4838
auto53
'The missing link between AWS AutoScaling Groups and Route53 [...] solves the issue of keeping a route53 zone up to date with the changes that an autoscaling group might face.'
auto53  route-53  dns  aws  amazon  ops  hostnames  asg  autoscaling 
3 hours ago
AWS CodeBuild Plugin - Jenkins - Jenkins Wiki
Trigger AWS CodeBuild jobs as build steps for a Jenkins project. :thinking_face_emoji:
jenkins  hacks  aws  codebuild  build  coding  ci 
3 hours ago
Internet protocols are changing
per @mnot. HTTP/2; TLS 1.3; QUIC and UDP; and DOH (DNS over HTTP!)
crypto  encryption  http  https  protocols  http2  tls  quic  udp  tcp  dns  tunnelling 
23 hours ago
The Case for Learned Index Structures
'Indexes are models: a B-Tree-Index can be seen as a model to map a key to the position of a record within a sorted array, a Hash-Index as a model to map a key to a position of a record within an unsorted array, and a BitMap-Index as a model to indicate if a data record exists or not. In this exploratory research paper, we start from this premise and posit that all existing index structures can be replaced with other types of models, including deep-learning models, which we term learned indexes. The key idea is that a model can learn the sort order or structure of lookup keys and use this signal to effectively predict the position or existence of records. We theoretically analyze under which conditions learned indexes outperform traditional index structures and describe the main challenges in designing learned index structures. Our initial results show, that by using neural nets we are able to outperform cache-optimized B-Trees by up to 70% in speed while saving an order-of-magnitude in memory over several real-world data sets. More importantly though, we believe that the idea of replacing core components of a data management system through learned models has far reaching implications for future systems designs and that this work just provides a glimpse of what might be possible.'

Excellent follow-up thread from Henry Robinson: https://threadreaderapp.com/thread/940344992723120128

'The fact that the learned representation is more compact is very neat. But also it's not really a surprise that, given the entire dataset, we can construct a more compact function than a B-tree which is *designed* to support efficient updates.' [...] 'given that the model performs best when trained on the whole data set - I strongly doubt B-trees are the best we can do with the current state-of-the art.'
data-structures  ml  google  b-trees  storage  indexes  deep-learning  henry-robinson 
yesterday
Canarytokens.org - Quick, Free, Detection for the Masses
similar to honeytokens -- detect breaches by access attempts to unique addresses
security  honeypots  honeytokens  canary  canarytokens 
2 days ago
In first, 3-D printed objects connect to WiFi without electronics
This. is. magic.

Physical motion—pushing a button, laundry soap flowing out of a bottle, turning a knob, removing a hammer from a weighted tool bench—triggers gears and springs elsewhere in the 3-D printed object that cause a conductive switch to intermittently connect or disconnect with the antenna and change its reflective state. Information—in the form of 1s and 0s—is encoded by the presence or absence of the tooth on a gear. Energy from a coiled spring drives the gear system, and the width and pattern of gear teeth control how long the backscatter switch makes contact with the antenna, creating patterns of reflected signals that can be decoded by a WiFi receiver.
magic  wifi  whoa  3d-printing  objects  plastic  gears  springs 
6 days ago
Handling GDPR: How to make Kafka Forget
How do you delete (or redact) data from Kafka? The simplest way to remove messages from Kafka is to simply let them expire. By default Kafka will keep data for two weeks and you can tune this as required. There is also an Admin API that lets you delete messages explicitly if they are older than some specified time or offset. But what if we are keeping data in the log for a longer period of time, say for Event Sourcing use cases or as a source of truth? For this you can make use of  Compacted Topics, which allow messages to be explicitly deleted or replaced by key.


Similar applies to Kinesis I would think.
kafka  kinesis  gdpr  expiry  deleting  data  privacy 
7 days ago
Theresa May's Blue Monday -- Fintan O’Toole
Having backed down, May was then peremptorily informed that she was not even allowed to back down. She left her lunch with the president of the European Commission, Jean-Claude Juncker, to take a phone call from the DUP’s Arlene Foster, who told her that the deal she had just made was unacceptable. May then had to go back in and tell Juncker that she could not agree to what she had just agreed to. It is a scarcely credible position for a once great state to find itself in: its leader does not even have the power to conduct a dignified retreat.
eu  ireland  brexit  uk  theresa-may  dup  politics  ec  fintan-otoole 
7 days ago
Using AWS Batch to Generate Mapzen Terrain Tiles · Mapzen
Using this setup on AWS Batch, we are able to generate more than 3.75 million tiles per minute and render the entire world in less than a week! These pre-rendered tiles get stored in S3 and are ready to use by anyone through the AWS Public Dataset or through Mapzen’s Terrain Tiles API.
mapzen  mapping  tiles  batch  aws  s3  lambda  docker 
7 days ago
AMERICAN AIRLINES 737MAX8: “LIKE A FLYING PRISON”
Quite unusual to see an honest review of travelling coach-class on an internal US flight. This is a massive stinker:

“I admit American isn’t my favourite airline, but this has made me seriously re-evaluate ever travelling on them again. And it won’t be economy. If this is Americans idea of their future standards, they can keep it. Aviation enthusiasts might find it really interesting- I felt like I was in a flying prison”.
coach  travel  aa  airlines  737  boeing  reviews  comfort 
8 days ago
VLC in European Parliament's bug bounty program
This was not something I expected:
The European Parliament has approved budget to improve the EU’s IT infrastructure by extending the free software security audit programme (FOSSA) and by including a bug bounty approach in the programme.

The Commission intends to conduct a small-scale "bug bounty" activity on open-source software with companies already operating in the market. The scope of this action is to:

Run a small-scale "bug bounty" activity for open source software project or library for a period of up to two months maximum;
The purpose of the procedure is to provide the European institutions with open source software projects or libraries that have been properly screened for potential vulnerabilities;
The process must be fully open to all potential bug hunters, while staying in-line with the existing Terms of Service of the bug bounty platform.
vlc  bug-bounties  security  europe  europarl  eu  ep  bugs  oss  video  open-source 
8 days ago
AWS re:invent 2017: Container Networking Deep Dive with Amazon ECS (CON401) // Practical Applications
Another re:Invent highlight to watch -- ECS' new native container networking model explained
reinvent  aws  containers  docker  ecs  networking  sdn  ops 
8 days ago
Bella Caledonia: A Wake-Up Call
Swathes of the British elite appeared ignorant of much of Irish history and the country’s present reality. They seemed to have missed that Ireland’s economic dependence on exports to its neighbour came speedily to an end after both joined the European Economic Community in 1973. They seemed unacquainted with Ireland’s modern reality as a confident, wealthy, and internationally-oriented nation with overwhelming popular support for EU membership. Repeated descriptions of the border as a “surprise” obstacle to talks betrayed that Britain had apparently not listened, or had dismissed, the Irish government’s insistence in tandem with the rest of the EU since April that no Brexit deal could be agreed that would harden the border between Ireland and Northern Ireland.
The British government failed to listen to Ireland throughout history, and it was failing to listen still.
europe  ireland  brexit  uk  ukip  eu  northern-ireland  border  history 
9 days ago
South Pole Ice Tunnels – Antarctica - Atlas Obscura
'One of the strangest of these monuments consists of the body of an atrophied White Sturgeon and a handwritten account of its journey. The fish had arrived in 1992 at McMurdo Station (a US base located at the edge of Antarctica and the Ross Sea) and had been destined for a remote Russian station called Vostok. However, the Russians gifted the sturgeon to American scientists who later discarded it after it had languished uneaten in a freezer for several months. It was from the trash dump that a garbage processing crew reclaimed the sturgeon, and it then made its way from location to location across Antarctica. It finally became enshrined in the tunnels beneath the South Pole where it greets visitors from a ledge chiseled in the ice.'
south-pole  pole  big-dead-place  shrines  funny  sturgeons  antarctica  amundsen-scott-station  mcmurdo  vostok 
11 days ago
Sonarr
newsgroup/torrent TV PVR automation. looks neat
pvr  tv  automation  usenet  bittorrent 
11 days ago
Meet the man who deactivated Trump’s Twitter account
Legend!
His last day at Twitter was mostly uneventful, he says. There were many goodbyes, and he worked up until the last hour before his computer access was to be shut off. Near the end of his shift, the fateful alert came in. This is where Trump’s behavior intersects with Duysak’s work life. Someone reported Trump’s account on Duysak’s last day; as a final, throwaway gesture, he put the wheels in motion to deactivate it. Then he closed his computer and left the building.
twitter  trump  bahtiyar-duysak  abuse  reporting  funny 
13 days ago
The Impenetrable Program Transforming How Courts Treat DNA Evidence | WIRED
'So the lab turned to TrueAllele, a program sold by Cybergenetics, a small company dedicated to helping law enforcement analyze DNA where regular lab tests fail. They do it with something called probabilistic genotyping, which uses complex mathematical formulas to examine the statistical likelihood that a certain genotype comes from one individual over another. It’s a type of DNA testing that’s becoming increasingly popular in courtrooms. '

[...] 'But now legal experts, along with Johnson’s advocates, are joining forces to argue to a California court that TrueAllele—the seemingly magic software that helped law enforcement analyze the evidence that tied Johnson to the crimes—should be forced to reveal the code that sent Johnson to prison. This code, they say, is necessary in order to properly evaluate the technology. In fact, they say, justice from an unknown algorithm is no justice at all.'
law  justice  trueallele  software  dna  evidence  statistics  probability  code-review  auditing 
13 days ago
Introducing the Amazon Time Sync Service
Well overdue; includes Google-style leap smearing
time-sync  time  aws  services  ntp  ops 
13 days ago
Introducing AWS Fargate – Run Containers without Managing Infrastructure
now that's a good announcement. Available right away running atop ECS; EKS in 2018
eks  ecs  fargate  aws  services  ops  containers  docker 
13 days ago
Fine Art Prints – The Public Domain Review
This is amazing -- "museum quality" prints of favourites from the PDR archives, featuring Paul Klee, William Blake, ukiyo-e from Hiroshige, Goya, and even Athanasius Kircher
prints  to-get  fine-art  public-domain  art  william-blake  ukiyo-e  hiroshige  goya  klee 
14 days ago
creepy fake motion-detector cameras in AirBnBs
Jason Scott on Twitter: "In "oh, that's a thing now" news, a colleague of mine thought it odd that there was a single "motion detector" in his AirBNB in the bedroom and voila, it's an IP camera connected to the web. (He left at 3am, reported, host is suspended, colleague got refund.)"
airbnb  motion-detectors  cameras  surveillance  creepy  privacy 
15 days ago
Tansplaining
/tanˈspleɪn/ - verb informal - (of a British journalist or political type) explaining Irish history and politics to an Irish person, in a manner regarded as condescending, patronizing, and often incorrect.
politics  lols  funny  tansplaining  black-and-tans  history  uk  brexit  dictionary  neologisms 
16 days ago
UK government planning to require age verification for access to porn
This thread has pointed out the unintentional side effect which I hadn't considered: this database of user auth info and their porn habits will be an incredibly valuable target for foreign governments and hackers, and a single foreign porn company owns the AV service they are potentially planning to use for it.

"if they can't find a way to de-link identities from usage, this is a monumental national security risk and it's beyond insane they're even considering it. "Sorry Prime Minister, Russia now knows what porn every MP, civil servant and clearance holder watches and when, and we don't know how much of it they've given to Wikileaks. In retrospect, having the world's most obvious SIGINT target built in PHP and hosted in the Cayman Islands by an uncleared foreign 25 year old working for a porn company probably wasn't the best idea".'
age  verification  porn  uk  politics  censorship  security  national-security  wikileaks  russia 
16 days ago
Brutal London
'A book about London's gorgeous, brutalist architecture includes dainty DIY papercraft models to make yourself' -- awesome
brutalist  architecture  london  papercraft  models  barbican 
16 days ago
Parental Controls & Internet Filtering — Circle
this looks interesting; internet time limits and per-user/per-device content filtering, for kids
apps  kids  android  ios  circle  filtering  family  parenting 
16 days ago
Spam is back | The Outline
it’s 2017, and spam has clawed itself back from the grave. It shows up on social media and dating sites as bots hoping to lure you into downloading malware or clicking an affiliate link. It creeps onto your phone as text messages and robocalls that ring you five times a day about luxury cruises and fictitious tax bills. Networks associated with the buzzy new cryptocurrency system Ethereum have been plagued with spam. Facebook recently fought a six-month battle against a spam operation that was administering fake accounts in Bangladesh, Indonesia, Saudi Arabia, and other countries. Last year, a Chicago resident sued the Trump campaign for allegedly sending unsolicited text message spam; this past November, ZDNet reported that voters were being inundated with political text messages they never signed up for. Apps can be horrid spam vectors, too — TechCrunch writer Jordan Crook wrote in April about how she idly downloaded an app called Gather that promptly spammed everyone in her contact list. Repeated mass data breaches that include contact information, such as the Yahoo breach in which 3 billion user accounts were exposed, surely haven’t helped. Meanwhile, you, me, and everyone we know is being plagued by robocalls. “There is no recourse for me,” lamented Troy Doliner, a student in Boston who gets robocalls every day. “I am harassed by a faceless entity that I cannot track down.”
“I think we had a really unique set of circumstances that created this temporary window where spam was in remission,” said Finn Brunton, an assistant professor at NYU who wrote Spam: A Shadow History of the Internet, “and now we’re on the other side of that, with no end in sight.”


(via Boing Boing)
spam  privacy  email  social-media  web  robocalls  phone  ethereum  texts  abuse 
18 days ago
Tech Leaders Dismayed by Weaponization of Social Media - IEEE Spectrum
“We have passed the fail-safe point,” McNamee said. “I don’t think we can get back to the Silicon Valley that I loved. At this point we just have to save America.”
propaganda  fake-news  facebook  twitter  social-media  us-politics  brexit  internet  russia  silicon-valley  usa 
22 days ago
Unicomp, Inc.
'I think you want a Unicomp [...] They bought the old IBM model M factory line, it's a model M with USB' -- a classic IBM-style clacky full size keyboard -- https://twitter.com/SwartzCr/status/932678394021535751
keyboards  clacky  model-m  ibm  history  hardware  usb 
22 days ago
Cordyceps even creepier than at first thought
Hughes’s team found that fungal cells infiltrate the ant’s entire body, including its head, but they leave its brain untouched. There are other parasites that manipulate their hosts without destroying their brains, says Kelly Weinersmith from Rice University. For example, one flatworm forms a carpet-like layer over the brain of the California killifish, leaving the brain intact while forcing the fish to behave erratically and draw the attention of birds—the flatworm’s next host. “But manipulation of ants by Ophiocordyceps is so exquisitely precise that it is perhaps surprising that the fungus doesn't invade the brain of its host,” Weinersmith says. [....]

So what we have here is a hostile takeover of a uniquely malevolent kind. Enemy forces invading a host’s body and using that body like a walkie-talkie to communicate with each other and influence the brain from afar. Hughes thinks the fungus might also exert more direct control over the ant’s muscles, literally controlling them “as a puppeteer controls as a marionette doll.” Once an infection is underway, he says, the neurons in the ant’s body—the ones that give its brain control over its muscles—start to die. Hughes suspects that the fungus takes over. It effectively cuts the ant’s limbs off from its brain and inserts itself in place, releasing chemicals that force the muscles there to contract. If this is right, then the ant ends its life as a prisoner in its own body. Its brain is still in the driver’s seat, but the fungus has the wheel.
biology  gross  cordyceps  fungi  fungus  ants  zombies  infection  brain  parasites 
22 days ago
IBM urged to avoid working on 'extreme vetting' of U.S. immigrants
ICE wants to use machine learning technology and social media monitoring to determine whether an individual is a “positively contributing member of society,” according to documents published on federal contracting websites. More than 50 civil society groups and more than 50 technical experts sent separate letters on Thursday to the Department of Homeland Security saying the vetting program as described was “tailor-made for discrimination” and contending artificial intelligence was unable to provide the information ICE desired.
civil-rights  politics  usa  trump  ice  ibm  civil-liberties  immigration  discrimination  racism  social-media 
22 days ago
S3 Inventory Adds Apache ORC output format and Amazon Athena Integration
Interesting to see Amazon are kind of putting their money behind ORC as a new public data interchange format with this.

Update: the Amazon senior PM for Athena and EMR says: 'Actually, we like both ORC and Parquet. Athena can process both ORC and Parquet, and teams can choose if they want to use either.' -- https://twitter.com/abysinha/status/932700622540849152
orc  formats  data  interchange  s3  athena  output 
23 days ago
Quad9
Quad9 is a free, recursive, anycast DNS platform that provides end users robust security protections, high-performance, and privacy. 

Security: Quad9 blocks against known malicious domains, preventing your computers and IoT devices from connecting malware or phishing sites. Whenever a Quad9 user clicks on a website link or types in an address into a web browser, Quad9 will check the site against the IBM X-Force threat intelligence database of over 40 billion analyzed web pages and images. Quad9 also taps feeds from 18 additional threat intelligence partners to block a large portion of the threats that present risk to end users and businesses alike. 

Performance: Quad9 systems are distributed worldwide in more than 70 locations at launch, with more than 160 locations in total on schedule for 2018. These servers are located primarily at Internet Exchange points, meaning that the distance and time required to get answers is lower than almost any other solution. These systems are distributed worldwide, not just in high-population areas, meaning users in less well-served areas can see significant improvements in speed on DNS lookups. The systems are “anycast” meaning that queries will automatically be routed to the closest operational system. 

Privacy: No personally-identifiable information is collected by the system. IP addresses of end users are not stored to disk or distributed outside of the equipment answering the query in the local data center. Quad9 is a nonprofit organization dedicated only to the operation of DNS services. There are no other secondary revenue streams for personally-identifiable data, and the core charter of the organization is to provide secure, fast, private DNS


Awesome!
quad9  resolvers  dns  anycast  ip  networking  privacy  security 
26 days ago
Why is this company tracking where you are on Thanksgiving?
Creepy:
To do this, they tapped a company called SafeGraph that provided them with 17 trillion location markers for 10 million smartphones.
The data wasn’t just staggering in sheer quantity. It also appears to be extremely granular. Researchers “used this data to identify individuals' home locations, which they defined as the places people were most often located between the hours of 1 and 4 a.m.,” wrote The Washington Post. [....]
This means SafeGraph is looking at an individual device and tracking where its owner is going throughout their day. A common defense from companies that creepily collect massive amounts of data is that the data is only analyzed in aggregate; for example, Google’s database BigQuery, which allows organizations to upload big data sets and then query them quickly, promises that all its public data sets are “fully anonymized” and “contain no personally-identifying information.” In multiple press releases from SafeGraph’s partners, the company’s location data is referred to as “anonymized,” but in this case they seem to be interpreting the concept of anonymity quite liberally given the specificity of the data.
Most people probably don’t realize that their Thanksgiving habits could end up being scrutinized by strangers.
It’s unclear if users realize that their data is being used this way, but all signs point to no. (SafeGraph and the researchers did not immediately respond to questions.) SafeGraph gets location data from “from numerous smartphone apps,” according to the researchers.
safegraph  apps  mobile  location  tracking  surveillance  android  iphone  ios  smartphones  big-data 
26 days ago
'STELLA Report from the SNAFUcatchers Workshop on Coping With Complexity', March 14-16 2017
'A consortium workshop of high end techs reviewed postmortems to better understand how engineers cope with the complexity of anomalies (SNAFU and SNAFU catching episodes) and how to support them. These cases reveal common themes regarding factors that produce resilient performances. The themes that emerge also highlight opportunities to move forward.'

The 'Dark debt' concept is interesting here.
complexity  postmortems  dark-debt  technical-debt  resilience  reliability  systems  snafu  reports  toread  stella  john-allspaw 
4 weeks ago
The naked truth about Facebook’s revenge porn tool
This is absolutely spot on.

If Facebook wanted to implement a truly trusted system for revenge porn victims, they could put the photo hashing on the user side of things -- so only the hash is transferred to Facebook. To verify the claim that the image is truly a revenge porn issue, the victim could have the images verified through a trusted revenge porn advocacy organization. Theoretically, the victim then would have a verified, privacy-safe version of the photo, and a hash that could be also sent to Google and other sites.
facebook  privacy  hashing  pictures  images  revenge-porn  abuse  via:jwz 
4 weeks ago
Driverless shuttle in Las Vegas gets in fender bender within an hour
Like any functioning autonomous vehicle, the shuttle can avoid obstacles and stop in a hurry if needed. What it apparently can’t do is move a couple feet out of the way when it looks like a 20-ton truck is going to back into it.

A passenger interviewed by KSNV shared her frustration:

The shuttle just stayed still and we were like, ‘oh my gosh, it’s gonna hit us, it’s gonna hit us!’ and then.. it hit us! And the shuttle didn’t have the ability to move back, either. Like, the shuttle just stayed still.
ai  driverless-cars  driving  cars  las-vegas  aaa  navya  keolis 
4 weeks ago
20 Benefits that speed up hiring and 5 that slow it down
But that isn’t to say work-life balance isn’t important. It’s just job seekers are looking for balance outside of work. Three of the five benefits that sped up time to hire were related to giving more opportunities to leave work:

Caregiver leave
Adoption leave
On site gym
Performance based incentives
Family leave
hiring  benefits  text-analysis  pto  holidays  vacation  leave  gyms  work  family-leave 
4 weeks ago
A Clash of Cultures
In short, I am in support of Naomi Wu. Rather than let the Internet speculate on why, I am sharing my perspectives on the situation preemptively.

As with most Internet controversies, it’s messy and emotional. I will try my best to outline the biases and issues I have observed. Of course, everyone has their perspective; you don’t have to agree with mine. And I suspect many of my core audience will dislike and disagree with this post. However, the beginning of healing starts with sharing and listening. I will share, and I respectfully request that readers read the entire content of this post before attacking any individual point out of context.

The key forces I see at play are:

Prototype Bias – how assumptions based on stereotypes influence the way we think and feel
Idol Effect – the tendency to assign exaggerated capabilities and inflated expectations upon celebrities
Power Asymmetry – those with more power have more influence, and should be held to a higher standard of accountability
Guanxi Bias – the tendency to give foreign faces more credibility than local faces in China

All these forces came together in a perfect storm this past week.
culture  engineering  maker  naomi-wu  women  stereotypes  bias  idols  power  china  bunnie 
4 weeks ago
How Facebook Figures Out Everyone You've Ever Met
Oh god this is so creepy.
Facebook’s machinery operates on a scale far beyond normal human interactions. And the results of its People You May Know algorithm are anything but obvious. In the months I’ve been writing about PYMK, as Facebook calls it, I’ve heard more than a hundred bewildering anecdotes:

A man who years ago donated sperm to a couple, secretly, so they could have a child—only to have Facebook recommend the child as a person he should know. He still knows the couple but is not friends with them on Facebook.
A social worker whose client called her by her nickname on their second visit, because she’d shown up in his People You May Know, despite their not having exchanged contact information.
A woman whose father left her family when she was six years old—and saw his then-mistress suggested to her as a Facebook friend 40 years later.
An attorney who wrote: “I deleted Facebook after it recommended as PYMK a man who was defense counsel on one of my cases. We had only communicated through my work email, which is not connected to my Facebook, which convinced me Facebook was scanning my work email.”
facebook  privacy  surveillance  security  creepy  phones  contacts  pymk 
5 weeks ago
The $280M Ethereum bug

The newly deployed contract, 0x863df6bfa4469f3ead0be8f9f2aae51c91a907b4, contains a vulnerability where its owner was uninitialized. Although, the contract is a library it was possible for devops199 to turn it into a regular multi-sig wallet since for Ethereum there is no real distinction between accounts, libraries, and contracts.
The event occurred in two transactions, a first one to take over the library and a second one to kill the library — which was used by all multi-sig wallets created after the 20th of July.

Since by design smart-contracts themselves can’t be patched easily, this make dependancies on third party libraries very lethal if a mistake happens. The fact that libraries are global is also arguable, this would be shocking if it was how our daily use Operating Systems would work.
security  bitcoin  ethereum  lol  fail  smart-contracts 
5 weeks ago
Facebook asks users for nude photos in project to combat revenge porn
The photos are hashed, server-side, using the PhotoDNA hashing algorithm. This would have been way way better if it ran locally, on user's phones, instead though. Interesting to note that PhotoDNA claims to have a "1 in 10 billion" false positive rate according to https://www.itu.int/en/cop/case-studies/Documents/ICMEC_PhotoDNA.PDF
photodna  hashing  images  facebook  revenge-porn  messenger  nudes  photos 
5 weeks ago
'Lambda and serverless is one of the worst forms of proprietary lock-in we've ever seen in the history of humanity' • The Register
That doesn't mean Polvi is a fan. "Lambda and serverless is one of the worst forms of proprietary lock-in that we've ever seen in the history of humanity," said Polvi, only partly in jest, referring to the most widely used serverless offering, AWS Lambda. "It's seriously as bad as it gets."

He elaborated: "It's code that tied not just to hardware – which we've seen before – but to a data center, you can't even get the hardware yourself. And that hardware is now custom fabbed for the cloud providers with dark fiber that runs all around the world, just for them. So literally the application you write will never get the performance or responsiveness or the ability to be ported somewhere else without having the deployment footprint of Amazon."


Absolutely agreed...
lambda  amazon  aws  containers  coreos  deployment  lockin  proprietary  serverless  alex-polvi  kubernetes 
5 weeks ago
Something is wrong on the internet – James Bridle – Medium
'an essay on YouTube, children's videos, automation, abuse, and violence, which crystallises a lot of my current feelings about the internet through a particularly unpleasant example from it. [...]

What we’re talking about is very young children [..] being deliberately targeted with content which will traumatise and disturb them, via networks which are extremely vulnerable to exactly this form of abuse. It’s not about trolls, but about a kind of violence inherent in the combination of digital systems and capitalist incentives. It’s down to that level of the metal.'
internet  youtube  children  web  automation  violence  horror  4chan  james-bridle 
5 weeks ago
The 10 Top Recommendations for the AI Field in 2017 from the AI Now Institute
I am 100% behind this. There's so much potential for hidden bias and unethical discrimination in careless AI/ML deployment.
While AI holds significant promise, we’re seeing significant challenges in the rapid push to integrate these systems into high stakes domains. In criminal justice, a team at Propublica, and multiple academics since, have investigated how an algorithm used by courts and law enforcement to predict recidivism in criminal defendants may be introducing significant bias against African Americans. In a healthcare setting, a study at the University of Pittsburgh Medical Center observed that an AI system used to triage pneumonia patients was missing a major risk factor for severe complications. In the education field, teachers in Texas successfully sued their school district for evaluating them based on a ‘black box’ algorithm, which was exposed to be deeply flawed.

This handful of examples is just the start — there’s much more we do not yet know. Part of the challenge is that the industry currently lacks standardized methods for testing and auditing AI systems to ensure they are safe and not amplifying bias. Yet early-stage AI systems are being introduced simultaneously across multiple areas, including healthcare, finance, law, education, and the workplace. These systems are increasingly being used to predict everything from our taste in music, to our likelihood of experiencing mental illness, to our fitness for a job or a loan.
ai  algorithms  machine-learning  ai-now  ethics  bias  racism  discrimination 
5 weeks ago
How to effectively complain to an Irish broadcaster about a public affairs show
Simon McGarr: "If you think that a public affairs show has failed to address a matter with proper balance, you can (Tweet) say it to the breeze or complain.
There is a process to follow to make an effective complaint
1) complain to broadcaster
2) complain to BAI if unhappy with response."

Thread with more details, and yet more at https://twitter.com/IrishTV_films/status/927172642544783360
complaining  complaints  rte  bai  ireland  current-affairs 
5 weeks ago
newrelic/sidecar: Gossip-based service discovery. Docker native, but supports static discovery, too.
An AP gossip-based service-discovery sidecar process.
Services communicate to each other through an HAproxy instance on each host that is itself managed and configured by Sidecar. It is inspired by Airbnb's SmartStack. But, we believe it has a few advantages over SmartStack:

Native support for Docker (works without Docker, too!);
No dependence on Zookeeper or other centralized services;
Peer-to-peer, so it works on your laptop or on a large cluster;
Static binary means it's easy to deploy, and there is no interpreter needed;
Tiny memory usage (under 20MB) and few execution threads means its very light weight
clustering  docker  go  service-discovery  ap  sidecar  haproxy  discovery  architecture 
5 weeks ago
Inside The Great Poop Emoji Feud
PILE_OF_POO in the news!
The debate appears to be between some of Unicode’s most prolific contributors and typographers (Unicode was initially established to develop standards for translating alphabets into code that can be read across all computers and operating systems), and those in the consortium who focus primarily on the evolution of emojis. The two chief critics — Michael Everson and Andrew West, both typographers — say that the emoji proposal process has become too commercial and frivolous, thereby cheapening the Unicode Consortium’s long body of work.

Their argument centers around “Frowning Pile Of Poo,” one of the emojis under consideration for the June 2018 class. In an Oct. 22 memo to the Unicode Technical Committee, Everson tore into the committee over the submission calling it “damaging ... to the Unicode standard.”
pile-of-poo  emoji  funny  michael-everson  unicode  frowning-poo  poo  shit 
5 weeks ago
How the Guardian found 800,000 paying readers
The strategy to rescue the Guardian from financial oblivion has attained a landmark position by increasing its revenue from readers to a point where it now outweighs the paper’s income from advertising.
This significant shift in the Guardian’s business model, making it less dependent on a highly challenging advertising market for media companies, results largely from a quadrupling in the number of readers making monthly payments under the title’s membership scheme, which has grown from 75,000 to 300,000 members in the past year.


Wow. Good job Guardian!
guardian  journalism  subscriptions  newspapers  future  membership  donations 
5 weeks ago
AWS Service Terms
57.10 Acceptable Use; Safety-Critical Systems. Your use of the Lumberyard Materials must comply with the AWS Acceptable Use Policy. The Lumberyard Materials are not intended for use with life-critical or safety-critical systems, such as use in operation of medical equipment, automated transportation systems, autonomous vehicles, aircraft or air traffic control, nuclear facilities, manned spacecraft, or military use in connection with live combat. However, this restriction will not apply in the event of the occurrence (certified by the United States Centers for Disease Control or successor body) of a widespread viral infection transmitted via bites or contact with bodily fluids that causes human corpses to reanimate and seek to consume living human flesh, blood, brain or nerve tissue and is likely to result in the fall of organized civilization.


Seems fair enough.
aws  zombies  funny  t-and-cs  legal  civilization  just-in-case 
5 weeks ago
aws-vault
'A vault for securely storing and accessing AWS credentials in development environments'.

Scott Piper says: 'You should not use the AWS CLI with MFA without aws-vault, and probably should not use the CLI at all without aws-vault, because of it's benefit of storing your keys outside of ~/.aws/credentials (since every once in a while a developer will decide to upload all their dot-files in their home directory to github so they can use the same .vimrc and .bashrc aliases everywhere, and will end up uploading their AWS creds).'
aws  vault  security  cli  development  coding  dotfiles  credentials  mfa 
5 weeks ago
Rich "Lowtax" Kyanka on Twitter's abuse/troll problem
how did you solve this problem at Something Awful? You said you wrote a bunch of rules but internet pedants will always find ways to get around them.

The last rule says we can ban you for any reason. It's like the catch-all. We can ban you if it's too hot in the room, we can ban you if we had a bad day, we can ban you if our finger slips and hits the ban button. And that way people know that if they're doing something and it's not technically breaking any rules but they're obviously trying to push shit as far as they can, we can still ban them. But, unlike Twitter, we actually have what's called the Leper's Colony, which says what they did and has their track record. Twitter just says, “You're gone.”
twitter  communication  discussion  history  somethingawful  lowtax 
5 weeks ago
Fooling Neural Networks in the Physical World with 3D Adversarial Objects · labsix
This is amazingly weird stuff. Fooling NNs with adversarial objects:
Here is a 3D-printed turtle that is classified at every viewpoint as a “rifle” by Google’s InceptionV3 image classifier, whereas the unperturbed turtle is consistently classified as “turtle”.

We do this using a new algorithm for reliably producing adversarial examples that cause targeted misclassification under transformations like blur, rotation, zoom, or translation, and we use it to generate both 2D printouts and 3D models that fool a standard neural network at any angle. Our process works for arbitrary 3D models - not just turtles! We also made a baseball that classifies as an espresso at every angle! The examples still fool the neural network when we put them in front of semantically relevant backgrounds; for example, you’d never see a rifle underwater, or an espresso in a baseball mitt.
ai  deep-learning  3d-printing  objects  security  hacking  rifles  models  turtles  adversarial-classification  classification  google  inceptionv3  images  image-classification 
5 weeks ago
Yonatan Zunger's twitter thread on Twitter's problem with policy issues
'I worked on policy issues at G+ and YT for years. It was *painfully* obvious that Twitter never took them seriously.'

This thread is full of good information on "free speech", nazis, Trump, Gamergate and Twitter's harrassment problem.

(Via Peter Bourgon)
via:peterbourgon  harrassment  twitter  gamergate  threads  youtube  google-plus  policy  abuse  bullying  free-speech  engagement 
6 weeks ago
MaxMind DB File Format Specification
An interesting data structure format -- 'the MaxMind DB file format is a database format that maps IPv4 and IPv6 addresses to data records using an efficient binary search tree.'
maxmind  databases  storage  ipv4  ipv6  addresses  bst  binary-search-trees  trees  data-structures 
7 weeks ago
What To Do When Your Daughter Is the Mean Girl | Psychology Today
Bookmarking -- just in case. hopefully it won't be necessary... good site for parenting advice along these lines.
I knew this day would come. I was, of course, hoping it never would-hoping that my daughter would never be mean to someone else's daughter-but as they say, I wrote the book on girl bullying in elementary school, so I knew that there was a pretty good chance that despite all of my best efforts, one of these days, my girl was gonna act like the mean one. This morning, she told me about it.
psychology  kids  parenting  bullies  children  girls 
7 weeks ago
Cronic
'A cure for Cron's chronic email problem'
cron  linux  unix  ops  sysadmin  mail 
7 weeks ago
IBM broke its cloud by letting three domain names expire - The Register
“multiple domain names were mistakenly allowed to expire and were in hold status.”
outages  fail  ibm  the-register  ops  dns  domains  cloud 
7 weeks ago
Solera - Wikipedia
Fascinating stuff -- from Felix Cohen's excellent twitter thread.
Solera is a process for aging liquids such as wine, beer, vinegar, and brandy, by fractional blending in such a way that the finished product is a mixture of ages, with the average age gradually increasing as the process continues over many years. The purpose of this labor-intensive process is the maintenance of a reliable style and quality of the beverage over time. Solera means literally "on the ground" in Spanish, and it refers to the lower level of the set of barrels or other containers used in the process; the liquid (traditionally transferred from barrel to barrel, top to bottom, the oldest mixtures being in the barrel right "on the ground"), although the containers in today's process are not necessarily stacked physically in the way that this implies, but merely carefully labeled. Products which are often solera aged include Sherry, Madeira, Lillet, Port wine, Marsala, Mavrodafni, Muscat, and Muscadelle wines; Balsamic, Commandaria, some Vins doux naturels, and Sherry vinegars; Brandy de Jerez; beer; rums; and whiskies. Since the origin of this process is undoubtedly out of the Iberian peninsula, most of the traditional terminology was in Spanish, Portuguese, or Catalan.
wine  aging  solera  sherry  muscat  vinegar  brandy  beer  rum  whiskey  whisky  brewing  spain 
7 weeks ago
Open-sourcing RacerD: Fast static race detection at scale | Engineering Blog | Facebook Code
At Facebook we have been working on automated reasoning about concurrency in our work with the Infer static analyzer. RacerD, our new open source race detector, searches for data races — unsynchronized memory accesses, where one is a write — in Java programs, and it does this without running the program it is analyzing. RacerD employs symbolic reasoning to cover many paths through an app, quickly.


This sounds extremely interesting...
racerd  race-conditions  data-races  thread-safety  static-code-analysis  coding  testing  facebook  open-source  infer 
7 weeks ago
Alarm systems alarmingly insecure. Oh the irony | Pen Test Partners
Some absolutely abysmal security practices used in off-the-shelf self-installed wireless home alarm systems -- specifically the Yale HSA6400. Simple replay attacks of the unlock PIN message, for instance
security  home  wireless  alarms  yale  fail 
7 weeks ago
"1 like = 1 delicious cocktail recipe or booze fact."
Great cocktail factoid thread from Manhattans Project/Every Cloud's Felix Cohen
felix-cohen  cocktails  booze  factoids  history  drinks 
7 weeks ago
Cyclists: Let's Talk About Shoaling
You're stopped at a red light with a bunch of folks on bikes, when someone who's just arrived sails past everyone, right to the head of the class. It's a lot like seeing somebody in the Whole Foods express lane with too many things. In other words, it's the kind of behavior that triggers toothy-toddler rages in otherwise emotionally competent adults.


Oh god. This drives me nuts. (via Mark)
shoaling  cycling  commuting  bikes  red-lights  commute  rage 
8 weeks ago
What Parents Can Do When Bullying is Downplayed at School | Psychology Today
Despite the "Bully-Free Zone" posters that line the school cafeteria walls and the Zero-Tolerance policy that was boasted about during last September's Back-to-School night, your experience is that the school would rather not address the problem at all. The responses you get from your child's teacher include bland lip service [...]


Good advice for this nasty situation -- I'm thankfully not facing it myself, but bookmarking just in case...
bullying  kids  school  education  psychology  children  parenting 
8 weeks ago
Falling through the KRACKs
I want to talk about why this vulnerability continues to exist so many years after WPA was standardized. And separately, to answer a question: how did this attack slip through, despite the fact that the 802.11i handshake was formally proven secure?
krack  security  wpa  wifi  ieee  crypto  vulnerabilities 
8 weeks ago
A history of the neural net/tank legend in AI, and other examples of reward hacking
@gwern: "A history of the neural net/tank legend in AI: https://t.co/2s4AOGMS3a (Feel free to suggest more sightings or examples of reward hacking!)"
gwern  history  ai  machine-learning  ml  genetic-algorithms  neural-networks  perceptron  learning  training  data  reward-hacking 
8 weeks ago
One person’s history of Twitter, from beginning to end – Mike Monteiro
Twitter, which was conceived and built by a room of privileged white boys (some of them my friends!), never considered the possibility that they were building a bomb. To this day, Jack Dorsey doesn’t realize the size of the bomb he’s sitting on. Or if he does, he believes it’s metaphorical. It’s not. He is utterly unprepared for the burden he’s found himself responsible for.
The power of Oppenheimer-wide destruction is in the hands of entitled men-children, cuddled runts, who aim not to enhance human communication, but to build themselves a digital substitute for physical contact with members of the species who were unlike them. And it should scare you.
politics  twitter  mike-monteiro  history  silicon-valley  trump 
8 weeks ago
Turtle Bunbury - THE NIGHT OF THE BIG WIND, 1839 (Reprise)

The Night of the Big Wind was the most devastating storm ever recorded in Irish history. Known in As Gaeilge as ‘Oiche na Gaoithe Moire’, the hurricane of 6th and 7th January 1839 made more people homeless in a single night than all the sorry decades of eviction that followed it.
1839  1830s  19th-century  ireland  turtle-bunbury  history  storms  weather  hurricanes 
8 weeks ago
« earlier      
abuse ai algorithms amazon analytics android anti-spam apache apple apps architecture art automation aws banking big-data bitcoin blocking books bugs build business cap cassandra censorship children china cli cloud coding compression concurrency containers copyright crime crypto culture cycling data data-protection data-structures databases dataviz debugging deployment design devops distcomp distributed dns docker dublin ec2 email eu europe exploits facebook fail false-positives fault-tolerance filesharing filtering food fraud funny future games gaming gc gchq git github go google government graphics graphs hacking hacks hadoop hardware hashing health history http https images internet ios ip iphone ireland isps java javascript journalism jvm kafka kids lambda languages latency law legal libraries life linux load-balancing logging machine-learning malware mapping maps medicine memory messaging metrics microsoft ml mobile money monitoring movies mp3 music mysql netflix network networking news nosql nsa open-source ops optimization outages packaging papers patents pdf performance phones photos piracy politics presentations privacy programming protocols python realtime recipes redis reference reliability replication research ruby russia s3 safety scala scalability scaling scams science search security shopping slides snooping social-media society software space spam sql ssl startups statistics storage streaming surveillance swpats sysadmin tcp tech testing time tips tls tools travel tuning tv twitter ui uk unix us-politics via:fanf via:nelson video web wifi work youtube

Copy this bookmark:



description:


tags: