Tag Archives: KAT

Kata Containers 1.0

Post Syndicated from ris original https://lwn.net/Articles/755230/rss

Kata Containers 1.0 has been released. “This first release of Kata Containers completes the merger of Intel’s Clear Containers and Hyper’s runV technologies, and delivers an OCI compatible runtime with seamless integration for container ecosystem technologies like Docker and Kubernetes.

AWS IoT 1-Click – Use Simple Devices to Trigger Lambda Functions

Post Syndicated from Jeff Barr original https://aws.amazon.com/blogs/aws/aws-iot-1-click-use-simple-devices-to-trigger-lambda-functions/

We announced a preview of AWS IoT 1-Click at AWS re:Invent 2017 and have been refining it ever since, focusing on simplicity and a clean out-of-box experience. Designed to make IoT available and accessible to a broad audience, AWS IoT 1-Click is now generally available, along with new IoT buttons from AWS and AT&T.

I sat down with the dev team a month or two ago to learn about the service so that I could start thinking about my blog post. During the meeting they gave me a pair of IoT buttons and I started to think about some creative ways to put them to use. Here are a few that I came up with:

Help Request – Earlier this month I spent a very pleasant weekend at the HackTillDawn hackathon in Los Angeles. As the participants were hacking away, they occasionally had questions about AWS, machine learning, Amazon SageMaker, and AWS DeepLens. While we had plenty of AWS Solution Architects on hand (decked out in fashionable & distinctive AWS shirts for easy identification), I imagined an IoT button for each team. Pressing the button would alert the SA crew via SMS and direct them to the proper table.

Camera ControlTim Bray and I were in the AWS video studio, prepping for the first episode of Tim’s series on AWS Messaging. Minutes before we opened the Twitch stream I realized that we did not have a clean, unobtrusive way to ask the camera operator to switch to a closeup view. Again, I imagined that a couple of IoT buttons would allow us to make the request.

Remote Dog Treat Dispenser – My dog barks every time a stranger opens the gate in front of our house. While it is great to have confirmation that my Ring doorbell is working, I would like to be able to press a button and dispense a treat so that Luna stops barking!

Homes, offices, factories, schools, vehicles, and health care facilities can all benefit from IoT buttons and other simple IoT devices, all managed using AWS IoT 1-Click.

All About AWS IoT 1-Click
As I said earlier, we have been focusing on simplicity and a clean out-of-box experience. Here’s what that means:

Architects can dream up applications for inexpensive, low-powered devices.

Developers don’t need to write any device-level code. They can make use of pre-built actions, which send email or SMS messages, or write their own custom actions using AWS Lambda functions.

Installers don’t have to install certificates or configure cloud endpoints on newly acquired devices, and don’t have to worry about firmware updates.

Administrators can monitor the overall status and health of each device, and can arrange to receive alerts when a device nears the end of its useful life and needs to be replaced, using a single interface that spans device types and manufacturers.

I’ll show you how easy this is in just a moment. But first, let’s talk about the current set of devices that are supported by AWS IoT 1-Click.

Who’s Got the Button?
We’re launching with support for two types of buttons (both pictured above). Both types of buttons are pre-configured with X.509 certificates, communicate to the cloud over secure connections, and are ready to use.

The AWS IoT Enterprise Button communicates via Wi-Fi. It has a 2000-click lifetime, encrypts outbound data using TLS, and can be configured using BLE and our mobile app. It retails for $19.99 (shipping and handling not included) and can be used in the United States, Europe, and Japan.

The AT&T LTE-M Button communicates via the LTE-M cellular network. It has a 1500-click lifetime, and also encrypts outbound data using TLS. The device and the bundled data plan is available an an introductory price of $29.99 (shipping and handling not included), and can be used in the United States.

We are very interested in working with device manufacturers in order to make even more shapes, sizes, and types of devices (badge readers, asset trackers, motion detectors, and industrial sensors, to name a few) available to our customers. Our team will be happy to tell you about our provisioning tools and our facility for pushing OTA (over the air) updates to large fleets of devices; you can contact them at [email protected].

AWS IoT 1-Click Concepts
I’m eager to show you how to use AWS IoT 1-Click and the buttons, but need to introduce a few concepts first.

Device – A button or other item that can send messages. Each device is uniquely identified by a serial number.

Placement Template – Describes a like-minded collection of devices to be deployed. Specifies the action to be performed and lists the names of custom attributes for each device.

Placement – A device that has been deployed. Referring to placements instead of devices gives you the freedom to replace and upgrade devices with minimal disruption. Each placement can include values for custom attributes such as a location (“Building 8, 3rd Floor, Room 1337”) or a purpose (“Coffee Request Button”).

Action – The AWS Lambda function to invoke when the button is pressed. You can write a function from scratch, or you can make use of a pair of predefined functions that send an email or an SMS message. The actions have access to the attributes; you can, for example, send an SMS message with the text “Urgent need for coffee in Building 8, 3rd Floor, Room 1337.”

Getting Started with AWS IoT 1-Click
Let’s set up an IoT button using the AWS IoT 1-Click Console:

If I didn’t have any buttons I could click Buy devices to get some. But, I do have some, so I click Claim devices to move ahead. I enter the device ID or claim code for my AT&T button and click Claim (I can enter multiple claim codes or device IDs if I want):

The AWS buttons can be claimed using the console or the mobile app; the first step is to use the mobile app to configure the button to use my Wi-Fi:

Then I scan the barcode on the box and click the button to complete the process of claiming the device. Both of my buttons are now visible in the console:

I am now ready to put them to use. I click on Projects, and then Create a project:

I name and describe my project, and click Next to proceed:

Now I define a device template, along with names and default values for the placement attributes. Here’s how I set up a device template (projects can contain several, but I just need one):

The action has two mandatory parameters (phone number and SMS message) built in; I add three more (Building, Room, and Floor) and click Create project:

I’m almost ready to ask for some coffee! The next step is to associate my buttons with this project by creating a placement for each one. I click Create placements to proceed. I name each placement, select the device to associate with it, and then enter values for the attributes that I established for the project. I can also add additional attributes that are peculiar to this placement:

I can inspect my project and see that everything looks good:

I click on the buttons and the SMS messages appear:

I can monitor device activity in the AWS IoT 1-Click Console:

And also in the Lambda Console:

The Lambda function itself is also accessible, and can be used as-is or customized:

As you can see, this is the code that lets me use {{*}}include all of the placement attributes in the message and {{Building}} (for example) to include a specific placement attribute.

Now Available
I’ve barely scratched the surface of this cool new service and I encourage you to give it a try (or a click) yourself. Buy a button or two, build something cool, and let me know all about it!

Pricing is based on the number of enabled devices in your account, measured monthly and pro-rated for partial months. Devices can be enabled or disabled at any time. See the AWS IoT 1-Click Pricing page for more info.

To learn more, visit the AWS IoT 1-Click home page or read the AWS IoT 1-Click documentation.

Jeff;

 

[$] Updates in container isolation

Post Syndicated from corbet original https://lwn.net/Articles/754433/rss

At KubeCon
+ CloudNativeCon Europe
2018, several talks explored the topic of
container isolation and security. The last year saw the release of Kata Containers which, combined with
the CRI-O project, provided strong isolation
guarantees for containers using a hypervisor. During the conference, Google
released its own hypervisor called gVisor, adding yet another
possible solution for this problem. Those new developments prompted the
community to work on integrating the concept of “secure containers”
(or “sandboxed containers”) deeper
into Kubernetes. This work is now coming to fruition; it prompts us to look
again at how Kubernetes tries to keep the bad guys from wreaking havoc once
they break into a container.

The Pirate Bay’s Rebellious History… in Doodles

Post Syndicated from Ernesto original https://torrentfreak.com/the-pirate-bays-rebellious-history-in-doodles-180429/

Later this year, The Pirate Bay will celebrate its 15th anniversary.

That’s quite an achievement for any website, but for a pirate site in particular, considering the mounting legal pressures.

The Pirate Bay is not an ordinary torrent site though. It has a long and rich history that, unfortunately, appears to be fading.

Up until a few years ago TPB frequently replaced its iconic pirate ship logo to send a message. These ‘doodles’ were pieces of art in their own right and have long been documented on a dedicated page.

However, when we checked this page a few days ago we noticed that the doodles only go back to 2014. This means that dozens of earlier pieces are missing, which is a crying shame. So, for the sake of history, we tracked down whatever we could and have published our findings here.

Below is our overview of TPB’s doodles in chronological order. Many of the titles are the ones TPB used. The list doesn’t include ‘ads’ or artist promos, which sometimes were just videos, but otherwise, it should be relatively complete.

The Grand Theft Bay – 24 October, 2004

The first doodle we’re aware of, celebrating the pirated release of Grand Theft Auto: San Andreas.

The Pear Bay – 20 August, 2005

The Pirate Bay renamed itself to The Pear Bay when Apple x86 OS leaked. The logo linked to a search which led visitors directly to it.

Merry Christmas! – 24 December, 2005

The Pirate Bay wished all its visitors a Merry Christmas. As far as we know, this doodle hasn’t been reused in recent years.

Nice game got released – 24 October, 2005

Another pirate game release, Quake 4 this time. It’s clear what some of the TPB people were up to in their spare time.

The Pirat eBay – 21 January, 2006

The Pirate Bay crew auctioned a night of partying to the highest bidder on eBay. “Since we have a lot of bandwidth usage and low salaries for working on our site, we’ve decided to go prostitutes on you and sell ourselves for money,” they wrote.

The Police Bay – 3 June, 2006

Three days after The Pirate Bay was raided for the first time, the site returned with their cannons aimed at Hollywood.

The Phoenix Bay – 18 June, 2006


With The Pirate Bay raid still dominating the news and political agenda, the site’s operator added another message. “Like the phoenix bird, The Pirate Bay will always rise again.”

Ladonia Invasion – 25 July, 2006

The Piratebay openly supported the ‘war’ against Ladonia, a micronation located in the south of Sweden. Yet another political statement.

Steal This Film – 21 August, 2006

Pirate Bay promoting the release of the documentary Steal This Film featuring its co-founders Brokep and Anakata, directed by Jamie King.

Party Aftermath – 8 October, 2006

The Pirate Bay crew had a party but didn’t bother to clean up. Instead, they put a photo of the aftermath on the frontpage.

Pirate Bay + WESC = <3 - 11 October, 2006

A pirate site teaming up with the street fashion company “WeSC”? While brands shun these links nowadays, it was all possible ten years ago.

Talk Like a Pirate Day – 19 September, 2006

Good pirates talk like pirates. The Pirate Bay honored the yearly Talk Like a Pirate Day.

Pirates of Sealand – 12 January, 2007

Perhaps one of the most ambitious plans. The Pirate Bay raised money to buy Sealand and form their own state. That never happened, the money was reportedly spent on trees instead.

OscarTorrents – 12 February, 2007

TPB promoting the OscarTorrents.com website where archivists were collecting pirated links to the latest Oscar-nominated movies.

North Korea – 01 April, 2007

Pirate Bay moves to North Korea on April 1st, causing a lot of confusion as well as some outrage.

Eurovisiontorrents.com – 08 May, 2007

Following the success of Oscartorrents, the Swedes from The Pirate Bay now promote a similar initiative for the Eurovision song contest.

Kopimi Klothing – 25 May, 2007

Every self-respecting website has its own merchandise store. The Pirate Bay had Kopimi clothing..

Pirates of the internets – 27 May, 2007


When the Hollywood blockbuster Pirates of the Caribbean: At World’s End leaked online, TPB made a fitting doodle linking to pirated copies.

The Torrent of Fire – 19 July, 2007

Harry Potter and the Deathly Hallows leaked online, and Pirate Bay’s logo leaked as well.

The Evergreen Terrace Bay – 27 July, 2007

The Pirate Bay celebrates the release of the first illegal CAM version of “The Simpsons Movie” with a new logo and t-shirt design.

Walk the plank – 21 September, 2007

The internal emails of anti-piracy outfit MediaDefender went public, revealing that they were indeed behind the video site MiiVi, and more…

The Global Icon Bay – 20 November, 2007

TPB praising its own achievement of becoming a global icon. “We won the ‘global icon’ award from the copy lobby!”

We need help! – 17 January, 2008

The Pirate Bay posted its version of a job application.

We wouldn’t steal – 19 January, 2008

When the European Parliament coalition Greens EFA launched a pro-filesharing campaign named “I Wouldn’t Steal,” Pirate Bay showed their support.

Jubilee – 31 January, 2008


“10 million peers. 1 million torrents. 2.5 million registered users. 100 blog entries. Jubilee!”

Valentines day – 14 February, 2008

The Pirate Bay shows off its romantic side.

Manifesta7 – 22 February, 2008

The Pirate Bay and the Bureau of Piracy start their journey throughout Europe, that will reach its climax at the art festival Manifesta.

Sinai – 01 April, 2008

The Pirate Bay keeps its arch-nemesis IFPI updated on the site’s whereabouts.

All your cops – 18 April, 2008

Hollywood buys police officers, according to The Pirate Bay, which is embroiled in a legal battle in Sweden.

Liberty Bay – 25 April, 2008

The Pirate Bay celebrates the release of Grand Theft Auto IV.

Tiamo Dirty Thirty – 27 April, 2008

Pirate Bay co-founder Fredrik Neij turned thirty. “All your NES are belong to him…”

Pirate Independence Day – 31 May, 2008

Two years after the Pirate Bay raid, the notorious torrent site declares May 31 “Pirate Independence Day.” “Today we celebrate that we’re united in our efforts. Keep on seeding!”

The Pirate Bat – 25 July, 2008

The Pirate Bay renamed the site into “The Pirate Bat“ and put up a new logo that links to a search for “The Dark Knight”.

The Beijing Bay – 17 August, 2008


The International Olympic Committee (IOC) asked the Swedish Minister of Justice for “assistance” to remove Olympic torrents from TPB. The site was not impressed.

The Beatrice Bay – 20 August, 2008

A few days later TPB asks its users to send their love to Beatrice Ask, the Swedish Minister of Justice at the time.

International Anti Piracy Day – 21 October, 2008

When Microsoft announced Global Anti-Piracy Day, The Pirate Bay blamed Bill Gates.

25 Million Peers – 15 November, 2008


Pirate Bay’s tracker served 25 million concurrent peers, which is more than the entire populations of Sweden, Norway, Finland, Iceland and Denmark combined.

Our fifth birthday! – 25 November, 2008


While the TPB-crew wasn’t certain that it was the right date (the tenth anniversary was in August), they celebrated anyway.

Happy new 1984! – 31 December, 2008


Ending 2008 with a call to action. “2009 turns out to be the year of surveillance. We need to fight that!”

Wasted can’t be wrong – 09 January, 2009

Leading up to the TPB-trial, the site reminds people that MPAA lawyer Monique Wadsted previously represented the Church of Scientology in a copyright case.

King Kong downloads – 18 February, 2009


The legendary King Kong defense.

Warner Brothers buys The Pirate Bay – 01 April, 2009

Pirate Bay announced that they settled their differences with Warner Bros. The largest BitTorrent tracker sold out to Hollywood, on April 1st.

Embassy of Piracy – 07 May, 2009

An important art institution is born, according to TPB. The Embassy of Piracy.

We are all The Pirate Bay – 15 May, 2009

Swedish artist Montt Mardié thought that The Pirate Bay and its following could use an anthem, so he decided to write one.

EU Election – 27 May, 2009


TPB reminded its visitors to vote in the EU election.

The Persian Bay – 17 June, 2009


TPB transformed into The Persian Bay and asked users to help out Iran. “Get your tunnelz goin!”

Hack the system – 07 December, 2010

Inspired by the French football legend Cantona, TPB calls in its users to ban Paypal after it kicked out Wikileaks.



Pirate Bay’s sysop decided to put his Christmas wishlist on the frontpage. “Freedom for all information!”

Blackout 4 hungary – 05 January, 2011


At a time where several new laws were being drafted to restrict people’s freedoms, TPB joined the Blackout for Hungary.

Protest time – 13 January, 2011

More protest.

TPB wins auction site – 01 April, 2011

The Pirate Bay reuses an old doodle on April first. “TPB will use the tools from eBay to make a better rating system for torrents. Then TPB will divide eBay up into smaller companies and sell to the highest bidders. We see no use for an auction site since most stuff is available for free.”

The Research Bay – 18 April, 2011

The Pirate Bay launched a new survey in collaboration with the Cybernorms research group at Sweden’s Lund University. As part of a sociology study, they hoped to find out more about people’s motivations to share.

You do not recieve freedom, you take it. – 09 May, 2011

In a slightly edited version of Winston Churchill’s “this was their finest hour” speech, replacing Nazi-Germany with MAFIAA, The Pirate Bay team declares war on Internet censorship advocates.

Happy birthday! – 15 September, 2011


The Pirate Bay turns eight years old. This time it’s in September. “One world one love!””

Belgian Beer, Belgian Blue, Belgian Block Belgian Bay – 04 October, 2011

The Belgian Anti-Piracy Federation succeeds in their quest to force two ISPs to block the famous torrent site. The next day TPB adds a new domain to bypass the blockade.

A new tool to avoid censorship! – 05 December, 2011

The Pirate Bay promotes Mafiaafire, an unblocking too that helps users to access blocked sites.

The Promo Bay! – 15 January, 2012


TPB launched The Promo Bay, an initiative to help artists expose their work to the world through the site’s frontpage. We won’t publish all promo’s here, just the first one below.

The Promo Bay proudly presents Paulo Coelho – 28 January, 2012

The first promo is none other than best selling author Paulo Coelho, who’s a file-sharing enthusiast and a supporter of The Pirate Bay.

Fight! – 01 February, 2012

Sweden’s Supreme Court announced that it would not grant an appeal in the Pirate Bay case. This means that the prison sentences and millions of dollars in fines previously handed out to the four defendants remained in place.

The Magnet Bay! – 28 February, 2012

TPB removed all popular torrent files and made the switch to magnet links. This was needed to make the site future proof, the team announced.

Suprbay! – 06 March, 2012

The Pirate Bay runs a promo for its own forum, Suprbay.

Greece sells airspace to TPB – 01 April, 2012

TPB memo on April 1st: “Political power in Athens, Greece, today signed an agreement with representatives for The Pirate Bay (TPB) about exclusive usage of the Greek airspace at 8000-9000ft.”

The Pirate Bay proudly promotes Dan Bull! – 23 April, 2012

With the track “Sharing is Caring”, Dan Bull tried to break into the UK and international singles charts with the help of a free Internet and BitTorrent. Not without success.

ACT NOW! – 03 May, 2012

The censorship button doodle was reused when The Pirate Bay was blocked in the UK.

The Hydra Bay! – 07 May, 2012


The Pirate Bay renamed itself The Hydra Bay today, linking it to PirateReverse.info, an information site that was dedicated to helping ‘blocked people’ to access TPB. The operator of this site was later arrested.

Act against Acta! – 07 June, 2012

TPB joins the widespread demonstrations against the Anti-Counterfeiting Trade Agreement (ACTA).

ACTA IS DEAD – 04 July, 2012


In a 478 to 39 vote, the European Parliament decided to reject ACTA.

Sign for Peter! – 14 July, 2012

Pirate Bay co-founder Peter Sunde submitted an emotional pardon plea to the Swedish authorities, hoping to avoid his prison sentence.

The Olympic Bay – 27 July, 2012


The TPB crew created another doodle for their friends at the International Olympic Committee, promoting their bi-annual gathering.

9th birthday – 14 September, 2012

Time flies. But at least it’s September again.

The Pirate Bay Party! – 09 October, 2012


The Pirate Bay is already looking forward to its tenth anniversary, which they will celebrate in August…

The Pirate Bay moves to the cloud – 17 October, 2012


From this day, The Pirate Bay will serve its users from several cloud hosting providers scattered around the world.

Support Richard from being extradited to the US! – 25 October, 2012

TPB backs efforts to prevent UK student Richard O’Dwyer from being extradited to the United States. Whether it helped or not, the extradition was stopped.

Merry a’rr a’rr! – 24 December, 2012

TPB encouraged its users to sent cards, letters, and gifts to co-founder Gottfrid Svartholm, who was in prison at the time.

TPB AFK – 08 February, 2013


TPB-AFK, the documentary about The Pirate Bay and its founders, was released. The film follows the lives of the three Pirate Bay founders during their trials in Sweden.

The Hydra Bay – 25 February, 2013

New Provider For TPB – 04 March, 2013

The Pirate Bay moves the site to North Korea. For real. Or?

Fuck yeah! – 01 April, 2013


After its failed experiment in North Korea, The Pirate Bay has set course to the land of the free, the United States of America.

Take a look at what these guys are doing! – 08 July, 2013

The Pirate Bay promotes a charity project.

PARTY PARTY PARTY! – 18 July, 2013


The 10 year anniversary is coming, and TPB is hosting a massive party!

Happy birthday! – 10 August, 2013


The Pirate Bay celebrates its 10th anniversary, in August.

ThePirateBay.PE – 13 December, 2013


Facing legal uncertainty, The Pirate Bay moves to a .PE domain name, the fifth domain is 2013.

Let him at least read some books for fucks sake! – 07 January, 2014

No books? More than 100,000 signatures on a petition to improve the prison circumstances of Pirate Bay founder Gottfrid Svartholm, appear to have had an effect.

Free the pirates! – 10 July, 2014

TPB encouraged its users to write to the site’s imprisoned co-founders. This doodle reappeared several times.

The Pirate Bay rises again – 29 January, 2015


The Pirate Bay reappears after more than a month of downtime, following a raid on the Nacka station, a nuclear-proof datacenter built into a mountain complex.

New domain names – 19 May, 2015

The Pirate Bay adds several new domain names. A new and improved hydra was born, although it didn’t last very long.

Raid? – 21 September, 2015

Raid? What raid? The Pirate Bay denies that they were critically hit by the police raid a few months earlier.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN reviews, discounts, offers and coupons.

Конкурси… и алманаси :)

Post Syndicated from Григор original http://www.gatchev.info/blog/?p=2131

Две обяви, насочени към всички любители на фантастиката:

1

НА ВАШЕТО ВНИМАНИЕ – „ФАНТАSTIKA 2017“

Излезе от печат осмият пореден алманах „ФантАstika“. Негов съставител, както винаги досега, е Атанас П. Славов – председател на Дружеството на българските фантасти „Тера Фантазия“.
Алманахът е интересен не само за читателите, запознати с предишните ежегодници, но и за ценителите на супержанра (във всичките му форми), които за пръв път ще вземат това издание в ръцете си.

Преводните автори са застъпени с оригинална новела на аржентинката Тереса Мира де Ечеверия, класически разказ на американеца Томас Шеред и една творба от македонския фантаст Никола Суботич, наскоро отличена в конкурса „Агоп Мелконян“.

В големия раздел на родните фантасти ще се срещнете както с доайена Христо Пощаков, представен като майстор на научната фантастика, фентъзито и хумора, така и с нови произведения от Ценка Бакърджиева, Валентин Д. Иванов, Мартин Петков, Янчо Чолаков, а също и с приказка от дебютната книга на Мел.

И сега разделът „Фантастология“ е посветен на обзори и тенденции в развитието на нашата и световната фантастика, плюс задочни срещи с класици като Светослав Минков и Елин Пелин, видени през погледа на Боряна Владимирова и Александър Карапанчев. Няколко статии разглеждат испаноезични писателки, руски тематични направления в модерната НФ, българската фантастика в нова аудио форма и последния брой на списание „Тера фантастика“.

В раздела „Съзвездие Кинотавър“ ще се запознаете с някои от актуалните екранизации на фантастични романи, с англичанина, създал сценария на „Изкуствен интелект“, и с шеговит комикс (за това как на Кубрик му е изглеждало бъдещето през 2019 година).

Броят обявява уникалния по темата си конкурс „Изгревът на следващото“ – за разкази, посветени на едно желаемо бъдеще. Разделът „Футурум“ включва статии за новите информационни религии, несъстояли се финали на света и особено любопитна фаКтастика.

И още по страниците на този алманах: подбрани картини от художника Андриан Бекяров… пристрастен репортаж за Еврокон 2017 в Дортмунд… поезия… и много други събития от неизчерпаемата сфера на въображението.

За повече информация: http://choveshkata.net/blog/?p=6617.

2

Дружество на българските фантасти „Тера Фантазия“ и фондация „Човешката библиотека“ канят всички автори да участват в първия Конкурс „Изгревът на следващото“.

В момента се провежда не един конкурс за български художествени текстове, но този е единственият, който има за тема възможното движение към позитивно бъдеще. Днес, в епохата на ширещи се антиутопии и безкритично катастрофично мислене, се изисква истинска интелектуална смелост, за да потърсим формите за Изхода. Смелост да допуснем, че Човешкият дух е в състояние да намери пътя си към по-високото ниво, интелект да си го представим и талант да го защитим художествено.

Какво е решението на задачата, наречена „Кризисно съвремие“?

Какво е решението, което води до по-висше състояние на ЧоВечността и Човечеството, към бъдеще, в което ЧоВечният Разум е надрасъл безчовечното невежество?

Какво е решението, което ще създаде свят, в който науките и технологиите ще се развиват, за да расте качеството на Човека, а не богатствата на единици?

Какво е решението, което ще избегне застиналите утопиянства, където позьорис бели хитони рецитират един на друг надути речи?

Конкурсът „Изгревът на следващото“ ще бъде мястото, където ще се публикуват истории, посветени на това търсене. Произведения, които с художествен талант и моделираща сила ще защитават нови светове от този вид по един от следните два начина:

  • По спиралата към следващото: Съдби на индивиди и общества, търсещи изхода от съвременното кризисно състояние на света ни; образи на учени, мислители и обикновени хора, напипващи в мрака на неизвестното пътищата към тази цел; приключения на личности, въвлечени в такъв спирален процес и постепенно осъзнаващи смисъла му.
  • Визии на следващото: Изграждане на образи, възникнали в нашето съвремие, но носещи белезите на новото, притежаващи вътрешната свобода, въпреки че са затворени в клетката на настоящата социална несвобода; образи на групи и общества, постигнали белези на следващото, без ескейпизъм, фанатизъм и аскетизъм. Хуманитарни технологии, водещи до освобождаване от опредметяването, разкриващи етическите и интелектуалните ресурси на ЧоВечното. Непротиворечиви и реалистично обрисувани общества на бъдещето, в които всяка личност е пълноценно разгърната и осъществена, без да зависи или да бъде притежавана от друга.

Приемливи са всички жанрове – достатъчно е разказите да засягат поне една от горните две теми.

Крайният срок за участие е 1 юни 2018 г.

Трите най-високо класирани разказа ще получат награди по 200 лв. и заедно с други подбрани заглавия от конкурса ще бъдат публикувани в следващите издания на алманаха „ФантАstika“.

Пълните условия са описани в сайта на Човешката библиотека: http://choveshkata.net/blog/?p=6668

Там ще откриете и най-актуална информация в случай на промени.

SoFi, the underwater robotic fish

Post Syndicated from Alex Bate original https://www.raspberrypi.org/blog/robotic-fish/

With the Greenland shark finally caught on video for the very first time, scientists and engineers are discussing the limitations of current marine monitoring technology. One significant advance comes from the CSAIL team at Massachusetts Institute of Technology (MIT): SoFi, the robotic fish.

A Robotic Fish Swims in the Ocean

More info: http://bit.ly/SoFiRobot Paper: http://robert.katzschmann.eu/wp-content/uploads/2018/03/katzschmann2018exploration.pdf

The untethered SoFi robot

Last week, the Computer Science and Artificial Intelligence Laboratory (CSAIL) team at MIT unveiled SoFi, “a soft robotic fish that can independently swim alongside real fish in the ocean.”

MIT CSAIL underwater fish SoFi using Raspberry Pi

Directed by a Super Nintendo controller and acoustic signals, SoFi can dive untethered to a maximum of 18 feet for a total of 40 minutes. A Raspberry Pi receives input from the controller and amplifies the ultrasound signals for SoFi via a HiFiBerry. The controller, Raspberry Pi, and HiFiBerry are sealed within a waterproof, cast-moulded silicone membrane filled with non-conductive mineral oil, allowing for underwater equalisation.

MIT CSAIL underwater fish SoFi using Raspberry Pi

The ultrasound signals, received by a modem within SoFi’s head, control everything from direction, tail oscillation, pitch, and depth to the onboard camera.

As explained on MIT’s news blog, “to make the robot swim, the motor pumps water into two balloon-like chambers in the fish’s tail that operate like a set of pistons in an engine. As one chamber expands, it bends and flexes to one side; when the actuators push water to the other channel, that one bends and flexes in the other direction.”

MIT CSAIL underwater fish SoFi using Raspberry Pi

Ocean exploration

While we’ve seen many autonomous underwater vehicles (AUVs) using onboard Raspberry Pis, SoFi’s ability to roam untethered with a wireless waterproof controller is an exciting achievement.

“To our knowledge, this is the first robotic fish that can swim untethered in three dimensions for extended periods of time. We are excited about the possibility of being able to use a system like this to get closer to marine life than humans can get on their own.” – CSAIL PhD candidate Robert Katzschmann

As the MIT news post notes, SoFi’s simple, lightweight setup of a single camera, a motor, and a smartphone lithium polymer battery set it apart it from existing bulky AUVs that require large motors or support from boats.

For more in-depth information on SoFi and the onboard tech that controls it, find the CSAIL team’s paper here.

The post SoFi, the underwater robotic fish appeared first on Raspberry Pi.

Owner of ShareBeast and AlbumJams Sentenced To Five Years in Prison

Post Syndicated from Andy original https://torrentfreak.com/owner-of-sharebeast-and-albumjams-sentenced-to-five-years-in-prison-180323/

According to the RIAA, ShareBeast.com and AlbumJams.com were responsible for the illegal distribution of “a massive library” of popular albums and tracks.

With a nod to the sensitivity of pre-release piracy, the sites were blamed for offering “thousands of songs” that hadn’t yet reached their official release dates. In September 2015, U.S. authorities shut them down, placing seizure notices on both domains.

The RIAA claimed that ShareBeast was the largest illegal file-sharing site operating in the United States, noting that the site’s IP addresses at the time indicated that at least some hosting had taken place in Illinois.

“Millions of users accessed songs from ShareBeast each month without one penny of compensation going to countless artists, songwriters, labels and others who created the music,” RIAA Chairman & CEO Cary Sherman commented at the time.

Two years later in September 2017, then 29-year-old former ShareBeast operator Artur Sargsyan pleaded guilty to one felony count of criminal copyright infringement, admitting to the unauthorized distribution and reproduction of over one billion copies of copyrighted works.

“Through Sharebeast and other related sites, this defendant profited by illegally distributing copyrighted music and albums on a massive scale,” said U. S. Attorney John Horn.

“The collective work of the FBI and our international law enforcement partners have shut down the Sharebeast websites and prevented further economic losses by scores of musicians and artists.”

The Department of Justice reported that from 2012 to 2015, Sargsyan used ShareBeast as a pirate music repository, illegally hosting music by Ariana Grande, Katy Perry, Beyonce, Kanye West, and Justin Bieber, among others. Sargsyan linked to that content from Newjams.net and Albumjams.com, and granted access to the public.

If Sargsyan had responded to takedown notices more positively, it’s possible that things may have progressed in a different direction. The RIAA sent the site more than 100 copyright-infringement emails over a three-year period but to no effect.

This led the music industry group to get out its calculator and inform the DoJ that the total monetary loss to its member companies was “a conservative” $6.3 billion “gut-punch” to music creators who were paid nothing by the service.

Given the huge numbers involved, it’s likely that Sargsyan hoped his 2017 guilty plea would result in a more forgiving sentence. Yesterday, however, the full weight of the law came crashing down.

California resident Artur Sargsyan was sentenced by U.S. District Judge Timothy C. Batten, Sr., to five years in prison, followed by three years of supervised release. The now 30-year-old was also ordered to pay $458,200 restitution and ordered to forfeit $184,768.87.

“Sargsyan operated one of the most successful illegal music sharing websites on the Internet,” said U.S. Attorney Byung J. “BJay” Pak.

“His reproduction of copyrighted musical works were made available only to generate undeserved profits for himself. The incredible work done by our law enforcement partners and prosecutors in light of the complexity of Sargsyan’s operation demonstrates that we will employ all of our resources to stop this kind of theft.”

David J. LaValley, Special Agent in Charge of FBI Atlanta, said that Sargsyan was warned several times that he was violating the law by illegally sharing copyrighted works, but chose to ignore the warnings.

“His sentence sends a message that no matter how complex the operation, the FBI, its federal partners and law enforcement partners around the globe will go to every length to protect the property of hard working artists and the companies that produce their art,” LaValley said.

Given the music group’s lengthy statements on the Sharebeast topic in the past, thus far the RIAA has been relatively brief. Welcoming news of the sentencing via Twitter, the major labels’ figurehead congratulated the law enforcement bodies behind the successful prosecution.

“Congrats to U.S. Attorney BJay Pak + his team along with @TheJusticeDept CCIPS Division and @FBIAtlanta for their leadership on this important case,” the RIAA wrote.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN reviews, discounts, offers and coupons.

Auto Scaling is now available for Amazon SageMaker

Post Syndicated from Ana Visneski original https://aws.amazon.com/blogs/aws/auto-scaling-is-now-available-for-amazon-sagemaker/

Kumar Venkateswar, Product Manager on the AWS ML Platforms Team, shares details on the announcement of Auto Scaling with Amazon SageMaker.


With Amazon SageMaker, thousands of customers have been able to easily build, train and deploy their machine learning (ML) models. Today, we’re making it even easier to manage production ML models, with Auto Scaling for Amazon SageMaker. Instead of having to manually manage the number of instances to match the scale that you need for your inferences, you can now have SageMaker automatically scale the number of instances based on an AWS Auto Scaling Policy.

SageMaker has made managing the ML process easier for many customers. We’ve seen customers take advantage of managed Jupyter notebooks and managed distributed training. We’ve seen customers deploying their models to SageMaker hosting for inferences, as they integrate machine learning with their applications. SageMaker makes this easy –  you don’t have to think about patching the operating system (OS) or frameworks on your inference hosts, and you don’t have to configure inference hosts across Availability Zones. You just deploy your models to SageMaker, and it handles the rest.

Until now, you have needed to specify the number and type of instances per endpoint (or production variant) to provide the scale that you need for your inferences. If your inference volume changes, you can change the number and/or type of instances that back each endpoint to accommodate that change, without incurring any downtime. In addition to making it easy to change provisioning, customers have asked us how we can make managing capacity for SageMaker even easier.

With Auto Scaling for Amazon SageMaker, in the SageMaker console, the AWS Auto Scaling API, and the AWS SDK, this becomes much easier. Now, instead of having to closely monitor inference volume, and change the endpoint configuration in response, customers can configure a scaling policy to be used by AWS Auto Scaling. Auto Scaling adjusts the number of instances up or down in response to actual workloads, determined by using Amazon CloudWatch metrics and target values defined in the policy. In this way, customers can automatically adjust their inference capacity to maintain predictable performance at a low cost. You simply specify the target inference throughput per instance and provide upper and lower bounds for the number of instances for each production variant. SageMaker will then monitor throughput per instance using Amazon CloudWatch alarms, and then it will adjust provisioned capacity up or down as needed.

After you configure the endpoint with Auto Scaling, SageMaker will continue to monitor your deployed models to automatically adjust the instance count. SageMaker will keep throughput within desired levels, in response to changes in application traffic. This makes it easier to manage models in production, and it can help reduce the cost of deployed models, as you no longer have to provision sufficient capacity in order to manage your peak load. Instead, you configure the limits to accommodate your minimum expected traffic and the maximum peak, and Amazon SageMaker will work within those limits to minimize cost.

How do you get started? Open the SageMaker console. For existing endpoints, you first access the endpoint to modify the settings.


Then, scroll to the Endpoint runtime settings section, select the variant, and choose Configure auto scaling.


First, configure the minimum and maximum number of instances.

Next, choose the throughput per instance at which you want to add an additional instance, given previous load testing.

You can optionally set cool down periods for scaling in or out, to avoid oscillation during periods of wide fluctuation in workload. If not, SageMaker will assume default values.

And that’s it! You now have an endpoint that will automatically scale with increasing inferences.

You pay for the capacity used at regular SageMaker pay-as-you-go pricing, so you no longer have to pay for unused capacity during relative idle periods!

Auto Scaling in Amazon SageMaker is available today in the US East (N. Virginia & Ohio), EU (Ireland), and U.S. West (Oregon) AWS regions. To learn more, see the Amazon SageMaker Auto Scaling documentation.


Kumar Venkateswar is a Product Manager in the AWS ML Platforms team, which includes Amazon SageMaker, Amazon Machine Learning, and the AWS Deep Learning AMIs. When not working, Kumar plays the violin and Magic: The Gathering.

 

 

 

 


 

 

Facebook Will Verify the Physical Location of Ad Buyers with Paper Postcards

Post Syndicated from Bruce Schneier original https://www.schneier.com/blog/archives/2018/02/facebook_will_v.html

It’s not a great solution, but it’s something:

The process of using postcards containing a specific code will be required for advertising that mentions a specific candidate running for a federal office, Katie Harbath, Facebook’s global director of policy programs, said. The requirement will not apply to issue-based political ads, she said.

“If you run an ad mentioning a candidate, we are going to mail you a postcard and you will have to use that code to prove you are in the United States,” Harbath said at a weekend conference of the National Association of Secretaries of State, where executives from Twitter Inc and Alphabet Inc’s Google also spoke.

“It won’t solve everything,” Harbath said in a brief interview with Reuters following her remarks.

But sending codes through old-fashioned mail was the most effective method the tech company could come up with to prevent Russians and other bad actors from purchasing ads while posing as someone else, Harbath said.

It does mean a several-days delay between purchasing an ad and seeing it run.

Embedding a Tweet Can be Copyright Infringement, Court Rules

Post Syndicated from Ernesto original https://torrentfreak.com/embedding-a-tweet-can-be-copyright-infringement-court-rules-180216/

Nowadays it’s fairly common for blogs and news sites to embed content posted by third parties, ranging from YouTube videos to tweets.

Although these publications don’t host the content themselves, they can be held liable for copyright infringement, a New York federal court has ruled.

The case in question was filed by Justin Goldman whose photo of Tom Brady went viral after he posted it on Snapchat. After being reposted on Reddit, it also made its way onto Twitter from where various news organizations picked it up.

Several of these news sites reported on the photo by embedding tweets from others. However, since Goldman never gave permission to display his photo, he went on to sue the likes of Breitbart, Time, Vox and Yahoo, for copyright infringement.

In their defense, the news organizations argued that they did nothing wrong as no content was hosted on their servers. They referred to the so-called “server test” that was applied in several related cases in the past, which determined that liability rests on the party that hosts the infringing content.

In an order that was just issued, US District Court Judge Katherine Forrest disagrees. She rejects the “server test” argument and rules that the news organizations are liable.

“[W]hen defendants caused the embedded Tweets to appear on their websites, their actions violated plaintiff’s exclusive display right; the fact that the image was hosted on a server owned and operated by an unrelated third party (Twitter) does not shield them from this result,” Judge Forrest writes.

Judge Forrest argues that the server test was established in the ‘Perfect 10 v. Amazon’ case, which dealt with the ‘distribution’ of content. This case is about ‘displaying’ an infringing work instead, an area where the jurisprudence is not as clear.

“The Court agrees with plaintiff. The plain language of the Copyright Act, the legislative history undergirding its enactment, and subsequent Supreme Court jurisprudence provide no basis for a rule that allows the physical location or possession of an image to determine who may or may not have “displayed” a work within the meaning of the Copyright Act.”

As a result, summary judgment was granted in favor of Goldman.

Rightsholders, including Getty Images which supported Goldman, are happy with the result. However, not everyone is pleased. The Electronic Frontier Foundation (EFF) says that if the current verdict stands it will put millions of regular Internet users at risk.

“Rejecting years of settled precedent, a federal court in New York has ruled that you could infringe copyright simply by embedding a tweet in a web page,” EFF comments.

“Even worse, the logic of the ruling applies to all in-line linking, not just embedding tweets. If adopted by other courts, this legally and technically misguided decision would threaten millions of ordinary Internet users with infringement liability.”

Given what’s at stake, it’s likely that the news organization will appeal this week’s order.

Interestingly, earlier this week a California district court dismissed Playboy’s copyright infringement complaint against Boing Boing, which embedded a YouTube video that contained infringing content.

A copy of Judge Forrest’s opinion can be found here (pdf).

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN discounts, offers and coupons

MPA Met With Russian Site-Blocking Body to Discuss Piracy

Post Syndicated from Andy original https://torrentfreak.com/mpa-met-with-russian-site-blocking-body-to-discuss-piracy-180209/

Given Russia’s historical reputation for having a weak approach to online piracy, the last few years stand in stark contrast to those that went before.

Overseen by telecoms watchdog Rozcomnadzor, Russia now has one of the toughest site-blocking regimes in the whole world. It’s possible to have entire sites blocked in a matter of days, potentially over a single piece of infringing content. For persistent offenders, permanent blocking is now a reality.

While that process requires the involvement of the courts, the subsequent blocking of mirror sites does not, with Russia blocking more than 500 since a new law was passed in October 2017.

With anti-piracy measures now a force to be reckoned with in Russia, it’s emerged that last week Stan McCoy, president of the Motion Picture Association’s EMEA division, met with telecoms watchdog Roskomnadzor in Moscow.

McCoy met with Rozcomnadzor chief Alexander Zharov last Friday, in a meeting that was also attended by Ekaterina Mironova, head of the anti-piracy committee of the Media Communication Union (ISS).

According to Rozcomnadzor, issues discussed included copyright-related legislation and regulation. Also on the agenda was the strengthening of international cooperation, including between public organizations representing the interests of rightholders.

“In particular, an agreement was reached to expand contacts between the MPAA and the ISS,” Rozcomnadzor notes.

The ISS (known locally as Media-Communication Union MKC) was founded by the largest Russian media companies and telecom operators in February 2014. It differentiates itself from other organizations with the claim that its the first group of its type to represent the interests of communications companies, rights holders, broadcasters and large distributors.

During the meeting, McCoy was given an update on Russia’s implementation of the various anti-piracy laws introduced and developed since May 2015.

“Since the introduction of the anti-piracy laws, Roskomnadzor has received more than 2,800 rulings from the Moscow City Court on the adoption of preliminary provisional [blocking] measures to protect copyright on the Internet, including 1,630 for movies,” the watchdog reveals.

“In connection with the deletion of pirated content, access to the territory of Russia was restricted for 1,547 Internet resources. Based on the decisions of the Moscow City Court, 752 pirated sites are now permanently blocked, and according to the decisions of the Ministry of Communications, more than 600 ‘mirrors’ of these resources are blocked too.”

While it’s normally the position of the US to criticize Russia for not doing enough to tackle piracy, it must’ve been interesting to participate in a meeting where for once the Russians had the upper hand. Even though the MPAA previously campaigned for one, there is no site-blocking mechanism in the United States.

“The fight against piracy stimulates the growth of the legal online video market in Russia. Attendance of legal online sites is constantly growing. Users are attracted to high-quality content for an affordable fee,” Rozcomnadzor concludes.

The meeting’s participants will join up again during the St. Petersburg International Economic Forum scheduled to take place May 24-26.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN discounts, offers and coupons

UK Government Teaches 7-Year-Olds That Piracy is Stealing

Post Syndicated from Ernesto original https://torrentfreak.com/uk-government-teaches-7-year-olds-that-piracy-is-stealing-180118/

In 2014, Mike Weatherley, the UK Government’s top IP advisor at the time, offered a recommendation that copyright education should be added to the school curriculum, starting with the youngest kids in primary school.

New generations should learn copyright moral and ethics, the idea was, and a few months later the first version of the new “Cracking Ideas” curriculum was made public.

In the years that followed new course material was added, published by the UK’s Intellectual Property Office (IPO) with support from the local copyright industry. The teaching material is aimed at a variety of ages, including those who have just started primary school.

Part of the education features a fictitious cartoon band called Nancy and the Meerkats. With help from their manager, they learn key copyright insights and this week several new videos were published, BBC points out.

The videos try to explain concepts including copyright, trademarks, and how people can protect the things they’ve created. Interestingly, the videos themselves use names of existing musicians, with puns such as Ed Shealing, Justin Beaver, and the evil Kitty Perry. Even Nancy and the Meerkats appears to be a play on the classic 1970s cartoon series Josie and the Pussycats, featuring a pop band of the same name.

The play on Ed Sheeran’s name is interesting, to say the least. While he’s one of the most popular artists today, he also mentioned in the past that file-sharing made his career.

“…illegal fire sharing was what made me. It was students in England going to university, sharing my songs with each other,” Sheeran said in an interview with CBS last year.

But that didn’t stop the IPO from using his likeness for their anti-file-sharing campaign. According to Catherine Davies of IPO’s education outreach department, knowledge about key intellectual property issues is a “life skill” nowadays.

“In today’s digital environment, even very young people are IP consumers, accessing online digital content independently and regularly,” she tells the BBC. “A basic understanding of IP and a respect for others’ IP rights is therefore a key life skill.”

While we doubt that these concepts will appeal to the average five-year-old, the course material does it best to simplify complex copyright issues. Perhaps that’s also where the danger lies.

The program is in part backed by copyright-reliant industries, who have a different view on the matter than many others. For example, a previously published video of Nancy and the Meerkats deals with the topic of file-sharing.

After the Meerkats found out that people were downloading their tracks from pirate sites and became outraged, their manager Big Joe explained that file-sharing is just the same as stealing a CD from a physical store.

“In a way, all those people who downloaded free copies are doing the same thing as walking out of the shop with a CD and forgetting to go the till,” he says.

“What these sites are doing is sometimes called piracy. It not only affects music but also videos, books, and movies.If someone owns the copyright to something, well, it is stealing. Simple as that,” Big Joe adds.

The Pirates of the Internet!

While we won’t go into the copying vs. stealing debate, it’s interesting that there is no mention of more liberal copyright licenses. There are thousands of artists who freely share their work after all, by adopting Creative Commons licenses for example. Downloading these tracks is certainly not stealing.

Jim Killock, director of the Open Rights Group, notes that the campaign is a bit extreme at points.

“Infringing copyright is a bad thing, but it is not the same as physical theft. Many children will guess that making a copy is not the same as making off with the local store’s chocolate bars,” he says.

“Children aren’t born bureaucrats, and they are surrounded by stupid rules made by stupid adults. Presumably, the IPO doesn’t want children to conclude that copyright is just another one, so they should be a bit more careful with how they explain things.”

Killock also stresses that children copy a lot of things in school, which would normally violate copyright. However, thanks to the educational exceptions they’re not getting in trouble. The IPO could pay more attention to these going forward.

Perhaps Nancy and the Meerkats could decide to release a free to share track in a future episode, for example, and encourage kids to use it for their own remixes, or other creative projects. Creativity and copyright are not all about restrictions, after all.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN discounts, offers and coupons

timeShift(GrafanaBuzz, 1w) Issue 29

Post Syndicated from Blogs on Grafana Labs Blog original https://grafana.com/blog/2018/01/12/timeshiftgrafanabuzz-1w-issue-29/

Welcome to TimeShift

intro paragraph


Latest Stable Release

Grafana 4.6.3 is now available. Latest bugfixes include:

  • Gzip: Fixes bug Gravatar images when gzip was enabled #5952
  • Alert list: Now shows alert state changes even after adding manual annotations on dashboard #99513
  • Alerting: Fixes bug where rules evaluated as firing when all conditions was false and using OR operator. #93183
  • Cloudwatch: CloudWatch no longer display metrics’ default alias #101514, thx @mtanda

Download Grafana 4.6.3 Now


From the Blogosphere

Graphite 1.1: Teaching an Old Dog New Tricks: Grafana Labs’ own Dan Cech is a contributor to the Graphite project, and has been instrumental in the addition of some of the newest features. This article discusses five of the biggest additions, how they work, and what you can expect for the future of the project.

Instrument an Application Using Prometheus and Grafana: Chris walks us through how easy it is to get useful metrics from an application to understand bottlenecks and performace. In this article, he shares an application he built that indexes your Gmail account into Elasticsearch, and sends the metrics to Prometheus. Then, he shows you how to set up Grafana to get meaningful graphs and dashboards.

Visualising Serverless Metrics With Grafana Dashboards: Part 3 in this series of blog posts on “Monitoring Serverless Applications Metrics” starts with an overview of Grafana and the UI, covers queries and templating, then dives into creating some great looking dashboards. The series plans to conclude with a post about setting up alerting.

Huawei FAT WLAN Access Points in Grafana: Huawei’s FAT firmware for their WLAN Access points lacks central management overview. To get a sense of the performance of your AP’s, why not quickly create a templated dashboard in Grafana? This article quickly steps your through the process, and includes a sample dashboard.


Grafana Plugins

Lots of updated plugins this week. Plugin authors add new features and fix bugs often, to make your plugin perform better – so it’s important to keep your plugins up to date. We’ve made updating easy; for on-prem Grafana, use the Grafana-cli tool, or update with 1 click if you’re using Hosted Grafana.

UPDATED PLUGIN

Clickhouse Data Source – The Clickhouse Data Source plugin has been updated a few times with small fixes during the last few weeks.

  • Fix for quantile functions
  • Allow rounding with round option for both time filters: $from and $to

Update

UPDATED PLUGIN

Zabbix App – The Zabbix App had a release with a redesign of the Triggers panel as well as support for Multiple data sources for the triggers panel

Update

UPDATED PLUGIN

OpenHistorian Data Source – this data source plugin received some new query builder screens and improved documentation.

Update

UPDATED PLUGIN

BT Status Dot Panel – This panel received a small bug fix.

Update

UPDATED PLUGIN

Carpet Plot Panel – A recent update for this panel fixes a D3 import bug.

Update


Upcoming Events

In between code pushes we like to speak at, sponsor and attend all kinds of conferences and meetups. We also like to make sure we mention other Grafana-related events happening all over the world. If you’re putting on just such an event, let us know and we’ll list it here.

Women Who Go Berlin: Go Workshop – Monitoring and Troubleshooting using Prometheus and Grafana | Berlin, Germany – Jan 31, 2018: In this workshop we will learn about one of the most important topics in making apps production ready: Monitoring. We will learn how to use tools you’ve probably heard a lot about – Prometheus and Grafana, and using what we learn we will troubleshoot a particularly buggy Go app.

Register Now

FOSDEM | Brussels, Belgium – Feb 3-4, 2018: FOSDEM is a free developer conference where thousands of developers of free and open source software gather to share ideas and technology. There is no need to register; all are welcome.

Jfokus | Stockholm, Sweden – Feb 5-7, 2018:
Carl Bergquist – Quickie: Monitoring? Not OPS Problem

Why should we monitor our system? Why can’t we just rely on the operations team anymore? They use to be able to do that. What’s currently changing? Presentation content: – Why do we monitor our system – How did it use to work? – Whats changing – Why do we need to shift focus – Everyone should be on call. – Resilience is the goal (Best way of having someone care about quality is to make them responsible).

Register Now

Jfokus | Stockholm, Sweden – Feb 5-7, 2018:
Leonard Gram – Presentation: DevOps Deconstructed

What’s a Site Reliability Engineer and how’s that role different from the DevOps engineer my boss wants to hire? I really don’t want to be on call, should I? Is Docker the right place for my code or am I better of just going straight to Serverless? And why should I care about any of it? I’ll try to answer some of these questions while looking at what DevOps really is about and how commodisation of servers through “the cloud” ties into it all. This session will be an opinionated piece from a developer who’s been on-call for the past 6 years and would like to convince you to do the same, at least once.

Register Now

Stockholm Metrics and Monitoring | Stockholm, Sweden – Feb 7, 2018:
Observability 3 ways – Logging, Metrics and Distributed Tracing

Let’s talk about often confused telemetry tools: Logging, Metrics and Distributed Tracing. We’ll show how you capture latency using each of the tools and how they work differently. Through examples and discussion, we’ll note edge cases where certain tools have advantages over others. By the end of this talk, we’ll better understand how each of Logging, Metrics and Distributed Tracing aids us in different ways to understand our applications.

Register Now

OpenNMS – Introduction to “Grafana” | Webinar – Feb 21, 2018:
IT monitoring helps detect emerging hardware damage and performance bottlenecks in the enterprise network before any consequential damage or disruption to business processes occurs. The powerful open-source OpenNMS software monitors a network, including all connected devices, and provides logging of a variety of data that can be used for analysis and planning purposes. In our next OpenNMS webinar on February 21, 2018, we introduce “Grafana” – a web-based tool for creating and displaying dashboards from various data sources, which can be perfectly combined with OpenNMS.

Register Now

GrafanaCon EU | Amsterdam, Netherlands – March 1-2, 2018:
Lock in your seat for GrafanaCon EU while there are still tickets avaialable! Join us March 1-2, 2018 in Amsterdam for 2 days of talks centered around Grafana and the surrounding monitoring ecosystem including Graphite, Prometheus, InfluxData, Elasticsearch, Kubernetes, and more.

We have some exciting talks lined up from Google, CERN, Bloomberg, eBay, Red Hat, Tinder, Automattic, Prometheus, InfluxData, Percona and more! Be sure to get your ticket before they’re sold out.

Learn More


Tweet of the Week

We scour Twitter each week to find an interesting/beautiful dashboard and show it off! #monitoringLove

Nice hack! I know I like to keep one eye on server requests when I’m dropping beats. 😉


Grafana Labs is Hiring!

We are passionate about open source software and thrive on tackling complex challenges to build the future. We ship code from every corner of the globe and love working with the community. If this sounds exciting, you’re in luck – WE’RE HIRING!

Check out our Open Positions


How are we doing?

Thanks for reading another issue of timeShift. Let us know what you think! Submit a comment on this article below, or post something at our community forum.

Follow us on Twitter, like us on Facebook, and join the Grafana Labs community.

Pirate Bay Founder: Netflix and Spotify Are a Threat, No Solution

Post Syndicated from Ernesto original https://torrentfreak.com/pirate-bay-founder-netflix-and-spotify-are-a-threat-no-solution-180107/

Ten years ago the Internet was an entirely different place. Piracy was rampant, as it is today, but the people behind the largest torrent sites were more vocal then.

There was a battle going on for the right to freely share content online. This was very much a necessity at the time, as legal options were scarce, but for many it was also an idealistic battle.

As the spokesperson of The Pirate Bay, Peter Sunde was one of the leading voices at the time. He believed, and still does, that people should be able to share anything without restrictions. Period.

For Peter and three others associated with The Pirate Bay, this eventually resulted in jail sentences. They were not the only ones to feel the consequences. Over the past decade, dozens of torrent sites were shut down under legal pressure, forcing those operators that remain to go into hiding.

Today, ten years after we spoke to Peter about the future of torrent sites and file-sharing, we reach out to him again. A lot has changed, but how does The Pirate Bay’s co-founder look at things now?

“On the personal side, all is great, and I’m working on a TV-series about activism that will air next year. On top of that of course working on Njalla, Ipredator and other known projects,” Peter says.

“In general, I think that projects for me are still about the same thing as a decade ago, but just trying different approaches!”

While Peter stays true to his activist roots, fighting for privacy and freedom on the Internet, his outlook is not as positive as it once was.

He is proud that The Pirate Bay never caved and that they fought their cases to the end. The moral struggle was won, but he also realizes that the greater battle was lost.

“I’m proud and happy to be able to look myself in the mirror every morning with a feeling of doing right. A lot of corrupt people involved in our cases probably feel quite shitty. Well, if they have feelings,” Peter says.

The Pirate Bay’s former spokesperson doesn’t have any regrets really. The one thing that comes to mind, when we ask about things that he would have done differently, is to tell fellow Pirate Bay founder Anakata to encrypt his hard drive.

Brokep (Peter) and Anakata (Gottfrid)

Looking at the current media climate, Peter doesn’t think we are better off. On the contrary. While it might be easier in some counties to access content legally online, this also means that control is now firmly in the hands of a few major companies.

The Pirate Bay and others always encouraged free sharing for creators and consumers. This certainly hasn’t improved. Instead, media today is contained in large centralized silos.

“I’m surprised that people are so short-sighted. The ‘solution’ to file sharing was never centralizing content control back to a few entities – that was the struggle we were fighting for.

“Netflix, Spotify etc are not a solution but a loss. And it surprises me that the pirate movement is not trying to talk more about that,” he adds.

The Netflixes and Spotifies of this world are often portrayed as a solution to piracy. However, Peter sees things differently. He believes that these services put more control in the hands of powerful companies.

“The same companies we fought own these platforms. Either they own the shares in the companies, or they have deals with them which makes it impossible for these companies to not follow their rules.

“Artists can’t choose to be or not to be on Spotify in reality, because there’s nothing else in the end. If Spotify doesn’t follow the rules from these companies, they are fucked as well. The dependence is higher than ever.”

The first wave of mass Internet piracy well over a decade ago was a wake-up call to the entertainment industry. The immense popularity of torrent sites showed that people demanded something they weren’t offering.

In a way, these early pirate sites are the reason why Netflix and Spotify were able to do what they do. Literally, in the case of Spotify, which used pirated music to get the service going.

Peter doesn’t see them as the answer though. The only solution in his book is to redefine and legalize piracy.

“The solution to piracy is to re-define piracy. Make things available to everyone, without that being a crime,” Peter says.

In this regard, not much has changed in ten years. However, having witnessed this battle closer than anyone else, he also realizes that the winners are likely on the other end.

Piracy will decrease over time, but not the way Peter hopes it will.

“I think we’ll have less piracy because of the problems we see today. With net neutrality being infringed upon and more laws against individual liberties and access to culture, instead of actually benefiting people.

“The media industry will be happy to know that their lobbying efforts and bribes are paying off,” he concludes.

This is the second and final post in our torrent pioneers series. The first interview with isoHunt founder Gary Fung is available here.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN discounts, offers and coupons

This Was 2017 in ‘Pirate’ Searches

Post Syndicated from Ernesto original https://torrentfreak.com/this-was-2017-in-pirate-searches-171229/

Lists, list, lists, it’s that time of the year again. In December many prominent search engines publish their overviews of most used search terms.

On Google, Hurricane Irma was the most searched for term of the year, globally. With “It” and “Stranger Things” ending up as the most sought after movie and TV show respectively.

But what’s happening on torrent search engines? With billions of searches every year, it’s worth taking a look at the most-entered keywords on the dominant file-sharing network.

With data from one of the most visited torrent indexes, we compiled a list of 50 popular terms, to give an indication.

2017’s number one query is “Game of Thrones,” which was entered in several variations, often paired with the episode number. While it’s no surprise, considering the show’s popularity, as a TV-show it’s somewhat of an outlier.

The top 50 is mostly made up of movie titles. “Spider Man: Homecoming” ended up in the second spot, followed by “Baby Driver” and “War for the Planet of the Apes.”

The only non-title entry in the top ten is “Telugu 2017,” which shows how popular BitTorrent is in India. On most torrent sites nowadays, a large chunk of all visitors come from the Asian country.

Torrent sites are predominantly used to download video, which is evident from the list. There are no references to music at all, and “CracksNow” appears to be the only software related search.

Below is the full list of the Top 50 most-entered search queries based on a data sample provided by one of the most popular torrent sites on the Internet. Searches pointing to the same title have been combined.

—-

Note that searches are not the same as download activity. The former are, in theory, easier to manipulate by outsiders.

What Pirates Searched for in 2017

rank search
torrentfreak.com
1. Game of Thrones
2. Spider Man Homecoming
3. Baby Driver
4. War for the Planet of the Apes
5. Star Trek Discovery
6. Telugu 2017
7. Transformers the last knight
8. Pirates of the Caribbean Dead Men Tell No Tales
9. Thor Ragnarok
10 Alien Covenant
11. Wonder Woman
12. The Mummy
13. Atomic Blonde
14. Malayalam 2017
15. Riverdale
16. Kingsman The Golden Circle
17. Designated Survivor
18. 2017 Movies
19. Half Girlfriend
20. Dunkirk
21. The Fate of the Furious
22. The Orville
23. Baywatch
24. Blade Runner 2049
25. Tigole
26. Golmaal again
27. Valerian and the City of a Thousand Planets
28. Midnight Texas
29. King Arthur Legend of the Sword
30. Tamil 2017
31. Justice League
32. Tubelight
33. Annabelle Creation
34. Geostorm
35. The Handmaids Tale
36. Young Sheldon
37. Toilet Ek Prem Katha
38. Logan lucky
39. 13 reasons why
40. Baadshaho
41. Jagga Jasoos
42. CracksNow
43. Dangal
44. The Lost City of Z
45. Suits
46. Power Rangers
47. The Big Bang Theory
48. The Hitman’s Bodyguard
49 Secret Superstar
50. Jab Harry Met Sejal

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN discounts, offers and coupons

A Christmas Carol – When Piracy Became Irrelevant

Post Syndicated from Ernesto original https://torrentfreak.com/a-christmas-carol-when-piracy-became-irrelevant-171225/

This is the story of Walter Scroogle, CEO of one of the major movie studios in Hollywood.

It begins on Christmas Eve, with Scroogle arriving home late at night. This wasn’t anything unusual, not even on a day like this. The rest of the family didn’t expect anything else and were already asleep in anticipation of the forthcoming festivities.

As Scroogle sits down he suddenly notices a pile of Amazon store boxes in the corner of the room. “Thank God, he mumbles, Christmas is saved.” But it was a close call.

It had been such a hectic week at work. So busy that Scroogle had totally forgot to get this year’s Christmas presents, one of the few things he arranges around the house. Luckily, modern day technology was there to save the day.

Amazon had everything in stock. The new bike for his son. The tablet for his daughter. The earrings for his wife, as well as many more gifts. It took Scroogle roughly fifteen minutes to get all his Christmas shopping done. And with same-day delivery, it arrived a few hours later. “Thank God,” he said again.

While a major disaster had been avoided, there were still a few presents to wrap. Apparently, there are no machines that can carefully wrap bikes. So there he was, at 2am Christmas morning, grumpily making the final preparations for the big day.
Halfway through Scroogle decided to lie on the couch for a bit. Just a short while, he promised himself, not knowing what was to come.

After a minute or two an exhausted Scroogle dozed off into his first dream.

Inspired by what had occurred earlier that day, he dreamt about forgetting the Chrismas presents. While he appeared to be his current self, the world was different. There were no Internet stores or even large malls. He had to drive to at least ten different stores to get what he wanted, and given that it was Sunday, most were closed.

Needless to say, it was a disaster.

The second dream was related to something at work. A few hours earlier he’d hosted a board meeting, discussing the new streaming platform the company had launched that morning. Scoogle was one of the pioneers. He was also the one who hastily decided to pull all their content from third-party platforms, Netflix included. “Everything will be pulled tonight. We want to be exclusive again,” he’s said.

The dream presented Scroogle with the darker side of his decision. It showed several families who, on Chrismas Eve, noticed that their favorite movies were no longer available. Christmas classics were removed without warning, forcing these families to take out another subscription. If the new service was even available in their region.

“Not the best way to spend time on Christmas,” Scroogle thought.

Scroogle was still fast asleep when the third and final dream kicked in. It was the future, apparently, as commercials for the streaming service and next year’s Christmas blockbuster were being shown on a TV. There was a Christmas tree and a family clearly amusing itself. Unfortunately for Scroogle, things didn’t turn out to be so bright.

After the commercial, the latest blockbuster played, but it was not on the company’s streaming platform. Instead, it was playing through what appeared to be some kind of piracy streaming device. “They are stealing our stuff,” he thought. “And on Christmas Day too! These people are cheapskates.”

Then, a deep-sounding voiceover became apparent.

“No, Scroogle, the family actually pays for seven streaming services already. However, their budgets are not endless. The increasing fragmentation in the current legal streaming landscape is pushing people toward these devices. If only they could get it all from under one roof.”

Then Scroogle woke up. At first, he hadn’t really processed what had happened. It was nearly 4am and he still had a few gifts to wrap, those that were so conveniently ordered a few hours earlier and delivered to his house, from one supplier. But, when it sank in, he knew that there was one thing he had to do before the family woke up.

Scroogle wrote an email to the board admitting that he was wrong. “We have to keep all our content on other services and think this through after the holidays. It’s inclusive from now on, not exclusive. People should be able to see our great films without hassle,” he typed.

Sent.

A year later the new Christmas blockbuster was indeed released. It came out together with a brand new streaming platform, one where users could watch a massive library of all the best classics from the major studios, independents, and other services under one roof. Even the latest movies could be easily played on demand for a small one-time fee.

Streaming records were broken that day, and people were smiling.

Merry Christmas everyone!

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN discounts, offers and coupons

timeShift(GrafanaBuzz, 1w) Issue 27

Post Syndicated from Blogs on Grafana Labs Blog original https://grafana.com/blog/2017/12/22/timeshiftgrafanabuzz-1w-issue-27/

As we wrap up 2017, I wanted to kick off my last timeShift of the year to thank you, the Grafana community, for all your input, feedback, and involvement that’s made Grafana better with every release. While code contributions are extremely important, they’re not the only way to participate in the open source software community. Feature requests, bug reports, writing documentation, testing new features, participating in hackathons and meetups – all contribute to making open source projects better.

Yet More Copyright Trolls Invade Sweden Demanding Much More Money

Post Syndicated from Andy original https://torrentfreak.com/yet-more-copyright-trolls-invade-sweden-demanding-much-more-money-171221/

Back in 2016, so-called copyright-trolling landed in Sweden for the first time via an organization calling itself Spridningskollen (Distribution Check). Within months, however, it was all over, with the operation heading for the hills after much negative publicity.

February this year, another wave of trolling hit the country, with Danish law firm Njord Law targeting the subscribers of several ISPs, including Telia, Tele2 and Bredbandsbolaget. Thousands of IP addresses had been harvested by its media company partners, potentially linking to thousands of subscribers.

“We have sent out a few thousand letters, but we have been given the right to obtain information behind many more IP addresses that we are waiting to receive from the telecom operators. So there are more,” lawyer Jeppe Brogaard Clausen said in October.

But while Internet users in Sweden wait for news of how this campaign is progressing, multiple new threats are appearing on the horizon. Swedish publication Breakit reports that several additional law firms in Sweden are also getting in on the action with one, Innerstans Advokatbyrå, already sending out demands to alleged file-sharers.

“By downloading and uploading the movie without permission from the copyright holder, you have committed a copyright infringement,” its letter warns.

“However, the rightsholder wishes to propose a conciliation solution consisting of paying a flat rate of 7,000 kronor [$831] in one payment for all of the copyright infringements in question.”

The demand for 7,000 kronor is significantly more than 4,500 kronor ($535) demanded by Njord Law but Innerstans Advokatbyrå warns that this amount will only be the beginning, should an alleged pirate fail to pay up and the case goes to court.

“If this happens, the amount will not be limited to 7,000 kronor but will compensate for the damage suffered and will include compensation for investigative costs, application fees and attorney fees,” the company warns.

Breakit spoke with Alex Block at Innerstans Advokatbyrå who wouldn’t reveal how many letters had been sent out. However, he did indicate that while damages amounts will be decided by the court, a license for a shared film can cost 80,000 kronor ($12,800).

“This will last for a long time, and to a large extent,” he said.

Of course, we’ve reported on plenty of these campaigns before and their representatives all state that people will be taken to court if they don’t pay. This one is no different, with Block assuring the public that if they don’t pay, court will follow. The credibility of the campaign is at stake, he notes.

“It’s our intention [to go to court], even if we prefer to avoid it. We must make reality of our requirements, otherwise it will not work,” he says.

Breakit says it has seen a copy of one letter from the lawfirm, which reveals a collaboration between US film company Mile High Distribution Inc. and Mircom International Content Management & Consulting Ltd.

Mircom is extremely well known in trolling circles having conducted campaigns in several areas of the EU. German outfit Media Protector is also involved, having tracked the IP addresses of the alleged pirates. This company also has years of experience working with copyright trolls.

With several other law firms apparently getting in on the action, Swedish authorities need to ensure that the country doesn’t become another Germany where trolls have run rampant for a number of years, causing misery for thousands.

While that help may not necessarily be forthcoming, it’s perhaps a little surprising that given Sweden’s proud and recent history of piracy activism, there appear to be very few signs of a visible and organized pushback from the masses. That will certainly please the trolls, who tend to thrive when unchallenged.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN discounts, offers and coupons

Managing AWS Lambda Function Concurrency

Post Syndicated from Chris Munns original https://aws.amazon.com/blogs/compute/managing-aws-lambda-function-concurrency/

One of the key benefits of serverless applications is the ease in which they can scale to meet traffic demands or requests, with little to no need for capacity planning. In AWS Lambda, which is the core of the serverless platform at AWS, the unit of scale is a concurrent execution. This refers to the number of executions of your function code that are happening at any given time.

Thinking about concurrent executions as a unit of scale is a fairly unique concept. In this post, I dive deeper into this and talk about how you can make use of per function concurrency limits in Lambda.

Understanding concurrency in Lambda

Instead of diving right into the guts of how Lambda works, here’s an appetizing analogy: a magical pizza.
Yes, a magical pizza!

This magical pizza has some unique properties:

  • It has a fixed maximum number of slices, such as 8.
  • Slices automatically re-appear after they are consumed.
  • When you take a slice from the pizza, it does not re-appear until it has been completely consumed.
  • One person can take multiple slices at a time.
  • You can easily ask to have the number of slices increased, but they remain fixed at any point in time otherwise.

Now that the magical pizza’s properties are defined, here’s a hypothetical situation of some friends sharing this pizza.

Shawn, Kate, Daniela, Chuck, Ian and Avleen get together every Friday to share a pizza and catch up on their week. As there is just six of them, they can easily all enjoy a slice of pizza at a time. As they finish each slice, it re-appears in the pizza pan and they can take another slice again. Given the magical properties of their pizza, they can continue to eat all they want, but with two very important constraints:

  • If any of them take too many slices at once, the others may not get as much as they want.
  • If they take too many slices, they might also eat too much and get sick.

One particular week, some of the friends are hungrier than the rest, taking two slices at a time instead of just one. If more than two of them try to take two pieces at a time, this can cause contention for pizza slices. Some of them would wait hungry for the slices to re-appear. They could ask for a pizza with more slices, but then run the same risk again later if more hungry friends join than planned for.

What can they do?

If the friends agreed to accept a limit for the maximum number of slices they each eat concurrently, both of these issues are avoided. Some could have a maximum of 2 of the 8 slices, or other concurrency limits that were more or less. Just so long as they kept it at or under eight total slices to be eaten at one time. This would keep any from going hungry or eating too much. The six friends can happily enjoy their magical pizza without worry!

Concurrency in Lambda

Concurrency in Lambda actually works similarly to the magical pizza model. Each AWS Account has an overall AccountLimit value that is fixed at any point in time, but can be easily increased as needed, just like the count of slices in the pizza. As of May 2017, the default limit is 1000 “slices” of concurrency per AWS Region.

Also like the magical pizza, each concurrency “slice” can only be consumed individually one at a time. After consumption, it becomes available to be consumed again. Services invoking Lambda functions can consume multiple slices of concurrency at the same time, just like the group of friends can take multiple slices of the pizza.

Let’s take our example of the six friends and bring it back to AWS services that commonly invoke Lambda:

  • Amazon S3
  • Amazon Kinesis
  • Amazon DynamoDB
  • Amazon Cognito

In a single account with the default concurrency limit of 1000 concurrent executions, any of these four services could invoke enough functions to consume the entire limit or some part of it. Just like with the pizza example, there is the possibility for two issues to pop up:

  • One or more of these services could invoke enough functions to consume a majority of the available concurrency capacity. This could cause others to be starved for it, causing failed invocations.
  • A service could consume too much concurrent capacity and cause a downstream service or database to be overwhelmed, which could cause failed executions.

For Lambda functions that are launched in a VPC, you have the potential to consume the available IP addresses in a subnet or the maximum number of elastic network interfaces to which your account has access. For more information, see Configuring a Lambda Function to Access Resources in an Amazon VPC. For information about elastic network interface limits, see Network Interfaces section in the Amazon VPC Limits topic.

One way to solve both of these problems is applying a concurrency limit to the Lambda functions in an account.

Configuring per function concurrency limits

You can now set a concurrency limit on individual Lambda functions in an account. The concurrency limit that you set reserves a portion of your account level concurrency for a given function. All of your functions’ concurrent executions count against this account-level limit by default.

If you set a concurrency limit for a specific function, then that function’s concurrency limit allocation is deducted from the shared pool and assigned to that specific function. AWS also reserves 100 units of concurrency for all functions that don’t have a specified concurrency limit set. This helps to make sure that future functions have capacity to be consumed.

Going back to the example of the consuming services, you could set throttles for the functions as follows:

Amazon S3 function = 350
Amazon Kinesis function = 200
Amazon DynamoDB function = 200
Amazon Cognito function = 150
Total = 900

With the 100 reserved for all non-concurrency reserved functions, this totals the account limit of 1000.

Here’s how this works. To start, create a basic Lambda function that is invoked via Amazon API Gateway. This Lambda function returns a single “Hello World” statement with an added sleep time between 2 and 5 seconds. The sleep time simulates an API providing some sort of capability that can take a varied amount of time. The goal here is to show how an API that is underloaded can reach its concurrency limit, and what happens when it does.
To create the example function

  1. Open the Lambda console.
  2. Choose Create Function.
  3. For Author from scratch, enter the following values:
    1. For Name, enter a value (such as concurrencyBlog01).
    2. For Runtime, choose Python 3.6.
    3. For Role, choose Create new role from template and enter a name aligned with this function, such as concurrencyBlogRole.
  4. Choose Create function.
  5. The function is created with some basic example code. Replace that code with the following:

import time
from random import randint
seconds = randint(2, 5)

def lambda_handler(event, context):
time.sleep(seconds)
return {"statusCode": 200,
"body": ("Hello world, slept " + str(seconds) + " seconds"),
"headers":
{
"Access-Control-Allow-Headers": "Content-Type,X-Amz-Date,Authorization,X-Api-Key,X-Amz-Security-Token",
"Access-Control-Allow-Methods": "GET,OPTIONS",
}}

  1. Under Basic settings, set Timeout to 10 seconds. While this function should only ever take up to 5-6 seconds (with the 5-second max sleep), this gives you a little bit of room if it takes longer.

  1. Choose Save at the top right.

At this point, your function is configured for this example. Test it and confirm this in the console:

  1. Choose Test.
  2. Enter a name (it doesn’t matter for this example).
  3. Choose Create.
  4. In the console, choose Test again.
  5. You should see output similar to the following:

Now configure API Gateway so that you have an HTTPS endpoint to test against.

  1. In the Lambda console, choose Configuration.
  2. Under Triggers, choose API Gateway.
  3. Open the API Gateway icon now shown as attached to your Lambda function:

  1. Under Configure triggers, leave the default values for API Name and Deployment stage. For Security, choose Open.
  2. Choose Add, Save.

API Gateway is now configured to invoke Lambda at the Invoke URL shown under its configuration. You can take this URL and test it in any browser or command line, using tools such as “curl”:


$ curl https://ofixul557l.execute-api.us-east-1.amazonaws.com/prod/concurrencyBlog01
Hello world, slept 2 seconds

Throwing load at the function

Now start throwing some load against your API Gateway + Lambda function combo. Right now, your function is only limited by the total amount of concurrency available in an account. For this example account, you might have 850 unreserved concurrency out of a full account limit of 1000 due to having configured a few concurrency limits already (also the 100 concurrency saved for all functions without configured limits). You can find all of this information on the main Dashboard page of the Lambda console:

For generating load in this example, use an open source tool called “hey” (https://github.com/rakyll/hey), which works similarly to ApacheBench (ab). You test from an Amazon EC2 instance running the default Amazon Linux AMI from the EC2 console. For more help with configuring an EC2 instance, follow the steps in the Launch Instance Wizard.

After the EC2 instance is running, SSH into the host and run the following:


sudo yum install go
go get -u github.com/rakyll/hey

“hey” is easy to use. For these tests, specify a total number of tests (5,000) and a concurrency of 50 against the API Gateway URL as follows(replace the URL here with your own):


$ ./go/bin/hey -n 5000 -c 50 https://ofixul557l.execute-api.us-east-1.amazonaws.com/prod/concurrencyBlog01

The output from “hey” tells you interesting bits of information:


$ ./go/bin/hey -n 5000 -c 50 https://ofixul557l.execute-api.us-east-1.amazonaws.com/prod/concurrencyBlog01

Summary:
Total: 381.9978 secs
Slowest: 9.4765 secs
Fastest: 0.0438 secs
Average: 3.2153 secs
Requests/sec: 13.0891
Total data: 140024 bytes
Size/request: 28 bytes

Response time histogram:
0.044 [1] |
0.987 [2] |
1.930 [0] |
2.874 [1803] |∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎
3.817 [1518] |∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎
4.760 [719] |∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎
5.703 [917] |∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎
6.647 [13] |
7.590 [14] |
8.533 [9] |
9.477 [4] |

Latency distribution:
10% in 2.0224 secs
25% in 2.0267 secs
50% in 3.0251 secs
75% in 4.0269 secs
90% in 5.0279 secs
95% in 5.0414 secs
99% in 5.1871 secs

Details (average, fastest, slowest):
DNS+dialup: 0.0003 secs, 0.0000 secs, 0.0332 secs
DNS-lookup: 0.0000 secs, 0.0000 secs, 0.0046 secs
req write: 0.0000 secs, 0.0000 secs, 0.0005 secs
resp wait: 3.2149 secs, 0.0438 secs, 9.4472 secs
resp read: 0.0000 secs, 0.0000 secs, 0.0004 secs

Status code distribution:
[200] 4997 responses
[502] 3 responses

You can see a helpful histogram and latency distribution. Remember that this Lambda function has a random sleep period in it and so isn’t entirely representational of a real-life workload. Those three 502s warrant digging deeper, but could be due to Lambda cold-start timing and the “second” variable being the maximum of 5, causing the Lambda functions to time out. AWS X-Ray and the Amazon CloudWatch logs generated by both API Gateway and Lambda could help you troubleshoot this.

Configuring a concurrency reservation

Now that you’ve established that you can generate this load against the function, I show you how to limit it and protect a backend resource from being overloaded by all of these requests.

  1. In the console, choose Configure.
  2. Under Concurrency, for Reserve concurrency, enter 25.

  1. Click on Save in the top right corner.

You could also set this with the AWS CLI using the Lambda put-function-concurrency command or see your current concurrency configuration via Lambda get-function. Here’s an example command:


$ aws lambda get-function --function-name concurrencyBlog01 --output json --query Concurrency
{
"ReservedConcurrentExecutions": 25
}

Either way, you’ve set the Concurrency Reservation to 25 for this function. This acts as both a limit and a reservation in terms of making sure that you can execute 25 concurrent functions at all times. Going above this results in the throttling of the Lambda function. Depending on the invoking service, throttling can result in a number of different outcomes, as shown in the documentation on Throttling Behavior. This change has also reduced your unreserved account concurrency for other functions by 25.

Rerun the same load generation as before and see what happens. Previously, you tested at 50 concurrency, which worked just fine. By limiting the Lambda functions to 25 concurrency, you should see rate limiting kick in. Run the same test again:


$ ./go/bin/hey -n 5000 -c 50 https://ofixul557l.execute-api.us-east-1.amazonaws.com/prod/concurrencyBlog01

While this test runs, refresh the Monitoring tab on your function detail page. You see the following warning message:

This is great! It means that your throttle is working as configured and you are now protecting your downstream resources from too much load from your Lambda function.

Here is the output from a new “hey” command:


$ ./go/bin/hey -n 5000 -c 50 https://ofixul557l.execute-api.us-east-1.amazonaws.com/prod/concurrencyBlog01
Summary:
Total: 379.9922 secs
Slowest: 7.1486 secs
Fastest: 0.0102 secs
Average: 1.1897 secs
Requests/sec: 13.1582
Total data: 164608 bytes
Size/request: 32 bytes

Response time histogram:
0.010 [1] |
0.724 [3075] |∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎
1.438 [0] |
2.152 [811] |∎∎∎∎∎∎∎∎∎∎∎
2.866 [11] |
3.579 [566] |∎∎∎∎∎∎∎
4.293 [214] |∎∎∎
5.007 [1] |
5.721 [315] |∎∎∎∎
6.435 [4] |
7.149 [2] |

Latency distribution:
10% in 0.0130 secs
25% in 0.0147 secs
50% in 0.0205 secs
75% in 2.0344 secs
90% in 4.0229 secs
95% in 5.0248 secs
99% in 5.0629 secs

Details (average, fastest, slowest):
DNS+dialup: 0.0004 secs, 0.0000 secs, 0.0537 secs
DNS-lookup: 0.0002 secs, 0.0000 secs, 0.0184 secs
req write: 0.0000 secs, 0.0000 secs, 0.0016 secs
resp wait: 1.1892 secs, 0.0101 secs, 7.1038 secs
resp read: 0.0000 secs, 0.0000 secs, 0.0005 secs

Status code distribution:
[502] 3076 responses
[200] 1924 responses

This looks fairly different from the last load test run. A large percentage of these requests failed fast due to the concurrency throttle failing them (those with the 0.724 seconds line). The timing shown here in the histogram represents the entire time it took to get a response between the EC2 instance and API Gateway calling Lambda and being rejected. It’s also important to note that this example was configured with an edge-optimized endpoint in API Gateway. You see under Status code distribution that 3076 of the 5000 requests failed with a 502, showing that the backend service from API Gateway and Lambda failed the request.

Other uses

Managing function concurrency can be useful in a few other ways beyond just limiting the impact on downstream services and providing a reservation of concurrency capacity. Here are two other uses:

  • Emergency kill switch
  • Cost controls

Emergency kill switch

On occasion, due to issues with applications I’ve managed in the past, I’ve had a need to disable a certain function or capability of an application. By setting the concurrency reservation and limit of a Lambda function to zero, you can do just that.

With the reservation set to zero every invocation of a Lambda function results in being throttled. You could then work on the related parts of the infrastructure or application that aren’t working, and then reconfigure the concurrency limit to allow invocations again.

Cost controls

While I mentioned how you might want to use concurrency limits to control the downstream impact to services or databases that your Lambda function might call, another resource that you might be cautious about is money. Setting the concurrency throttle is another way to help control costs during development and testing of your application.

You might want to prevent against a function performing a recursive action too quickly or a development workload generating too high of a concurrency. You might also want to protect development resources connected to this function from generating too much cost, such as APIs that your Lambda function calls.

Conclusion

Concurrent executions as a unit of scale are a fairly unique characteristic about Lambda functions. Placing limits on how many concurrency “slices” that your function can consume can prevent a single function from consuming all of the available concurrency in an account. Limits can also prevent a function from overwhelming a backend resource that isn’t as scalable.

Unlike monolithic applications or even microservices where there are mixed capabilities in a single service, Lambda functions encourage a sort of “nano-service” of small business logic directly related to the integration model connected to the function. I hope you’ve enjoyed this post and configure your concurrency limits today!