jm + via:nelson   37

Determinism in League of Legends
Once again, deterministic replay/reruns of online games proves useful. John Carmack wrote a .plan about this many years ago: https://raw.githubusercontent.com/ESWAT/john-carmack-plan-archive/master/by_day/johnc_plan_19981014.txt

(via Nelson)
clock  realtime  time  determinism  testing  replay  games  league-of-legends  via:nelson 
june 2017 by jm
When Boring is Awesome: Building a scalable time-series database on PostgreSQL
Nice. we built something along these lines atop MySQL before -- partitioning by timestamp is the key. (via Nelson)
database  postgresql  postgres  timeseries  tsd  storage  state  via:nelson 
april 2017 by jm
League of Legends win-rates vs latency analysed
It appears that more mechanically intensive champions are more affected by latency, while tankier champions or those with point-and-click abilities are less affected by latency.


(via Nelson)
games  league-of-legends  latency  ping  gaming  internet  via:nelson 
december 2015 by jm
Nelson recommends Ubiquiti
'The key thing about Ubiquiti gear is the high quality radios and antennas. It just seems much more reliable than most consumer WiFi gear. Their airOS firmware is good too, it’s a bit complicated to set up but very capable and flexible. And in addition to normal 802.11n or 802.11ac they also have an optional proprietary TDMA protocol called airMax that’s designed for serving several long haul links from a single basestation. They’re mostly marketing to business customers but the equipment is sold retail and well documented for ordinary nerds to figure out.'
ubiquiti  wifi  wireless  802.11  via:nelson  ethernet  networking  prosumer  hardware  wan 
september 2015 by jm
what3emojis?
Is it too late to replace Eircode?
Addresses are hard. Who can remember street addresses or latitude/longitude pairs? You could do much better with three totally random English words, but then there’s that pesky language barrier. No system is perfect, except for emoji.
eircode  maps  parody  via:nelson  location  geocoding  mapping  pile-of-poo 
september 2015 by jm
grsecurity
Open source security team has had enough of embedded-systems vendors taking the piss with licensing:
This announcement is our public statement that we've had enough. Companies in the embedded industry not playing by the same rules as every other company using our software violates users' rights, misleads users and developers, and harms our ability to continue our work. Though I've only gone into depth in this announcement on the latest trademark violation against us, our experience with two GPL violations over the previous year have caused an incredible amount of frustration. These concerns are echoed by the complaints of many others about the treatment of the GPL by the embedded Linux industry in particular over many years.

With that in mind, today's announcement is concerned with the future availability of our stable series of patches. We decided that it is unfair to our sponsors that the above mentioned unlawful players can get away with their activity. Therefore, two weeks from now, we will cease the public dissemination of the stable series and will make it available to sponsors only. The test series, unfit in our view for production use, will however continue to be available to the public to avoid impact to the Gentoo Hardened and Arch Linux communities. If this does not resolve the issue, despite strong indications that it will have a large impact, we may need to resort to a policy similar to Red Hat's, described here or eventually stop the stable series entirely as it will be an unsustainable development model.
culture  gpl  linux  opensource  security  grsecurity  via:nelson  gentoo  arch-linux  gnu 
august 2015 by jm
Newegg vs. Patent Trolls: When We Win, You Win
go NewEgg: 'Newegg went against a company that claimed its patent covered SSL and RC4 encryption, a common encryption system used by many retailers and websites. This particular patent troll has gone against over 100 other companies, and brought in $45 million in settlements before going after Newegg. We won.'
via:nelson  ip  law  patent-trolls  patents  newegg  crypto 
july 2015 by jm
How Plex is doing HTTPS for all its users
large-scale automated TLS certificate deployment. very impressive and not easy to reproduce, good work Plex!

(via Nelson)
via:nelson  https  ssl  tls  certificates  pki  digicert  security  plex 
june 2015 by jm
Google Online Security Blog: A Javascript-based DDoS Attack [the Greatfire DDoS] as seen by Safe Browsing
We hope this report helps to round out the overall facts known about this attack. It also demonstrates that collectively there is a lot of visibility into what happens on the web. At the HTTP level seen by Safe Browsing, we cannot confidently attribute this attack to anyone. However, it makes it clear that hiding such attacks from detailed analysis after the fact is difficult.

Had the entire web already moved to encrypted traffic via TLS, such an injection attack would not have been possible. This provides further motivation for transitioning the web to encrypted and integrity-protected communication. Unfortunately, defending against such an attack is not easy for website operators. In this case, the attack Javascript requests web resources sequentially and slowing down responses might have helped with reducing the overall attack traffic. Another hope is that the external visibility of this attack will serve as a deterrent in the future.


