produced by Native Irish Honey Bees” or similar, for confirmation that the honey you are buying is indeed of Irish origin.
(tags: irish ireland honey buy-irish big-red-kitchen food organic-food)
More than 50% of Irish companies have “suffered a data breach” in 2013
The research, conducted among hundreds of Irish companies’ IT managers by the Irish Computer Society, reveals that 51 per cent of Irish firms have suffered a data breach over the last year, a jump on 43 per cent recorded in 2012.
Wow, that’s high.(tags: hacking security ireland ics data-breaches)
Irish Internet Providers Roll Out KickassTorrents Blockade
The lucrative whack-a-mole business continues — mostly in response to High Court actions, although Eircom are just helping out. I bet a google for “kickass proxy” doesn’t return anything useful at all, of course….
(tags: kat kickasstorrents bittorrent piracy copyright high-court ireland eircom filtering blocking)
Internet Censors Came For TorrentFreak & Now I’m Really Mad
TF are not happy about Sky blocking their blog.
There can be little doubt that little by little, piece by piece, big corporations and governments are taking chunks out of the free Internet. Today they pretend that the control is in the hands of the people, but along the way they are prepared to mislead and misdirect, even when their errors are pointed out to them. I’m calling on Sky, Symantec, McAfee and other ISPs about to employ filtering to categorize this site correctly as a news site or blog and to please start listening to people’s legitimate complaints about other innocent sites. It serves nobody’s interests to wrongfully block legitimate information.
(tags: censorship isps uk sky torrentfreak piracy copyright filtering blocking symantec filesharing)
Harry – A Tool for Measuring String Similarity
a small tool for comparing strings and measuring their similarity. The tool supports several common distance and kernel functions for strings as well as some exotic similarity measures. The focus of Harry lies on implicit similarity measures, that is, comparison functions that do not give rise to an explicit vector space. Examples of such similarity measures are the Levenshtein distance and the Jaro-Winkler distance. For comparison Harry loads a set of strings from input, computes the specified similarity measure and writes a matrix of similarity values to output. The similarity measure can be computed based on the granularity of characters as well as words contained in the strings. The configuration of this process, such as the input format, the similarity measure and the output format, are specified in a configuration file and can be additionally refined using command-line options. Harry is implemented using OpenMP, such that the computation time for a set of strings scales linear with the number of available CPU cores. Moreover, efficient implementations of several similarity measures, effective caching of similarity values and low-overhead locking further speedup the computation.
via kragen.(tags: via:kragen strings similarity levenshtein-distance algorithms openmp jaro-winkler edit-distance cli commandline hamming-distance compression)
-
A nice node.js app to perform continuous deployment from a GitHub repo via its webhook support, from Matt Sergeant
(tags: github node.js runit deployment git continuous-deployment devops ops)
-
yummy-looking recipe from Lily at amexicancook.ie
(tags: tacos mexican-food food recipes meat tacos-al-pastor)
Succinct Data Structures: Cramming 80,000 words into a Javascript file
a succinctly-encoded trie — slow to encode, super-compact, but fast to look up
(tags: succinct-encoding tries coding performance compression data-structures algorithms)
Transport Minister planning to make hi-vis jackets mandatory for cyclists
The minister also spoke of a number of new transport initiatives, such as mandatory use of high visibility jackets by cyclists.
(tags: cycling safety law ireland leo-varadkar)
The Malware That Duped Target Has Been Found
a Windows ‘RAM scraper’ trojan known as Trojan.POSRAM, which was used to attack the Windows-based point-of-sales systems which the POS terminals are connected to. part of an operation called Kaptoxa. ‘The code is based on a previous malicious tool known as BlackPOS that is believed to have been developed in 2013 in Russia, though the new variant was highly customized to prevent antivirus programs from detecting it’ … ‘The tool monitors memory address spaces used by specific programs, such as payment application programs like pos.exe and PosW32.exe that process the data embossed in the magnetic strip of credit and debit cards data. The tool grabs the data from memory.’ … ‘The siphoned data is stored on the system, and then every seven hours the malware checks the local time on the compromised system to see if it’s between the hours of 10 a.m. and 5 p.m. If so, it attempts to send the data over a temporary NetBIOS share to an internal host inside the compromised network so the attackers can then extract the data over an FTP … connection.’ http://www.pcworld.com/article/2088920/target-credit-card-data-was-sent-to-server-in-russia.html says the data was then transmitted to another US-based server, and from there relayed to Russia, and notes: ‘At the time of its discovery, Trojan.POSRAM “had a zero percent antivirus detection rate, which means that fully updated antivirus engines on fully patched computers could not identify the software as malicious,” iSight said.’ Massive AV fail.
(tags: kaptoxa trojans ram-scrapers trojan.posram posram point-of-sale security hacks target credit-cards pin ftp netbios smb)
Full iSight report on the Kaptoxa attack on Target
‘POS malware is becoming increasingly available to cyber criminals’ … ‘there is growing demand for [this kind of malware]’. Watch your credit cards…
(tags: debit-cards credit-cards security card-present attacks kaptoxa ram-scrapers trojans point-of-sale pos malware target)
-
Both Heartland Payment Systems and Hannaford Bros. were in fact certified PCI-compliant while the hackers were in their system. In August 2006, Wal-Mart was also certified PCI-compliant while unknown attackers were lurking on its network. […] “This PCI standard just ain’t working,” says Litan, the Gartner analyst. “I wouldn’t say it’s completely pointless. Because you can’t say security is a bad thing. But they’re trying to patch a really weak [and] insecure payment system [with it].”
