@share   741

« earlier    

In defence of swap: common misconceptions
Having swap is a reasonably important part of a well functioning system. Without it, sane memory management becomes harder to achieve. Swap is not generally about getting emergency memory, it’s about making memory reclamation egalitarian and efficient.
swap  performance  linux  programming  sysAdmin  @share  memory 
february 2018 by Mekk
How do Ruby & Python profilers work? - Julia Evans
In this post, we’re just going to focus on CPU profilers (and not, say, memory/heap profilers). I’ll explain some basic general approaches to writing a profiler, give some code examples, and take a bunch of examples of popular Ruby & Python profilers and tell you how they work under the hood.
profiler  profiling  python  @share 
december 2017 by Mekk
The Log: What every software engineer should know about real-time data's unifying abstraction | LinkedIn Engineering
You can't fully understand databases, NoSQL stores, key value stores, replication, paxos, hadoop, version control, or almost any software system without understanding logs; and yet, most software engineers are not familiar with them. I'd like to change that. In this post, I'll walk you through everything you need to know about logs, including what is log and how to use logs for data integration, real time processing, and system building.
logging  architecture  distributed  kafka  synchronization  replication  algorithms  @share 
december 2017 by Mekk
Engineering Empathy – Brave New Geek
Why do you work where you work? For many in tech, the answer is probably culture. When you tell a friend about your job, the culture is probably the first thing you describe. It’s culture that can be a company’s biggest asset—and its biggest downfall. But what is it?
Culture isn’t a list of values or a mission statement. It’s not a casual dress code or a beer fridge. Culture is what you reward and what you don’t. More importantly, it’s what you reward and what you punish.
culture  business  engineering  community  communication  @share 
june 2017 by Mekk
Understanding Convolutional Neural Networks for NLP – WildML
I’ll try to summarize what CNNs are, and how they’re used in NLP. The intuitions behind CNNs are somewhat easier to understand for the Computer Vision use case, so I’ll start there, and then slowly move towards NLP.
convolution  machinelearning  language-processing  neural-networks  tutorial  artificial-intelligence  @share 
june 2017 by Mekk
CPU Utilization is Wrong
The metric we all use for CPU utilization is deeply misleading, and getting worse every year. What is CPU utilization? How busy your processors are? No, that's not what it measures. Yes, I'm talking about the "%CPU" metric used everywhere, by everyone. In every performance monitoring product. In top(1).
performance  cpu  profiling  linux  modern  @share  top 
june 2017 by Mekk
DOWÓD – jak to robią w Krakowie
Najczęściej spotykamy dowód
- przez ogląd (wystarczy popatrzeć),
- przez połechtanie ambicji słuchaczy (to dla Państwa jest proste),
humor  dowód  matematyka  delta  @share 
may 2017 by Mekk
Phishing with Unicode Domains - Xudong Zheng
From a security perspective, Unicode domains can be problematic because many Unicode characters are difficult to distinguish from common ASCII characters. It is possible to register domains such as "xn--pple-43d.com", which is equivalent to "аpple.com". It may not be obvious at first glance, but "аpple.com" uses the Cyrillic "а" (U+0430) rather than the ASCII "a" (U+0041). This is known as a homograph attack.
security  domain  phishing  homograph  unicode-domains  @share 
april 2017 by Mekk
When automation goes horribly wrong
Between October 2013 and August 2015, MiDAS initiated roughly 50,000 fraud findings. (…) A year and a half after the system went live, the TV station FOX 17 reported how the MiDAS touch overwhelmed the courts, and a backlog of nearly 30,000 cases was waiting to even be heard by a judge. In 2015, amid the media fallout, and several law suits against the UIA, the agency staff manually reviewed seven thousand cases flagged by computers. It turned out that only 8% of those were actually fraudulent. With a 92% false positive rate, this system should never have gone live, let alone endanger the lives of 50,000 families. (…) one woman took her own life after receiving a fraud penalty of $50,000, and several other attempted suicide. At the time when I wrote this in early 2017, the story was far from over.
automation  detection  fraud  bugs  errors  midas  @share  government  michigan 
april 2017 by Mekk
AI Decisively Defeats Human Poker Players - IEEE Spectrum
Developed by Carnegie Mellon University, the AI won the “Brains Vs. Artificial Intelligence” tournament against four poker pros by $1,766,250 in chips over 120,000 hands (games). Researchers can now say that the victory margin was large enough to count as a statistically significant win. (…) the victory demonstrates how AI has likely surpassed the best humans at doing strategic reasoning in “imperfect information” games such as poker. (…) “The algorithms we used are not poker specific, they take as input the rules of the game and output strategy.”
artificial-intelligence  poker  texas-holdem  ai  @share 
february 2017 by Mekk
Your Echo Chamber is Destroying Democracy
Our digital social existence has turned into a huge echo chamber, where we
mostly discuss similar views with like-minded peers and miserably fail to
penetrate other social bubbles
social-bubble  silos  confirmation-bias  facebook  trump  @share 
january 2017 by Mekk
Why big data and algorithms won’t improve business strategy
Less than 1% of companies have any mechanism of visualising their environment and continuously learning from it. The vast majority suffer from little to no situational awareness but then they are competing in a world against others who also lack situational awareness.

