Author Archives: dailylinks

Links for 2018-11-16

This Week’s Giza Pyramid Discovery Was Already Built Into Assassin’s Creed Origins As a kid, I was Egypt-obsessed — this game is hitting the spot (tags: assassins-creed egypt history pyramids architecture)

Posted in Uncategorized | Leave a comment

Links for 2018-11-15

Tuning Spark Back Pressure by Simulation Interesting, Spark uses a PID controller algorithm to manage backpressure: Spark back pressure, which can be enabled by setting spark.streaming.backpressure.enabled=true, will dynamically resize batches so as to avoid queue build up. It is implemented using a Proportional Integral Derivative (PID) algorithm. This algorithm has some interesting properties, including the lack of guarantee […]

Posted in Uncategorized | Leave a comment

Links for 2018-11-14

Jeff Bezos is wrong, tech workers are not bullies I decided to leave my job as a staff engineer at Google because of Project Maven, and because I believe that the artificial intelligence ethical guidelines they published afterwards were not strict enough: they allowed surveillance within “internationally accepted norms”. I am now joining forces with […]

Posted in Uncategorized | Leave a comment

Links for 2018-11-12

Some notes on running new software in production This is really good — how to approach new infrastructure/software dependencies in production with reliability and uptime in mind. (via Tony Finch) (tags: reliability uptime slas kubernetes envoy outages runbooks ops)

Posted in Uncategorized | Leave a comment

Links for 2018-11-09

Specification gaming examples in AI A good list of examples where machine learning systems “figure out” how to cheat their fitness function, e.g.: ‘Creatures bred for speed grow really tall and generate high velocities by falling over’ (tags: ai funny humor spreadsheets machine-learning ml fitness-functions) What if the Placebo Effect Isn’t a Trick? – The […]

Posted in Uncategorized | Leave a comment

Links for 2018-11-08

Sci-Fi Writer Greg Egan and 4chan anon Math Whiz Advance Permutation Problem | Quanta Magazine On September 16, 2011, an anime fan posted a math question to the online bulletin board 4chan about the cult classic television series ‘The Melancholy of Haruhi Suzumiya’. Season one of the show, which involves time travel, had originally aired […]

Posted in Uncategorized | 2 Responses

Links for 2018-11-07

wifiscan.py A neat kragen hack: Report wireless signal strength using audio synthesis. This quick kludge is useful for figuring out where the dead spots in your wireless network coverage are. They’re where the pitch goes high and maybe you start getting clicks from audio buffer underruns. Example audio output can be found at . This […]

Posted in Uncategorized | Leave a comment

Links for 2018-11-06

Underground Utility Colour Codes Explained Underground utility colour codes are used to differentiate and identify underground utilities to protect it from damage during excavation. There are different types of utilities and in order to tell them apart coloured lines, flags or sometimes both are used. They help mark the location and indicate the type of […]

Posted in Uncategorized | Leave a comment

Links for 2018-11-02

Physical spam using cheap Bluetooth beacons spotted in the wild Buzz Andersen on Twitter: “Crazy thing: my friends who run a high traffic coffee shop just found this thing under their bar. It turns out to be a super cheap Chinese Bluetooth LE beacon.… https://t.co/pecNBCR86u” (tags: bluetooth spam via:twitter alibaba eddystone ads) Productionproofing EKS ‘We […]

Posted in Uncategorized | Comments closed

Links for 2018-11-01

Neoliberalism has conned us into fighting climate change as individuals | Martin Lukacs | Environment | The Guardian These pervasive exhortations to individual action — in corporate ads, school textbooks, and the campaigns of mainstream environmental groups, especially in the west — seem as natural as the air we breathe. But we could hardly be […]

Posted in Uncategorized | Comments closed

Links for 2018-10-31

October 21 post-incident analysis | The GitHub Blog A network outage caused a split-brain scenario, and their failover system allowed writes to occur in both regional databases. Once the outage was repaired it was impossible to reconcile writes in an automated fashion as a result. Embarrassingly, this exact scenario was called out in their previous […]

Posted in Uncategorized | Comments closed

Links for 2018-10-30

Epic twitter thread from @colmmacc explaining why client certs and mutual-auth TLS are TERRIBAD Ok. tweet thread time! Too long ago I promised to write a screed explaining how much I hated mutual-auth TLS and why. I got distracted, and I wasn’t happy with the writing, so here it is in tweet thread form instead! […]

Posted in Uncategorized | Comments closed

Links for 2018-10-26

“The first AI portrait in Christie’s” was mostly output from someone else’s open-source code The print was created by Obvious, a trio of 25-year-old French students whose goal is to “explain and democratize” AI through art. Over the past year, they’ve made a series of portraits depicting members of the fictional Belamy family, amplifying their […]

Posted in Uncategorized | Comments closed

Links for 2018-10-23

pusher/k8s-spot-rescheduler ‘Tries to move K8s Pods from on-demand to spot instances’: K8s Spot rescheduler is a tool that tries to reduce load on a set of Kubernetes nodes. It was designed with the purpose of moving Pods scheduled on AWS on-demand instances to AWS spot instances to allow the on-demand instances to be safely scaled […]

Posted in Uncategorized | Comments closed

Links for 2018-10-19

Excellent Twitter thread from colmmacc on how s2n avoids protocol-state errors using a linearized set of state transitions, and Cryptol and SAW to perform verification of the TLS state machine (tags: cryptol saw formal-verification twitter threads colmmacc security s2n) Remapping the silly double-S key on a Macbook running 10.12 Sierra the latest hacky workaround for […]

Posted in Uncategorized | Comments closed

Links for 2018-10-18

Republicans Are Adopting the Proud Boys Extreme-right factions of the GOP happily taking on a brownshirt paramilitary gang. This is scary shit (tags: fascism america politics proud-boys paramilitary republicans gop)

Posted in Uncategorized | Comments closed

Links for 2018-10-17

Every fantasy map / Boing Boing Every fantasy map, ever (tags: maps funny fantasy sf) Lawsuit: “pivoting to video” was a disaster led by Facebook’s cooked viewing data / Boing Boing The company decided to “obfuscate the fact that we screwed up the math” by quietly retiring the erroneous metrics and replacing them with corrected […]

Posted in Uncategorized | Comments closed

Links for 2018-10-16

Bitcoin must die If Bitcoin were to cease trading tomorrow, 0.5% of the world’s electricity demand would simply disappear. This is roughly equivalent to the output of ten coal-fired power plants, emitting 50 million tonnes of CO2 per year – which would cover one year’s worth of the carbon emission cuts required to limit temperature […]

Posted in Uncategorized | Comments closed

Links for 2018-10-12

‘We’re doomed’: Mayer Hillman on the climate reality no one else will dare mention | Environment | The Guardian Well this is terrifying. Can civilisation prolong its life until the end of this century? “It depends on what we are prepared to do.” He fears it will be a long time before we take proportionate […]

Posted in Uncategorized | Comments closed

Links for 2018-10-11

How To Survive The Coming Century New Scientist article from 2009 with a rather terrifying map of the 4-degrees-warmer Earth (tags: earth new-scientist climate fear) IPCC 1.5 degrees target requires massive carbon dioxide removal technology efforts The grimmest prognosis in the draft report is in the details of the effort it would take to actually […]

Posted in Uncategorized | Comments closed

Links for 2018-10-10

The 100 best restaurants, cafes and places to eat in Ireland the Irish Times latest foodie list, via Aoife McElwain (tags: irish-times food cafes eating dublin foodie restaurants) A Controversial Virus Study Shows Flaws in How Science Is Done – The Atlantic Absent clearer guidelines, the burden falls on the scientific enterprise to self-regulate—and it […]

Posted in Uncategorized | Comments closed

Links for 2018-10-08

Wild camping spots – Google My Maps A GMaps version of the list of wild camping spots around Ireland (tags: gmaps google mapping wild-camping camping ireland) When It’s Too Late to Stop Fascism, According to Stefan Zweig | The New Yorker The destruction of a symbolic edifice—a blaze that caused no loss of life—became the […]

Posted in Uncategorized | Comments closed

Links for 2018-10-05

What to Look for in Java 8 Code Great advice from Trisha Gee on J8 features and how to code-review code which uses them (tags: java8 java code-review coding) Wild Camping Spots map Ireland & Northern Ireland looks like a decent map (even if they can’t use GMaps) (tags: wild-camping camping campsites ireland tourism) archive.org […]

Posted in Uncategorized | Comments closed

Links for 2018-10-03

Kubernetes: The Surprisingly Affordable Platform for Personal Projects At the beginning of the year I spent several months deep diving on Kubernetes for a project at work. As an all-inclusive, batteries-included technology for infrastructure management, Kubernetes solves many of the problems you’re bound to run into at scale. However popular wisdom would suggest that Kubernetes […]

Posted in Uncategorized | Comments closed

Links for 2018-10-01

Amazon S3 Announces Selective Cross-Region Replication Based on Object Tags Amazon S3 Cross-Region Replication (CRR) now supports object filtering based on S3 object tags. This allows you to identify individual objects using S3 object tags for automatic replication across AWS Regions for compliance and/or data protection. CRR is an Amazon S3 feature that automatically replicates […]

Posted in Uncategorized | Comments closed

Links for 2018-09-28

Estonia sues Gemalto for 152 mln euros over ID card flaws Estonia’s Police and Border Guard Board (PPA) said in a statement Gemalto had created private key codes for individual cards, leaving the government IDs vulnerable to external cyber attack, rather than embedding it on the card’s chip as promised. “It turned out that our […]

Posted in Uncategorized | Comments closed

Links for 2018-09-27

How Triplebyte solved its office Wi-Fi problems This is good general wi-fi infrastructure advice for home use too (tags: internet networking wifi ethernet routers ops) randomised prefixes in S3 are no longer necessary to improve performance This S3 request rate performance increase removes any previous guidance to randomize object prefixes to achieve faster performance. That […]

Posted in Uncategorized | Comments closed

Links for 2018-09-26

Do not fall into Oracle’s Java 11 trap The key part of the terms is as follows: You may not: use the Programs for any data processing or any commercial, production, or internal business purposes other than developing, testing, prototyping, and demonstrating your Application; The trap is as follows: Download Oracle JDK (because that is […]

Posted in Uncategorized | Comments closed

Links for 2018-09-25

Dublin Bikes Animated lots of nice graphs and dataviz around Dublin Bikes usage (tags: bikes cycling dublin dataviz cool) Common Cyborg | Jillian Weise | Granta Fantastic essay: When I tell people I am a cyborg, they often ask if I have read Donna Haraway’s ‘A Cyborg Manifesto’. Of course I have read it. And […]

Posted in Uncategorized | Comments closed

Links for 2018-09-24

25 Years of WIRED Predictions: Why the Future Never Arrives These early views of the sharing economy were accurate depictions of the moment, but poor visions of the future. Within a few short years, many of those Uber drivers would be stuck paying off their cars in sub-minimum-wage jobs with no benefits. What began as […]

Posted in Uncategorized | Comments closed

Links for 2018-09-21

Customer Service Data Vulnerability, Intercom [Fixed] good demo of the danger of unrestricted API keys (tags: api-keys security intercom fail dropmobility web apis)

Posted in Uncategorized | Comments closed

Links for 2018-09-20

Peter Flynn caused the first 404 Now that’s a great bit of web trivia :) “[UCC’s] first webmaster was the first person to ever break a link on the web, when he moved the location of a webpage on UCC’s servers without telling TimBL. Such a change resulted in the need to error-handle such an […]

Posted in Uncategorized | Comments closed

Links for 2018-09-18

Muting some magic keywords fixes the Twitter timeline Apparently, turning off some of the shittier recent features: Muting suggest_recycled_tweet_inline and suggest_activity_tweet actually has fixed my timeline. It’s all chronological and there are barely any “x and y liked” tweets. (tags: twitter feature-creep muting hacks) Kebab-Case TIL! In other words spelling identifiers-like-this, Lisp style (tags: kebab-case […]

Posted in Uncategorized | Comments closed

Links for 2018-09-14

Surprisingly Little Evidence for the Accepted Wisdom About Teeth – The New York Times Turns out there is little evidence for many dental practices: A systematic review in 2011 concluded that, in adults, toothbrushing with flossing versus toothbrushing alone most likely reduced gingivitis, or inflammation of the gums. But there was really weak evidence that […]

Posted in Uncategorized | Comments closed

Links for 2018-09-13

Google spent $60 million on building Content ID That’s how much it costs to build a not-particularly-accurate UGC copyright filter: Google’s new report takes aim at this claim. It asserts that Content ID is a highly effective solution, with over 98 percent of copyright management on YouTube happening through Content ID, and just 2 percent […]

Posted in Uncategorized | Comments closed

Links for 2018-09-12

The British Airways Breach: How Magecart Claimed 380,000 Victims very detailed and pretty fiendish (tags: analysis security attacks magecart british-airways web javascript)

Posted in Uncategorized | Comments closed

Links for 2018-09-11

UIDAI’s Aadhaar Software Hacked, ID Database Compromised, Experts Confirm The authenticity of the data stored in India’s controversial Aadhaar identity database, which contains the biometrics and personal information of over 1 billion Indians, has been compromised by a software patch that disables critical security features of the software used to enrol new Aadhaar users, a […]

Posted in Uncategorized | Comments closed

Links for 2018-09-09

Software as Craft: software delivery and open source in a Cloud & Enterprise world Niall Murphy sends this on: Microsoft is very pleased to welcome Maggie Pint and Dr. Nicole Forsgren to our new campus, to talk about open source and the deep connections between how software is written, and how successful it is. For […]

Posted in Uncategorized | Comments closed

Links for 2018-09-06

gRPC On HTTP/2: Engineering A Robust, High Performance Protocol Decent writeup on how gRPC uses HTTP/2 efficiently (tags: http2 grpc rpc networking http tcp protocols)

Posted in Uncategorized | Comments closed

Links for 2018-09-05

‘The Internet of Garbage’ by Sarah Jeong Sarah Jeong’s 2015 book is now free: ‘I think The Internet of Garbage still provides a useful framework to begin to talk about our new dystopia, and it continues to be surprisingly relevant in many ways. But I wrote the book with a tone of optimism I did […]

Posted in Uncategorized | Comments closed