I recently read an article called “Computer. Science. Paradox?” by Ben Rockwood which pointed me to a phenomenal project called “Great Principles of Computing.” The project’s founding principle is that Computing, not Computers are the center of our study and that the Science of Computing is, indeed, a natural science. This project touches on so many issues in the teaching of Computer Science and how we index our knowledge. It also provides solutions to so many frustrations I felt while working my way through the undergraduate Computer Science curriculum at the University of Akron.
Background When performing automation using OpenSSH/Cron you will inevitably run into concurrency problems. Recently, we had a problem where one machine was receiving 21 ssh connection within one second. This is because the standard cron daemon only has a granularity of one minute. In this article, I am going to quickly elaborate on how we
This tutorial provides guidance on best practices and configuration of OpenSSH/Keychain, but also includes some important troubleshooting techniques for which documentation is somewhat lacking. These techniques took me several years to develop and I have tried to compile them here in one concise post so that others do not have to suffer through the arduous learning process
Today, I got an email from the Fedora package manager, Red, who let me know that there was a problem with Petit. I don’t think he knew it, but it was actually my fault that the whole thing got screwed up, so I felt kind of bad. Well, to make a long story short, when
Gaurav Saxena will be giving this talk: Link
Background An ethnography is a holistic study of another culture conducted by an anthropologist. During the study, the anthropologist lives among the members of the foreign culture, takes notes, and collects data. From this data, the anthropologist develops theories and tests them cross culturally to determine if the source is genetic/biological in nature or enculturated.
Background Today, I finally took the time to update a Cacti Data Query which I wrote a while back. When I took a look at it, I found out that it was never actually working for other people strait out of the box. This data query graphs BGP prefixes, messages received and messages sent. I
Background In my original post KVM Virtualization 101 and my second post KVM Virtualization 102, I explained some basic commands that are necessary to get on using KVM and some features for tuning KVM. In this article I move on to some of the more advanced problems when converting existing Linux machines from a
Background In my original post KVM Virtualization 101 I explained some basic commands that are necessary to get on using KVM. In this article I move on to some slightly more obscure topics in using KVM. Routine Operations CPU Type When you are operating in a KVM virtual machine the processor will report
Background In Part 1, I described a method of documentation where the introduction of the system is made using the documentation. This builds consensus, enculturates an operations group, and provides a platform unto which more automation can be built. In Part 2, I elaborated on the ideas of Bootstrapping & Rooting, Self Service Culture, and