Watching the end of Two and Half Men series 1 and about to start Series 2 #
@Gemmaboyle I just bought Season 1 & 2 box sets; We are having way too much fun, so I can feel a season 3 and 4 purchase coming :)) in reply to Gemmaboyle#
@rebekah_king Well, even without the time difference I would normally get up at 4am locally. Honest. I’ve got better. It used to be 2am! in reply to rebekah_king#
I know it’s only been a few months, but I feel it is time to watch Family Guy all over again from episode one #
@Gemmaboyle Much better although she still has quite a few aches, but the ankle and elbow are less swollen. Thank you for asking! in reply to Gemmaboyle#
@Gemmaboyle Well I’d offer to stow you away in my suitcase when I go to SF and Austin next week, but that would be even worse than economy! in reply to Gemmaboyle#
RT @chris_herborth: Keep ISPs from stopping the next Google – http://is.gd/BmWa#
@BeateVeronica I bought a Mophie juice pack which gives me 10 hours or so, but it makes it huge; it’s 2 years old, I might just replace it in reply to BeateVeronica#
@BeateVeronica it’s work in SF, I’m presenting a talk at #communityone, and popping to Austin, and hopefully meeting some friends too 🙂 in reply to BeateVeronica#
I have a new tutorial on analyzing networks, in terms of understanding your basic network configuration, the other machines and devices on the network, and the general topology.
From the intro:
When accessing a new UNIX system, or even understanding an existing one, a key part of the puzzle to how the system operates is the network configuration. There are many aspects of the network that you need to know and understand to correctly identify problems and prevent future problems. By using some basic tools and commands you can determine a lot about the configuration of a single system, and through this basic understanding, a good idea of the configuration of the rest of the network. With some additional tools, you can expand that knowledge to cover more systems and services within your network.
In this tutorial you will use some basic tools within the UNIX environment that can disclose information about the configuration of your system. By understanding these tools and the information they output, you will be able to gain a greater understanding of your system network configuration and how it works. You will also examine tools and solutions that can look at the wider network and gain more detailed information about your network, its potential security issues, and key points of information that will help you identify and diagnose problems when they do occur.
Tracing applications are something of a passion for me, especially with the introduction of DTrace in Solaris and Mac OS X.
To support that, I have a new tutorial about the different methods available for tracing Unix applications. I tried to concentrate on tools and techniques that don’t require access to the source, like using truss and DTrace.
From the intro:
Most developers and systems administrators know what should happen in their operating system and with their applications, but sadly, this isn’t always the case. There are times when an application has failed, or is not behaving as you expect, and you need to find out more information. By using your existing knowledge of how your application should work and some basic UNIX skills, you can trace the application to find out what is causing the problem. This tutorial will teach you the basic techniques of using tracing tools to find out what your application is doing behind the scenes.
First, the tutorial looks at the distinction between debugging and tracing, and how the two solutions differ. Then it examines some specific examples of where tracing can be used to solve problems in your application. DTrace provides elements of both system tracing and debugging, and also provides you with the ability to time and benchmark applications. Finally, the tutorial shows how to trace the information being exchanged between network computers to help find problems in network applications.
I have a new article on different ways in which you can synchronize your Unix files.
From the intro:
There are many tools available that allow you to synchronize files across UNIX directories, but doing it effectively, and securely, takes a little bit more effort. This article looks at solutions for synchronizing files across UNIX filesystems and different computer systems securely, and at solutions that allow you to synchronize encrypted versions of your files for the purposes of backup.
File synchronization is the process of adding, changing, or deleting a file in one location, and having the same file added to, changed, or deleted at another location. This article covers three utilties, cp, tar, and rsync, that can aid with synchronization of UNIX files. While cp and tar commands have limited synchronization abilities, rsync provides you with the full range of options; however, all three have their place.
Of particular interest is a script that provides an encrypted wrapper around rsync, which I use to provide a nice secure rsync-able backup.
I’ve just received a copy of Cloud Application Architectures by George Reese for review, and my first glance through it this morning I have so far been very impressed by what I’ve read.
It’s in a nice conversational style, and so far the technical material I have glanced over has been very cleanly laid out.
I’ll continue reading and hope to have a full review up soon.