When you have a large number of blogs to look after, it can be a challenge to keep on top with security updates for plugins and WordPress Core. At the same time the bad guys are getting faster and faster to exploit these kinds of holes. Continue reading
After years of preparation, we are proud to present a usable product of a stochastic optimization library. The core Java libraries were programmed by Nils Löhndorf. I contributed the iPython interface and other ‘glue’. We are excited to find out which uses people will find for this technology.
Check out the website: http://www.quantego.com/
Forecasts are rather difficult, especially when they’re about the future. Or so the saying goes. While predictiong returns is a pointless exercise, there is some value in keeping an eye on correlations.
I use SSH for pretty much anything from VPN, server administration, database connections or iPython work on remote machines. When working from weird places and with weird internet connections SSH become painfully slow. I already use Mosh, but that also relies on ordinary SSH to initiate the connection.
Last week we discussed Linux Debian’s apt-get update mechanism and how to fully automate essential updates. This week I’d like to demonstrate how to do the same thing for Python. I admit that keeping Python packages up-to-date is probably not half as essential as keeping internet-facing server infrastructure updated. Nonetheless I like to work with the latest versions of packages, as they might fix problems or add features. Continue reading
This week’s massive SSL-security vulnerability showed how important regular security updates for all of our software is. Because – let’s face it – today’s world is largely powered by software. Software that is written by humans, who make mistakes when writing it. The rule should be: retire it or update it. Continue reading
I’m back in Shanghai and faced with the pollution problem once again. Here a quick update on the last months. You can clearly see a reduction in pollution around Chinese New Year, when factories are shutting down. With warmer weather the readings also seem to be lower. I don’t know the reason, but anecdotal evidence gives the same effect for Beijing. An expert from Vienna University of Economics is currently analyzing the data and correlating it with weather observations. I’ll give an update, when some results emerge.
This morning I came across this post by Kelly Norton. He calculated the number of ‘pleasant’ days for each US zip-code area. California seems to win the race with more than 180 ‘pleasant’ days each year. A pleasant day is defined by the min- and max temperature not exceeding certain limits.
I’d like to officially name my current dev stack:
A.. for AngularJS. Drives the user frontend.
S.. for Supervisord. Takes care of processes.
P.. for Python. Quick way to implement almost any business logic.
E.. for Nginx. Fast web server for static files and to add SSL.
L.. for Linux.
Few things are more annoying than hotels, who think they need to earn some extra cash by charging people for wireless internet. Given the low to nonexistent cost of providing the service, they should also charge for warm water or fresh air, when following the same logic.
In the case of a local Howard-Johnson (HoJo) hotel, the wifi’s paywall was so badly implemented, it actually posed a threat to the rest of the hotel. Below, I will describe 4 options, anyone can use to get free internet at this particular hotel. Continue reading
A word of warning: Updating from Mountain lion to Mavericks is by far the most buggy process I have ever seen from Apple. At times the installer quit in the middle, My time machine volume was not recognized, network settings are lost, …
Make sure you have multiple backups and plan some downtime. On the plus-side Homebrew and my Python-packages all survived. Just make sure you use pip with a virtualenv or the –user option.
This is pretty crazy. Every conspiracy theorist was correct. The government is really watching everything. All internet data on the internet is compromised.
Check out the presentation and read it nice and slow: http://www.theguardian.com/world/interactive/2013/jul/31/nsa-xkeyscore-program-full-presentation
Threats rarely come from above, but most of the time from below. Small and flexible companies start with niches and keep improving their performance, until they become a threat to the established player. In this case we see the S-curve model playing out against Oracle.
These migrations indicate that after years of development, many open source or low-cost databases have now attained performance that is either roughly equivalent to parts of Oracle, such as Postgres, or have developed capabilities that while irrelevant to much of the database market, are far in advance of any technology operated by the Red Borg, such as MongoDB or Riak or Cassandra.
Personally I’m a fan of MongoDB and Redis. I also tried CouchDB, but didn’t find it very active.
Today I stumpled over a rather fascinating post on Sinosplice. It basically says that all maps in China are based on a different coordinate system than Western maps. As a result, ‘Western’ GPS-coordinates projected onto them will be off between 300 to 500m.
I noticed this issue while playing Ingress in Shanghai. While walking along the Bund, I always ended up in the Pu-river. It seems that Google Maps has a correction-algorithm built in, while Ingress hasn’t. This still doesn’t help you while tagging photos or sharing your position with friends. Continue reading
Update Aug 9, 2013: The biggest German email providers are currently running a big marketing campaign and promise secure email. They are using the same technique described on this page. After checking my logs, I can confirm that GMX-emails were delivered unencrypted on Aug 5, but arrived encrypted on Aug 6.
Thanks to Mr. Snowden, we know two important facts about the world of security and email:
First, most governments in the world will eavesdrop and store your communication, if they get the chance. They don’t have a specific reason and the benefits are highly disputed.
Second, your users can’t/won’t use PGP or S/MIME to encrypt their email.
The job is left to admins. We need to maximize usability and compatibility, while ensuring that user data stays confidential. If you are running Postfix, I’d like to draw your attention to some useful settings that will protect your user’s email in transit. If emails stay on the same server or the other server is secured as well, there is little chance to intercept messages on a big scale. If your users are sending emails to Gmail or Hotmail, then interception is still possible at the receiving end.