Basically, RAM scrapers have been in use in live attacks, sniffing credentials in the clear, since 2007. Ouch.(tags: ram-scrapers trojans pins pci-dss compliance security gartner walmart target)
ISPAI responds to TD Patrick O’Donovan’s bizarre comments regarding “open source browsers”
ISPAI is rather dismayed and somewhat confused by the recent press release issued by Deputy Patrick O’Donovan (FG). He appears to be asking the Oireachtas Communications Committee (of which he is a member) to investigate: “the matter of tougher controls on the use of open source internet browsers and payment systems” which he claims “allow users to remain anonymous for illegal trade of drugs weapons and pornography.” Deputy O’Donovan would do well to ask the advice of industry experts on these matters given that legislating to curtail the use of such legitimate software or services, which may be misused by some, is neither practical nor logical. Whether or not a browser is open source bears no relevance to its ability to be the subject of anonymous use. Indeed, Deputy O’Donovan must surely be confusing and conflating different technical concepts? In tracing illegal activities, Law Enforcement Agencies and co-operating parties will use IP addresses – users’ choice of browser has little relevance to an investigation of criminal activity. Equally, it may be that the Deputy is uncomfortable with the concept of electronic payment systems but these underpin the digital economy which is bringing enormous benefit to Ireland. Yes, these may be misused by criminals but so are cash and traditional banking services. Restricting the growth of innovative financial services is not the solution to tackling cyber criminals who might be operating what he describes as “online supermarkets for illegal goods.” Tackling international cybercrime requires more specialist Law Enforcement resources at national level and improved international police cooperation supported by revision of EU legislation relating to obtaining server log evidence existing in other jurisdictions.
(tags: ispai open-source patrick-o-donovan fine-gael press-releases tor darknet crime)
-
I use it to modify Time Machine’s backup behavior using weighted reservoir sampling. I built Time Warp to preserve important backup snapshots and prevent Time Machine from deleting them.
via Aman. Nifty!(tags: backup python time-machine decay exponential-decay weighting algorithms snapshots ops)
Nominet now filtering .uk domain registrations for ‘sex-crime content’
Amazing. Massive nanny-stateism of the ‘something must be done’ variety, with a 100% false-alarm hit rate, and it’s now policy.
‘Nominet have made a decision, based on a report by Lord Macdonald QC, that recommends that they check any domain registration that signals sex crime content or is in itself a sex crime. This is screening of domains within 48 hours of registration, and de-registration. The report says that such domains should be reported to the police.’ [….] ‘The report itself states […] that in 2013 Nominet checked domains for key words used by the IWF, and as a result reported tens of thousands of domains to IWF for checking, all of which were false positives. Not one was, in fact, related to child sex abuse.’
(tags: filtering nominet false-positives nanny-state uk sex-crimes false-alarms domains iwf)
Tuning advice for HTTPS for nginx and HAProxy
from Ilya Grigorik. nginx version here: http://www.igvita.com/2013/12/16/optimizing-nginx-tls-time-to-first-byte/
A common error when using the Metrics library is to record Timer metrics on things like API calls, using the default settings, then to publish those to a time-series store like Graphite. Here’s why this is a problem.
By default, a Timer uses an Exponentially Decaying Reservoir. The docs say:
‘A histogram with an exponentially decaying reservoir produces quantiles which are representative of (roughly) the last five minutes of data. It does so by using a forward-decaying priority reservoir with an exponential weighting towards newer data. Unlike the uniform reservoir, an exponentially decaying reservoir represents recent data, allowing you to know very quickly if the distribution of the data has changed.’
This is more-or-less correct — but the key phrase is ‘roughly’. In reality, if the frequency of updates to such a timer drops off, it could take a lot longer, and if you stop updating a timer which uses this reservoir type, it’ll never decay at all. The GraphiteReporter will dutifully capture the percentiles, min, max, etc. from that timer’s reservoir every minute thereafter, and record those to Graphite using the current timestamp — even though the data it was derived from is becoming more and more ancient.
Here’s a demo. Note the long stretch of 800ms 99th-percentile latencies on the green line in the middle of this chart:
However, the blue line displays the number of events. As you can see, there were no calls to this API for that 8-hour period — this one was a test system, and the user population was safely at home, in bed. So while Graphite is claiming that there’s an 800ms latency at 7am, in reality the 800ms-latency event occurred 8 hours previously.
I observed the same thing in our production systems for various APIs which suffered variable invocation rates; if rates dropped off during normal operation, the high-percentile latencies hung around for far longer than they should have. This is quite misleading when you’re looking at a graph for 10pm and seeing a high 99th-percentile latency, when the actual high-latency event occurred hours earlier. On several occasions, this caused lots of user confusion and FUD with our production monitoring, so we needed to fix it.
Here are some potential fixes.
Modify ExponentiallyDecayingReservoir to also call rescaleIfNeeded() inside getSnapshot() — but based on this discussion, it appears the current behaviour is intended (at least for the mean measurement), so that may not be acceptable. Another risk of this is that it leaves us in a position where the percentiles displayed for time T may actually have occurred several minutes prior to that, which is still misleading (albeit less so).
