5309
Some facts on immigration to Ireland
Handy to have to hand next time right-wing talking points emerge:
Let’s summarise:

Ireland has a relatively high level of non-citizens in its population. But this is down to the high level of UK citizens and citizens from other English-speaking countries (US, Canada, Australia and New Zealand).
Ireland has significantly fewer non-citizens from outside the English-speaking world than high-income EU countries.
The proportion of non-citizens has remained stable over the last 10 years (i.e. there is no ‘surge’).
Non-citizens in Ireland are more integrated into the labour market than any other high-income EU country – that is, there is lower unemployment among non-citizens. So much for the ‘sponging-off-the-state’ argument.
We have had far fewer asylum-seekers and we grant asylum to far fewer than most other high-income EU countries.
The claims of the Far Right and their allies collapse when we look to reality. 
immigration  facts  statistics  ireland  asylum-seekers 
6 hours ago
Serverless Computing: One Step Forward, Two Steps Back - Speaker Deck
So much agreement with this slide deck, particularly the list of limitations of current FaaS:
15 min lifetimes; I/O bottlenecks; no inbound network comms; no specialized hardware; and the general horribleness of using DynamoDB or S3 state as a platform for distributed computing protocols.
faas  lambda  serverless  fail  slides  architecture  aws  dynamodb  s3  cloud 
12 hours ago
Apache Iceberg (incubating)
Coming to presto soon apparently....
Iceberg tracks individual data files in a table instead of directories. This allows writers to create data files in-place and only adds files to the table in an explicit commit.

Table state is maintained in metadata files. All changes to table state create a new metadata file and replace the old metadata with an atomic operation. The table metadata file tracks the table schema, partitioning config, other properties, and snapshots of the table contents.

The atomic transitions from one table metadata file to the next provide snapshot isolation. Readers use the latest table state (snapshot) that was current when they load the table metadata and are not affected by changes until they refresh and pick up a new metadata location.


excellent -- this will let me obsolete so much of our own code :)
presto  storage  s3  hive  iceberg  apache  asf  data  architecture 
yesterday
Crunching The Numbers: How Much Will Your Electric Car Really Cost? | CleanTechnica
some good real-world measurements from Germany. Ireland's residential electricity costs are roughly comparable to the Netherlands I think in price/kWh
evs  cars  driving  costs  home  household  electricity 
yesterday
The Embroidered Computer
an exploration into using historic gold embroidery materials and knowledge to craft a programmable 8 bit computer.

Solely built from a variety of metal threads, magnetic, glass and metal beads, and being inspired by traditional crafting routines and patterns, the piece questions the appearance of current digital and electronic technologies surrounding us, as well as our interaction with them.

Technically, the piece consists of (textile) relays, similar to early computers before the invention of semiconductors. Visually, the gold materials, here used for their conductive properties, arranged into specific patterns to fulfil electronic functions, dominate the work. Traditionally purely decorative, their pattern here defines they function. They lay bare core digital routines usually hidden in black boxes. Users are invited to interact with the piece in programming the textile to compute for them.
electronics  computers  computing  art  embroidery  craft  gold  8-bit 
yesterday
certain Irish surnames inherited ‘the cure’
This is quite an odd superstition -- the belief that people with a certain surname could cure a specific ailment.
Wicklow-born reader Mattie Lennon reminds me that certain Irish families used to hold monopolies over the treatment of individual disorders, based solely on their surnames. Mattie knows this from experience. As a child in the 1950s, he contracted shingles. And it was an article of faith then that anyone by the name of Keogh could cure that painful condition. There were no mysterious herbal concoctions involved: the power resided in their veins, literally. Thus a man named Darby Keogh was called, “bled his fingers, mixed the blood with holy water, and applied it”. Scoff all you like readers, but “it cured my shingles”, says Mattie,
health  history  superstitions  ireland  wicklow  quackery  the-cure 
2 days ago
glibc changed their UTF-8 character collation ordering across versions, breaking postgres
This is terrifying:
Streaming replicas—and by extension, base backups—can become dangerously broken when the source and target machines run slightly different versions of glibc. Particularly, differences in strcoll and strcoll_l leave "corrupt" indexes on the slave. These indexes are sorted out of order with respect to the strcoll running on the slave. Because postgres is unaware of the discrepancy is uses these "corrupt" indexes to perform merge joins; merges rely heavily on the assumption that the indexes are sorted and this causes all the results of the join past the first poison pill entry to not be returned. Additionally, if the slave becomes master, the "corrupt" indexes will in cases be unable to enforce uniqueness, but quietly allow duplicate values.


Moral of the story -- keep your libc versions in sync across storage replication sets!
postgresql  scary  ops  glibc  collation  utf-8  characters  indexing  sorting  replicas  postgres 
4 days ago
PRNG-predicting bot ascends in Nethack in 7 minutes 15 seconds
This is a really amazing hack!
So, we could now go from starting inventory to RNG-seed in no time, but we still had to ascend. While we could write a simple “wish”-bot, get +127 Magicbane and then ascend by hand from there, achieving both fastest realtime and lowest turn count in the same game would not be easy.

First idea was to start a NAO game, fetch the seed, then saving and perfecting the seed offline. It was quickly ruled out though as the game is reseeded each time it is started (i.e. when you load your game).

Loooong story short, we wrote a bot. You had to play the first turns (offline) and move her to a non-magic fountain located next to a wall. If you died, no big deal, just retry on the same seed. This is why SWAGGINZZZ stood still for 6 minutes, we had absolutely horrible RNG when trying to get the specific fountain needed on dlvl2.

The fountain is required for wishes. The wall is required to be able to offset the random state without advancing the game state – every time the character attempts to walk into a wall, it calls random() without wasting any in-game time. From the fountain, the bot ascends completely on her own.
nethack  random  prng  games  hacks  cheats  nao  amazing 
4 days ago
A UK police force is dropping tricky cases on advice of an algorithm
Wow, this is a terrible idea. It will definitely launder existing human bias into its decisions.

However, because the technology bases its predictions on past investigations, any biases contained in those decisions may be reinforced by the algorithm. For example, if there are areas that don’t have CCTV and police frequently decided not to pursue cases there, people in those places could be disadvantaged. “When we train algorithms on the data on historical arrests or reports of crime, any biases in that data will go into the algorithm and it will learn those biases and then reinforce them,” says Joshua Loftus at Stanford University in California.
[...]

Police forces only ever know about crimes they detect or have reported to them, but plenty of crime goes unreported, especially in communities that have less trust in the police.
This means the algorithms are making predictions based on a partial picture. While this sort of bias is hard to avoid, baking it into an algorithm may make its decisions harder to hold to account compared with an officer’s. John Phillips, superintendent at Kent Police, says that for the types of crimes that EBIT is being used for, under-reporting isn’t an issue and so shouldn’t affect the tool’s effectiveness.


....well, I guess that's OK then? I would have assumed under-reporting would be a massive source of bias alright....
bias  machine-learning  ml  ai  cctv  police  uk  kent  policing 
5 days ago
"Cracking the Coding Interview" handouts
amazing handouts for interviewees looking to do well in technical interviews; there are 3, coding, PM, and soft-skills-oriented. I'm on the other side of the table these days but these are fantastic
interviews  coding  career  interviewing  hiring 
6 days ago
White Matter Integrity in Obstructive Sleep Apnea before and after Treatment
Sleep Apnea causes physical damage to the brain, particularly in white matter fibre integrity. Thankfully, it is reversible.
Results in pre-treatment OSA patients showed impairments in most cognitive areas, mood and sleepiness that were associated with diffuse reduction of WM fiber integrity reflected by diminished fractional anisotropy (FA) and mean diffusivity (MD) in multiple brain areas. After 3 months of CPAP, only limited changes of WM were found. However, over the course of 12 months CPAP treatment, an almost complete reversal of WM abnormalities in all the affected regions was observed in patients who were compliant with treatment. Significant improvements involving memory, attention, and executive-functioning paralleled WM changes after treatment.
brain  brain-damage  sleep  sleep-apnea  snoring  medicine  papers 
6 days ago
How Millennials Became The Burnout Generation
That realization recast my recent struggles: Why can’t I get this mundane stuff done? Because I’m burned out. Why am I burned out? Because I’ve internalized the idea that I should be working all the time. Why have I internalized that idea? Because everything and everyone in my life has reinforced it — explicitly and implicitly — since I was young. Life has always been hard, but many millennials are unequipped to deal with the particular ways in which it’s become hard for us.
burnout  life  work  workaholism  millenials  anxiety 
6 days ago
Allthefood
Decent new Dublin food blog -- reviews and news. Like a Harbo-free version of Lovin' Dublin
dublin  food  eating  restaurants  reviews 
7 days ago
FFmpeg, SOX, Pandoc and RSVG for AWS Lambda
OK-ish way to add dependencies to your Lambda containers:
The basic AWS Lambda container is quite constrained, and until recently it was relatively difficult to include additional binaries into Lambda functions. Lambda Layers make that easy. A Layer is a common piece of code that is attached to your Lambda runtime in the /opt directory. You can reuse it in many functions, and deploy it only once. Individual functions do not need to include the layer code in their deployment packages, which means that the resulting functions are smaller and deploy faster. For example, at MindMup, we use Pandoc to convert markdown files into Word documents. The actual lambda function code is only a few dozen lines of JavaScript, but before layers, each deployment of the function had to include the whole Pandoc binary, larger than 100 MB. With a layer, we can publish Pandoc only once, so we use significantly less overall space for Lambda function versions. Each code change now requires just a quick redeployment.
serverless  lambda  dependencies  deployment  packaging  ops 
7 days ago
Give Up the Ghost: A Backdoor by Another Name | Just Security
Now that GCHQ have asked for this, I suspect plenty of other government bodies around the world will be looking for similar.
They’re talking about adding a “feature” that would require the user’s device to selectively lie about whether it’s even employing end-to-end encryption, or whether it’s leaking the conversation content to a third (secret) party. Is the security code displayed by your device a mathematical representation of the two keys involved, or is it a straight-up lie? Furthermore, what’s to guarantee that the method used by governments to insert the “ghost” key into a conversation without alerting the users won’t be exploited by bad actors?

Despite the GCHQ authors’ claim, the ghost will require vendors to disable the very features that give our communications systems their security guarantees in a way that fundamentally changes the trust relationship between a service provider and its users. Software and hardware companies will never be able to convincingly claim that they are being honest about what their applications and tools are doing, and users will have no good reason to believe them if they try.

And, as we’ve seen already seen, GCHQ will not be the only agency in the world demanding such extraordinary access to billions of users’ software. Australia was quick to follow the UK’s lead, and we can expect to see similar demands, from Brazil and the European Union to Russia and China. (Note that this proposal would be unconstitutional were it proposed in the United States, which has strong protections against governments forcing actors to speak or lie on its behalf.)
We must reject GCHQ’s newest “ghost” proposal for what it is: a mandated encryption backdoor that weakens the security properties of encrypted messaging systems and fundamentally compromises user trust.
crypto  ghost  gchq  security  backdoors  uk 
7 days ago
Trek10 | From relational DB to single DynamoDB table: a step-by-step exploration
tl;dr:
Is modeling my relational database in a single DynamoDB table really a good idea?

About a year ago, I wrote a fairly popular article called “Why DynamoDB isn’t for everyone”. Many of the technical criticisms of DynamoDB I put forth at that time (lack of operational controls such as backup/restore; a persistent problem with hot keys) have since been partially or fully resolved due to a truly awe-inspiring run of feature releases from the DynamoDB team.

However, the central argument of that article remains valid: DynamoDB is a powerful tool when used properly, but if you don’t know what you’re doing it’s a deceptively user-friendly guide into madness. And the further you stray into esoteric applications like relational modeling, the more sure you’d better be that you know what you’re getting into. Especially with SQL-friendly “serverless” databases like Amazon Aurora hitting their stride, you have a lot of fully-managed options with a smaller learning curve.
dynamodb  databases  storage  nosql  sql  relational  aws  relations 
7 days ago
AWS Service SLAs
The goal of this page is to high-light the lack of coverage AWS provides for its services across different security factors. These limitations are not well-understood by many. Further, the "Y" fields are meant to indicate that this service has any capability for the relevant factor. In many cases, this is not full coverage for the service, or there are exceptions or special cases.
amazon  aws  services  slas  ops  reliability 
7 days ago
We’ll Never Know Whether Monorepos Are Better
This makes sense to me where the monorepo-vs-polyrepo argument is concerned -- it's another religious war:
About six months after the project was declared “done” (but there was always more to do, more improvements to make to our homegrown dependency management solution), we had a retrospective meeting. The same engineers who had taken sides, for and against the project, were again assembled to discuss how it went.
One of the main opponents went first.

“Thank goodness we’re finally having this retrospective,” he said. “I think we can all see that this experiment has been a colossal failure and that it’s time for us to change course and roll back to monorepo.”
“What do you mean?” one of the main multirepo advocates replied. “This was one of the best decisions we’ve ever made!”

This really shocked me. We had access to all of the data you could possibly want to evaluate the decision. The same engineers working with the same codebase had seen what it was like in the monorepo model and the multirepo model. We knew exactly how much it had actually cost to switch. We had lived with the advantages and disadvantages of both models. But still we couldn’t come to an agreement.

That retrospective taught me to be humble in my ambitions to “improve” engineering productivity. There’s no way to measure productivity in software, so there’s no way to know whether controversial, expensive “productivity enhancing” projects actually deliver on their promise, even in hindsight.
monorepo  productivity  dev  engineering  coding  polyrepo 
11 days ago
I Accidentally Made Myself Lactose Intolerant With Whole30
A few years back, I had a nasty bout of food poisoning while travelling, which made me lactose-intolerant for several years. Sounds like this may be more common than you'd think, based on this article:
If you haven’t heard of Whole30, some information: It’s a month-long eating plan that aims to help followers hit “the reset button with your health, habits, and relationship with food.” For 30 days, you cut out soy, legumes, grains, sugars, alcohol, and, of course, dairy. [....]

When you reach the end of the Whole30, you’re supposed to add the forbidden food groups back into your diet one at a time. The goal is to figure out which foods are making you feel sluggish, bloated, or just generally not great, so you can ostensibly keep on avoiding them forever.

I didn’t do that part. I just jumped right back into eating what I wanted — but suddenly nothing was the same. That first bowl of ice cream I’d been looking forward to for weeks was quickly followed by sharp stomach pains and what can best be described (grossly, but accurately) as bubble gut. [....]

The good news, according to gastrointestinal specialist Kim Barrett, a professor of medicine at the University of California, San Diego, is that I’m not crazy. The bad news is that dairy no longer agrees with my body’s biology. Turns out, it is possible to suddenly make yourself lactose intolerant.

“To some extent, our ability to handle lactose is a use-it-or-lose-it phenomenon,” Barrett says. The body digests lactose — a disaccharide — by using lactase, an enzyme in the small intestine, to break it down into the monosaccharides glucose and galactose, which can then be absorbed. “If you don’t have the [lactose] substrate in the diet, you start to reduce the synthesis of the lactase enzyme to digest it,” Barrett explains. “After a period of completely excluding lactose from the diet, you may not have any of those digestive enzymes present.”
diet  food  lactose  lactase  intolerance  whole30  milk  cheese 
12 days ago
Risky business: linking _Toxoplasma gondii_ infection and entrepreneurship behaviours across individuals and countries | Proceedings of the Royal Society B: Biological Sciences
Using a saliva-based assay, we found that students (n = 1495) who tested IgG positive for Toxoplasma gondii exposure were 1.4× more likely to major in business and 1.7× more likely to have an emphasis in ‘management and entrepreneurship' over other business-related emphases. Among professionals attending entrepreneurship events, T. gondii-positive individuals were 1.8× more likely to have started their own business compared with other attendees (n = 197). Finally, after synthesizing and combining country-level databases on T. gondii infection from the past 25 years with the Global Entrepreneurship Monitor of entrepreneurial activity, we found that infection prevalence was a consistent, positive predictor of entrepreneurial activity and intentions at the national scale, regardless of whether previously identified economic covariates were included. Nations with higher infection also had a lower fraction of respondents citing ‘fear of failure' in inhibiting new business ventures. While correlational, these results highlight the linkage between parasitic infection and complex human behaviours, including those relevant to business, entrepreneurship and economic productivity.
science  biology  infection  toxoplasmosis  parasites  humans  behaviour  entrepreneurs  business  brains  economics 
13 days ago
The Hydrogen Fuel Cell Scam
The need to have a massive and costly buildout of [hydrogen refuelling] infrastructure remains one of the most glaring problems of a supposed transition to a hydrogen economy. The cost of a single hydrogen fueling station is likely to be over $2 million. This is in contrast to the relatively modest $50,000 cost of deploying a high-speed battery-electric car charging station. Another factor here is the reality of putting into place an all-new infrastructure from scratch versus building off of an already existing electrical infrastructure that exists in every developed nation.  The fact that every building, garage, and lamp post in the US is already electrified means we simply have to add one final component to the existing and established network.
hydrogen  green  driving  cars  fuel  fossil-fuels  decarbonisation 
13 days ago
"Thread on climate change & Irish agri lobbyists"
'The massive levy income raised on beef & dairy gives the IFA a financial incentive to promote beef & dairy expansion and a disincentive to support any fundamental changes to Ireland’s agricultural model, regardless the public interest.'
dairy  beef  ireland  farming  climate-change  climate  lobbying  government 
25 days ago
The Holiday Drink of 2018: Cognac Punch
Looks tasty, albeit pricey and strong:
London Punch House Punch
By David Wondrich

Ingredients:
4 Lemons
6 oz (3/4 cup) White sugar
20 oz Hennessy Privilege VSOP Cognac
6 oz Jamaican rum
1 quart (4 cups) Cold water
Glass: Punch cup

Garnish: Freshly grated nutmeg

Directions:
The day before you serve the punch, fill a quart container with water and put it in the freezer.
Peel 4 lemons in long spirals and put the peels into a mason jar with 6 oz (3/4 cup) of white sugar. Seal the jar, shake it and let sit overnight.
Two hours before you serve the punch, unseal the mason jar, add 6 oz (3/4) cup fresh-squeezed, strained lemon juice, reseal and shake until all the sugar has dissolved. Refrigerate.
To assemble the punch, unmold the ice block and place it in a 1-gallon punch bowl. Shake the contents of the mason jar and pour it into the punch bowl unstrained, peels and all.
Add 20 oz (2-and-a-half cups) Hennessy Privilege VSOP Cognac and 6 oz (3/4 cup) Jamaican rum. Stir.
Add 1 quart (4 cups) cold water. Stir again and grate nutmeg on top.
Using a punch ladle, drape a few ends of the spiral lemon peels over the rim of the bowl.
Grate nutmeg over the top.
punch  cognac  hennessy  recipes  rum 
26 days ago
Zstandard: How Facebook increased compression speed - Facebook Code
very cool; particularly the high level of support for external-dictionary compression
facebook  compression  zstd  zstandard  dictionary-compression 
26 days ago
slides from "Distributed Log-Processing Design Workshop", SRECon Americas 2018
Fantastic presentation discussing the kinds of design criteria used when architecting a large-scale data processing and storage service. Interesting to see some Google terminology, e.g. "dimensioning" -- ballparking the expected scalability numbers, bandwidth, qps, and limits.
distributed-systems  coding  design  architecture  google  photon  logs  log-storage  slides  srecon 
26 days ago
The “Bart” — sudden hundreds-of-Bitcoin pumps or dumps, to burn the margin traders
Finance journalists need to stop treating crypto as an efficient market that responds to concerns. It’s a thinly-traded unregulated playground for whales, out to wreck the margin traders. A $400 dip in fifteen minutes is not a “market signal” — it’s a deliberate dump to manipulate the price.

