avatarharuki zaemon

Corfu: A distributed shared log

Shared by

CORFU is a global log which clients can append-to and read-from over a network. Internally, CORFU is distributed over a cluster of machines in such a way that there is no single I/O bottleneck to either appends or reads. Data is fully replicated for fault tolerance, and a modest cluster of about 16–32 machines with SSD drives can sustain 1 million 4-KByte operations per second.

Retraction Watch

Shared by

Although retractions are on average occurring sooner after publication than in the past, citation analysis shows that they are not being recognised by subsequent users of the work. Findings suggest that editors and institutional officials are taking more responsibility for correcting the scientific record but that reasons published in the retraction notice are not always reliable. More aggressive means of notification to the scientific community appear to be necessary.

255- The Architect of Hollywood - 99% Invisible

Shared by

“Paul Williams is an African American architect who was much more than an African American architect,” says Karen Hudson, Paul Williams’ biographer and granddaughter. “He was simply one of the best architects of the 20th century.”

Nukes - Radiolab

Shared by

President Richard Nixon once boasted that at any moment he could pick up a telephone and - in 20 minutes - kill 60 million people.  Such is the power of the US President over the nation’s nuclear arsenal.  But what if you were the military officer on the receiving end of that phone call? Could you refuse the order?

Who is Publishing NSA and CIA Secrets, and Why?

Shared by

Countries don’t often reveal intelligence capabilities: “sources and methods.” Because it gives their adversaries important information about what to fix, it’s a deliberate decision done with good reason.

What do Australian governments prioritise in public expenditure? Does party make a difference?

Shared by

Patterns of public expenditure over the past 25 years demonstrate that the funding priorities of Australia’s two main parties have been remarkably similar. Furthermore, any exceptions to the rule have been precipitated by dramatic changes to global economic conditions.

Wikipedia plot descriptions think men save, women forgive

Shared by

In general, it can be said that men are written to be active, while women are more often passive. Exploring this binary division further, data scientist David Robinson analyzed which verbs most often follow “he” or “she” in the Wikipedia plot descriptions of over 100,000 movies, books, TV shows, and video games. The results highlight a stark contrast along lines of violence, forgiveness, and power.

The design, implementation and deployment of a system to transparently compress hundreds of petabytes of image files for a file storage service

Shared by

Lepton losslessly compresses an average JPEG image by about 23%. This is expected to save Dropbox more than 8% of its overall backend file storage. Lepton introduces new techniques that allow it to match the compression savings of prior work (PackJPG) while decoding more than nine times faster and in a streaming manner.

Nancy | WNYC

Shared by

BFFs Kathy Tu and Tobin Low are super queer, super fun and ready to take over your podcast feed. Join them for provocative stories and frank conversations about the LGBTQ experience today. Because everyone’s a little bit gay…

Low-sodium diet might not lower blood pressure

Shared by

A new study that followed more than 2,600 men and women for 16 years found that consuming less sodium wasn’t associated with lower blood pressure. The study adds to growing evidence that current recommendations for limiting sodium intake may be misguided.

Funky Hand Jive — Radiolab

Shared by

Neil Degrasse Tyson and some new microbiome science help answer the question - when we touch greatness how much of it stays with us?

Reckon you've seen some stupid security things? Here, hold my beer...

Shared by

Yes, that’s just a Base64 encoded version of your password in a cookie and yes, it’s being sent insecurely on every request and also yes, it’s not flagged as “secure” therefore it’s being sent in the clear.

The FBI convicted this man using hair analysis. It was a dog's hair.

Shared by

Over 95 percent of the cases involving hair evidence that the FBI has reviewed so far contained flawed testimony—257 out of 268 cases.

rems and ems, and why you probably don’t need them

Shared by

Use pixels, and if a scenario pops up where ems or rems are the better tool for the job, go for it.

Russian-controlled telecom hijacks financial services’ Internet traffic

Shared by

Doug Madory, director of Internet analysis at network management firm Dyn:

I would classify this as quite suspicious

256- Sounds Natural — 99% Invisible

Shared by

As much as people want to believe it’s all real, nature documentaries are still movies, and they need a little movie magic just like any other film.

254- Containers — 99% Invisible

Shared by

When people started shipping things in standardized containers all kinds of inefficiencies in global shipping that had existed for hundreds of years were eliminated and the world changed forever.

A vigilante is putting a huge amount of work into infecting IoT devices

Shared by

A technical analysis published Wednesday reveals for the first time just how much technical acumen went into designing and building the renegade network, which just may be the Internet’s most advanced IoT botnet.

The Struggles of Writing About Chinese Food as a Chinese Person

Shared by

There’s an ancient Chinese recipe that dates back to the Tang Dynasty, in which a fat goose is stuffed into the belly cavity of a whole lamb, and then hung from a frame over a slow fire. It is roasted until the lamb skin is burnt and crisp and the goose well-done. As it cooks in the belly cavity, the goose absorbs the taste of the lamb, while retaining its own tenderness and flavor.

EFF to FDA: the DMCA turns medical implants into time-bombs

Shared by

The Electronic Frontier Foundation just filed comments with the FDA in its embedded device cybersecurity docket, warning the agency that manufacturers have abused the Digital Millennium Copyright Act, threatening security researchers with lawsuits if they came forward with embarrassing news about defects in the manufacturers’ products.