Switch to sliding time window reservoirs, but those are unbounded in size — so a timer on an unexpectedly-popular API could create GC pressure and out-of-memory scenarios. It’s also the slowest reservoir type, according to the docs. That made it too risky for us to adopt in our production code as a general-purpose Timer implementation.
Update, Dec 2017: as of version 3.2.3 of Dropwizard Metrics, there is a new SlidingTimeWindowArrayReservoir reservoir implementation, which is a drop-in replacement for SlidingTimeWindowReservoir, with much more acceptable memory footprint and GC impact. It costs roughly 128 bits per stored measurement, and is therefore judged to be ‘comparable with ExponentiallyDecayingReservoir in terms of GC overhead and performance’. (thanks to Bogdan Storozhuk for the tip)
What we eventually did in our code was to use this Reporter class instead of GraphiteReporter; it clears all Timer metrics’ reservoirs after each write to Graphite. This is dumb and dirty, reaching across logical class boundaries, but at the same time it’s simple and comprehensible behaviour: with this, we can guarantee that the percentile/min/max data recorded at timestamp T is measuring events in that timestamp’s 1-minute window — not any time before that. This is exactly what you want to see in a time-series graph like those in Graphite, so is a very valuable feature for our metrics, and one that others have noted to be important in comparable scenarios elsewhere.
Here’s an example of what a graph like the above should look like (captured from our current staging stack):
Note that when there are no invocations, the reported 99th-percentile latency is 0, and each measurement doesn’t stick around after its 1-minute slot.
Another potential bug fix for a related issue, would be to add support to Metrics so that it can use Gil Tene’s LatencyUtils package, and its HdrHistogram class, as a reservoir. (Update: however, I don’t think this would address the “old data leaking into newer datapoints” problem as fully.) This would address some other bugs in the Exponentially Decaying Reservoir, as Gil describes:
‘In your example of a system logging 10K operations/sec with the histogram being sampled every second, you’ll be missing 9 out of each 10 actual outliers. You can have an outlier every second and think you have one roughly every 10. You can have a huge business affecting outlier happening every hour, and think that they are only occurring once a day.’
Eek.
Branchless hex-to-decimal conversion hack
via @simonebordet, on the mechanical-sympathy list: ((c & 0x1F) + ((c >> 6) * 0x19) – 0x10)
(tags: hacks one-liners coding performance optimization hex conversion numbers ascii)
A sampling profiler for your daily browsing – Google Groups
via Ilya Grigorik: Chrome Canary now has a built-in, always-on, zero-overhead code profiler. I want this in my server-side JVMs!
(tags: chrome tracing debugging performance profiling google sampling-profiler javascript blink v8)
-
from tonx. Good advice
-
‘The web’s only open collection of legal contracts and the best way to negotiate and sign documents online’. (via Kowalshki)
(tags: via:kowalshki business documents legal law contracts)
How an emulator-fueled robot reprogrammed Super Mario World on the fly
Suffice it to say that the first minute-and-a-half or so of this [speedrun] is merely an effort to spawn a specific set of sprites into the game’s Object Attribute Memory (OAM) buffer in a specific order. The TAS runner then uses a stun glitch to spawn an unused sprite into the game, which in turn causes the system to treat the sprites in that OAM buffer as raw executable code. In this case, that code has been arranged to jump to the memory location for controller data, in essence letting the user insert whatever executable program he or she wants into memory by converting the binary data for precisely ordered button presses into assembly code (interestingly, this data is entered more quickly by simulating the inputs of eight controllers plugged in through simulated multitaps on each controller port).
oh. my. god. This is utterly bananas.(tags: games hacking omgwtfbbq hacks buffer-overrun super-mario snes security)
Nassim Taleb: retire Standard Deviation
Use the mean absolute deviation […] it corresponds to “real life” much better than the first—and to reality. In fact, whenever people make decisions after being supplied with the standard deviation number, they act as if it were the expected mean deviation.’ Graydon Hoare in turn recommends the median absolute deviation. I prefer percentiles, anyway ;)
(tags: statistics standard-deviation stddev maths nassim-taleb deviation volatility rmse distributions)
Mathematical Purity in Distributed Systems: CRDTs Without Fear
Via Tony Finch. Funnily enough, the example describes Swrve: mobile game analytics, backed by a CRDT-based eventually consistent data store ;)
(tags: storage crdts semilattice idempotency commutativity data-structures distcomp eventual-consistency)
-
some good data (and graphs) on baby names (via Ruth)
(tags: via:ruth babies naming graphs dataviz data usa names)
-
Crowdsourcing transcription of some WWI artifacts: ‘The story of the British Army on the Western Front during the First World War is waiting to be discovered in 1.5 million pages of unit war diaries. We need your help to reveal the stories of those who fought in the global conflict that shaped the world we live in today.’ (via Luke)
Map of Steamship Routes of the World, 1914
massive image. very cool (via burritojustice)
(tags: maps desktop images steamships shipping history 1914 travel world)
Google Fonts recently switched to using Zopfli
Google Fonts recently switched to using new Zopfli compression algorithm: the fonts are ~6% smaller on average, and in some cases up to 15% smaller! […] What’s Zopfli? It’s an algorithm that was developed by the compression team at Google that delivers ~3~8% bytesize improvement when compared to gzip with maximum compression. This byte savings comes at a cost of much higher encoding cost, but the good news is, fonts are static files and decompression speed is exactly the same. Google Fonts pays the compression cost once and every clients gets the benefit of smaller download. If you’re curious to learn more about Zopfli: http://bit.ly/Y8DEL4
(tags: zopfli compression gzip fonts google speed optimization)
“Understanding the Robustness of SSDs under Power Fault”, FAST ’13 [paper]
Horrific. SSDs (including “enterprise-class storage”) storing sync’d writes in volatile RAM while claiming they were synced; one device losing 72.6GB, 30% of its data, after 8 injected power faults; and all SSDs tested displayed serious errors including random bit errors, metadata corruption, serialization errors and shorn writes. Don’t trust lone unreplicated, unbacked-up SSDs!
