16 results back to index
Site Reliability Engineering: How Google Runs Production Systems by Betsy Beyer, Chris Jones, Jennifer Petoff, Niall Richard Murphy
Air France Flight 447, anti-pattern, barriers to entry, business intelligence, business process, Checklist Manifesto, cloud computing, combinatorial explosion, continuous integration, correlation does not imply causation, crowdsourcing, database schema, defense in depth, DevOps, en.wikipedia.org, fault tolerance, Flash crash, George Santayana, Google Chrome, Google Earth, information asymmetry, job automation, job satisfaction, Kubernetes, linear programming, load shedding, loose coupling, meta analysis, meta-analysis, microservices, minimum viable product, MVC pattern, performance metric, platform as a service, revision control, risk tolerance, side project, six sigma, the scientific method, Toyota Production System, trickle-down economics, web application, zero day
Such strategies are more likely to be needed for shared services. Graceful degradation takes the concept of load shedding one step further by reducing the amount of work that needs to be performed. In some applications, it’s possible to significantly decrease the amount of work or time needed by decreasing the quality of responses. For instance, a search application might only search a subset of data stored in an in-memory cache rather than the full on-disk database or use a less-accurate (but faster) ranking algorithm when overloaded. When evaluating load shedding or graceful degradation options for your service, consider the following: Which metrics should you use to determine when load shedding or graceful degradation should kick in (e.g,. CPU usage, latency, queue length, number of threads used, whether your service enters degraded mode automatically or if manual intervention is necessary)?
time requirements, Balance in Quality training for, Learning Paths That Are Cumulative and Orderly-A Hunger for Failure: Reading and Sharing Postmortems training materials, Creating Stellar Reverse Engineers and Improvisational Thinkers typical activities, Life of an On-Call Engineer one-phase pipelines, Initial Effect of Big Data on the Simple Pipeline Pattern open commenting/annotation system, Collaborate and Share Knowledge operational loadcross-industry lessons, Automating Away Repetitive Work and Operational Overhead managing, Managing Operational Load ongoing responsibilities, Managing Operational Load types of, Dealing with Interrupts operational overload, Operational Overload operational underload, A Treacherous Enemy: Operational Underload operational work (see toil) out-of-band checks and balances, Choosing a Strategy for Superior Data Integrity, Out-of-band data validation out-of-band communications systems, What went well outage trackingbaselines and progress tracking, Tracking Outages benefits of, Unexpected Benefits Escalator, Escalator Outalator, Outalator-Reporting and communication Outalatoraggregation in, Aggregation benefits of, Outalator building your own, Outalator incident analysis, Analysis notification process, Outalator reporting and communication, Reporting and communication tagging in, Tagging overhead, Toil Defined overload handlingapproaches to, Handling Overload best practices for, Overloads and Failure client-side throttling, Client-Side Throttling load from connections, Load from Connections overload errors, Handling Overload Errors overview of, Conclusions per-client retry budget, Deciding to Retry per-customer limits, Per-Customer Limits per-request retry budget, Deciding to Retry product launches and, Overload Behavior and Load Tests request criticality, Criticality retrying requests, Deciding to Retry(see also retries, RPC) utilization signals, Utilization Signals(see also cascading failures) P package managers, Packaging packet encapsulation, Load Balancing at the Virtual IP Address Paxos consensus algorithmClassic Paxos algorithm, Reasoning About Performance: Fast Paxos disk access and, Disk Access Egalitarian Paxos consensus algorithm, Stable Leaders Fast Paxos consensus algorithm, Reasoning About Performance: Fast Paxos, The Use of Paxos Lamport’s Paxos protocol, How Distributed Consensus Works(see also consensus algorithms) performanceefficiency and, Efficiency and Performance monitoring, Worrying About Your Tail (or, Instrumentation and Performance) performance tests, System tests periodic pipelines, Challenges with the Periodic Pipeline Pattern periodic scheduling (see cron) persistent storage, Disk Access Photon, Number of Replicas pipelining, Batching planned changes, Planned Changes, Drains, or Turndowns policies and procedures, enforcing, Enforcement of Policies and Procedures post hoc analysis, Setting Reasonable Expectations for Monitoring postmortemsbenefits of, Postmortem Culture: Learning from Failure best practices for, Google’s Postmortem Philosophy-Introducing a Postmortem Culture, Postmortems collaboration and sharing in, Collaborate and Share Knowledge concept of, Postmortem Culture: Learning from Failure cross-industry lessons, Postmortem Culture-Postmortem Culture example postmortem, Example Postmortem-Timeline formal review and publication of, Collaborate and Share Knowledge Google's philosophy for, Google’s Postmortem Philosophy guidelines for, Ensuring a Durable Focus on Engineering introducing postmortem cultures, Introducing a Postmortem Culture on-call engineering and, A Hunger for Failure: Reading and Sharing Postmortems ongoing improvements to, Conclusion and Ongoing Improvements rewarding participation in, Introducing a Postmortem Culture triggers for, Google’s Postmortem Philosophy privacy, Choosing a Strategy for Superior Data Integrity proactive testing, Encourage Proactive Testing problem reports, Problem Report process death, Process Death process health checks, Stop Health Check Failures/Deaths process updates, Process Updates process-induced emergencies, Process-Induced Emergency Prodtest (Production Test), Detecting Inconsistencies with Prodtest product launchesbest practices for, Progressive Rollouts defined, Reliable Product Launches at Scale development of Launch Coordination Engineering (LCE), Development of LCE-Infrastructure churn driving convergence and simplification, Driving Convergence and Simplification launch coordination checklists, The Launch Checklist-Example action items, Launch Coordination Checklist launch coordination engineering, Launch Coordination Engineering NORAD Tracks Santa example, Reliable Product Launches at Scale overview of, Conclusion processes for, Setting Up a Launch Process rate of, Reliable Product Launches at Scale techniques for reliable, Selected Techniques for Reliable Launches-Overload Behavior and Load Tests production environment (see Google production environment) production inconsistenciesdetecting with Prodtest, Detecting Inconsistencies with Prodtest resolving idempotently, Resolving Inconsistencies Idempotently production meetings, Communications: Production Meetings-Attendanceagenda example, Example Production Meeting Minutes production probes, Production Probes Production Readiness Review process (see SRE engagement model) production tests, Production Tests protocol buffers (protobufs), Our Software Infrastructure, Integration Protocol Data Units, Load Balancing at the Virtual IP Address provisioning, guidelines for, Provisioning PRR (Production Readiness Review) model, The PRR Model, Production Readiness Reviews: Simple PRR Model-Continuous Improvement push frequency, Motivation for Error Budgets push managers, Ongoing responsibilities Python’s safe_load, Integration Q “queries per second” model, The Pitfalls of “Queries per Second” Query of Death, Process Death queuingcontrolled delay, Load Shedding and Graceful Degradation first-in, first-out, Load Shedding and Graceful Degradation last-in, first-out, Load Shedding and Graceful Degradation management of, Queue Management, Reliable Distributed Queuing and Messaging queuing-as-work-distribution pattern, Reliable Distributed Queuing and Messaging quorum (see distributed consensus systems) R Raft consensus protocol, Multi-Paxos: Detailed Message Flow, Stable Leaders(see also consensus algorithms) RAID, Overarching Layer: Replication Rapid automated release system, Continuous Build and Deployment, Rapid read workload, scaling, Scaling Read-Heavy Workloads real backups, Backups Versus Archives real-time collaboration, Collaborate and Share Knowledge recoverability, Challenges of Maintaining Data Integrity Deep and Wide recovery, Knowing That Data Recovery Will Work recovery systems, Delivering a Recovery System, Rather Than a Backup System recursion (see recursion) recursive DNS servers, Load Balancing Using DNS recursive separation of responsibilities, Recursive Separation of Responsibilities redundancy, Challenges of Maintaining Data Integrity Deep and Wide, Overarching Layer: Replication Reed-Solomon erasure codes, Overarching Layer: Replication regression tests, System tests release engineeringchallenges of, Release Engineering continuous build and deployment, Continuous Build and Deployment-Configuration Management defined, Release Engineering instituting, Start Release Engineering at the Beginning philosophy of, Philosophy-Enforcement of Policies and Procedures the role of release engineers, The Role of a Release Engineer wider application of, Conclusions reliability testingamount required, Testing for Reliability benefits of, Conclusion break-glass mechanisms, Expect Testing Fail canary tests, Canary test configuration tests, Configuration test coordination of, The Need for Speed creating test and build environments, Creating a Test and Build Environment error budgets, Pursuing Maximum Change Velocity Without Violating a Service’s SLO, Motivation for Error Budgets-Forming Your Error Budget, Error Budgets expecting test failure, Expect Testing Fail-Expect Testing Fail fake backend versions, Production Probes goals of, Testing for Reliability importance of, Preface integration tests, Integration tests, Integration MTTR and, Testing for Reliability performance tests, System tests proactive, Encourage Proactive Testing production probes, Production Probes production tests, Production Tests regression tests, System tests reliability goals, Embracing Risk sanity testing, System tests segregated environments and, Pushing to Production smoke tests, System tests speed of, The Need for Speed statistical tests, Testing Disaster stress tests, Stress test system tests, System tests testing at scale, Testing at Scale-Production Probes timing of, Production Tests unit tests, Unit tests reliable replicated datastores, Reliable Replicated Datastores and Configuration Stores Remote Procedure Call (RPC), Our Software Infrastructure, Examine, Criticalitybimodal, Bimodal latency deadlinesmissing, Missing deadlines propagating, Load Shedding and Graceful Degradation, Deadline propagation queue management, Queue Management, Reliable Distributed Queuing and Messaging selecting, Latency and Deadlines retries, Retries-Retries RPC criticality, Criticality(see also overload handling) replicasadding, Capacity and Load Balancing drawbacks of leader replicas, Capacity and Load Balancing location of, Location of Replicas, Quorum composition number deployed, Number of Replicas replicated logs, Number of Replicas replicated state machine (RSM), Reliable Replicated State Machines replication, Challenges of Maintaining Data Integrity Deep and Wide, Overarching Layer: Replication request latency, Indicators, The Four Golden Signals request profile changes, Request profile changes request success rate, Measuring Service Risk resilience testing, Practices resourcesallocation of, Hardware, Managing Machines exhaustion, Resource Exhaustion limits, Resource limits(see also capacity planning) restores, 1T Versus 1E: Not “Just” a Bigger Backup retention, Retention retries, RPCavoiding, Deciding to Retry cascading failures due to, Retries considerations for automatic, Retries diagnosing outages due to, Retries handling overload errors and, Handling Overload Errors per-client retry budgets, Deciding to Retry per-request retry budgets, Deciding to Retry reverse engineering, Reverse Engineers: Figuring Out How Things Work reverse proxies, What went well revision history, First Layer: Soft Deletion risk managementbalancing risk and innovation, Embracing Risk costs of, Managing Risk error budgets, Motivation for Error Budgets-Benefits, Error Budgets key insights, Benefits measuring service risk, Measuring Service Risk risk tolerance of services, Risk Tolerance of Services-Example: Frontend infrastructure rollback procedures, What we learned rollouts, New Rollouts, Rollout Planning, Progressive Rollouts root causeanalysis of, Practices, Google’s Postmortem Philosophy(see also postmortems) defined, Definitions Round Robin policy, Simple Round Robin round-trip-time (RTT), Distributed Consensus Performance and Network Latency rows, Hardware rule evaluation, in monitoring systems, Rule Evaluation-Rule Evaluation S Safari® Books Online, Safari® Books Online sanity testing, System tests saturation, The Four Golden Signals scaledefined, Choosing a Strategy for Superior Data Integrity issues in, Scaling issues: Fulls, incrementals, and the competing forces of backups and restores securityin release engineering, Enforcement of Policies and Procedures new approach to, Practices self-service model, Self-Service Model separation of responsibilities, Recursive Separation of Responsibilities serversvs. clients, Our Software Infrastructure defined, Hardware overload scenario, Server Overload preventing overload, Preventing Server Overload-Always Go Downward in the Stack service availabilityavailability table, Availability Table cost factors, Cost, Cost defined, Indicators target for consumer services, Target level of availability target for infrastructure service, Target level of availability time-based equation, Measuring Service Risk types of consumer service failures, Types of failures types of infrastructure services failures, Types of failures service health checks, Stop Health Check Failures/Deaths service latencylooser approach to, Other service metrics monitoring for, The Four Golden Signals service level agreements (SLAs), Agreements service level indicators (SLIs)aggregating raw measurements, Aggregation collecting indicators, Collecting Indicators defined, Indicators standardizing indicators, Standardize Indicators service level objectives (SLOs)agreements in practice, Agreements in Practice best practices for, Define SLOs Like a User choosing, Service Level Objectives-Objectives control measures, Control Measures defined, Objectives defining objectives, Objectives in Practice selecting relevant indicators, What Do You and Your Users Care About?
Unless you test in a realistic environment, it’s very hard to predict exactly which resource will be exhausted and how that resource exhaustion will manifest. For details, see “Testing for Cascading Failures”. Serve degraded results Serve lower-quality, cheaper-to-compute results to the user. Your strategy here will be service-specific. See “Load Shedding and Graceful Degradation”. Instrument the server to reject requests when overloaded Servers should protect themselves from becoming overloaded and crashing. When overloaded at either the frontend or backend layers, fail early and cheaply. For details, see “Load Shedding and Graceful Degradation”. Instrument higher-level systems to reject requests, rather than overloading servers Note that because rate limiting often doesn’t take overall service health into account, it may not be able to stop a failure that has already begun.
Building Secure and Reliable Systems: Best Practices for Designing, Implementing, and Maintaining Systems by Heather Adkins, Betsy Beyer, Paul Blankinship, Ana Oprea, Piotr Lewandowski, Adam Stubblefield
anti-pattern, barriers to entry, bash_history, business continuity plan, business process, Cass Sunstein, cloud computing, continuous integration, correlation does not imply causation, create, read, update, delete, cryptocurrency, cyber-physical system, database schema, Debian, defense in depth, DevOps, Edward Snowden, fault tolerance, fear of failure, general-purpose programming language, Google Chrome, Internet of things, Kubernetes, load shedding, margin call, microservices, MITM: man-in-the-middle, performance metric, pull request, ransomware, revision control, Richard Thaler, risk tolerance, self-driving car, Skype, slashdot, software as a service, source of truth, Stuxnet, Turing test, undersea cable, uranium enrichment, Valgrind, web application, Y2K, zero day
Figure 8-3 shows how the system might actually crash, leading to a greater impact in terms of both volume (number of requests lost) and time (duration of the outage extends past the traffic spike). Figure 8-3 also distinguishes the uncontrolled nature of degraded traffic (the backward-slashed area) prior to system crash. Figure 8-4 shows that the system with load shedding rejects significantly less traffic than in Figure 8-3 (the crosshatched area), with the rest of the traffic either processed without failure (whitespace area) or rejected if lower priority (forward-slashed area). Figure 8-3. Complete outage and a possible cascading failure from a load spike Figure 8-4. Using load shedding and throttling to manage a load spike Load shedding The primary resilience objective of load shedding (described in Chapter 22 of the SRE book) is to stabilize components at maximum load, which can be especially beneficial for preserving security-critical functions. When the load on a component starts to exceed its capacity, you want the component to serve errors for all excessive requests rather than crashing.
Some possibilities for automated response include the following: Implementing load-balancing systems that can respond to throttling signals and attempt to shift traffic to servers with lower loads Providing DoS protections that can assist in response to malicious clients if throttling is ineffective or damaging Using reports of heavy load shedding for critical services to trigger preparation for failover to alternative components (a strategy that we discuss later in this chapter) You can also use automation for self-reliant failure detection: a server that determines that it can’t serve some or all classes of requests can degrade itself to a full load-shedding mode. Self-contained or self-hosted detection is desirable because you don’t want to rely on external signals (possibly simulated by an attacker) to force an entire fleet of servers into an outage. As you implement graceful degradation, it’s important to determine and record levels of system degradation, regardless of what triggered the problem. This information is useful for diagnosing and debugging. Reporting the actual load shedding or throttling (whether self-imposed or directed) can help you evaluate global health and capacity and detect bugs or attacks.
Humans might not respond fast enough, and traffic could overwhelm servers enough to lead to cascading failures and an eventual global service crash. Creating a safeguard by permanently overprovisioning servers wastes money and doesn’t guarantee a safe response. Instead, servers should adjust how they respond to load based upon current conditions. You can use two specific automation strategies here: Load shedding is done by returning errors rather than serving requests. Throttling of clients is done by delaying responses until closer to the request deadline. Figure 8-3 illustrates a traffic spike that exceeds the capacity. Figure 8-4 illustrates the effects of load shedding and throttling to manage the load spike. Note the following: The curve represents requests per second, and the area under it represents total requests. Whitespace represents traffic processed without failure. The backward-slashed area represents degraded traffic (some requests failed).
The Practice of Cloud System Administration: DevOps and SRE Practices for Web Services, Volume 2 by Thomas A. Limoncelli, Strata R. Chalup, Christina J. Hogan
active measures, Amazon Web Services, anti-pattern, barriers to entry, business process, cloud computing, commoditize, continuous integration, correlation coefficient, database schema, Debian, defense in depth, delayed gratification, DevOps, domain-specific language, en.wikipedia.org, fault tolerance, finite state, Firefox, Google Glasses, information asymmetry, Infrastructure as a Service, intermodal, Internet of things, job automation, job satisfaction, Kickstarter, load shedding, longitudinal study, loose coupling, Malcom McLean invented shipping containers, Marc Andreessen, place-making, platform as a service, premature optimization, recommendation engine, revision control, risk tolerance, side project, Silicon Valley, software as a service, sorting algorithm, standardized shipping container, statistical model, Steven Levy, supply-chain management, Toyota Production System, web application, Yogi Berra
Shared resource pools are not just appropriate for machines, but may also be used for storage and other resources. Load Shedding Another strategy is load shedding. With this strategy the service turns away some users so that other users can have a good experience. To make an analogy, an overloaded phone system doesn’t suddenly disconnect all existing calls. Instead, it responds to any new attempts to make a call with a “fast busy” tone so that the person will try to make the call later. An overloaded web site should likewise give some users an immediate response, such as a simple “come back later” web page, rather than requiring them to time out after minutes of waiting. A variation of load shedding is stopping certain tasks that can be put off until later. For example, low-priority database updates could be queued up for processing later; a social network that stores reputation points for users might store the fact that points have been awarded rather than processing them; nightly bulk file transfers might be delayed if the network is overloaded.
For example, low-priority database updates could be queued up for processing later; a social network that stores reputation points for users might store the fact that points have been awarded rather than processing them; nightly bulk file transfers might be delayed if the network is overloaded. That said, tasks that can be put off for a couple of hours might cause problems if they are put off forever. There is, after all, a reason they exist. For any activity that is delayed due to load shedding, there must be a plan on how such a delay is handled. Establish a service level agreement (SLA) to determine how long something can be delayed and to identify a timeline of actions that should be undertaken to mitigate problems or extend the deadlines. Low-priority updates might become a high priority after a certain amount of time. If many systems are turned off due to load shedding, it might be possible to enable them, one at a time, to let each catch up. To be able to manage such situations one must have visibility into the system so that prioritization decisions can be made. For example, knowing the age of a task (how long it has been delayed), predicting how long it will take to process, and indicating how close it is to a deadline will permit operations personnel to gauge when delayed items should be continued
DiRT tests, 320 meta-work, 162 packages, 204 test event planning, 319 time management, 256 Linear scaling, 476–477 Link-shortening site example, 87–89 Linking tickets to subsystems, 263–264 Linux in dot-bomb era, 460–461 Live code changes, 236 Live restores, 36 Live schema changes, 234–236 Live service upgrades. See Upgrading live services Load balancers failures, 134–136 first web era, 456 with multiple backend replicas, 12–13 with shared state, 75 three-tier web service, 72–74 Load sharing vs. hot spares, 126 Load shedding, 139 Load testing, 215 Local business listings in Google Maps, 42 Local labor laws, 43 Logarithmic scaling, 476 Logistics in disaster preparedness, 318–320 Logistics team in Incident Command System, 326 Loglinear scaling, 476–477 Logs, 11, 340 approach, 341 design documents, 282 timestamps, 341–342 Long-term analysis, 354 Long-term fixes oncall, 299–300 vs. quick, 295–296 Longitudinal hardware failure study, 133–134 Look-for’s, 407 Lookup-oriented splits in AKF Scaling Cube, 102–104 Loosely coupled systems, 24–25 Lower-latency services in cloud computing era, 469 LREs (Launch Readiness Engineers), 157–158 LRRs (Launch Readiness Reviews), 159 LRU (Least Recently Used) algorithm, 107 Lynch, N., 23 MACD (moving average convergence/divergence) metric, 367, 378–379 MACD signal line, 367 Machine Learning service, 55 Machines automated configuration example, 251 defined, 10 failures, 134 KPI example, 393–396 Madrigal, A.
Ten Technologies to Save the Planet: Energy Options for a Low-Carbon Future by Chris Goodall
barriers to entry, carbon footprint, congestion charging, decarbonisation, energy security, Indoor air pollution, Intergovernmental Panel on Climate Change (IPCC), Kickstarter, land tenure, load shedding, New Urbanism, oil shock, profit maximization, Silicon Valley, smart grid, smart meter, statistical model, undersea cable
To the electricity provider, these reductions may be equivalent to having an extra power station available; however, a spare power station that sits idle 90 percent of the time would be a much more expensive and polluting solution. The major load-shedding programs around the world typically cover about 2 percent of peak power use, enough to cope with temporary energy deficiencies as long as wind is not too great a percentage of total electricity supply. For Spain and Denmark, countries where wind occasionally provides a very large fraction of total electricity demand for several hours at a time, this scheme would not be enough on its own. However, many people in the electricity industry think that load-shedding programs could cover 10 percent of peak power use or even more. This would be enough to protect the power grid from wind’s small minute-to-minute variability in almost all circumstances.
Managing demand to meet supply Supply and demand need to balance almost exactly on an electricity grid. Otherwise, the voltage or frequency of the alternating current would move outside the tolerances of home appliances and business equipment, possibly causing damage. Pumped storage is a way of quickly adjusting supply, but there are also methods to almost instantaneously reduce demand. In the jargon of the electricity industry, this activity is known as “load shedding.” Some manufacturing companies, for example, have agreements that allow their electricity supplier to disconnect them at a few moments’ notice. In return, they pay lower prices for their electricity. This system works well. Although it is designed primarily to shave a little off the sharp daily peaks of electricity demand, there is no reason why the same approach couldn’t be adapted to deal with temporary shortfalls in wind power at all times of day.
More advanced meters could be used to switch off non-critical machines such as dishwashers and washing machines at moments when wind power drops. The technology is already available to do this. A signal carried over the mobile phone network might trigger an electronic on/off switch at the wall socket of those electric appliances that use large amounts of electricity. A program involving all three of these techniques for balancing supply and demand—better electricity grids, greater energy storage, and load shedding—allows electricity operators to deal with the occasional unexpected drop in wind power. There will be some costs, and some inconvenience, such as washing machines unexpectedly switching off for an hour or so, but it can be done. In many parts of the world, regional electricity grids are already finding ways to reduce peak demand. In southern parts of the U.S., electricity suppliers often struggle to cope with summer afternoon peaks resulting from increased use of air conditioning.
Smart Cities: Big Data, Civic Hackers, and the Quest for a New Utopia by Anthony M. Townsend
1960s counterculture, 4chan, A Pattern Language, Airbnb, Amazon Web Services, anti-communist, Apple II, Bay Area Rapid Transit, Burning Man, business process, call centre, carbon footprint, charter city, chief data officer, clean water, cleantech, cloud computing, computer age, congestion charging, connected car, crack epidemic, crowdsourcing, DARPA: Urban Challenge, data acquisition, Deng Xiaoping, digital map, Donald Davies, East Village, Edward Glaeser, game design, garden city movement, Geoffrey West, Santa Fe Institute, George Gilder, ghettoisation, global supply chain, Grace Hopper, Haight Ashbury, Hedy Lamarr / George Antheil, hive mind, Howard Rheingold, interchangeable parts, Internet Archive, Internet of things, Jacquard loom, Jane Jacobs, jitney, John Snow's cholera map, Joi Ito, Khan Academy, Kibera, Kickstarter, knowledge worker, load shedding, M-Pesa, Mark Zuckerberg, megacity, mobile money, mutually assured destruction, new economy, New Urbanism, Norbert Wiener, Occupy movement, off grid, openstreetmap, packet switching, Panopticon Jeremy Bentham, Parag Khanna, patent troll, Pearl River Delta, place-making, planetary scale, popular electronics, RFC: Request For Comment, RFID, ride hailing / ride sharing, Robert Gordon, self-driving car, sharing economy, Silicon Valley, Skype, smart cities, smart grid, smart meter, social graph, social software, social web, special economic zone, Steve Jobs, Steve Wozniak, Stuxnet, supply-chain management, technoutopianism, Ted Kaczynski, telepresence, The Death and Life of Great American Cities, too big to fail, trade route, Tyler Cowen: Great Stagnation, undersea cable, Upton Sinclair, uranium enrichment, urban decay, urban planning, urban renewal, Vannevar Bush, working poor, working-age population, X Prize, Y2K, zero day, Zipcar
Dynamic pricing can dramatically reduce swings in demand for power and increase overall generating efficiency, but load shifting can also be automated and proactive. Smart meters that communicate directly with smart appliances might automatically reschedule a load of wash for later in the day when demand and prices are likely to fall. Even the most sophisticated load-shifting scheme will one day meet its limit. That’s when utilities wield their trump card—load shedding—a kind of targeted blackout. Traditionally, load shedding was a manual process. Utilities would cut deals with large users of electricity like factories and universities to shut down power during peaking crises in return for a discount on their regular rates. Smart meters will allow these miniblackouts to be replaced by sophisticated surgical drawdowns on sacrificial facilities and equipment. A university might agree to have its dormitories or office lighting shut off while service to sensitive laboratory instruments, for instance, is maintained.
While peaking plants can also be highly efficient—most are natural-gas–powered turbines—they are far more costly per unit of power to build and run. If only the peaks could be evened out, fewer peaking plants would be needed and utilities could focus more on ruthlessly fine-tuning base load plants to be as lean and clean as possible.48 Smart grids offer two tricks to even out the peaks: load shifting and load shedding. Load shifting, the gentler of the two, tries to spread demand for power away from peak periods of demand through price incentives. In their simplest form, smart meters allow businesses and consumers to see the true cost of generating electricity during periods of high demand. As they fire up those costly peaking plants, utilities simply pass the higher generating cost along to consumers. Dynamic pricing can dramatically reduce swings in demand for power and increase overall generating efficiency, but load shifting can also be automated and proactive.
Even as demand surges, building new power plants only gets harder as NIMBY-led resistance to plant construction spreads in many countries. The wiggle room that once existed in the form of reserve generating capacity is fast disappearing, raising the possibility of regular blackouts in the future. During the 1990s, demand for electricity grew by 35 percent in the United States, but generating capacity increased by only 18 percent.49 According to Siemens, smart grids will help utility engineers sleep at night, since load shedding and load shifting could reduce national electricity needs by up to 10 percent. 50 Environmentalists will cheer because improved demand management removes a key obstacle to greater reliance on renewable generating sources, which are notoriously unreliable base capacity—the sun doesn’t always shine and the wind doesn’t always blow. Even hydropower generated at dams depends on reliable seasonal rains to fill up rivers.
Building Microservices by Sam Newman
airport security, Amazon Web Services, anti-pattern, business process, call centre, continuous integration, create, read, update, delete, defense in depth, don't repeat yourself, Edward Snowden, fault tolerance, index card, information retrieval, Infrastructure as a Service, inventory management, job automation, Kubernetes, load shedding, loose coupling, microservices, MITM: man-in-the-middle, platform as a service, premature optimization, pull request, recommendation engine, social graph, software as a service, source of truth, the built environment, web application, WebSocket
In many ways, bulkheads are the most important of these three patterns. Timeouts and circuit breakers help you free up resources when they are becoming constrained, but bulkheads can ensure they don’t become constrained in the first place. Hystrix allows you, for example, to implement bulkheads that actually reject requests in certain conditions to ensure that resources don’t become even more saturated; this is known as load shedding. Sometimes rejecting a request is the best way to stop an important system from becoming overwhelmed and being a bottleneck for multiple upstream services. Isolation The more one service depends on another being up, the more the health of one impacts the ability of the other to do its job. If we can use integration techniques that allow a downstream server to be offline, upstream services are less likely to be affected by outages, planned or unplanned.
Index A acceptance testing, Types of Tests access by reference, Access by Reference accountability, People adaptability, Summary Aegisthus project, Backup Data Pump aggregated logs, Logs, Logs, and Yet More Logs… antifragile systems, Microservices, The Antifragile Organization-Isolationbulkheads, Bulkheads circuit breakers, Circuit Breakers examples of, The Antifragile Organization increased use of, Microservices isolation, Isolation load shedding, Bulkheads timeouts, Timeouts AP systemdefinition of term, Sacrificing Consistency vs. CP system, AP or CP? API key-based authentication, API Keys, It’s All About the Keys application containers, Application Containers architects (see systems architects) architectural principlesdevelopment of, Principles Heroku's 12 factors, Principles key microservices principles, Bringing It All Together real-world example, A Real-World Example architectural safety, Architectural Safety, Architectural Safety Measures artifactsimages, Images as Artifacts operating system, Operating System Artifacts platform-specific, Platform-Specific Artifacts asynchronous collaborationcomplexities of, Complexities of Asynchronous Architectures implementing, Implementing Asynchronous Event-Based Collaboration vs. synchronous, Synchronous Versus Asynchronous ATOM specification, Technology Choices authentication/authorization, Authentication and Authorization-The Deputy Problemdefinition of terms, Authentication and Authorization fine-grained, Fine-Grained Authorization service-to-service, Service-to-Service Authentication and Authorization single sign-on (SSO), Common Single Sign-On Implementations single sign-on gateway, Single Sign-On Gateway terminology, Common Single Sign-On Implementations automationbenefits for deployment, Automation case studies on, Two Case Studies on the Power of Automation autonomymicroservices and, Autonomous role of systems architect in, Summary autoscaling, Autoscaling availabilityin CAP theorem, CAP Theorem key microservices principle of, How Much Is Too Much?
JSON web tokens (JWT), HMAC Over HTTP K Karyon, Tailored Service Template key-based authentication, API Keys Kibana, Logs, Logs, and Yet More Logs… L latency, How Much Is Too Much? Latency Monkey, The Antifragile Organization layered architectures, Microservices librariesclient, Client Libraries service metrics, Service Metrics shared, Shared Libraries Linux containers, Linux Containers load balancing, Load Balancing load shedding, Bulkheads local calls, Local Calls Are Not Like Remote Calls logsaggregated, Logs, Logs, and Yet More Logs…(see also monitoring) security issues, Logging standardization of, Standardization logstash, Logs, Logs, and Yet More Logs… loose coupling, Loose Coupling, Orchestration Versus Choreography, Loose and Tightly Coupled Organizations M man-in-the-middle attacks, Allow Everything Inside the Perimeter Marick's quadrant, Types of Tests maturity, Maturity mean time between failures (MTBF), Mean Time to Repair Over Mean Time Between Failures?
Nepal Travel Guide by Lonely Planet
call centre, carbon footprint, clean water, happiness index / gross national happiness, illegal immigration, Kickstarter, land reform, load shedding, Mahatma Gandhi, mass immigration, Skype, sustainable-tourism, trade route, traffic fines
Get very nervous if you notice that your car is the only one on the streets of Kathmandu! Avoid marches, demonstrations and disturbances, as they can quickly turn violent. The website www.nepalbandh.com warns of any upcoming strikes. When roads are closed the government generally runs buses with armed police from the airport to major hotels, returning to the airport from Tridevi Marg at the east end of Thamel. Load Shedding Electricity cuts (‘load shedding’) are a fact of life in Kathmandu and Pokhara, especially in winter, when water and thus hydro power levels are at their lowest. Electricity is currently rationed across Kathmandu, shifting from district to district every eight hours or so. Most hotels post a schedule of planned electricity cuts, which can last up to 16 hours a day in both Kathmandu and Pokhara. Try to choose a hotel with a generator and make sure your room is far away from it.
Indigo Gallery ART GALLERY ( 4424303; Naxal; 8.30am-5pm) An upmarket gallery set in a lovely old Rana building, with excellent exhibits of modern thangkas, photography and prints for sale. It’s set to move location in 2012. Information Emergency Ambulance service ( 4521048) Provided by Patan Hospital. Fire Brigade ( 101, 4221177) Police ( 100, 4223011; www.nepalpolice.gov.np; Durbar Sq) Red Cross Ambulance ( 4228094) Tourist Police Bhrikuti Mandap ( 4247041); Thamel ( 4700750) Dangers & Annoyances Electricity cuts (‘load shedding’) are a fact of life in Kathmandu; they last for up to 16 hours a day in winter when hydro power levels are at their lowest. Electricity is currently rationed across the city, shifting from district to district every eight hours or so. Most hotels post a schedule of planned electricity cuts. Try to choose a hotel with a generator and make sure your room is far away from it. The combination of ancient vehicles, low-quality fuel and lack of emission controls makes the streets of Kathmandu particularly dirty, noisy and unpleasant.
If you visit the department between 10am and 1pm, you should be able to pick up a certificate by 5pm the same day. These controls also apply to the export of precious and semiprecious stones. Electricity Electricity is 220V/50 cycles; 120V appliances from the USA will need a transformer. Sockets usually take plugs with three round pins, sometimes the small variety, sometimes the large. Some sockets take plugs with two round pins. Local electrical shops sell cheap adapters. Blackouts (‘load shedding’) are a fact of life across Nepal, especially in Kathmandu; these peak in February with up to 16 hours a day of cuts. Power surges are also likely, so bring a voltage guard with spike suppressor (automatic cut-off switch) for your laptop. Embassies & Consulates Travellers continuing beyond Nepal may need visas for Bangladesh, China, India, Myanmar (Burma) and Thailand. The only visas dished out in Kathmandu for Tibet (actually there’s no such thing as a ‘visa for Tibet’; it’s just a Chinese group visa and a travel permit for Tibet) are for organised groups.
Imagining India by Nandan Nilekani
addicted to oil, affirmative action, Airbus A320, BRICs, British Empire, business process, business process outsourcing, call centre, clean water, colonial rule, corporate governance, cuban missile crisis, deindustrialization, demographic dividend, demographic transition, Deng Xiaoping, digital map, distributed generation, farmers can use mobile phones to check market prices, full employment, ghettoisation, glass ceiling, global supply chain, Hernando de Soto, income inequality, informal economy, information asymmetry, Intergovernmental Panel on Climate Change (IPCC), joint-stock company, knowledge economy, land reform, light touch regulation, LNG terminal, load shedding, low cost airline, Mahatma Gandhi, market fragmentation, mass immigration, Mikhail Gorbachev, Network effects, new economy, New Urbanism, open economy, Parag Khanna, pension reform, Potemkin village, price mechanism, race to the bottom, rent control, rolodex, Ronald Reagan, school vouchers, Silicon Valley, smart grid, special economic zone, The Wealth of Nations by Adam Smith, Thomas L Friedman, Thomas Malthus, transaction costs, trickle-down economics, unemployed young men, upwardly mobile, urban planning, urban renewal, women in the workforce, working poor, working-age population
But I think that India’s growth rates have made us perhaps overly cheerful in the face of some obvious weaknesses. And somebody has to say it.” He is right, of course. There is no escaping our infrastructure problems, even here in India’s capital city—the Delhi newspapers during my visit have been full of headlines on the city’s power outages. A single day that week, as one outraged journalist wrote, had seen “10 periods of ‘load-shedding.’” In fact this particular bit of bureaucratspeak we use, “load-shedding,” reveals how a growing economy has found it difficult to look its crisis in the face.bt Our bad roads and power cuts are a reminder of our prereform years—it is here that we can most clearly see the evidence of India’s old structures, the tattered vestiges of socialism in an emerging free-market economy. As a result India now presents us with a bewildering landscape—of vibrant, private enterprise choking up as it meets crumbling public infrastructure.
bq The richer classes in Bombay’s slums earn as much as Rs 14,000 a month, which means a substantial part of Bombay’s middle class lives here. br It is a different story that this rule has often been violated by state governments. bs Bangalore can lay claim to pioneering bond issues by cities in India—India’s first such bond issue was by the Bangalore Mahanagarapalika in 1997 of Rs 1 billion, with a coupon rate of 13 percent. bt As a technical term, “load-shedding” means power cuts to tackle spikes in excess demand. But what India faces is consistent and severe power shortage. bu This view of roads and railways as an investment toward safety—to move people and goods in and out quickly, and avoid being cornered by enemies—has plenty of precedent. The Romans built Britain’s major road systems when they had occupied the restive island, and many of these still exist.
Nerds on Wall Street: Math, Machines and Wired Markets by David J. Leinweber
AI winter, algorithmic trading, asset allocation, banking crisis, barriers to entry, Big bang: deregulation of the City of London, business cycle, butter production in bangladesh, butterfly effect, buttonwood tree, buy and hold, buy low sell high, capital asset pricing model, citizen journalism, collateralized debt obligation, corporate governance, Craig Reynolds: boids flock, creative destruction, credit crunch, Credit Default Swap, credit default swaps / collateralized debt obligations, Danny Hillis, demand response, disintermediation, distributed generation, diversification, diversified portfolio, Emanuel Derman, en.wikipedia.org, experimental economics, financial innovation, fixed income, Gordon Gekko, implied volatility, index arbitrage, index fund, information retrieval, intangible asset, Internet Archive, John Nash: game theory, Kenneth Arrow, load shedding, Long Term Capital Management, Machine translation of "The spirit is willing, but the flesh is weak." to Russian and back, market fragmentation, market microstructure, Mars Rover, Metcalfe’s law, moral hazard, mutually assured destruction, Myron Scholes, natural language processing, negative equity, Network effects, optical character recognition, paper trading, passive investing, pez dispenser, phenotype, prediction markets, quantitative hedge fund, quantitative trading / quantitative ﬁnance, QWERTY keyboard, RAND corporation, random walk, Ray Kurzweil, Renaissance Technologies, risk tolerance, risk-adjusted returns, risk/return, Robert Metcalfe, Ronald Reagan, Rubik’s Cube, semantic web, Sharpe ratio, short selling, Silicon Valley, Small Order Execution System, smart grid, smart meter, social web, South Sea Bubble, statistical arbitrage, statistical model, Steve Jobs, Steven Levy, Tacoma Narrows Bridge, the scientific method, The Wisdom of Crowds, time value of money, too big to fail, transaction costs, Turing machine, Upton Sinclair, value at risk, Vernor Vinge, yield curve, Yogi Berra, your tax dollars at work
Smart meters with Internet communication capabilities were the enabling technology for the next wave of technologydriven savings, designed to bring the suppliers into the process. This was 336 Nerds on Wall Str eet done using simple command-and-control load-shedding measures that allowed utilities, with prior agreement of larger customers, to shed loads during periods of peak demand or to remotely adjust airconditioning thermostats upward to reduce demand when needed. The next step, still in its infancy, is to introduce real-time electricity pricing. This will allow consumers to make their own economically motivated load-shedding decisions, and to program their meters to implement those decisions for them. Day Trading for Electrons In the best seller Hot, Flat, and Crowded: Why We Need a Green Revolution—and How It Can Renew America (Farrar, Straus & Giroux, 2008), New York Times columnist Thomas Friedman calls the use of smart meters to create a market-based system of energy technology (ET), “when IT meets ET—day trading for electrons.”
Adventures in the Anthropocene: A Journey to the Heart of the Planet We Made by Gaia Vince
3D printing, agricultural Revolution, bank run, car-free, carbon footprint, citizen journalism, clean water, congestion charging, crowdsourcing, decarbonisation, deindustrialization, energy security, failed state, Google Earth, Haber-Bosch Process, hive mind, informal economy, Intergovernmental Panel on Climate Change (IPCC), Kickstarter, load shedding, M-Pesa, Mars Rover, Masdar, megacity, mobile money, off grid, oil shale / tar sands, out of africa, Peter Thiel, phenotype, planetary scale, Ray Kurzweil, Silicon Valley, Skype, smart cities, smart grid, smart meter, South China Sea, sovereign wealth fund, stem cell, supervolcano, sustainable-tourism
The government has just a few years to build enough reservoirs to trap the melting waters and power the country towards twenty-first-century development, before lights go out. It is hard to see how that will happen. Drought conditions are already causing blackouts as the nation’s hydropower struggles with lack of water and poor energy infrastructure. As throughout the developing world, most of the blackouts are planned load-shedding intervals, where the government tries to manage the poor supply by rationing electricity among different regions in turn. The load-shedding is seriously impacting Nepal’s fledgling electric car industry, its 700 Safa Tempos (three-wheeled electric passenger vans), which cleanly ply Kathmandu’s streets, charging at thirty-two stations and transporting around 100,000 people a day. More than $8 million is invested in the industry, and its five manufacturing companies employ thousands.
Countdown: Our Last, Best Hope for a Future on Earth? by Alan Weisman
air freight, Albert Einstein, anti-communist, Ayatollah Khomeini, Berlin Wall, Bretton Woods, British Empire, call centre, carbon footprint, clean water, colonial rule, David Attenborough, demographic transition, Deng Xiaoping, El Camino Real, epigenetics, Filipino sailors, Haber-Bosch Process, happiness index / gross national happiness, haute couture, housing crisis, ice-free Arctic, Ignaz Semmelweis: hand washing, illegal immigration, immigration reform, Intergovernmental Panel on Climate Change (IPCC), land reform, liberation theology, load shedding, Louis Pasteur, Mahatma Gandhi, megacity, Menlo Park, new economy, oil shale / tar sands, out of africa, Pearl River Delta, planetary scale, Ponzi scheme, race to the bottom, Ronald Reagan, Satyajit Das, Silicon Valley, South China Sea, stem cell, Stephen Hawking, Stewart Brand, unemployed young men, upwardly mobile, urban sprawl, Whole Earth Catalog, WikiLeaks
Everyone is back: men in white kurtis and prayer caps; hijab’d women brilliant as tropical birdlife, wrapped in multihued loose pants and tunics called salwar kameez; other women in black chadors, even transvestites in chadors, all threading their way through the stalled traffic, buying provisions and tea. Since 10:00 a.m., that traffic has gone from mere paralysis to pandemonium, as Lyari’s stoplights are out for the next three hours. All but the most privileged parts of Karachi are subject to load-shedding—daily rolling blackouts—because the city can’t possibly keep up with demand. There were fewer than a half-million people here in 1947. Today’s 21 million is a forty-two-fold increase. No one could have prepared for this. Three days earlier, when the grenade attacks began, everyone stayed hidden until long after the explosions ended. Thankfully, only two deaths this time. At the Civil Hospital, Pakistan’s biggest, which has a police station at its front entrance, eleven wounded were brought into emergency.
She is the second wife of a man who was her brother-in-law until her husband died in a bombing. In northern Pakistan, a man will often support a brother’s widow by marrying her. He has six children with his first wife, and three with her. She wants to keep pleasing him so he’ll be attentive. Alma takes her hand. “But in your condition, more pregnancies are a risk.” The overhead fan quits and the deadened air is immediately stifling. The women exchange worried glances, because load-shedding was over for the day, and unexpected blackouts often signal yet a new civil disturbance. Asma pulls a flashlight from her desk drawer and motions for the next client. An entire bench stands and approaches: five women in white burqas bordered with lace, their dark eyes peering through woven lattice grills in their face hoods. They are Pashto speakers from Pakistan’s own version of Switzerland, the Swat Valley in Khyber Pakhtunkhwa: a sublimely beautiful region wedged between Afghanistan and Kashmir in far northern Pakistan.
Engineering Security by Peter Gutmann
active measures, algorithmic trading, Amazon Web Services, Asperger Syndrome, bank run, barriers to entry, bitcoin, Brian Krebs, business process, call centre, card file, cloud computing, cognitive bias, cognitive dissonance, combinatorial explosion, Credit Default Swap, crowdsourcing, cryptocurrency, Daniel Kahneman / Amos Tversky, Debian, domain-specific language, Donald Davies, Donald Knuth, double helix, en.wikipedia.org, endowment effect, fault tolerance, Firefox, fundamental attribution error, George Akerlof, glass ceiling, GnuPG, Google Chrome, iterative process, Jacob Appelbaum, Jane Jacobs, Jeff Bezos, John Conway, John Markoff, John von Neumann, Kickstarter, lake wobegon effect, Laplace demon, linear programming, litecoin, load shedding, MITM: man-in-the-middle, Network effects, Parkinson's law, pattern recognition, peer-to-peer, Pierre-Simon Laplace, place-making, post-materialism, QR code, race to the bottom, random walk, recommendation engine, RFID, risk tolerance, Robert Metcalfe, Ruby on Rails, Sapir-Whorf hypothesis, Satoshi Nakamoto, security theater, semantic web, Skype, slashdot, smart meter, social intelligence, speech recognition, statistical model, Steve Jobs, Steven Pinker, Stuxnet, telemarketer, text mining, the built environment, The Death and Life of Great American Cities, The Market for Lemons, the payments system, Therac-25, too big to fail, Turing complete, Turing machine, Turing test, web application, web of trust, x509 certificate, Y2K, zero day, Zimmermann PGP
To cope with the inability to handle the driving process via automatic actions, novice drivers load-shed by ignoring one of the two main aspects of driving (speed control and steering), with the result that they crawl down the road at an irritatingly slow speed while they concentrate on steering. It’s not until both aspects of vehicle control have become automatic processes that the novices progress to the level of more experienced drivers . 138 Psychology This load-shedding phenomenon is particularly pernicious in situations like aircraft control, where a multitude of events such as an unexpected occurrence during an already complex operation like takeoff or landing can overload a pilot’s ability to maintain full awareness of the situation . In order to cope with the situational awareness problem the pilot load-sheds, and the result of this process is written up by the board of inquiry as “pilot error”.
In order to cope with the situational awareness problem the pilot load-sheds, and the result of this process is written up by the board of inquiry as “pilot error”. Mind you, you can sometimes use the load-shedding phenomenon to your advantage. If you suspect that someone’s lying to you, you can increase their cognitive load to the point where they can no longer both maintain the lie and deal with the extra load. One way of doing this is to get them to narrate their story in reverse, which is awkward because it runs counter to the natural sequence of events and increases the chances that the liar will trip themselves up . Another example of an automatic process occurs when you drive in to work (or along some other familiar route) and you start thinking about something else. Suddenly you’re at your destination and you can’t really recall any part of the process that got you there. This isn’t something as simple as leaving the iron on, this is a long and very involved process to which a lot of resources are allocated (sometimes this autopilot mechanism can go slightly wrong, leading to problems of absentmindedness when the autopilot kicks in inappropriately and you find yourself halfway to work on a Saturday morning when your original intention was merely to pick up some bread and milk at the shops ).
The result is what performers call choking, someone becoming incapacitated by their own thoughts. You can see the conflict between conscious and unconscious processing yourself if you write something simple like your name or the weekday repeatedly across a piece of paper and at some point start counting backwards from 100 while you write. Look at what happens to either your writing speed or writing quality when you do this, depending on which load-shedding strategy you choose to adopt. Now try it again but this time sign your name (an automatic process for most people) and see what happens. This simple experiment in fact mirrors some of the early investigations into the phenomenon of attention that were carried out in the 1950s, which involved seeing whether and how much performing one task interfered with another . The initial theory was that there was some cognitive bottleneck in the human informationprocessing system, but alongside this bottleneck metaphor there’s a whole list of others including a filtering metaphor that assumes that humans have a limited information-processing capacity and therefore use a kind of selective filter to protect themselves from overload, a serial vs. parallel-processing metaphor in which parallel processing has to switch to serial processing under load, an economic metaphor that models attention as a limited resource that’s allocated as required, a performanceoriented characteristic model that tries to measure the resources allocated to each attention task, and numerous others as well.
The Return of Marco Polo's World: War, Strategy, and American Interests in the Twenty-First Century by Robert D. Kaplan
Admiral Zheng, always be closing, California gold rush, collective bargaining, Deng Xiaoping, Donald Trump, failed state, Francis Fukuyama: the end of history, friendly fire, Haight Ashbury, kremlinology, load shedding, mass immigration, megacity, one-China policy, Parag Khanna, Pax Mongolica, Ronald Reagan, South China Sea, sovereign wealth fund, trade route, Westphalian system, Yom Kippur War
It is doubtful, however, that China can save Pakistan. While it is true that Pakistan’s government is increasingly being held accountable by a burgeoning media and nongovernmental organizations—thereby expanding civil society at the top end of the spectrum in Islamabad and Lahore—and it is also true that interparty warfare in Islamabad has lessened somewhat, the country in fundamental ways continues to deteriorate. Electricity blackouts (“load shedding,” as they are called) are more persistent now than ever, and water shortages are worsening. The situation is fluid. Nuclear power and coal imports may soon alleviate the power blackouts, even as the army has reportedly moved away somewhat from encouraging Islamic radicalism. But Pakistan’s population growth is still above 2 percent annually, meaning its population doubles every thirty-five years.
Lonely Planet Cape Town & the Garden Route (Travel Guide) by Lucy Corne
Berlin Wall, British Empire, Cape to Cairo, carbon footprint, haute couture, haute cuisine, load shedding, Mark Shuttleworth, mass immigration, Nelson Mandela, New Urbanism, Robert Gordon, upwardly mobile, urban renewal, urban sprawl
The Natural Environment Shaped over millions of years, the Cape’s dramatic features are carpeted by the richest floral kingdom in the world. Wine The forces that created this 350-year-old industry, and how it is tackling the working practices that blighted its past. Cape Town Today The legacy of the city’s stint as World Design Capital 2014 (WDC2014); the threat of electricity blackouts (known as ‘load shedding’) due to a struggling national grid; political tussles between the Democratic Alliance (DA), who run the city and the Western Cape, and national governing party the African National Congress (ANC); and is Cape Town the most racist city in South Africa? These are among the ongoing conversation topics across the Mother City. Best on Film Black Butterflies Biopic about Afrikaans poet Ingrid Jonkers (a powerful performance by Carice van Houten) set in Cape Town in the 1950s and '60s.
Extreme Money: Masters of the Universe and the Cult of Risk by Satyajit Das
affirmative action, Albert Einstein, algorithmic trading, Andy Kessler, Asian financial crisis, asset allocation, asset-backed security, bank run, banking crisis, banks create money, Basel III, Benoit Mandelbrot, Berlin Wall, Bernie Madoff, Big bang: deregulation of the City of London, Black Swan, Bonfire of the Vanities, bonus culture, Bretton Woods, BRICs, British Empire, business cycle, capital asset pricing model, Carmen Reinhart, carried interest, Celtic Tiger, clean water, cognitive dissonance, collapse of Lehman Brothers, collateralized debt obligation, corporate governance, corporate raider, creative destruction, credit crunch, Credit Default Swap, credit default swaps / collateralized debt obligations, Daniel Kahneman / Amos Tversky, debt deflation, Deng Xiaoping, deskilling, discrete time, diversification, diversified portfolio, Doomsday Clock, Edward Thorp, Emanuel Derman, en.wikipedia.org, Eugene Fama: efficient market hypothesis, eurozone crisis, Everybody Ought to Be Rich, Fall of the Berlin Wall, financial independence, financial innovation, financial thriller, fixed income, full employment, global reserve currency, Goldman Sachs: Vampire Squid, Gordon Gekko, greed is good, happiness index / gross national happiness, haute cuisine, high net worth, Hyman Minsky, index fund, information asymmetry, interest rate swap, invention of the wheel, invisible hand, Isaac Newton, job automation, Johann Wolfgang von Goethe, John Meriwether, joint-stock company, Jones Act, Joseph Schumpeter, Kenneth Arrow, Kenneth Rogoff, Kevin Kelly, laissez-faire capitalism, load shedding, locking in a profit, Long Term Capital Management, Louis Bachelier, margin call, market bubble, market fundamentalism, Marshall McLuhan, Martin Wolf, mega-rich, merger arbitrage, Mikhail Gorbachev, Milgram experiment, money market fund, Mont Pelerin Society, moral hazard, mortgage debt, mortgage tax deduction, mutually assured destruction, Myron Scholes, Naomi Klein, negative equity, NetJets, Network effects, new economy, Nick Leeson, Nixon shock, Northern Rock, nuclear winter, oil shock, Own Your Own Home, Paul Samuelson, pets.com, Philip Mirowski, plutocrats, Plutocrats, Ponzi scheme, price anchoring, price stability, profit maximization, quantitative easing, quantitative trading / quantitative ﬁnance, Ralph Nader, RAND corporation, random walk, Ray Kurzweil, regulatory arbitrage, rent control, rent-seeking, reserve currency, Richard Feynman, Richard Thaler, Right to Buy, risk-adjusted returns, risk/return, road to serfdom, Robert Shiller, Robert Shiller, Rod Stewart played at Stephen Schwarzman birthday party, rolodex, Ronald Reagan, Ronald Reagan: Tear down this wall, Satyajit Das, savings glut, shareholder value, Sharpe ratio, short selling, Silicon Valley, six sigma, Slavoj Žižek, South Sea Bubble, special economic zone, statistical model, Stephen Hawking, Steve Jobs, survivorship bias, The Chicago School, The Great Moderation, the market place, the medium is the message, The Myth of the Rational Market, The Nature of the Firm, the new new thing, The Predators' Ball, The Wealth of Nations by Adam Smith, Thorstein Veblen, too big to fail, trickle-down economics, Turing test, Upton Sinclair, value at risk, Yogi Berra, zero-coupon bond, zero-sum game
My Indian heritage has gotten me an invitation to the Indian Bankers’ Association party themed “India Shining,” a shameless sales pitch for investment in India. A minister extols the virtues of India, citing statistics on growth, resource availability, and opportunities. There is no mention of the fact that the vast majority of the Indian population has no access to sanitation, clean water, education, or healthcare. There is no mention of the aging colonial era infrastructure where inadequate electricity supply results in daily load shedding or brownouts interrupting power supplies for several hours most days. An American banker finds India fascinating and full of opportunity. “A billion people, a billion consumers, wow!” He is fascinated that I, an Indian, do not speak Indian but Bengali, one of the hundreds of languages spoken in India. “Wouldn’t it be easier if everybody just spoke, you know, Indian?” Dan Quayle, a former U.S. vice-president, once apologized to Latin Americans that he could not speak Latin.
The Architecture of Open Source Applications by Amy Brown, Greg Wilson
8-hour work day, anti-pattern, bioinformatics, c2.com, cloud computing, collaborative editing, combinatorial explosion, computer vision, continuous integration, create, read, update, delete, David Heinemeier Hansson, Debian, domain-specific language, Donald Knuth, en.wikipedia.org, fault tolerance, finite state, Firefox, friendly fire, Guido van Rossum, linked data, load shedding, locality of reference, loose coupling, Mars Rover, MITM: man-in-the-middle, MVC pattern, peer-to-peer, Perl 6, premature optimization, recommendation engine, revision control, Ruby on Rails, side project, Skype, slashdot, social web, speech recognition, the scientific method, The Wisdom of Crowds, web application, WebSocket
Like the consistent hash ring approach, this range partitioning splits the keyspace into ranges, with each key range being managed by one machine and potentially replicated to others. Unlike the consistent hashing approach, two keys that are next to each other in the key's sort order are likely to appear in the same partition. This reduces the size of the routing metadata, as large ranges are compressed to [start, end] markers. In adding active record-keeping of the range-to-server mapping, the range partitioning approach allows for more fine-grained control of load-shedding from heavily loaded servers. If a specific key range sees higher traffic than other ranges, a load manager can reduce the size of the range on that server, or reduce the number of shards that this server serves. The added freedom to actively manage load comes at the expense of extra architectural components which monitor and route shards. The BigTable Way Google's BigTable paper describes a range-partitioning hierarchical technique for sharding data into tablets.