Monthly Shaarli

All links of one month in a single page.

April, 2019

XY problem - Wikipedia

The XY problem is a communication problem encountered in help desk and similar situations in which the real issue, X, of the person asking for help is obscured, because instead of asking directly about issue X, they ask how to solve a secondary issue, Y, which they believe will allow them to resolve issue X. However, resolving issue Y often does not resolve issue X, or is a poor way to resolve it, and the obscuring of the real issue and the introduction of the potentially strange secondary issue can lead to the person trying to help having unnecessary difficulties in communication and offering poor solutions.

George Neville-Neil: Security Fantasies and Realities for the BSDs

AsiaBSDCon 2019 Keynote.

MandalaGaba

a free tool for creating Zen Geometry

The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power by Shoshana Zuboff

The challenges to humanity posed by the digital future, the first detailed examination of the unprecedented form of power called "surveillance capitalism," and the quest by powerful corporations to predict and control our behavior.

Celebrating 50 Years of the RFCs That Define How the Internet Works | Internet Society

50 years ago today, on 7 April 1969, the very first “Request for Comments” (RFC) document was published. Titled simply “Host Software”, RFC 1 was written by Steve Crocker to document how packets would be sent from computer to computer in what was then the very early ARPANET.

Thinking in Systems: A Primer by Donella H. Meadows

Well-structured introduction to Systems thinking.

You Are Not Google

First, Understand the Problem.

Untangling the worldwide mesh of undersea cables | APNIC Blog

The growth of global Internet traffic has driven a drastic expansion of the submarine cable network, both in terms of the sheer number of links and its total capacity. Today, a complex mesh of hundreds of cables, stretching over one million kilometres, connects nearly every corner of the earth and is instrumental in closing the remaining connectivity gaps. Despite the scale and critical role of the submarine network for both business and society at large, our community has mostly ignored it, treating it as a black box in most Internet studies, from connectivity to inter-domain traffic and reliability.

A Generation Lost in the Bazaar - ACM Queue

Quality happens only when someone is responsible for it.

Digitale Souveränität durch Self-Hosting
Introducing Mozilla WebThings

The Mozilla IoT team’s mission is to create a Web of Things implementation which embodies those values and helps drive IoT standards for security, privacy and interoperability. Mozilla WebThings is an open platform for monitoring and controlling devices over the web.

Artificial intelligence is helping old video games look like new

Modders are taking advantage of AI tools to update old graphics.

OpenSSH 8.0

OpenSSH 8.0 release notes.

Tech’s new stars have it all—except a path to high profits - The trouble with tech unicorns

Millions of users, cool brands and charismatic bosses are not enough

Internet of Things Devices as a DDoS Vector

As adoption of Internet of Things devices increases, so does the number of insecure IoT devices on the network. These devices represent an ever-increasing pool of computing and communications capacity open to misuse.

Fail-Slow at Scale: Evidence of HardwarePerformance Faults in Large Production Systems

Today’s software systems are arguably robust at logging and recovering from fail-stop hardware – there is a clear,binary signal that is fairly easy to recognize a and interpret. We believe fail-slow hardware is a fundamentally harder problem to solve. It is very hard to distinguish such cases from ones that are caused by software performance issues. It is also evident that many modern,advanced deployed systems do not anticipate this failure mode. We hope that our study can influence vendors, operators, and systems designers to treat fail-slow hardware as a separate class of failures and start addressing them more robustly in future systems.

Lessons from 300k+ Lines of Infrastructure Code

Yevgeniy Brikman shares key lessons from the “Infrastructure Cookbook” they developed at Gruntwork while creating and maintaining a library of over 300,000 lines of infrastructure code used in production by hundreds of companies. Topics include how to design infrastructure APIs, automated tests for infrastructure code, patterns for reuse and composition, refactoring, namespacing, and more.

Announcing the release of Fedora 30 - Fedora Magazine

Changes:

  1. Ansible Support (Linux System Roles)
  2. GNOME 3.32
  3. Bash 5
  4. GCC 9
  5. PHP 7.3

much more...

WebXR Device API

This specification describes support for accessing virtual reality (VR) and augmented reality (AR) devices, including sensors and head-mounted displays, on the Web.

Tools, Techniques, and Methodologies: A Survey of Digital Forensics for SCADA Systems

With the rise of attacks against critical infrastructure, SCADA environments, and industrial control systems, security practitioners must leverage digital forensics in increasingly complex ways. By collecting, aggregating, and analyzing forensics data, breaches and attacks are able to be discovered and remediated. However, there exists a significant gap in the complexity, generality, and versatility of forensics tools, techniques, and methodologies for SCADA environments compared to the realm of IT-based forensics.

The Dangerous Flaws in Boeing’s Automated System - The New York Times

MCAS relied on only one of two sensors that measured the plane’s angle of attack.

UNIX: Building The Most Important OS in the World

Today, Unix and its derivatives make up the majority of operating systems currently in use and its popularity continues to spread as the popularity of open-source software grows. All thanks to Kenneth Thompson, Dennis Ritchie, and their fellow rebellious Bell Labs colleagues, who—by refusing to watch their beloved Multics die—ensured that their Unix operating system would go on to run the world.

Transparent Hugepages: measuring the performance impact

This post explains Transparent Hugepages (THP) in a nutshell, describes techniques that can be used to measure the performance impact, shows the effect on a real-world application.

HTTPSWatch

HTTPSWatch tracks the HTTPS support of prominent websites.

Over 13K iSCSI storage clusters left exposed online without a password | ZDNet

New attack vector opens backdoor inside enterprise disk storage arrays and people's NAS devices.