you can edit these boxes with the editor of your choice. And it is amazing. Just click the little edit button and your defined editor fires up and you can start editing in real time.
If you are stuck with twiki you should have a look at http://www.neilvandyke.org/erin-twiki-emacs/
this combination makes wiki pages actually usable
So now the connection was closed but the program still tried to read data from it. So basically there was a dead lock. After setting up the limit the problem disappeared. Further Marco and Me looked into using the Coda file system for our Laptops. We have now requested a server and hopefully we can start installing next week. This should be really cool as this is a networked file system that will sync when it reconnects. So you can take your laptop home work offline and when you come back to work you can keep on working on your big work pc. I further did some research into shadow-utils and userlib. Without going into to much detail userlib is really nice. I don't really understand why so many people still use shadow-utils. I am currently lobbing for userlib to become the standard at Cern. I started thinking about disaster recovery and disaster management. I wrote a script that will run on a server and query the Ldap server every 15 minutes about it's entries then it creates the /etc/passwd, /etc/groups and /etc/shadow. So in the unlikely event that Ldap goes down and Kerberos is still up. The files can just be copied to all the machines and users can still use them.
I started to have a look at the quattor sendmail component that automatically configures the sendmail program. The syntax is really horrible of the sendmail config file. But more to come about this. While writing this I am waiting for my sendmail patches to be commit to the test cluster. Through some minor changes I reduced the run time from about 1 1/2 minutes (real 1m12.017s ) to half a second. (real 0m0.875s).
Further I attended quite a few meetings. And a talk about the new castor scheduler.
I was quite happy to hear that the average uptime is 99.73 % for the machines my department maneges.
This week my Perl script or quattor module went into production. I build the rpm and then did loads of testing on my cluster. I had to pretty much try all the different scenarios under which my program could be run (Dan: installed a machine... lots of times). There were some minor problems but now it is on swrep (the Cern software repository). Because it was such a huge change I got my own version number. Normally the counting is done 2.0.x or something like that, but because I changed so much I now started the 3.0.0 tree. I did some benchmarking on my code and found that it behaved quite linear.
After some research I found out that the library function, I was calling to execute a shell command, had a sleep(1) in it. The idea behind this is to be sure that all buffers have been flushed before it returns. But this of course has a linear execution time as a result. As I don’t rely on the output I simply created a work around, but for the long run I am thinking of changing my program to be multithreaded.
Further I helped Dan to design his new Aims replacement. A system to distribute pxe images, and get the right machine to boot the right OS.
I had a look at the new Google Android mobile development SDK. It seems to be really cool. I wrote a little “hello world” program in it. Currently I am thinking about something I could write for it. Ideas will come.
So another book review. After Ruth told me that my social skills needed improving I bought this book. It is really good and worth reading. It is not one of those boring, this is how your brain works type of books. It takes a different approach. More like this is the situation, this is how Mr. X responds WHY.
I can notice the difference at Work. How I see the people I work with and how I interact with them. For 3 Euro this was one of the best books I have read. Another really good point is the size. It is so small that you can easily fit it in a pocket and big enough to nicely read it.
Buy the way my Week count is still correct. So i haven't missed writing a entry :)
Well, one usually enters a drinking establishment, with money in ones
pocket. One then approaches the bar, inquires to what selection of
drinks are available and based on the reply, selects the cheapest drink
with the high percentage of alcohol. Upon delivery of the drink, one
then adjusts the angle of the glass to allow the liquid to fall down
ones throat. The above is then repeated until one can long complete any
of the above actions, either due to intoxication, lack of money or gets
lucky and takes the barmaid home.
And another one:
This is a classic. I really love it. It has a long description, but stick with me because it's worth it.
There are 4 people who need to cross a narrow bridge at night with only one torch.
The four people each have different travelling times:
Person 1 crosses in 1 minute
Person 2 crosses in 2 minutes
Person 1 crosses in 5 minutes
Person 1 crosses in 10 minutes
Only two people can cross at a time and one person has to come back over the bridge to give the torch to the others still waiting to cross.
While crossing, you have to use the slowest time of the two people because they have to walk the same pace.
You have to add the person who comes back to your total time.
They need to cross in 17 minutes. How?
Here's an example:
5 and 10 go over (that's 10 minutes) and then 5 comes back with the torch (that's a total of 15 minutes). Then 5 and 2 go over (that's 20 minutes---and you're already over the time limit . . . )
How can you get all four people to the other side in 17 minutes?
Note that there is a logical answer. It won't be anything like "they can throw the torch to the other side instead of walking it over", or "they can all wait till sunrise", or "why don't they jog over and increase their times", etc!
Try them, it is really good fun. Don't Google it. We didn't
So now you think ahhh brilliant this will be nice and secure. So you enter your User Name and your password. Lets assume my name is 'r2d2' and my password is 'security'. Lets have a look at the package that is sent over the so trustworthy Internet.
Cookie: sessionid=1245b528-ae7e-4022-9300-0f580a07f33e:0x409; ASPSESSIONIDCC DRTSCS=NKDGCHNAEPBLGGFDAOHGPAHM\r\n
Authorization: Basic cjJkMjpzZWN1cml0eQ==\r\n
Can you spot the password. This is in plain text, I just caught the packet, with wireshark. So lets create a little scenario here. I am sitting in the Library with my laptop over wireless, I want to read my email so I log into the email server. Now someone in the reach of my wireless can sniff the package and get my password. Because this password is used all around uni he can now see everything I see, so my results (mybu), my assignments(h drive), ....
If you want you can use https but it is not enforced.
You can view the whole package here
From: Luis Fernando Mu�oz Mej�as
Subject: Re: AFS usage
On Tuesday 06 November 2007 15:25, Marco Emilio Poleggi wrote:
> , such as Kerberos (I don't think, f.i., that NFS supports it, though
> I might be wrong).
NFS v4 supports Kerberos, although, you know, NFS=Not For Security. ;)
Waiting to go to OpenCon :)
* As of OpenBSD 3.7, reentrant functions are now working, they just are
* incompatible with everyone else. To make OpenBSD happy, we have to
* memzero out certain structures before calling the functions.
# define REENTR_MEMZERO(a,b) memzero(a,b)
# define REENTR_MEMZERO(a,b) 0
# Must make OpenBSD happy
my $memzero = '';
The rest of the week I took holidays to go to Germany and pick up my snowboard.