(tags: pdf papers ssd storage reliability safety hardware ops usenix serialization shorn-writes bit-errors corruption fsync)
Irish politician calls for ban on “open source browsers”
‘Fine Gael TD for Limerick, Patrick O’Donovan has called for tougher controls on the use of open source internet browsers and payment systems which allow users to remain anonymous in the illegal trade of drugs, weapons and pornography.’ Amazing. Yes, this is real.
(tags: open-source clueless omgwtfbbq fine-gael ireland fail funny tor inept)
Little-known Apollo 10 incident
‘Apollo 10 had a little known incident in flight as evidenced by this transcript.’ http://pic.twitter.com/NCZy7OdxDU
(tags: poo turds space spaceflight funny history apollo-10 apollo accidents)
-
As can be guessed, the higher the compression ratio, the more efficient FSE becomes compared to Huffman, since Huffman can’t break the “1 bit per symbol” limit. FSE speed is also very stable, under all probabilities. I’m quite please with the result, especially considering that, since the invention of arithmetic coding in the 70’s, nothing really new has been brought to this field. This is still beta stuff, so please consider this first release for testing purposes mostly.
Looking forward to this making it into a production release of some form.(tags: compression algorithms via:kragen fse finite-state-entropy-coding huffman arithmetic-coding)
-
A bug in a scheduled OS upgrade script caused live production DB servers to be upgraded while live. Fixes include fixing that script by verifying non-liveness on the host itself, and a faster parallel MySQL binary-log recovery command.
(tags: dropbox outage postmortems upgrades mysql)
Creative Commons event in Dublin this Friday
‘Maximising Digital Creativity, Sharing and Innovation’, Event organised by Creative Commons Ireland and Faculty of Law, University College Cork, Lecture Theatre, National Gallery of Ireland, Clare Street entrance, Dublin 2, Friday 17 January 2014, 9.45 a.m. to 1 p.m. (via Darius Whelan)
(tags: creative-commons ireland dublin events talks law copyright)
Growing up unvaccinated: A healthy lifestyle couldn’t prevent many childhood illnesses.
I understand, to a point, where the anti-vaccine parents are coming from. Back in the ’90s, when I was a concerned, 19-year-old mother, frightened by the world I was bringing my child into, I was studying homeopathy, herbalism, and aromatherapy; I believed in angels, witchcraft, clairvoyants, crop circles, aliens at Nazca, giant ginger mariners spreading their knowledge to the Aztecs, the Incas, and the Egyptians, and that I was somehow personally blessed by the Holy Spirit with healing abilities. I was having my aura read at a hefty price and filtering the fluoride out of my water. I was choosing to have past life regressions instead of taking antidepressants. I was taking my daily advice from tarot cards. I grew all my own veg and made my own herbal remedies. I was so freaking crunchy that I literally crumbled. It was only when I took control of those paranoid thoughts and fears about the world around me and became an objective critical thinker that I got well. It was when I stopped taking sugar pills for everything and started seeing medical professionals that I began to thrive physically and mentally.
Life on Mars: Irish man signs up for colony mission
Last week, a private space exploration company called Mars One announced that it has shortlisted 1,058 people from 200,000 applicants who wanted to travel to Mars. Roche is the only Irishman on the list. The catch? If he goes, he can never come back.
Mad stuff. Works at the Science Gallery, so a co-worker of a friend, to boot(tags: science-gallery dublin ireland mars-one mars one-way-trips exploration future space science joseph-roche)
UK NHS will soon require GPs pass confidential medical data to third parties
Specifically, unanonymised, confidential, patient-identifying data, for purposes of “admin, healthcare planning, and research”, to be held indefinitely, via the HSCIC. Opt-outs may be requested, however
(tags: opt-out privacy medical data healthcare nhs uk data-privacy data-protection)
-
‘why the fuck does my fridge need Twitter?’
(tags: twitter funny tech home fridges internet web appliances consume)
Visualisation of the Raft distributed consensus protocol
Very pretty
(tags: consensus raft visualization distributed distcomp algorithms)
Directv DCA2SR0 01 Deca II Connected Home Adapter
a John-Looney-recommended MoCA adapter, allowing legacy coax home wiring to be used to transmit ethernet
(tags: ethernet coax legacy wiring home-networking moca directv)
Bruce Schneier and Matt Blaze on TAO’s Methods
An important point:
As scarily impressive as [NSA’s TAO] implant catalog is, it’s targeted. We can argue about how it should be targeted — who counts as a “bad guy” and who doesn’t — but it’s much better than the NSA’s collecting cell phone location data on everyone on the planet. The more we can deny the NSA the ability to do broad wholesale surveillance on everyone, and force them to do targeted surveillance in individuals and organizations, the safer we all are.
(tags: nsa tao security matt-blaze bruce-schneier surveillance tempest)
How the NSA (may have) put a backdoor in RSA’s cryptography: A technical primer
An excellent description of how the Dual_EC_DRBG backdoor works
(tags: surveillance tech dual_ec_drbg nsa rsa security backdoors via:jgc elliptic-curves)
Who Made That Nigerian Scam? – NYTimes.com
The history behind the 419 advance-fee fraud scam.
According to Robert Whitaker, a historian at the University of Texas, an earlier version of the con, known as the Spanish Swindle or the Spanish Prisoner trick, plagued Britain throughout the 19th century.
True facts about Ocean Radiation and the Fukushima Disaster
solid science
(tags: fukushima japan radiation risk ocean disasters sieverts contamination sea fish science)
Packet Flight: Facebook News Feed @8X
good dataviz of a HTTP page load: ‘this is a visualization of a Facebook News Feed load from the perspective of the client, over a 3G wireless connection. Different packet types have different shapes and colors.’ (via John Harrington)
(tags: via:johnharrington visualization facebook dataviz networking tcp 3g)
URGENT: Input needed on EU copyright consultation – Boing Boing
The EC is looking for feedback — but not much, and pretty sharpish.
Go to www.copywrongs.eu and answer the questions which are important to you. You do not have to answer all the questions, only the ones that matter to you. […] The deadline is 5 February 2014. Until then, we should provide the European Commission with as many responses as possible!
Peter Norvig writes a program to play regex golf with arbitrary lists
In response to XKCD 1313. This is excellent. It’s reminiscent of my SpamAssassin SOUGHT-ruleset regexp-discovery algorithm, described in http://taint.org/2007/03/05/134447a.html , albeit without the BLAST step intended to maximise pattern length and minimise false positives
(tags: python regex xkcd blast rule-discovery spamassassin rules regexps regular-expressions algorithms peter-norvig)
-
Beautiful d3.js dataviz of wind patterns and forecasts, projected against a vector Earth map
(tags: earth map visualization weather javascript d3.js dataviz wind forecasts maps)
-
Good description of Etsy’s take on continuous deployment, committing directly to trunk, hidden with feature-flags, from Rafe Colburn
(tags: continuous-deployment coding agile deployment devops etsy rafe-colburn)
Dogs like to excrete in alignment with the Earth’s magnetic field
Dogs preferred to excrete with the body being aligned along the North-south axis under calm magnetic field conditions.
(tags: dogs poo excrement shit magnetic-field earth zoology papers)
Paul Graham and the Manic Pixie Dream Hacker
Under Graham’s influence, Mark [Zuckerberg], like many in Silicon Valley, subscribes to the Manic Pixie Dream Hacker ideal, making self-started teenage hackers Facebook’s most desired recruiting targets, not even so much for their coding ability as their ability to serve as the faces of hacking culture. “Culture fit”, in this sense, is one’s ability to conform to the Valley’s boyish hacker fantasy, which is easier, obviously, the closer you are to a teenage boy. Like the Manic Pixie Dream Girl’s role of existing to serve the male film protagonist’s personal growth, the Manic Pixie Dream Hacker’s job is to embody the dream hacker role while growing the VC’s portfolio. This is why the dream hacker never ages, never visibly develops interests beyond hardware and code, and doesn’t question why nearly all the other people receiving funding look like him. Like the actress playing the pixie dream girl, the pixie dream boy isn’t being paid to question the role for which he has been cast. In this way, for all his supposed “disruptiveness”, the hacker pixie actually does exactly what he is told: to embody, while he can, the ideal hacker, until he is no longer young, mono-focused, and boyish-seeming enough to qualify for the role (at that point, vested equity may allow him to retire). And like in Hollywood, VCs will have already recruited newer, younger ones to play him.
(tags: hackers manic-pixie-dream-girl culture-fit silicon-valley mark-zuckerberg paul-graham y-combinator vc work investment technology recruitment facebook ageism equality sexism)
-
Flapjack aims to be a flexible notification system that handles: Alert routing (determining who should receive alerts based on interest, time of day, scheduled maintenance, etc); Alert summarisation (with per-user, per media summary thresholds); Your standard operational tasks (setting scheduled maintenance, acknowledgements, etc). Flapjack sits downstream of your check execution engine (like Nagios, Sensu, Icinga, or cron), processing events to determine if a problem has been detected, who should know about the problem, and how they should be told.
(tags: flapjack notification alerts ops nagios paging sensu)
We need your help to keep working for European digital rights in 2014
Grim. DRI are facing a 5-figure legal bill from the music industry – they need your donations to avoid shutdown
(tags: donations dri funding amicus-curiae law ireland digital-rights-ireland emi irma)
Replicant: Replicated State Machines Made Easy
The next time you reach for ZooKeeper, ask yourself whether it provides the primitive you really need. If ZooKeeper’s filesystem and znode abstractions truly meet your needs, great. But the odds are, you’ll be better off writing your application as a replicated state machine.
(tags: zookeeper paxos replicant replication consensus state-machines distcomp)
Dublin Cycle Planner needs a health warning – Irish Cycle
An extensive catalogue of shitty routing. Poor…
It’s expected that any new mapping and routing systems will have errors which will need to be ironed out but the level of issues with the NTA Cycle Planner is far beyond what you’d expect in a light and quiet beta launch. It’s beyond acceptable for a public PR launch directing people to a route planner with no clear warnings. It looks like a rush job which allows junior minister Alan Kelly to get his name in another press release before the end of the year.
Reflected hidden faces in photographs revealed in pupil
The pupil of the eye in a photograph of a face can be mined for hidden information, such as reflected faces of the photographer and bystanders, according to research led by Dr. Rob Jenkins, of the Department of Psychology at the University of York and published in PLOS ONE (open access).
(via Waxy)(tags: via:waxy future zoom-and-enhance privacy photography eyes photos)
Jesse Willms, the Dark Lord of the Internet – Taylor Clark – The Atlantic
“It was an out-and-out hijacking,” LeFevre told me. “They counterfeited our product, they pirated our Web site, and they basically directed all of their customer service to us.” At the peak of Willms’s sales, LeFevre says, dazzlesmile was receiving 1,000 calls a day from customers trying to cancel orders for a product it didn’t even sell. When irate consumers made the name dazzlesmile synonymous with online scamming, LeFevre’s sales effectively dropped to zero. Dazzlesmile sued Willms in November 2009; he later paid a settlement.
(tags: scams hijacking ads affiliate one-wierd-trick health dieting crime)
-
An exhaustive list from the UK’s Open Rights Group
Netflix: Your Linux AMI: optimization and performance [slides]
a fantastic bunch of low-level kernel tweaks and tunables which Netflix have found useful in production to maximise productivity of their fleet. Interesting use of SCHED_BATCH process scheduler class for batch processes, in particular. Also, great docs on their experience with perf and SystemTap. Perf really looks like a tool I need to get to grips with…
(tags: netflix aws tuning ami perf systemtap tunables sched_batch batch hadoop optimization performance)
creepypasta, Slenderman, and Lovecraft
our use of networked computers is daily coloured by fear of infection and corruption, of predators and those who would assume our identity, of viruses and data-sucking catastrophes. What if something dark is able to breach that all-important final firewall, the gap between the central processing unit and the person sitting at the keyboard? What if it already has? That would be ‘a malign and particular suspension or defeat of those fixed laws of Nature which are our only safeguard’, without a doubt — but the unplumbed space haunted by demons and chaos is the network, not the cosmos. In using the internet to creep ourselves out recreationally, we begin to understand the real ways in which it haunts our fears.
(via etienneshrdlu)(tags: via:etienneshrdlu literature stories horror slenderman something-awful creepypasta copypasta lovecraft)
BitCoin exchange CoinBase uses MongoDB as their ‘primary datastore’
‘Coinbase uses MongoDB for their primary datastore for their web app, api requests, etc.’
(tags: coinbase mongodb reliability hn via:aphyr ops banking bitcoin)
Alex Payne — Bitcoin, Magical Thinking, and Political Ideology
Working in technology has an element of pioneering, and with new frontiers come those would prefer to leave civilization behind. But in a time of growing inequality, we need technology that preserves and renews the civilization we already have. The first step in this direction is for technologists to engage with the experiences and struggles of those outside their industry and community. There’s a big, wide, increasingly poor world out there, and it doesn’t need 99% of what Silicon Valley is selling. I’ve enjoyed the thought experiment of Bitcoin as much as the next nerd, but it’s time to dispense with the opportunism and adolescent fantasies of a crypto-powered stateless future and return to the work of building technology and social services that meaningfully and accountably improve our collective quality of life.
(tags: bitcoin business economics silicon-valley tech alex-payne writing libertarianism futurism crypto civilization frontier community)
MP Claire Perry tells UK that worrying about filter overblocking is a “load of cock”
the bottom line appears to be “think of the children” — in other words, any degree of overblocking is acceptable as long as children cannot access porn:
The debate and letter confuse legal, illegal and potentially harmful content, all of which require very different tactics to deal with. Without a greater commitment to evidence and rational debate, poor policy outcomes will be the likely result. There’s a pattern, much the same as the Digital Economy Act, or the Snooper’s Charter. Start with moral panic; dismiss evidence; legislate; and finally, watch the policy unravel, either delivering unintended harms, even to children in this case, or simply failing altogether.
See https://www.openrightsgroup.org/blog/2013/talktalk-wordpress for a well-written exploration of a case of overblocking and its fallout. Talk Talk, one UK ISP, has filters which incorrectly dealt with IWF data and blocked WordPress.com’s admin interface, resulting in all blogs there become unusable for their owners for over a week, with seemingly nobody able to diagnose and fix the problem competently.(tags: filtering overblocking uk politics think-of-the-children porn cam claire-perry open-rights-group false-positives talk-talk networking internet wordpress)
stereopsis : graphics : radix tricks
some nice super-optimized Radix Sort code which handles floating point values. See also http://codercorner.com/RadixSortRevisited.htm for more info on the histogramming/counter concept
(tags: sorting programming coding algorithms radix-sort optimization floating-point)
-
ie. “i18n”, “a11y” etc.
According to Tex Texin, the first numeronym [..] was “S12n”, the electronic mail account name given to Digital Equipment Corporation (DEC) employee Jan Scherpenhuizen by a system administrator because his surname was too long to be an account name. By 1985, colleagues who found Jan’s name unpronounceable often referred to him verbally as “S12n”. The use of such numeronyms became part of DEC corporate culture.[1]
(tags: numbers names etymology numeronyms history dec i18n a11y l10n s12n)
On undoing, fixing, or removing commits in git
Choose-your-own-adventure style. “Oh dear. This is going to get complicated.” (via Tom)
(tags: via:tom cyoa git fixing revert source-control coding)
-
this is excellent!
The British Library has uploaded one million public domain scans from 17th-19th century books to Flickr! They’re embarking on an ambitious programme to crowdsource novel uses and navigation tools for the huge corpus. Already, the manifest of image descriptions is available through Github. This is a remarkable, public spirited, archival project, and the British Library is to be loudly applauded for it!
(tags: british-library libraries public-domain art graphics images history 19th-century 17th-century 18th-century books crowdsourcing via:boingboing github)
-
Fantastic long-form blog post by Jay Kreps on this key concept. great stuff
(tags: coding databases log network kafka jay-kreps linkedin architecture storage)
Difference Engine: Obituary for software patents
The Economist reckons we’re finally seeing the light at the end of the tunnel where the patent troll shakedown is concerned:
If the use of state consumer-protection laws to ward off frivolous patent suits were to catch on, it could give the trolls serious pause for thought—especially if their mass mailings of threatening letters to businesses were met by dozens of law suits from attorneys general demanding their presence in state courts across the land. One way or another, things are beginning to look ominous for those who would exploit the inadequacies of America’s patent system.
(tags: the-economist patents swpats trolls us east-texas law)
Load Balancer Testing with a Honeypot Daemon
nice post on writing BDD unit tests for infrastructure, in this case specifically a load balancer (via Devops Weekly)
(tags: load-balancers ops devops sysadmin testing unit-tests networking honeypot infrastructure bdd)
Karlin Lillington on DRI’s looming victory in the European Court of Justice
If the full European Court of Justice (ECJ) accepts the opinion of its advocate general in a final ruling due early next year – and it almost always does – it will prove a huge vindication of Ireland’s small privacy advocacy group, Digital Rights Ireland (DRI). Its case against Irish retention laws, which began in 2006, forms the basis of this broader David v Goliath challenge and initial opinion. The advocate general’s advice largely upholds the key concerns put forward by DRI against Ireland’s laws. Withholding so much data about every citizen, including children, in case someone commits a future crime, is too intrusive into private life, and could allow authorities to create a “faithful and exhaustive map of a large portion of a person’s [private] conduct”. Retained data is so comprehensive that they could easily reveal private identities, which are supposed to remain anonymous. And the data, entrusted to third parties, is at too much risk of fraudulent or malicious use. Cruz Villalón argues that there must be far greater oversight to the retention process, and controls on access to data, and that citizens should have the right to be notified after the fact if their data has been scrutinised. The Irish Government had repeatedly waved off such concerns from Digital Rights Ireland in the past.
(tags: dri rights ireland internet surveillance data-retention privacy eu ecj law)
Meet the Robot Telemarketer Who Denies She’s A Robot
Florida’s spammers strike again – pushing the boundaries of intrusive direct sales and marketing
(tags: florida ai spam direct-marketing bots sales health-insurance)
DigitalOcean’s guide to using Docker on their hosts
must give this a spin
(tags: lxc docker digital-ocean hosting ops)
-
Our children should be free to choose to study what really excites them, not subtly steered away from certain subjects because teachers believe in and propagate the stereotypes. Last year the IOP published a report “It’s Different for Girls” which demonstrated that essentially half of state coeducational schools did not see a single girl progress to A-level physics. By contrast, the likelihood of girls progressing from single sex schools were two and a half times greater.
Amen to this.(tags: sexism schools teaching uk phyics girls children bias stereotypes)
-
‘SBE is an OSI layer 6 representation for encoding and decoding application messages in binary format for low-latency applications.’ Licensed under ASL2, C++ and Java supported.
(tags: sbe encoding codecs persistence binary low-latency open-source java c++ serialization)
-
‘like inetd, but for WebSockets’ — ‘a small command line tool that will wrap an existing command line interface program, and allow it to be accessed via a WebSocket. It provides a quick mechanism for allowing web-applications to interact with existing command line tools.’ Awesome idea. BSD-licensed. (Via Mike Loukides)
(tags: websockets cli server tools unix inetd web http open-source)
-
a metric storage daemon, exposing both a carbon listener and a simple web service. Its aim is to become a simple, scalable and drop-in replacement for graphite’s backend.
Pretty alpha for now, but definitely worth keeping an eye on to potentially replace our burgeoning Carbon fleet…(tags: graphite carbon cassandra storage metrics ops graphs service-metrics)
Twitter tech talk video: “Profiling Java In Production”
In this talk Kaushik Srenevasan describes a new, low overhead, full-stack tool (based on the Linux perf profiler and infrastructure built into the Hotspot JVM) we’ve built at Twitter to solve the problem of dynamically profiling and tracing the behavior of applications (including managed runtimes) in production.
Looks very interesting. Haven’t watched it yet though(tags: twitter tech-talks video presentations java jvm profiling testing monitoring service-metrics performance production hotspot perf)
Spy agencies in covert push to infiltrate virtual world of online gaming
[MMOGs], the [NSA] analyst wrote, “are an opportunity!”. According to the briefing notes, so many different US intelligence agents were conducting operations inside games that a “deconfliction” group was required to ensure they weren’t spying on, or interfering with, each other.
(tags: spies spying games mmog online surveillance absurd east-germany funny warcraft)
Ryan Lizza: Why Won’t Obama Rein in the N.S.A.? : The New Yorker
Fantastic wrap-up of the story so far on the pervasive global surveillance story.
The history of the intelligence community, though, reveals a willingness to violate the spirit and the letter of the law, even with oversight. What’s more, the benefits of the domestic-surveillance programs remain unclear. Wyden contends that the N.S.A. could find other ways to get the information it says it needs. Even Olsen, when pressed, suggested that the N.S.A. could make do without the bulk-collection program. “In some cases, it’s a bit of an insurance policy,” he told me. “It’s a way to do what we otherwise could do, but do it a little bit more quickly.” In recent years, Americans have become accustomed to the idea of advertisers gathering wide swaths of information about their private transactions. The N.S.A.’s collecting of data looks a lot like what Facebook does, but it is fundamentally different. It inverts the crucial legal principle of probable cause: the government may not seize or inspect private property or information without evidence of a crime. The N.S.A. contends that it needs haystacks in order to find the terrorist needle. Its definition of a haystack is expanding; there are indications that, under the auspices of the “business records” provision of the Patriot Act, the intelligence community is now trying to assemble databases of financial transactions and cell-phone location information. Feinstein maintains that data collection is not surveillance. But it is no longer clear if there is a distinction.
(tags: nsa gchq surveillance spying privacy dianne-feinstein new-yorker journalism long-reads us-politics probable-cause)
Same Old Stories From Sean Sherlock
Sherlock’s record is spotty at best when it comes to engagement. Setting aside the 80,680 people who were ignored by the minister, he was hostile and counter productive to debate from the beginning, going so far as to threaten to pull out of a public debate because a campaigner against the [‘Irish SOPA’] SI would be in attendance. His habit of blocking people online who publicly ask him tough yet legitimate questions has earned him the nickname “Sherblock”.
(tags: sean-sherlock sherblock labour ireland politics blocking filtering internet freedom copyright emi music law piracy debate twitter)
Smart Metering in the UK is FCUKED
Most utilities don’t want smart metering. In fact they seem to have used the wrong dictionary. It is difficult to find anything smart about the UK deployment, until you realise that the utilities use smart in the sense of “it hurts”. They consider they have a perfectly adequate business model which has no need for new technology. In many Government meetings, their reluctant support seems to be a veneer for the hope that it will all end in disaster, letting them go back to the world they know, of inflated bills and demands for money with menaces. […] Even when smart meters are deployed, there is no evidence that any utility will use the resulting data to transform their business, rather than persecute the consumer. At a recent US conference a senior executive for a US utility which had deployed smart meters, stated that their main benefit was “to give them more evidence to blame the customer”. That’s a good description of the attitude displayed by our utilities.
(tags: smart-metering energy utilities uk services metering consumer)
Kelly “kellabyte” Sommers on Redis’ “relaxed CP” approach to the CAP theorem
Similar to ACID properties, if you partially provide properties it means the user has to _still_ consider in their application that the property doesn’t exist, because sometimes it doesn’t. In you’re fsync example, if fsync is relaxed and there are no replicas, you cannot consider the database durable, just like you can’t consider Redis a CP system. It can’t be counted on for guarantees to be delivered. This is why I say these systems are hard for users to reason about. Systems that partially offer guarantees require in-depth knowledge of the nuances to properly use the tool. Systems that explicitly make the trade-offs in the designs are easier to reason about because it is more obvious and _predictable_.
(tags: kellabyte redis cp ap cap-theorem consistency outages reliability ops database storage distcomp)
Building a Balanced Universe – EVE Community
Good blog post about EVE’s algorithm to load-balance a 3D map of star systems
(tags: eve eve-online algorithms 3d space load-balancing sharding games)
Virtual Clock – Testing Patterns Encyclopedia
a nice pattern for unit tests which need deterministic time behaviour. Trying to think up a really nice API for this….
(tags: testing unit-tests time virtual-clock real-time coding)
We’re sending out the wrong signals in bid to lure the big data bucks – Independent.ie
Simon McGarr on Ireland’s looming data-protection train-crash.
Last week, during the debate of his proposals to increase fees for making a Freedom of Information request, Brendan Howlin was asked how one of his amendments would affect citizens looking for data from the State’s electronic databases. His reply was to cheerfully admit he didn’t even understand the question. “I have no idea what an SQL code is. Does anyone know what an SQL code is?” Unlike the minister, it probably isn’t your job to know that SQL is the computer language that underpins the data industry. The amendment he had originally proposed would have effectively allowed civil servants to pretend that their computer files were made of paper when deciding whether a request was reasonable. His answer showed how the Government could have proposed such an absurd idea in the first place. Like it or not – fair or not – these are not the signals a country that wanted to build a long-term data industry would choose to send out. They are the sort of signals that Ireland used to send out about Financial Regulation. I think it’s agreed, that approach didn’t work out so well.
(tags: foi ireland brendan-howlin technology illiteracy sql civil-service government data-protection privacy regulation dpa)