The Future of Zoos
http://time.com/4672990/the-future-of-zoos/ [time.com]
2017-02-21 15:40
tags:
biology
life
urban
At a time when scientists know more than they ever have before about the inner lives of animals--and when concerns about animal rights loom large--many experts think that zoos need a major overhaul if they’re going to last.
Arena allocator tips and tricks
https://nullprogram.com/blog/2023/09/27/ [nullprogram.com]
2023-10-01 18:51
tags:
c
development
hash
malloc
programming
Over the past year I’ve refined my approach to arena allocation. With practice, it’s effective, simple, and fast; typically as easy to use as garbage collection but without the costs. Depending on need, an allocator can weigh just 7–25 lines of code — perfect when lacking a runtime. With the core details of my own technique settled, now is a good time to document and share lessons learned. This is certainly not the only way to approach arena allocation, but these are practices I’ve worked out to simplify programs and reduce mistakes.
See also: https://nullprogram.com/blog/2023/09/30/
An easy-to-implement, arena-friendly hash map
source: L
Don’t Put Your Valuables in the Bank
https://www.bloomberg.com/opinion/articles/2019-07-22/don-t-put-your-valuables-in-the-bank [www.bloomberg.com]
2019-07-30 04:02
tags:
finance
life
On the other hand if you have valuable stuff you can leave it with the bank, and the bank will keep it in a box for you, but that is sort of an accident. It is not a core banking function, not really a banking function at all except for historical reasons. And sometimes they’ll drill open the box and throw your stuff out!
Original story: https://www.nytimes.com/2019/07/19/business/safe-deposit-box-theft.html
It turns out that, statistically, heart surgeons are better at heart surgery than barbers are. What about dermatologists, are they better at sourcing and identifying private-equity and venture-capital investments than private-equity professionals are?
Original: https://www.nytimes.com/2019/07/19/your-money/diy-private-equity.html
source: ML
Abusing Linux's firewall: the hack that allowed us to build Spectrum
https://blog.cloudflare.com/how-we-built-spectrum/ [blog.cloudflare.com]
2018-04-30 01:39
tags:
linux
networking
Soon after we started building Spectrum, we hit a major technical obstacle: Spectrum requires us to accept connections on any valid TCP port, from 1 to 65535. On our Linux edge servers it’s impossible to “accept inbound connections on any port number”. This is not a Linux-specific limitation: it’s a characteristic of the BSD sockets API, the basis for network applications on most operating systems.
Hacking GitHub with Unicode's dotless 'i'.
https://eng.getwisdom.io/hacking-github-with-unicode-dotless-i/ [eng.getwisdom.io]
2019-12-17 02:51
tags:
auth
best
email
security
text
turtles
web
GitHub’s forgot password feature could be compromised because the system lowercased the provided email address and compared it to the email address stored in the user database. If there was a match, GitHub would send the reset password link to the email address provided by the attacker- which was technically speaking, not the same email address.
This is beautiful.
source: HN
In Praise of Hierarchy
https://www.wsj.com/articles/in-praise-of-hierarchy-1515175338 [www.wsj.com]
2018-01-07 01:48
tags:
ideas
media
social
Established, traditional order is under assault from freewheeling, networked disrupters as never before. But society craves centralized leadership, too.
I think the idea is to stop before going full French Revolution. Just a touch of change, please.
Mr. Ferguson’s new book, “The Square and the Tower: Networks and Power, from the Freemasons to Facebook,” will be published by Penguin Press on Jan. 16.
Categorizing OpenBSD Bugs
https://www.collicutt.co.uk/notebook/openbsd_bugs.html [www.collicutt.co.uk]
2019-04-22 14:38
tags:
bugfix
development
openbsd
I went through two years of OpenBSD errata for the most recent four releases (6.1, 6.2, 6.3 and 6.4) and categorized each bug.
source: L
The Gambler Who Cracked the Horse-Racing Code
https://www.bloomberg.com/news/features/2018-05-03/the-gambler-who-cracked-the-horse-racing-code [www.bloomberg.com]
2018-07-06 17:48
tags:
article
business
hoipolloi
Bill Benter did the impossible: He wrote an algorithm that couldn’t lose at the track. Close to a billion dollars later, he tells his story for the first time.
A Survey of CPU Caches
https://meribold.github.io/2017/10/20/survey-of-cpu-caches/ [meribold.github.io]
2017-10-21 16:04
tags:
benchmark
cpu
perf
programming
The hidden constant separating the time complexities of two reasonable algorithms under asymptotic analysis can get quite big because of cache effects. Understanding how CPU caches work helps make good choices for writing fast programs and I hope this article provided some insight.
More on the subject: https://github.com/meribold/cache-seminar-paper
source: L
systemd, 10 years later: a historical and technical retrospective
https://blog.darknedgy.net/technology/2020/05/02/0/ [blog.darknedgy.net]
2020-05-17 03:39
tags:
admin
article
development
linux
10 years ago, systemd was announced and swiftly rose to become one of the most persistently controversial and polarizing pieces of software in recent history, and especially in the GNU/Linux world. The quality and nature of debate has not improved in the least from the major flame wars around 2012-2014, and systemd still remains poorly understood and understudied from both a technical and social level despite paradoxically having disproportionate levels of attention focused on it.
I am writing this essay both for my own solace, so I can finally lay it to rest, but also with the hopes that my analysis can provide some context to what has been a decade-long farce, and not, as in Benno Rice’s now famous characterization, tragedy.
source: grugq
Dual numbers
https://ericlippert.com/2019/01/07/dual-numbers-part-1/ [ericlippert.com]
2019-01-17 23:23
tags:
csharp
math
series
I’ve recently been looking into a fascinating corner of mathematics that at first glance appears a little bit silly, but actually has far-reaching applications, from physics to numerical methods to machine learning. I thought I’d share what I’ve learned over the next few episodes.
I assume you recall what a complex number is, but perhaps not all of the details. A complex number is usually introduced as a pair of real numbers (a, b), where a is called the “real part” and b is called the “imaginary part”.
A brief aside: it has always bugged me that these labels are unnecessarily value-laden. There is no particular “reality” that is associated with the real part; it is every bit as “imaginary” as the imaginary part. They might as well be called the “rezrov part” and the “gnusto part”, but we’re stuck with “real” and “imaginary”. Moving on.
The midnight Monad
http://www.lambdacat.com/the-midnight-monad-a-journey-to-enlightenment/ [www.lambdacat.com]
2016-11-16 03:02
tags:
functional
haskell
intro-programming
type-system
Functor, Applicative, Monad, Enlightenment. It’s all about the fame.
Java and Scala's Type Systems are Unsound
http://io.livecode.ch/learn/namin/unsound [io.livecode.ch]
2016-11-27 06:40
tags:
java
paper
pdf
type-system
If you’re looking for gold, look in trees
https://www.economist.com/science-and-technology/2019/05/25/if-youre-looking-for-gold-look-in-trees [www.economist.com]
2019-05-24 17:47
tags:
biology
business
chemistry
Prospecting for gold by looking for it in leaves has finally proved itself commercially in Australia
The quantities are minuscule. In areas where there is no gold, leaves may have a background level of 0.15 parts per billion (ppb) of gold; on gold-rich sites that can rise to 4ppb.
source: HN
machoke - CFG-based fuzzy hash for malware classification
https://github.com/conix-security/machoke [github.com]
2017-10-29 16:26
tags:
compiler
hash
malware
release
security
swtools
This implementation is based on Machoc, originally published by ANSSI during SSTIC2015 as a part of polichombr (https://github.com/ANSSI-FR/polichombr). The algorythm is roughly the same, but unlike ANSSI’s Machoc, is implemented using radare2 and r2pipe instead of miasm or IDApython.
source: grugq
The Intel 80386, part 1: Introduction
https://blogs.msdn.microsoft.com/oldnewthing/20190121-00/?p=100745 [blogs.msdn.microsoft.com]
2019-01-21 23:46
tags:
cpu
programming
series
systems
The Perfect Container
https://tedium.co/2019/03/19/milk-crate-theft-history/ [tedium.co]
2019-03-22 10:09
tags:
food
hoipolloi
policy
storage
Sometimes, it’s possible to create something that’s too useful, that is designed for a niche purpose but is so well-attuned to that purpose that it attracts other people, who find a similar value but different use case than was intended. And because of the sheer prevalence of said useful tool, it suddenly is everywhere—finding purpose as a cheap alternative to a trip to the local department store. If you’re the maker of that too-useful something, whaddya do? Well, in the case of the dairy industry, you use your political influence to try to ban all those college students from using milk crates. In today’s Tedium, we talk about the bizarre legal status of the plastic milk crate.
“They are looking for people who are doing even the smallest crime, because, what we’ve learned is, those who will go out and steal a milk crate, for example, are the same people who are probably breaking into cars, breaking into your house.”
Operational Gaps as Hackers See Them
https://cybersecpolitics.blogspot.com/2016/10/operational-gaps-and-vep.html [cybersecpolitics.blogspot.com]
2016-12-30 17:47
tags:
development
exploit
opsec
policy
security
And getting caught once means your entire toolchain can get wrapped up. This is why operational gaps are so dangerous.
In addition, machines you have implants on get upgraded all the time.
Unfortunately not quite, but it’s a good point about how to become an unattractive target.
Anti-Activist Poison Pills
https://corpgov.law.harvard.edu/2017/03/22/anti-activist-poison-pills/ [corpgov.law.harvard.edu]
2017-03-24 20:18
tags:
business
finance
paper
policy
We provide a comprehensive policy and doctrinal analysis of the use of poison pills again activists in corporate governance contests. Although pills have been in common use as anti-takeover devices since the 1980s, it is only now—in the context of anti-activist pills—that many design features of pills start to matter. The reason lies in the different sources of gains derived by the raiders of yore and today’s activists.
source: ML
The Baseline Interpreter: a faster JS interpreter in Firefox 70
https://hacks.mozilla.org/2019/08/the-baseline-interpreter-a-faster-js-interpreter-in-firefox-70/ [hacks.mozilla.org]
2019-08-30 18:17
tags:
browser
javascript
jit
perf
update
The Baseline Interpreter sits between the C++ interpreter and the Baseline JIT and has elements from both. It executes all bytecode instructions with a fixed interpreter loop (like the C++ interpreter). In addition, it uses Inline Caches to improve performance and collect type information (like the Baseline JIT).
source: HN