This is probably why the majority of strategy documents contain a tyranny of action and why most companies seem to duplicate strategy memes and rely on backward causality. We should be digital first, cloud first, we need a strategy for big data, social media, cloud, insight from data, IoT … yada yada. It’s also undoubtably why companies get disrupted by predictable changes and are unable to overcome their inertia to the change.
@share  business  chess-metaphor  knowledge-level  management  big-data-input  strategy 
january 2017 by Mekk
The Populists Wins Because We Let Them Define The Narrative (by @baekdal) #opinion
The media and politicians are so focused on each other that we are stuck inside this politicians first bubble. And the public is left standing on the outside, not being heard, not being invited to take part, disconnected and abandoned.

The result is that the public feels that both the politicians and the press are all a bunch of idiots. And this is why that every time the trust on politicians goes down, media go down with them.
baekdal  politics  newspaper  populists  @share 
january 2017 by Mekk
What’s wrong with exceptions? Nothing.
Exceptions are great, and I believe there’s a much simpler explanation for why they’ve gone AWOL in some newer languages — implementing them well is hard work for language designers, so some don’t bother and then choose to spin a weakness as a strength. Worse, some new languages are designed by people who spent their careers working in large C++ codebases that ban exceptions, so they probably don’t miss them.

In this article I’ll look at why exceptions are hard to implement well, why they’re so often banned in C++ and why we should demand them from our languages and runtimes anyway.
@share  exceptions  language-design  programming 
january 2017 by Mekk
The science of Westworld
Artificial intelligence made enormous strides in 2016, so it is fitting that one of the year’s hit TV shows was an exploration of what it means for machines to gain consciousness. But how close are we to building the brains of Westworld’s hosts for real? I’m going to look at some recent AI research papers and show that the hosts aren’t quite as futuristic as you might think.
artificial-intelligence  westworld  @share 
january 2017 by Mekk
DTrace for Linux 2016
The Linux 4.9-rc1 kernel now has raw capabilities similar to those provided by DTrace, the advanced tracer from Solaris. (…) you can now analyze the performance of applications and the kernel using production-safe low-overhead custom tracing, with latency histograms, frequency counts, and more.
linux  performance  trace  dtrace  debugging  @share 
november 2016 by Mekk
Why you should argue with your employees
Arguing is a sign that you care. You care enough to have strong opinions about how to make the company better. You’re willing to bring those opinions forward, and battle it out for the best one.
(…) The key is to argue well. To put forth your point not because you want your point to win, but because you want the best point to win.
management  conflict  @share 
october 2016 by Mekk

« earlier    

related tags

2013  2014  3g  admins  advice  agile  agility  ai  air-france  airbus  algorithms  anomaly  apex  architecture  article  artificial-intelligence  assembler  assembly  automated-testing  automation  averages  background  bad-habits  baduk  baekdal  banki  bankrupcy  bart  bash  bezpieczeństwo  bgp  big-data-input  bitcoin  bledy  book-review  books  boring-ssl  browser-specs  browser  browsers  bug  buggy-code  bugs  build  business  c++  caching  cap  change  changesets  checklist  chess-metaphor  children  code-review  code  communication  community  compilers  concentration  confirmation-bias  conflict  consistency  console  convolution  corporate  correlation  cpu-count  cpu  cracking  creativity  critical-analysis  critique  cryptography  css  cukier  culture  customization  data-science  database  dave-obasanjo  debugging  deficit  delta  democracy  deployment-patterns  design-patterns  design  detection  developers  development-vs-operations  development  devops  diet  diff  distributed  dls  dom  domain-specific-languages  domain  donation  dowód  dropbox  dtrace  dzieci  długość-życia-xix  długość-życia  ebook  economy  education  energy  engineering  error-simulation  errors  essay  estonia  ethernet  exceptions  exclusion  extensions  facebook  failures  fault-injection  figury  finance  firefox  flying  fork  frameworks  fraud  free-bsd  free-software  free  funny  gadzety  games  gcc  gerrit  global-warming  google  government  gry  hacking  hand-written  hardening  hate  hci  health  hello-world  hg-wip  hgrc  historia  history  homograph  howto  humor  ian-bicking  ietf  image-magick  image-processing  image-recognition  inequality  informatyka  infrastructure  injection  inspiration  intel  inzynieria-oprogramowania  inzynieria-wszechswietnosci  iptables  java  javascript  jobs  kafka  katastrofy  knowledge-level  korelacja  kształty  language-design  language-processing  lets-encrypt  libraries  library  libressl  linked-list  linksys  linux  logging  machine-learning  machinelearning  mackenzie  magic-code  management  manager  managers  managing-programmer  manual-testing  manual  mark-dominus  marketing  martinfowler  matematyka  math  mathematics  mediocre  memory  mercurial  michigan  microsoft  midas  migrations-vs-state  mistakes  mobile  modern  money  mysterious  nasa  nauka  netgear  network-problems  network  networking  neural-networks  newspaper  nfc  not-removed-code  online  open-source  openssl  optimistic-code  optimization  optimizations  organization  oszustwa  ovid  paradoxes  parser  parsing  password-change  password-frequency  password-strength  password  passwords  patterns  pdf  people  performance  perl  peter-gutmann  phishing  phone  physics  pilot  pki  play  plugins  plus-bank  poker  politics  polityka  polskie  populists  porting  priorities  prioritizing  privacy  problems  proces  process  productivity  profiler  profiling  programmer  programming  programowanie  project-management  protocol  protocols  przypadkowa-zbieżność  python  rant  readability  reading-technique  reading  refactor  refactoring  reference  release  remaining  replication  research  resiliance  retrospect  rewrite  rewriting  rfc  rfid  risk  routing  salesforce  schema-management  science  scientific  security  selecting-work  seo  sfdc-isv  shapes  shell  shellshock  silos  social-bubble  software-rewrite  software  speed  ssl  standards  startup  statystyka  story  strategy  style  su  sugar  surveillance  swap  sympy  synchronization  sysadmin  system-wyborczy  tc  team-building  team  tech  temperature  terrorism  terroryzm  testing  texas-holdem  thanks  theory  thinking  threading  tools  top  topologia  topology  trace  traffic-errors-simulation  training  trouble  trump  tutorial  typography  tłuszcz  unicode-domains  unix  unmaintaneable-code  unreadable-code  usa  usability  values  vector  voting  voyeur-marketing  w3org  web-based  web  westworld  wiek  wiki-editing-habits  wiki  windows  wireless  wojna-z-terroryzmem  wolphram-alpha-alternative  wordpress  workflow  working-wiki  wybory  wychowanie  wykład  włamania  xix  xtext  xviii  zabawa  zabezpieczenia  zdrowie  zed-shaw  zespol 

Copy this bookmark: