The next step in the Turkish twitter-block arms race.
Bridge relays (or “bridges” for short) are Tor relays that aren’t listed in the main Tor directory. Since there is no complete public list of them, even if your ISP is filtering connections to all the known Tor relays, they probably won’t be able to block all the bridges. If you suspect your access to the Tor network is being blocked, you may want to use the bridge feature of Tor. The addition of bridges to Tor is a step forward in the blocking resistance race. It is perfectly possible that even if your ISP filters the Internet, you do not require a bridge to use Tor. So you should try to use Tor without bridges first, since it might work.
(tags: tor privacy turkey bridging networking tor-bridges twitter filtering blocking censorship)
Adrian Cockroft’s Cloud Outage Reports Collection
The detailed summaries of outages from cloud vendors are comprehensive and the response to each highlights many lessons in how to build robust distributed systems. For outages that significantly affected Netflix, the Netflix techblog report gives insight into how to effectively build reliable services on top of AWS. [….] I plan to collect reports here over time, and welcome links to other write-ups of outages and how to survive them.
(tags: outages post-mortems documentation ops aws ec2 amazon google dropbox microsoft azure incident-response)
This looks like an excellent new feature for parents:
A supervised user is a special type of Chrome user who can browse the web with guidance. Under the supervision of the manager, a supervised user can browse the web and sign in to websites. Supervised users don’t need a Google Account or an email address because the manager creates a profile for the supervised user through the manager’s Google Account. As a manager of a supervised user, you can see the user’s browsing history, block specific sites, and approve which sites the user can see, all from the supervised users dashboard that is accessible from any browser.
(tags: users chrome supervision parental-control parents safety web browsing kids)
The Stony Brook Algorithm Repository
This WWW page is intended to serve as a comprehensive collection of algorithm implementations for over seventy of the most fundamental problems in combinatorial algorithms. The problem taxonomy, implementations, and supporting material are all drawn from my [ie. Steven Skiena’s] book ‘The Algorithm Design Manual’. Since the practical person is more often looking for a program than an algorithm, we provide pointers to solid implementations of useful algorithms, when they are available.
(tags: algorithms reference coding steven-skiena combinatorial cs)
The Overprotected Kid – The Atlantic
There is a big difference between avoiding major hazards and making every decision with the primary goal of optimizing child safety (or enrichment, or happiness). We can no more create the perfect environment for our children than we can create perfect children. To believe otherwise is a delusion, and a harmful one; remind yourself of that every time the panic rises.
(tags: child-safety parenting safety kids education risk danger playgrounds the-land)
Issue 122 – android-query – HTTP 204 Response results in Network Error (-101)
an empty 204 response to a HTTP PUT will trigger this. See also https://code.google.com/p/android/issues/detail?id=24672, ‘”java.io.IOException: unexpected end of stream” on HttpURLConnection HEAD call’.
(tags: http urlconnection httpurlconnection java android dalvik bugs 204 head get exceptions)
‘The European election will take place between 22 and 25 May 2014. Citizens, promise to vote for candidates that have signed a 10-point charter of digital rights! Show candidates that they need to earn your vote by signing our charter!’
(tags: europarl ep digital-rights rights ireland eu data-privacy data-protection privacy)
anigifs animated gif retro cyberpunk gustavo-torres kidmograph fx video-art via:mlkshk)