Via Nelson.
google  security  via:nelson  ddos  javascript  tls  ssl  safe-browsing  networking  china  greatfire 
april 2015 by jm
5% of Google visitors have ad-injecting malware installed
Ad injectors were detected on all operating systems (Mac and Windows), and web browsers (Chrome, Firefox, IE) that were included in our test. More than 5% of people visiting Google sites have at least one ad injector installed. Within that group, half have at least two injectors installed and nearly one-third have at least four installed.


via Nelson.
via:nelson  ads  google  chrome  ad-injectors  malware  scummy 
april 2015 by jm
Twitter’s new anti-harassment filter
Twitter is calling it a “quality filter,” and it’s been rolling out to verified users running Twitter’s iOS app since last week. It appears to work much like a spam filter, except instead of hiding bots and copy-paste marketers, it screens “threats, offensive language, [and] duplicate content” out of your notifications feed.


via Nelson
via:nelson  harassment  spam  twitter  gamergame  abuse  ml 
april 2015 by jm
Tim Bray on one year as an xoogler
Seems pretty insightful; particularly "I do think the In­ter­net econ­o­my would be bet­ter and more hu­mane if it didn’t have a sin­gle white-hot highly-overprivileged cen­ter. Al­so, soon­er or lat­er that’ll stop scal­ing. Can’t hap­pen too soon."
google  tim-bray  via:nelson  xoogler  funding  tech  privacy  ads  internet 
march 2015 by jm
NA Server Roadmap Update: PoPs, Peering, and the North Bridge
League of Legends has set up private network links to a variety of major US ISPs to avoid internet weather (via Nelson)
via:nelson  peering  games  networks  internet  ops  networking 
january 2015 by jm
The programming error that cost Mt Gox 2609 bitcoins
Digging into broken Bitcoin scripts in the blockchain. Fascinating:
While analyzing coinbase transactions, I came across another interesting bug that lost bitcoins. Some transactions have the meaningless and unredeemable script:

OP_IFDUP
OP_IF
OP_2SWAP
OP_VERIFY
OP_2OVER
OP_DEPTH

That script turns out to be the ASCII text script. Instead of putting the redemption script into the transaction, the P2Pool miners accidentally put in the literal word "script". The associated bitcoins are lost forever due to this error.


(via Nelson)
programming  script  coding  bitcoin  mtgox  via:nelson  scripting  dsls 
may 2014 by jm
A Linguist Explains the Grammar of Doge. Wow.
In this sense, doge really is the next generation of LOLcat, in terms of a pet-based snapshot of a certain era in internet language. We’ve kept the idea that animals speak like an exaggerated version of an internet-savvy human, but as our definitions of what it means to be a human on the internet have changed, so too have the voices that we give our animals. Wow.
via:nelson  language  linguist  doge  memes  internet  english 
february 2014 by jm
Factual/drake
a simple-to-use, extensible, text-based data workflow tool that organizes command execution around data and its dependencies. Data processing steps are defined along with their inputs and outputs and Drake automatically resolves their dependencies. [...] Drake is similar to GNU Make, but designed especially for data workflow management. It has HDFS [and S3] support, allows multiple inputs and outputs, and includes a host of features designed to help you bring sanity to your otherwise chaotic data processing workflows.


Via Nelson. Looks interesting, although I'd like to see more features around retries, single-executor locking, parallelism, alerting/metrics, and unattended cron-like operation -- those are always the hard part when I wind up coding up a data pump.
make  data  data-pump  drake  via:nelson  pipelines  workflow 
november 2013 by jm
Barbarians at the Gateways - ACM Queue

I am a former high-frequency trader. For a few wonderful years I led a group of brilliant engineers and mathematicians, and together we traded in the electronic marketplaces and pushed systems to the edge of their capability.


Insane stuff -- FPGAs embedded in the network switches to shave off nanoseconds of latency.
low-latency  hft  via:nelson  markets  stock-trading  latency  fpgas  networking 
october 2013 by jm
transparent DNS proxies
Ugh. low-end ISPs MITM'ing DNS queries:

Some ISP's are now using a technology called 'Transparent DNS proxy'. Using this technology, they will intercept all DNS lookup requests (TCP/UDP port 53) and transparently proxy the results. This effectively forces you to use their DNS service for all DNS lookups.
If you have changed your DNS settings to an open DNS service such as Google, Comodo or OpenDNS expecting that your DNS traffic is no longer being sent to your ISP's DNS server, you may be surprised to find out that they are using transparent DNS proxying.


(via Nelson)
via:nelson  dns  isps  proxying  mitm  phorm  attacks 
april 2013 by jm
Meet the nice-guy lawyers who want $1,000 per worker for using scanners | Ars Technica
Great investigative journalism, interviewing the legal team behind the current big patent-troll shakedown; that on scanning documents with a button press, using a scanner attached to a network. They express whole-hearted belief in the legality of their actions, unsurprisingly -- they're exactly what you think they'd be like (via Nelson)
via:nelson  ethics  business  legal  patents  swpats  patent-trolls  texas  shakedown 
april 2013 by jm
Literate Jenks Natural Breaks and How The Idea Of Code is Lost
A crazy amount of code archaeology to discover exactly an algorithm -- specifically 'Jenks natural breaks", works, after decades of cargo-cult copying (via Nelson):

'I spent a day reading the original text and decoding as much as possible of the code’s intention, so that I could write a ‘literate’ implementation. My definition of literate is highly descriptive variable names, detailed and narrative comments, and straightforward code with no hijinks.

So: yes, this isn’t the first implementation of Jenks in Javascript. And it took me several times longer to do things this way than to just get the code working.

But the sad and foreboding state of this algorithm’s existing implementations said that to think critically about this code, its result, and possibilities for improvement, we need at least one version that’s clear about what it’s doing.'
jenks-natural-breaks  algorithms  chloropleth  javascript  reverse-engineering  history  software  copyright  via:nelson 
february 2013 by jm
Evasi0n Jailbreak's Userland Component
Good writeup of the exploit techniques used in the new iOS jailbreak.
Evasi0n is interesting because it escalates privileges and has full access to the system partition all without any memory corruption.  It does this by exploiting the /var/db/timezone vulnerability to gain access to the root user’s launchd socket.  It then abuses launchd to load MobileFileIntegrity with an inserted codeless library, which is overriding MISValidateSignature to always return 0.
jailbreak  ios  iphone  ipad  exploits  evasi0n  via:nelson 
february 2013 by jm
Welcome to Life: the singularity, ruined by lawyers - YouTube
'some portions of the experience, such as the sky, may be replaced by personalised advertising.' Uploading your consciousness in the age of copyright maximalism, as Nelson Minar put it (via Nelson)
via:nelson  grim-meathook-future  future  singularity  funny  copyright  advertising 
may 2012 by jm
The OpenPhoto Project
A great getting-out-of-Flickr life-raft. self-hosted, PHP app, storing photos in Dropbox, S3, or local disk; UI screenshots look great (via Nelson)
galleries  photos  php  flickr  images  via:nelson 
february 2012 by jm
ChessBase.com - Chess News - A Gross Miscarriage of Justice in Computer Chess (part two)
An amazing article, via Nelson Minar -- careful examination of the evolution of chess programs over the past 8 years appears to show clear signs of code/algorithm copying and unauthorised reverse engineering -- by many of the developers. 'Dr Søren Riis of Queen Mary University in London shows how most programs (legally) profited from Fruit, and subsequently much more so from the (illegally) reverse engineered Rybka. Yet it is Vasik Rajlich who was investigated, found guilty of plagiarism, banned for life, stripped of his titles, and vilified in the international press – for a five-year-old alleged tournament rule violation. Ironic.'
chess  code  games  open-source  licensing  reverse-engineering  copyright  infringement  via:nelson 
january 2012 by jm
GTA4 Google Map
wow, very impressive -- as far as I can tell, it really _is_ using GMaps infrastructure to some degree
google-maps  google  maps  gta4  grand-theft-auto  via:nelson  games 
june 2011 by jm
DuoSecurity
well-packaged, well-designed, two-factor auth for SSH from Dug Song. free for small-scale use, too, it looks like. awesome! I've signed up (via Nelson)
via:nelson  security  authentication  authorization  two-factor-auth  openssh  ssh  dug-song 
april 2011 by jm
Quora’s Technology Examined
Python, Nginx, Tornado for COMET stuff, MySQL as a data store, memcached, Thrift, haproxy, AWS, Pylons.  fantastic, very detailed post (via Nelson)
quora  python  nginx  tornado  comet  mysql  memcached  thrift  haproxy  aws  pylons  via:nelson  from delicious
february 2011 by jm
Gamasutra - News - Opinion: Minecraft And The Question Of Luck
'Notch’s luck was that he came across the idea of doing a first-person fortress building game. His alignment was that the game that he wanted to make was culturally connected to [he PC gamer] tribe. While the game may appear ugly, and its purchase process etc seem naive to many a gaming professional, all of those decisions that Notch made along the road to releasing his game were from the point of view of a particular perspective of what games are, what matters and what were the things that he could trust the tribe to figure out for themselves.'
tribes  viral  minecraft  gaming  analysis  games  culture  gamasutra  via:nelson  future  software  marketing  from delicious
february 2011 by jm
Etsy's metrics infrastructure
I never really understood how useful a good metrics infrastructure could be for operational visibility until I joined Amazon.  Here's a good demo of Etsy's metrics system (via Netlson)
via:nelson  metrics  deployment  change-monitoring  etsy  software  monitoring  ops  from delicious
december 2010 by jm
deeptoad - Project Hosting on Google Code
'a (python) library and a tool to clusterize similar files using fuzzy hashing techniques. This project is inspired by the well known tool ssdeep.' Via Nelson
via:nelson  deeptoad  software  open-source  fuzzy  hashing  from delicious
november 2010 by jm
Foursquare MongoDB outage post mortem
MongoDB was set up to write to RAM if possible, omitting immediate writes to disk -- but then the db size exceeded RAM size, the disk was hit, imposing a massive slowdown and creating a huge backlog immediately, bringing the site down (via Nelson)
via:nelson  mongodb  sharding  nosql  ouch  outage  foursquare  sysadmin  ops  from delicious
october 2010 by jm
Lone Sale of $4.1 Billion in Contracts Led to ‘Flash Crash’ in May
'as the computers of the high-frequency traders traded contracts back and forth, a “hot potato” effect was created, the report said, as contracts changed hands 27,000 times in 14 seconds, but with eventually only 200 actually being bought or sold.' upshot: horrifically complex distributed feedback loops now directly impact our economies -- great :(
distributed-systems  distcomp  flash-crash  stock-market  trading  automation  via:nelson  sec  nyse  high-frequency-trading  from delicious
october 2010 by jm
GameFAQs: Assassin's Creed II (X360) Puzzle/Codex FAQ
linked by Nelson; will return to this once i've gotten into the game
assassins-creed  games  via:nelson  toread  xbox  from delicious
december 2009 by jm
GUI Icon Sets for Web Designers
lots of commercial and open-source-friendly-licensed icon sets, including the old reliable FamFamFam and Pinvoke icons
gui  icons  ui  web  graphics  creative-commons  via:nelson 
july 2009 by jm

related tags

802.11  abuse  ad-injectors  ads  advertising  algorithms  ama  analysis  arch-linux  architecture  assassins-creed  attacks  authentication  authorization  automation  aws  bitcoin  business  certificates  change-monitoring  chess  china  chloropleth  chrome  clock  code  coding  comet  compensation  copyright  creative-commons  crypto  culture  d3  data  data-pump  database  dataviz  ddos  decision-trees  deeptoad  deployment  determinism  devops  digicert  distcomp  distributed-systems  dns  doge  drake  dsls  dug-song  eircode  employment  english  ethernet  ethics  etsy  evasi0n  exploits  flash-crash  flickr  foursquare  fpgas  funding  funny  future  fuzzy  galleries  gamasutra  gamergame  games  gaming  gentoo  geocoding  gnu  google  google-maps  gpl  grand-theft-auto  graphics  greatfire  grim-meathook-future  grsecurity  gta4  gui  haproxy  harassment  hardware  hashing  hft  high-frequency-trading  history  https  icons  images  infringement  internet  ios  ip  ipad  iphone  isps  jailbreak  javascript  jenks-natural-breaks  jobs  language  latency  law  league-of-legends  legal  licensing  linguist  linux  location  low-latency  machine-learning  make  malware  mapping  maps  marketing  markets  memcached  memes  metrics  minecraft  mitm  ml  mongodb  monitoring  mtgox  mysql  networking  networks  newegg  nginx  nosql  nyse  open-source  opensource  openssh  ops  ouch  outage  parody  patent-trolls  patents  peering  phorm  photos  php  pile-of-poo  ping  pipelines  pki  plex  postgres  postgresql  privacy  programming  prosumer  proxying  pylons  python  quora  realtime  reddit  replay  reverse-engineering  safe-browsing  script  scripting  scummy  sec  security  shakedown  sharding  share-options  shares  singularity  software  spam  ssh  ssl  state  stock  stock-market  stock-options  stock-trading  storage  swpats  sysadmin  tech  testing  texas  thrift  tim-bray  time  timeseries  tls  toread  tornado  trading  tribes  tsd  twitter  two-factor-auth  ubiquiti  ui  via:nelson  viral  wan  web  wifi  wireless  workflow  xbox  xoogler 

Copy this bookmark:



description:


tags: