jm + leaks   13

Debugging Java Native Memory Leaks (evanjones.ca)
Using jemalloc to instrument the contents of the native heap and record stack traces of each chunk's allocators, so that leakers can be quickly identified (GZIPInputStream in this case).

See also https://gdstechnology.blog.gov.uk/2015/12/11/using-jemalloc-to-get-to-the-bottom-of-a-memory-leak/ , https://github.com/jeffgriffith/native-jvm-leaks/blob/master/README.md .
debugging  memory  jvm  java  leaks  memory-leaks  leak-checking  jemalloc  malloc  native  heap  off-heap  gzipinputstream 
january 2017 by jm
Twitter CEO: 'We suck at dealing with abuse' | The Verge
'We suck at dealing with abuse and trolls on the platform and we've sucked at it for years. It's no secret and the rest of the world talks about it every day. We lose core user after core user by not addressing simple trolling issues that they face every day.
I'm frankly ashamed of how poorly we've dealt with this issue during my tenure as CEO. It's absurd. There's no excuse for it. I take full responsibility for not being more aggressive on this front. It's nobody else's fault but mine, and it's embarrassing.
We're going to start kicking these people off right and left and making sure that when they issue their ridiculous attacks, nobody hears them.
Everybody on the leadership team knows this is vital.'


More like this!
trolls  twitter  gamergate  dickc  abuse  leaks  social-media 
february 2015 by jm
The Hit Team
Fergal Crehan's new gig -- good idea!
The Hit Team helps you fight back against leaked photos and videos, internet targeting and revenge porn.
revenge-porn  revenge  law  privacy  porn  leaks  photos  videos  images  selfies 
january 2015 by jm
Riding with the Stars: Passenger Privacy in the NYC Taxicab Dataset
A practical demo of "differential privacy" -- allowing public data dumps to happen without leaking privacy, using Laplace noise addition
differential-privacy  privacy  leaks  public-data  open-data  data  nyc  taxis  laplace  noise  randomness 
september 2014 by jm
The leaked New York Times innovation report is one of the key documents of this media age » Nieman Journalism Lab
one of the world’s leading news organizations giving itself a rigorous self-examination. I’ve spoken with multiple digital-savvy Times staffers in recent days who described the report with words like “transformative” and “incredibly important” and “a big big moment for the future of the Times.” One admitted crying while reading it because it surfaced so many issues about Times culture that digital types have been struggling to overcome for years.


via Antoin. This is pretty insightful -- the death of the homepage is notable
nytimes  publishing  media  journalism  tech  internet  web  news  leaks  via:antoin 
may 2014 by jm
The MtGox 500
'On March 9th a group posted a data leak, which included the trading history of all MtGox users from April 2011 to November 2013. The graphs below explore the trade behaviors of the 500 highest volume MtGox users from the leaked data set. These are the Bitcoin barons, wealthy speculators, dueling algorithms, greater fools, and many more who took bitcoin to the moon.'
dataviz  stamen  bitcoin  data  leaks  mtgox  greater-fools 
march 2014 by jm
RTE internal memo to unhappy staff re Pantigate
'I want to reassure you that RTÉ explored every option available to it, including right of reply. Legal advice was sought and all avenues were explored, including an offer to make a donation to a neutral charity.'

And they folded. Notable lack of testicular fortitude by our national broadcaster.
fail  rte  leaks  memos  pantigate  panti-bliss  homophobia  libel  defamation  ireland 
february 2014 by jm
Even the NSA is finding it hard to cope with spam
3 new Snowden leaks, covering acquisition of Yahoo address books, buddy lists, and email account activity, and how spammer activity required intervention to avoid losing useful data in the noise
spam  spammers  nsa  snowden  leaks  anti-spam  yahoo  im  mail 
october 2013 by jm
GCHQ report on 'MULLENIZE' program to 'stain' anonymous electronic traffic
By modifying the User-Agent: header string, each HTTP transaction is "stained" to allow tracking. huh
gchq  nsa  snooping  sniffing  surveillance  user-agent  http  browsers  leaks 
october 2013 by jm
IrishLeaks
hmm, interesting to see what develops here -- reminds me of "Cogair", the original Irish anonymous-whistleblower site from the '90s
anonymous  ireland  wikileaks  leaks  whistleblowing  from delicious
april 2011 by jm
WikiLeaks Archive: A CAUCASUS WEDDING
Dagestan knows how to party. 'The main activity of the day was eating and drinking -- starting from 4 p.m., about eight hours worth, all told -- punctuated, when all were laden with food and sodden with drink, with a bout of jet skiing in the Caspian'
russia  government  politics  leaks  wikileaks  weddings  funny  dagestan  caucasus  from delicious
november 2010 by jm

Copy this bookmark:



description:


tags: