Load Impact & Async Postback Error

Load Impact Performance Testing - Healthy Sites Mean Consistent Testing

I thought I’d post about this as others may have run into this issue and not finding the right information about resolving it. We spent a lot of time googling to no avail.

In anticipation of our largest traffic spike of the year, we ran a load test using Load Impact, a third-party service that bombards your website with virtual users as a means of testing how your servers handle an influx of increasing traffic. For a small fee, of course.

We began a test of 800 VUs over the course of a 1/2 hour and began seeing the following error (ASP.NET):

There was an error
SITE ERROR TYPE: System.InvalidOperationException [500] Error Message: The page is performing an async postback but the ScriptManager.SupportsPartialRendering property is set to false. Ensure that the property is set to true during an async postback. URL:https://www.foo.com/foo USER AGENT:LoadImpactRload/3.2.0 (Load Impact; http://loadimpact.com); REFERRER: Error Stack: at System.Web.UI.ScriptManager.OnPageInitComplete(Object sender, EventArgs e) at System.Web.UI.Page.OnInitComplete(EventArgs e) at System.Web.UI.Page.ProcessRequestMain(Boolean includeStagesBeforeAsyncPoint, Boolean includeStagesAfterAsyncPoint)

This error came with every request and eventually the server choked. Figuring that we uncovered some major bug, we took to googling, finding fixes from simple to complicated. The thing is, looking back in our error logs, we’ve only seen this error a few times in real life and even then, only coming from some mobile devices. So, we deduced that this error was triggered by Load Impact itself. Sure enough, we changed the user agent, re-ran the tests, and the errors disappeared.

The Load Impact tests default to Load Impact as the user agent. You can change this via the Advanced Settings in the portal or you can add a line at the top of your scripts. Chrome on Windows is, by far, the most popular browser used to visit our website, so we added:

http.set_user_agent_string("Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.36")

Easy peasy, no more errors. Hope this fixes your problem.

SkyNet is Sooner Than You Think, Thanks to Facebook.

From Forbes Magazine
www.forbes.com/sites/tonybradley/2017/07/31/facebook-ai-creates-its-own-language-in-creepy-preview-of-our-potential-future/#6b59f31f292c

Facebook AI Creates Its Own Language In Creepy Preview Of Our Potential Future
Tony Bradley, CONTRIBUTOR

Facebook shut down an artificial intelligence engine after developers discovered that the AI had created its own unique language that humans can’t understand. Researchers at the Facebook AI Research Lab (FAIR) found that the chatbots had deviated from the script and were communicating in a new language developed without human input. It is as concerning as it is amazing – simultaneously a glimpse of both the awesome and horrifying potential of AI.

Artificial Intelligence is not sentient—at least not yet. It may be someday, though – or it may approach something close enough to be dangerous. Ray Kurzweil warned years ago about the technological singularity. The Oxford dictionary defines “the singularity” as, “A hypothetical moment in time when artificial intelligence and other technologies have become so advanced that humanity undergoes a dramatic and irreversible change.”

To be clear, we aren’t really talking about whether or not Alexa is eavesdropping on your conversations, or whether Siri knows too much about your calendar and location data. There is a massive difference between a voice-enabled digital assistant and an artificial intelligence. These digital assistant platforms are just glorified web search and basic voice interaction tools. The level of “intelligence” is minimal compared to a true machine learning artificial intelligence. Siri and Alexa can’t hold a candle to IBM’s Watson.

Scientists and tech luminaries, including Elon Musk, Bill Gates, and Steve Wozniak have warned that AI could lead to tragic unforeseen consequences. Eminent physicist Stephen Hawking cautioned in 2014 that AI could mean the end of the human race. “It would take off on its own and re-design itself at an ever increasing rate. Humans, who are limited by slow biological evolution, couldn’t compete, and would be superseded.”

Stephen Hawking
Stephen Hawking. Photo copyright NIKLAS HALLE’N/AFP/Getty Images

Why is this scary? Think SKYNET from Terminator, or WOPR from War Games. Our entire world is wired and connected. An artificial intelligence will eventually figure that out – and figure out how to collaborate and cooperate with other AI systems. Maybe the AI will determine that mankind is a threat, or that mankind is an inefficient waste of resources – conclusions that seems plausible from a purely logical perspective.

Machine learning and artificial intelligence have phenomenal potential to simplify, accelerate, and improve many aspects of our lives. Computers can ingest and process massive quantities of data and extract patterns and useful information at a rate exponentially faster than humans, and that potential is being explored and developed around the world.

I am not saying the sky is falling. I am not saying we need to pull the plug on all machine learning and artificial intelligence and return to a simpler, more Luddite existence. We do need to proceed with caution, though. We need to closely monitor and understand the self-perpetuating evolution of an artificial intelligence, and always maintain some means of disabling it or shutting it down. If the AI is communicating using a language that only the AI knows, we may not even be able to determine why or how it does what it does, and that might not work out well for mankind.

Hackers Descend on Las Vegas to Expose Voting Machine Flaws

A voter casts a ballot at a machine at Cheyenne High School on Election Day on Nov. 8, 2016, in North Las Vegas, Nevada. | Ethan Miller/Getty

“We’ve” been saying this for years, ever since the advent of electronic tallying.

From Politico:
www.politico.com/story/2017/07/30/hackers-voting-machines-las-vegas-241130
Image copyright Ethan Miller/Getty.

Hackers descend on Las Vegas to expose voting machine flaws
By KEVIN COLLIER 07/30/2017 07:25 AM EDT Updated 07/31/2017 12:24 AM EDT

LAS VEGAS — Election officials and voting machine manufacturers insist that the rites of American democracy are safe from hackers. But people like Carten Schurman need just a few minutes to raise doubts about that claim.

Schurman, a professor of computer science at the University of Copenhagen in Denmark, used a laptop’s Wi-Fi connection Friday to gain access to the type of voting machine that Fairfax County, Virginia, used until just two years ago. Nearby, other would-be hackers took turns trying to poke into a simulated election computer network resembling the one used by Cook County, Illinois.

Elsewhere, a gaggle of hackers went to work on a model still used in parts of seven states, as well as all of the state of Nevada. Though the device was supposedly wiped before it was sold by the government at auction, the hackers were able to uncover the results the machine tallied in 2002.

A voter casts a ballot at a machine at Cheyenne High School on Election Day on Nov. 8, 2016, in North Las Vegas, Nevada. | Ethan Miller/Getty
A voter casts a ballot at a machine at Cheyenne High School on Election Day on Nov. 8, 2016, in North Las Vegas, Nevada. | Ethan Miller/Getty

They were among the hundreds of cybersecurity experts who descended on “Voting Village,” one of the most talked-about features of the annual DEF CON hacker conference. In a cramped conference room, they took turns over three days cracking into 10 examples of voting machines and voter registration systems — a reminder, they say, of the risks awaiting upcoming U.S. elections.

“I could have done this in 2004,” said Schurman, who could gain administrative-level access to the voting machine, giving him the power to see all the votes cast on the device and to manipulate or delete vote totals. “Or 2008, or 2012.”

Anne-Marie Hwang, an intern at the digital security firm Synac, demonstrated that by bringing a generic plastic key to mimic the ones given to poll workers and plugging in a keyboard, she could simply hit control-alt-delete and enter the voting machine’s generic password to gain administrative access.

The lesson: “The bad guys can get in,” said Jake Braun, a panel moderator at the conference who advised the Department of Homeland Security on cybersecurity during the Obama administration.

And that means election officials must acknowledge that no security is foolproof. Instead, Braun said, they need to adopt the private sector model of working to better detect and minimize the effect of successful cyberattacks rather than trying to become impenetrable.

“‘Unhackable’ is absurd on its face,” Braun said. “If the Russians and Chinese and whoever else can get into NSA and Lockheed Martin and JP Morgan, they absolutely can get into Kalamazoo County or the state of Ohio or the [voting machine] vendor.”

Already, the country has seen Moscow-backed hackers attack the 2016 U.S. election in what intelligence officials said was a widespread digital meddling campaign orchestrated by Russian President Vladimir Putin. According to U.S. officials, the Kremlin’s digital spies targeted at least 21 state voter registration systems and successfully infiltrated at least two, Arizona and Illinois. On Election Day, the White House staff was so worried about Russian hackers tampering with the actual voting process that it drew up a 15-page contingency plan that included potentially deploying the military and National Guard.

But Nov. 8 came and went with no indication that any votes were altered, a point U.S. officials stress regularly. Voting security experts caution, though, that the country doesn’t have the mechanisms in place to make such a definitive conclusion.

“One thing that’s been very unfortunate in the way a lot of election officials have talked about the breaches is saying the phrase we have no evidence that X, Y, or Z happened,” Braun added. “However, the real answer is they have no idea what happened, or [way] of knowing. I’m not suggesting votes were switched or voters were deleted from voter files, but the point is the security is so lax and so bad that they have no way of going back and doing the forensics and saying one way or the other.”

Federal and state officials argue that it would be extremely unlikely for hackers to manipulate vote tallies. Voting machines are not connected to the internet and many states collect voter registration information at the county level, providing a backup to confirm the veracity of the statewide database. Basically, the system is decentralized and lacks key internet links, they say.

Before the 2016 election, former FBI Director James Comey assuaged fears by telling Congress that the system was so “clunky” — comprised of a mishmash of different kinds of machines and networks, with each state’s results managed by a consortium of state and county officials — that its overall integrity was fairly safe.

Election security advocates aren’t as confident. Barbara Simons, Board Chair of Verified Voting, a nonprofit that since 2003 has studied U.S. elections equipment, said that the vulnerabilities on display in Las Vegas only served to reiterate a need for the country to adopt a nationwide system of verifiable paper ballots and mandatory, statistically significant audits.

While numerous states have starting moving in this direction, Simons worries it’s not enough.

“Nobody’s done a really thorough examination,” Simons said. “Even where there are paper ballots, most ballots haven’t been checked to see if there was any hacking or intrusion, so even if security people didn’t see any outside hacking occurring on Election Day, things could have been attacked earlier.”

Verified Voting, Simons said, plans to partner with Braun and several other groups that have not yet been named to aggressively campaign for increasing DHS grants that would pay for states to make specific upgrades to their election security systems.

“It’s actually pretty cheap to do it,” Braun said, putting the price tag at $500-600 million.

A significantly more secure election, while relatively difficult to implement, doesn’t need to be complicated, Simons said.

“We know how to protect ourselves against Russian hacking,” she said. “Paper ballots and post-election ballot audits before the results are certified. That’s what we need across the country. It’s a straightforward solution.”