Though there’s still downward pressure on the price — all the suckers from the bubble have gone home, so they’re not buying … but the miners still have to sell coins for actual money to pay for their electricity.

And even more so now that the price of mining one bitcoin is at — or above — what you could get for selling that bitcoin.

So one minute you’ll see a sudden $100 increase in the price that cost 130 BTC of dollars — and those are actual dollars going in — followed the next minute by a matching $100 drop that came from selling only 30 BTC. It’s much easier to drop the price than raise it.
investing  bitcoin  via:harikunzru  cryptocurrency  pump-and-dump  barts  finance  margin-traders  currencies  fraud 
28 days ago
awslabs/amazon-kinesis-scaling-utils
The Kinesis Scaling Utility is designed to give you the ability to scale Amazon Kinesis Streams in the same way that you scale EC2 Auto Scaling groups – up or down by a count or as a percentage of the total fleet. You can also simply scale to an exact number of Shards. There is no requirement for you to manage the allocation of the keyspace to Shards when using this API, as it is done automatically.

You can also deploy the Web Archive to a Java Application Server, and allow Scaling Utils to automatically manage the number of Shards in the Stream based on the observed PUT or GET rate of the stream.
kinesis  scaling  scalability  shards  sharding  ops 
28 days ago
Google used a Baidu front-end to scrape user searches without consent
The engineers used the data they pulled from [acquired Baidu front-end site] 265.com to learn about the kinds of things that people located in mainland China routinely search for in Mandarin. This helped them to build a prototype of Dragonfly. The engineers used the sample queries from 265.com, for instance, to review lists of websites Chinese people would see if they typed the same word or phrase into Google. They then used a tool they called “BeaconTower” to check whether any websites in the Google search results would be blocked by China’s internet censorship system, known as the Great Firewall. Through this process, the engineers compiled a list of thousands of banned websites, which they integrated into the Dragonfly search platform so that it would purge links to websites prohibited in China, such as those of the online encyclopedia Wikipedia and British news broadcaster BBC.

Under normal company protocol, analysis of people’s search queries is subject to tight constraints and should be reviewed by the company’s privacy staff, whose job is to safeguard user rights. But the privacy team only found out about the 265.com data access after The Intercept revealed it, and were “really pissed,” according to one Google source.
china  search  tech  google  privacy  baidu  interception  censorship  great-firewall  dragonfly 
28 days ago
Remove Background from Image
A fully automated background-removal tool. Nicely done
images  editing  tools  background  graphics 
28 days ago
Applied machine learning at Facebook: a datacenter infrastructure perspective
Lots of cool details into how they've productized and scaled up their prod ML infrastructure.
As we looked at last month with Continuum, the latency of incorporating the latest data into the models is also really important. There’s a nice section of this paper where the authors study the impact of losing the ability to train models for a period of time and have to serve requests from stale models. The Community Integrity team for example rely on frequently trained models to keep up with the ever changing ways adversaries try to bypass Facebook’s protections and show objectionable content to users. Here training iterations take on the order of days. Even more dependent on the incorporation of recent data into models is the news feed ranking. “Stale News Feed models have a measurable impact on quality.” And if we look at the very core of the business, the Ads Ranking models, “we learned that the impact of leveraging a stale ML model is measured in hours. In other words, using a one-day-old model is measurably worse than using a one-hour old model.” One of the conclusions in this section of the paper is that disaster recovery / high availability for training workloads is key importance.
machine-learning  facebook  ml  training  ops  models  infrastructure  prod  production 
29 days ago
8 Myths of Abortion in Ireland
from the Abortion Rights Campaign's "8 Days - 8 Reasons to Repeal the 8th" myth-busting series in 2014.
arc  abortion  ireland  politics  mythbusters  repealthe8th 
4 weeks ago
GDPR Subject Access Request helper for Dublin Bus vs bike incidents
'A new tool has been created to assist people who want to request video footage of incidents involving Dublin Bus under GDPR rules.'
dublin-bus  bus  bike  cycling  dublin  cameras  gdpr  sars 
4 weeks ago
A primer on privacy as "contextual integrity"
A primer on privacy as "contextual integrity" and why privacy notices on mobile platforms (both Android and iOS) are insufficient for attaining informed consent.

If your doctor asked for permission to collect your medical history, you would probably say yes.
However, if that doctor asked to collect your medical history to give to marketers for advertising purposes, you would probably decline.

The difference is, in the first case, you're making assumptions about how the data will be used based on who is making the request.
Knowing just the type of data requested and the requester are insufficient to make an informed decision: people also consider the purpose and other constraints (e.g., will data be resold, stored securely, etc.), which are equally important factors.

(via Karlin)
privacy  context  understanding  mobile  data-protection  permission  opt-in 
5 weeks ago
Notebookcheck's Top 10 Tablets under 250 Euros
a decent list of low-end tablets, given the season
tablets  devices  hardware  android  gadgets  xmas 
5 weeks ago
Makisu
Uber’s Fast, Reliable Docker Image Builder for Apache Mesos and Kubernetes.
we built our own image building tool, Makisu, a solution that allows for more flexible, faster container image building at scale. Specifically, Makisu:

requires no elevated privileges, making the build process portable.

uses a distributed layer cache to improve performance across a build cluster.

provides flexible layer generation, preventing unnecessary files in images.

is Docker-compatible, supporting multi-stage builds and common build commands.
makisu  docker  containers  ops  build  mesos  kubernetes  building 
5 weeks ago
Billionaires Are the Leading Cause of Climate Change
That's largely because there is no "free market" incentive to prevent disaster. An economic environment where a company is only considered viable if it's constantly expanding and increasing its production can't be expected to pump its own brakes over something as trivial as pending global catastrophe. Instead, market logic dictates that rather than take the financial hit that comes with cutting profits, it's more reasonable to find a way to make money off the boiling ocean. Nothing illustrates this phenomenon better than the burgeoning climate-change investment industry. According to Bloomberg, investors are looking to make money off of everything from revamped food production to hotels for people fleeing increasingly hurricane-ravaged areas. A top JP Morgan Asset investment strategist advised clients that sea-level rise was so inevitable that there was likely a lot of opportunity for investing in sea-wall construction.
doom  capitalism  future  climate-change  environment  politics 
5 weeks ago
"Bring home the bacon" debate is a case study in how stupid we've all become
Well said, that Carl Kinsella.
How are we supposed to focus on the things that matter when media organisations refuse to? Ivan Yates and Matt Cooper ran a segment on whether or not we've reached political correctness. Niall Boylan had a discussion about whether or not it's okay to ban phrases that nobody really wants to ban [as PETA has suggested].

As a matter of pure coincidence, other reports from outlets like the Daily Mail and Today FM reported that the HSE was going to ban its employees from using phrases like "love," "pet" or "dear." That wasn't true either. Again, it was one line in a huge report that asked the question as to whether or not it was the best course of action to use such terms. It wasn't mentioned again.

Unlike phrases about meat, this actually matters. This is the kind of thing that could actually change how people are treated in hospital. But again, it wasn't true. The public – which has lost its capacity to verify what is true and what is not — was being lied to by the media. That's how it works now.
media  clickbait  fake-news  news  today-fm  daily-mail  hse  niall-boylan  peta  controversy  political-correctness  ivan-yates  matt-cooper 
5 weeks ago
Irish agricultural CO2 emissions actually INCREASED by 2.9% last year
Irish EPA: agriculture greenhouse gas emissions increased by 2.9% in 2017 “The most significant drivers are higher dairy cow numbers (+3.1%) which reflects national plans to expand milk production”


Feck's sake.
epa  ireland  co2  greenhouse-gases  emissions  green  farming  agriculture 
5 weeks ago
Chester Beatty Digital Collections
'Explore online access to our remarkable treasures, through this searchable database of digitised artworks and manuscripts', from the Chester Beatty museum's collection. Licensing isn't fully open though -- 'Images and PDF's are provided for personal research and scholarship.'
chester-beatty  museums  history  archaeology  artifacts  art  manuscripts 
5 weeks ago
3D models by DH_Age Sheela-na-Gig3D Project (@DH_Age) - Sketchfab
These are fantastic -- 3D scans of Sheela-na-Gig carvings around Ireland from 3D Sheela, an Irish based research initiative 'focusing on the digital documentation and analysis of Ireland's Sheela-na-Gig catalogue' (NSFW)
3d  sheela-na-gigs  history  carving  nsfw  models  photogrammetry 
5 weeks ago
Rudy Giuliani doesn't understand how links work
As waxy noted: 'this might be funny if he wasn't Trump's cybersecurity advisor'.
Twitter allowed someone to invade my text with a disgusting anti-President message. The same thing-period no space-occurred later and it didn’t happen. Don’t tell me they are not committed cardcarrying anti-Trumpers. Time Magazine also may fit that description. FAIRNESS PLEASE


Giuliani composed a tweet with no spaces after full stops, and a broken regexp at Twitter auto-linkified "G-20.In". An internet prankster registered this domain and Giuliani lost his shit in a spectacular display of incompetence.

The best bit? Here's a thread with the original devs: https://twitter.com/hoverbird/status/1070142045140877312 -- 'Hey @tw and @bcherry, remember all the debates we had about the linkifying regex around edge cases like this?'

(via Waxy and pretty much everyone on twitter)
edge-cases  bugs  twitter  regexps  regular-expressions  links  urls  us-politics  trump  rudy-giuliani  security  funny 
5 weeks ago
Convert an RSS feed to ActivityPub
for autoposting to Mastodon or similar. Via Nelson
via:nelson  mastodon  rss  blogging  scripts 
6 weeks ago
Nice heatmap visualisation of mortality ratios between men and women
'Age and period specific mortality ratios of females and males (a "Lexis-surface" in demographers parlance)' (via apenwarr)
via:apenwarr  mortality  heatmaps  dataviz  visualisation  colouring  lexis-surfaces 
6 weeks ago
PRDD - Performance-Review Driven Development
'If the way to get promoted is to launch a shiny new product, then your most senior people will be the best at finding shiny new products to launch, even if that's not the right technical decision to make.' (from a newsy thread about Twitter's latest messaging system switch)
newsy  messaging  infrastructure  twitter  kafka  pubsub  ops  architecture  prdd  performance-reviews 
6 weeks ago
Crowdfunding Backer Patented My Project
I had thought thought all along that if we published everything openly, it wouldn’t be possible for someone else to patent stuff that’s already all over the web.  But I was wrong. Despite tons of prior art out on the web, in academic research papers and even for sale that are LED stickers, the patent examiner missed it and deemed the LED sticker patent “new” and “non-obvious.”  

How could that happen?  The sad truth is that patents are approved all that time that probably shouldn’t be.
[...]

Can’t you invalidate the patent? Unfortunately, once a patent gets issued things get much more complicated and expensive. The cheapest option would be for us to go to the USPTO with our prior art list and invalidate the patent though a process called an inter partes review (IPR).  But such a process typically costs between $300,000 and $600,000 to file due to legal fees. In fact, it’s much more than the cost of getting the patent in the first place! So for now, we’ve decided not to go down this route.


The US patent system is broken. This is appalling
patents  led-stickers  uspto  prior-art  invention  crowdfunding 
6 weeks ago
Google Tried to Patent My Work After a Job Interview
I looked up the patent application and luckily, this time the patent application was still being reviewed by the patent examiner.  It had not issued! The provisional was filed August 29, 2014, months after my first interview and visit back in March 2014.  Two of the inventors listed were the same people who had interviewed me. 


This is frankly appalling behaviour from Google -- total abuse of the patent system. If Joi Ito hadn't been around to mediate this patent probably would have issued and this researcher's life's work stolen from her through IP dirty tricks.

(Also, patents need to die)
patents  software-patents  google  dirty-tricks  interviewing  ip  mit  medialab  paper  jie-qi 
6 weeks ago
House Democrats Sent A New Letter To Jeff Bezos About Amazon’s Facial Recognition Tool
The House Democrats’ questions focus largely on possible embedded bias in Amazon Rekognition, including how the tool’s accuracy breaks down by race, gender, ethnicity, and age. Also of particular concern is whether Amazon will build privacy protections into its facial recognition system and how it will ensure it is not abused for secret government surveillance. [....]

Meanwhile, Jeff Bezos has yet to address mounting criticism of Amazon’s Rekognition technology by Amazon employees, shareholders, and civil rights groups. In November, Amazon executives defended the company’s controversial facial recognition technology at an all-hands staff meeting after employees raised civil rights concerns about the tech’s potential misuse.

“It’s hard to trust that harm and abuse can be prevented if it is only post-mortem and through the Terms of Service,” an Amazon employee who requested anonymity told BuzzFeed News at the time.

rekognition  aws  privacy  data-protection  surveillance  amazon  us-politics  civil-rights 
6 weeks ago
event-stream vulnerability explained - Zach Schneider
This was an incredibly clever attack, very reminiscent of this blog post from January about how a similar attack might work. The attacker covered their tracks well — the code and commit log on GitHub all tell an innocuous and fairly common story (a new maintainer joins a project, adds a feature, and then tweaks the implementation of their feature a bit). Other than the warning signs about flatmap-stream (new package, no contributors or download activity), the attack was virtually undetectable. And indeed, it wasn’t discovered for over two months — it was only found because the attacker made a tiny mistake and used the deprecated crypto.createDecipher rather than crypto.createDecipheriv, which raised a suspicious deprecation warning in another library that consumes event-stream.

Unfortunately, this genre of attack isn’t going away anytime soon. JavaScript is the most popular language right now and it’s not really close, meaning it will continue to be an attractive target for hackers. JavaScript also has relatively few standard-library convenience features compared to other languages, which encourages developers to import them from npm packages instead — this, along with other cultural factors, means that JavaScript projects tend to have massive dependency trees.

(via Nelson)
npm  malware  bitcoin  security  javascript  event-stream  flatmap-stream  hacks 
6 weeks ago
Party Parrot as a Service
Enter an image URL and it'll generate an animated GIF of the party parrot version
party-parrot  gifs  funny  slack  emojis 
6 weeks ago
cryptoshredding
A way to handle immutable blockchains and GDPR: "have an encryption key for each user (stored outside of this ledger) and encrypt all PII with that key. Throw away the key if the user wants you to delete their data."
pii  gdpr  privacy  data-protection  crypto  cryptoshredding  deletion  coding 
6 weeks ago
Leeroy Jenkins was taking the piss
I had no idea!
"We didn’t think anyone would believe it was real, we thought it was so obviously satire."
leeroy-jenkins  warcraft  gaming  memes  satire  videos  at-least-i-have-chicken 
6 weeks ago
boundary-layer
Declarative Airflow Workflows in YAML, from Etsy
airflow  python  batch  cron  etl 
7 weeks ago
Antoin O Lachtnain on Twitter regarding GDPR and DNA kits
'It provides legal protections. But the problem is that those protections may not be practically effective. The other problem is the effect that you, as a consenting adult may have on other people who are related to you but who haven't consented.' -- useful thread
gdpr  privacy  data-protection  dna 
7 weeks ago
flatmap-stream NPM package backdoor incident
Good twitter thread with background on the incident. 2,000,000 downloads per week, used by many other core libs. It appears the attacker persuaded the (overloaded) legit maintainer to hand over ownership then backdoored the package in order to attack copay-dash, a cryptocurrency wallet app.
cryptocurrency  npm  packages  open-source  twitter  flatmap-stream  packaging  security  backdoors 
7 weeks ago
Linkerd 2.0
The 2.0 release of Linkerd brings two very significant changes. First, we’ve completely rewritten Linkerd to be orders of magnitude faster and smaller than Linkerd 1.x. Linkerd 2.0’s data plane is comprised of ultralight Rust proxies which consume around 10mb of RSS and have a p99 latency of <1ms. Linkerd’s minimalist control plane (written in Go) is similarly designed for speed and low resource footprint.

Second, with the 2.0 release, Linkerd moves beyond the service mesh model to be something not more, but less: Linkerd 2.0 at its core is a service sidecar, running on a single service without requiring cluster-wide installation. This means that if you’re a developer or service owner who doesn’t have access to the whole Kubernetes cluster, you can run Linkerd on your service and get:

Instant Grafana dashboards of your service’s success rates, latencies, and throughput;
A topology graph of incoming and outgoing dependencies;
A live view of requests being made to your service;
Improved, latency-aware load balancing;
… and much more.
linkerd  mesh  networking  services  architecture  sidecars 
7 weeks ago
MuMufication
the act of having a small portion of your cremated remains fired in a Brickof Mu.

MuMufied is what you will be after the act of MuMufication has been carried out.

What you get in the here and now is a Brick of Mu and a signed and stamped Certificate of MuMufication.

What you get after you die is 23 grams of yours cremated remains fired in your Brick of Mu, which will then be laid to rest on The People’s Pyramid come the following Toxteth Day of the Dead on 23rd of November.
klf  mu  mumufication  23  eris  discordianism  religion  death  toxteth  liverpool  cremation  pyramids 
7 weeks ago
Awful AI

Artificial intelligence in its current state is unfair, easily susceptible to attacks and notoriously difficult to control. Nevertheless, more and more concerning uses of AI technology are appearing in the wild. This list aims to track all of them. We hope that Awful AI can be a platform to spur discussion for the development of possible contestational technology (to fight back!).
ai  algorithms  ethics  technology  machine-learning 
7 weeks ago
Introducing Predictive Scaling for Amazon EC2 in AWS Auto Scaling
Predictive Scaling predicts future traffic based on daily and weekly trends, including regularly-occurring spikes, and provisions the right number of EC2 instances in advance of anticipated changes. Provisioning the capacity just in time for an impending load change makes Auto Scaling faster than ever before. Predictive Scaling’s machine learning algorithms detect changes in daily and weekly patterns, automatically adjusting their forecasts. This removes the need for manual adjustment of Auto Scaling parameters over time, making Auto Scaling simpler to configure and consume. Auto Scaling enhanced with Predictive Scaling delivers faster, simpler, and more accurate capacity provisioning to our customers.


Fantastic! More heavy lifting taken care of.
aws  amazon  scaling  autoscaling  predictive-scaling  ml  ec2  asg 
7 weeks ago
Traditional Chinese medicine origins: Mao invented it but didn’t believe in it
Mikulski and the rest of the Senate may be surprised to learn that they were repeating 60-year-old justifications of Chinese medicine put forward by Chairman Mao. Unlike Mikulski, however, Mao was under no illusion that Chinese medicine—a key component of naturopathic education—actually worked. In The Private Life of Chairman Mao, Li Zhisui, one of Mao’s personal physicians, recounts a conversation they had on the subject. Trained as an M.D. in Western medicine, Li admitted to being baffled by ancient Chinese medical books, especially their theories relating to the five elements. It turns out his employer also found them implausible. 


via Dr. Jen Gunter
medicine  tcm  mao  history  china  health  naturopathy 
8 weeks ago
Some notes about HTTP/3
Robert Graham from ErrataSec on QUIC aka HTTP/3:

'Google (pbuh) has both the most popular web browser (Chrome) and the two most popular websites (#1 Google.com #2 Youtube.com). Therefore, they are in control of future web protocol development.'

Faster connection setup and latency; better bandwidth negotiation when using multiplexing; user-mode stacks by building on UDP and using recvmmsg(); and better mobile support for roaming IPs.
google  http3  quic  protocols  ip 
8 weeks ago
The JVM in Docker 2018

Later JDK versions have made it far easier to run a JVM application in a Linux container. The memory support means that if you relied on JVM ergonomics before than you can do the same inside a container where as previously you had to override all memory related settings. The CPU support for containers needs to be carefully evaluated for your application and environment. If you’ve previously set low cpu_shares in environments like Kubernetes to increase utilisation while relying on using up unused cycles then you might get a shock.
jvm  docker  kubernetes  linux  containers  ops 
8 weeks ago
OpsMop
'a next-generation, no-compromise automation system'.
Uses:

Web-scale configuration management of all Linux/Unix systems;
Application deployment;
Immutable systems build definition;
Maintaining stateful services such as database and messaging platforms;
Automating one-off tasks & processes;
Deployment and management of the undercloud.

Features:

Python 3 DSL;
Declarative resource model with imperative capabilities;
Type / Provider plugin seperation;
Implicit ordering (with handler notification);
Formalized “Plan” vs “Apply” evaluation stages;
Early validation prior to runtime;
Programatically scoped variables;
Strong object-orientation
opsmop  ops  configuration-management  deployment  build 
8 weeks ago
Deep learning can "discover" new knowledge from scans/images
Amazing paper:
Here, we show that deep learning can extract new knowledge from retinal fundus images. Using deep-learning models trained on data from 284,335 patients and validated on two independent datasets of 12,026 and 999 patients, we predicted cardiovascular risk factors not previously thought to be present or quantifiable in retinal images, such as age (mean absolute error within 3.26 years), gender (area under the receiver operating characteristic curve (AUC) = 0.97), smoking status (AUC = 0.71), systolic blood pressure (mean absolute error within 11.23 mmHg) and major adverse cardiac events (AUC = 0.70). We also show that the trained deep-learning models used anatomical features, such as the optic disc or blood vessels, to generate each prediction.
deep-learning  data  analysis  ml  machine-learning  health  medicine  papers 
8 weeks ago
The Time Our Provider Screwed Us
Good talk (with transcript) from Paul Biggar about what happened when CircleCI had a massive security incident, and how Jesse Robbins helped them do incident response correctly.

'On the left, Jesse pointed out that we needed an incident commander. That’s me, Paul. And this is very good, because I was a big proponent, I think lots of were around the 2013 mark, of flat organizational structures, and so I hadn’t really got a handle of this whole being in charge thing. The fact that someone else came in and said, “No, no, no, you are in charge”: extremely useful. And he also laid out the order of our priorities. Number one priority; safety of customers. Number two priority: communicate with customers. Number three priority: recovery of service.

I think a reasonable person could have put those in a different order, especially under the pressure and time constraints of the potential company-ending situation. So I was very happy to have those in order. If this is ever going to happen to you, I’d memorize them, maybe put it on an index card in your pocket, in case this ever happens.

The last thing he said is to make sure that we log everything, that we go slow, and that we code review and communicate. His point there is that if we’re going to bring our site back up, if we’re going to do all the things that we need to do in order to save our business and do the right thing for our customers and all that, we can’t be making quick, bad decisions. You can’t just upload whatever code is on your computer now, because I have to do this now, I have to fix it. So we set up a Slack channel … This was pre-Slack; it was a HipChat channel, where all of our communications went. Every single communication that we had about this went in that chatroom. Which came in extremely useful the next day, when I had to write a blog post that detailed exactly what had happened and all the steps that we did to fix it and remediate this, and I had an exact time stamps of all the things that had happened.'
incidents  incident-response  paul-biggar  circleci  security  communication  outages 
8 weeks ago
Java's ByteBuffer native memory "leak"
Well this is suboptimal:
The Java NIO APIs use ByteBuffers as the source and destination of I/O calls, and come in two flavours. Heap ByteBuffers wrap a byte[] array, allocated in the garbage collected Java heap. Direct ByteBuffers wrap memory allocated outside the Java heap using malloc. Only "native" memory can be passed to operating system calls, so it won't be moved by the garbage collector. This means that when you use a heap ByteBuffer for I/O, it is copied into a temporary direct ByteBuffer. The JDK caches one temporary buffer per thread, without any memory limits. As a result, if you call I/O methods with large heap ByteBuffers from multiple threads, your process can use a huge amount of additional native memory, which looks like a native memory leak. This can cause your process to unexpectedly run into memory limits and get killed.
jvm  performance  java  memory  leaks  bytebuffers  netty  threads  coding  bugs 
8 weeks ago
Google 'betrays patient trust' with DeepMind Health move | Technology | The Guardian

Now that Streams is a Google product itself, that promise appears to have been broken, says privacy researcher Julia Powles: “Making this about semantics is a sleight of hand. DeepMind said it would never connect Streams with Google. The whole Streams app is now a Google product. That is an atrocious breach of trust, for an already beleaguered product.”

A DeepMind spokesperson emphasised that the core of the promise remains intact: “All patient data remains under our partners’ strict control, and all decisions about its use lie with them. This data remains subject to strict audit and access controls and its processing remains subject to both our contracts and data protection legislation. The move to Google does not affect this.”

google  deepmind  health  nhs  data-protection  privacy  healthcare 
8 weeks ago
SpamAssassin is back [LWN.net]
The SpamAssassin 3.4.2 release was the first from that project in well over three years. At the 2018 Open Source Summit Europe, Giovanni Bechis talked about that release and those that will be coming in the near future. It would seem that, after an extended period of quiet, the SpamAssassin project is back and has rededicated itself to the task of keeping junk out of our inboxes.


This is good to see! Also, newsy thread: https://news.ycombinator.com/item?id=18458212
spamassassin  open-source  oss  anti-spam 
8 weeks ago
Tuning Spark Back Pressure by Simulation
Interesting, Spark uses a PID controller algorithm to manage backpressure:
Spark back pressure, which can be enabled by setting spark.streaming.backpressure.enabled=true, will dynamically resize batches so as to avoid queue build up. It is implemented using a Proportional Integral Derivative (PID) algorithm. This algorithm has some interesting properties, including the lack of guarantee of a stable fixed point. This can manifest itself not just in transient overshoot, but in a batch size oscillating around a (potentially optimal) constant throughput. The overshoot incurs latency; the undershoot costs throughput. Catastrophic overshoot leading to OOM is possible in degenerate circumstances (you need to choose the parameters quite deviously to cause this to happen). Having witnessed undershoot and slow recovery in production streaming jobs, I decided to investigate further by testing the algorithm with a simulator.
backpressure  streaming  queueing  pid-controllers  algorithms  congestion-control 
8 weeks ago
Brits getting into the online-disinfo game

Disinformation and deception have been a part of warfare for thousands of years, but across the world, something new was starting to happen. Information has long been used to support combat operations, but now combat was seen to taking place primarily, sometimes exclusively, through it. From being a tool of warfare, each military began to realise that the struggle with, over and through information was what war itself actually was about. And it wasn’t confined to Russia, China or anyone else. A global informational struggle has broken out. Dozens of countries are already doing it. And these are just the campaigns that we know about.
disinfo  fake-news  uk  british-army  military  memes  infowar 
8 weeks ago
HTTP-over-QUIC to be renamed HTTP/3
Decent newsy comment thread about HTTP/3, QUIC, and how the modern internet treats IP protocols
ip  protocols  http  http3  quic  networking  internet  newsy 
8 weeks ago
Jeff Bezos is wrong, tech workers are not bullies
I decided to leave my job as a staff engineer at Google because of Project Maven, and because I believe that the artificial intelligence ethical guidelines they published afterwards were not strict enough: they allowed surveillance within “internationally accepted norms”.

I am now joining forces with current and former Google employees who also opposed Maven and the Dragonfly search engine. We do not wish to be complicit in human rights violations and we believe that workers, and the public, deserve a voice. We support employees at Amazon, Microsoft, Salesforce, McKinsey and Deloitte who have similarly stood up to their employers.

We also have a right to not contribute to killing. Most workers at Google or Amazon did not join those companies to work on military applications. Both companies are international employers with engineering offices across the world, and many of their workers are neither US citizens nor residents. I worked as an engineer in Google's European headquarters in Dublin, Ireland. To me, the US military is not our military (as Google Cloud chief executive Diane Greene referred to it in a blog post), nor is it a force we should automatically support as a matter of patriotism.

As an engineer, I believe it is my responsibility to speak up for human rights and accountable decision making. As an industry, we in technology cannot compromise our principles or allow ourselves to be bullied by billionaires who stand to be enriched by our silence.
project-maven  dragonfly  google  amazon  surveillance  us-politics  politics  ai  silicon-valley  ethics  work  life 
8 weeks ago
Riding full circle on a paternoster
"A paternoster or paternoster lift is a passenger elevator which consists of a chain of open compartments (each usually designed for two persons) that move slowly in a loop up and down inside a building without stopping. Passengers can step on or off at any floor they like.


I'm slightly obsessed with these quite dangerous 1970s constructions....
paternoster  lifts  elevators  danger  construction  1970s 
9 weeks ago
Some notes on running new software in production
This is really good -- how to approach new infrastructure/software dependencies in production with reliability and uptime in mind.

(via Tony Finch)
reliability  uptime  slas  kubernetes  envoy  outages  runbooks  ops 
9 weeks ago
Deadlines, lies and videotape: The tale of a gRPC bug
HostedGraphite decided to use gRPC as an internal inter-service protocol and ran into a basic protocol bug -- it does not default to using an application-level keepalive on the TCP channel so can block indefinitely if sending-side buffers fill up. Always use application-level keepalives and don't trust TCP
tcp  protocols  keepalive  grpc  rpc  architecture  networking 
9 weeks ago
What if the Placebo Effect Isn’t a Trick? - The New York Times
It is not possible to assay levels of COMT directly in a living brain, but there is a snippet of the genome called rs4680 that governs the production of the enzyme, and that varies from one person to another: One variant predicts low levels of COMT, while another predicts high levels. When Hall analyzed the I.B.S. patients’ DNA, she found a distinct trend. Those with the high-COMT variant had the weakest placebo responses, and those with the opposite variant had the strongest. These effects were compounded by the amount of interaction each patient got: For instance, low-COMT, high-interaction patients fared best of all, but the low-COMT subjects who were placed in the no-treatment group did worse than the other genotypes in that group. They were, in other words, more sensitive to the impact of the relationship with the healer.

The discovery of this genetic correlation to placebo response set Hall off on a continuing effort to identify the biochemical ensemble she calls the placebome — the term reflecting her belief that it will one day take its place among the other important “-omes” of medical science, from the genome to the microbiome. The rs4680 gene snippet is one of a group that governs the production of COMT, and COMT is one of a number of enzymes that determine levels of catecholamines, a group of brain chemicals that includes dopamine and epinephrine. (Low COMT tends to mean higher levels of dopamine, and vice versa.) Hall points out that the catecholamines are associated with stress, as well as with reward and good feeling, which bolsters the possibility that the placebome plays an important role in illness and health, especially in the chronic, stress-related conditions that are most susceptible to placebo effects.
placebo  comt  health  healthcare  medicine  enzymes  brain 
9 weeks ago
« earlier      
abuse ads ai algorithms amazon analytics android anti-spam apache apple apps architecture art automation aws banking big-data bitcoin books bugs build business cars cassandra censorship children china cli coding compression concurrency containers copyright crime crypto culture cycling data data-protection data-structures databases dataviz debugging deployment design devops distcomp distributed dns docker driving dublin ec2 email eu europe exploits facebook fail false-positives filesharing filtering food fraud funny future games gaming gc gchq git github go google government graphics hacking hacks hadoop hardware hashing health history home http https images internet ios ip iphone ireland isps java javascript journalism jvm kafka kids lambda languages latency law legal libraries life linux load-balancing logging machine-learning malware mapping maps medicine memory metrics microsoft ml mobile money monitoring movies mp3 music mysql netflix network networking news nosql nsa open-source ops optimization outages packaging papers patents pdf performance phones photos piracy politics presentations privacy programming protocols python recipes redis reliability replication research ruby russia s3 safety scala scalability scaling scams science search security services shopping silicon-valley slides snooping social-media software space spam sql ssl startups statistics storage streaming surveillance swpats sysadmin tcp tech technology testing time tips tls tools travel tuning tv twitter ui uk unix us-politics via:fanf via:nelson video web wifi work youtube

Copy this bookmark:



description:


tags: