What does an out of work laser do?
Light up the night sky?
Send a message to Alpha Centauri?
Flash incinerate your pop corn?
What does an out of work laser do?
These can not be very good cables because they lack the direction arrow that the Belden audiophile Ethernet cables have (had?). This was so you would know which way to plug them in. Packets flow from hub/switch to the device.
And if you believe this, I have a bridge to sell you.
It is orange and you will make your money back in picture postcard royalties.
Last week I found that my IPv6 address was blocked as a spam IP by Comcast. I have had IP addresses blocked in the past so I did some digging and found the Comcast form you fill out to unblock an IP address and filled it out. When I tried to submit my IPv6 address the form reported that it was a malformed IP address. The form only accepts IPv4 dotted quad addresses.
Just one of the many minor issues facing IPv6 adoption.
I know in my town the local paper carries pictures of the high school games. How is this significantly different than the student taking the pictures? Yes, I know, a press pass and an official newspaper. It would be interesting to hear why the principal thinks this students pictures are different?
It is not hard to get classic mode in the URL. Just add:
As in my book mark:
To bad this will not work for much longer because the new maps really suck under Linux when you don't enable ALL the google java crap.
There is always Taylor Mali's Pizza poem for Pluto:
I is a poem about a planet mnemonic:
My very educated mother just served us nine pizzas
Mercury, Venus, Earth, Mars, Jupiter, Saturn, Uranus, Neptune, Pluto
He also has a great poem about teachers and I love his spell checker poem.
In a clean room, swiping a badge each time is hard. Use RFID in a wrist band. The hand needs to push a button. Put a reader next to the default button so pressing the button authenticates with RFID. For non-default operations requires a RFID swipe. Could the reader be an IoT (Internet of Things) device?
Strong authentication with an RFID device in a clean room environment is easy. Put the RFID wrist band on under the bunny suit. Require the user to authenticate on a computer with their RFID wrist band inside the clean room before anything will work. Two users can not swap wrist bands because they would have to wear them outside the bunny suit which is visually obvious.
A wrist band could work easily any manufacturing environment if the company does not need strong authenticati
Weak authentication is easy. Strong authentication is hard.
Many years ago I took a geomorphology class in college. Geomorphology is the study of the landscape and the geologic processes that shape the contours of the land. We had a lab where we identified landslides using aerial photos and a stereoscope. I already had some experience looking through a stereoscope and identifying landslides so I was finding lots of them. The professor walked by and noticed. He said "OK Robert, now look for larger landslides." They were harder to see because they were older. But they could be identified by their surface mottling and shape. So I start to see them and there are lots of them. The professor was impressed and he said "OK, now step back and look at the entire hill side." When I did this I realized that the entire hillside was one massive landslide. Ridge to valley bottom. Probably on the order of a square mile. He suggested that at some time in the past the entire hillside slid. Probably the result of a 1906 type earthquake in the middle of a very wet winter when all the soil on the hillside was saturated with water. It blew my mind.
Yelling "Fire" in a movie theater is far less terrifying than receiving a death threat. But people do not yell "Fire" in theaters because it is considered socially unacceptable even as a prank. Why are we not raising the same level of social pressure when people send death or rape threats?
Death or rape threats are never a joke just like yelling "Fire" in a theater is never a joke. This is especially true for a woman or girl when they receive one. It is really bad to teach women that they should "Laugh it off" or "Get a thinker skin" in response to a direct threat to their personal safety. Is this how you want your daughters or sisters or mothers to be treated?
Kind of off topic but we have a picture of my father, Jack Harker, walking on water in front of the sculpture. He was manager of "The Labs" and was working with manufacturing to introduce their first Winchester disk drive. The technology was not moving successfully from the lab to the shop. There were some tremendous technical problems in mass producing the drives. Manufacturing gave a very aggressive schedule for solving the problems. My father replied that if they could meet the schedule, he would walk on water.
Manufacturing meet the schedule and the disk drives were delivered. My father had a plywood platform built and painted dark placed just under the surface of the reflecting pool. True to his word, there he was walking on water with the sculpture in the background.
A picture I did not understand fully until after his death.
Jack Harker, one of the fathers of the disk drive industry, a manager's manager, a great dad.
Interesting things to monitor are I/O rates and read/write latency. More esoteric things might be stats about most active files and directories or percentage of recently accessed data -vs- inactive data. But these are more analysis than monitoring. What other parameters would a sysadmin want to look at?
I am a crackpot
At least you know what you are.
Women talk about it as a women's issue because women get the vast majority of the death and rape threats many of which have personal details and need to be taken seriously..
If we treat this as a war, we will be fighting, killing and destroying for 30 years changing little. Most of the death and destruction will happen to the civilian population. We need to treat this as a battle for the hearts and minds of the Muslim world. We have to change attitudes and how they treat each other. Break the cycle of tit for tat, I kill you because you killed my father/brother. This will take a generation or more.
Pre-disclosure and a quarantine period is useful for both infrastructure security bugs like xen and widely deployed security bugs like bash and openssl.
In the case of an infrastructure bug the quarantine period allows the service providers a chance to patch and restart their services before their customers become vulnerable.
In the case of a widely deployed security bug it give the OS/software vendors the chance to investigate the bug. Create patches and test/verify their patches and pre-stage them so when the bug is disclosed publicly sites that do automatic updates are already patched.
I think the two week window used by xen is a good window balancing giving time for people to fix the problem but limiting the time between discovery and public knowledge/exploit.
We used to have crapware preinstalled on Windoze PCs.
Now we get google crapps preinstalled on our smartphones.