Archive for the ‘Operating Systems’ Category

6WIND – From Data Plane Acceleration to Virtual Appliances

Sunday, April 12th, 2015

Data Plane Acceleration with 6WIND and Intel DPDK

Data Plane Acceleration with 6WIND and Intel DPDK

6WIND is an interesting company I’ve been following for some time now, initially out of curiosity, and then out of more curiosity :-) . They first started as a networking software company claiming to solve performance challenges for software defined networks (SDN) and network function virtualization (NFV). How you ask? They leverage the capabilities of multicore processors and Intel’s Data Plane Development Kit (DPDK) to allow direct access to the data plane enabling a zero-copy mode from network to CPU! (more…)


Minecraft for $2.5 Billion – Yes, ‘the App’ is King

Tuesday, March 10th, 2015

I’m still not completely over the shock from last November when I learned Microsoft had bought Mojang, the company behind Minecraft, for $2.5 billion dollars. Let me repeat that: “$2.5 BILLION”; you heard right. Markus Persson, the 35 year-old original and main developer with 71% stake in Mojang became an instant billionaire and a member of the Forbes World’s Billionaire list overnight. That’s right, Markus Persson is now #1415 with an estimated worth of $1.3 Billion according to Forbes. (more…)


Security, Art of Hacking, & the Worst 2014 Security Breaches

Sunday, March 1st, 2015

Hacked TargetSecurity is hot; no doubt about it. Consider the fact that between 2011 and 2013, venture investors put nearly $3 billion into cyber security companies, resulting in new funding for some 300 firms (Source: Thomson Reuters). Worldwide security software revenue alone totaled $19.9 billion in 2013, a 4.9 percent increase from 2012 revenue of $19.0 billion (Source: Gartner). According to Gartner, global cybersecurity spending is to reach $76.9 billion in 2015 and $80 billion in 2016; in 2011 it stood at $55 billion. (more…)


Mac OS X: Java – “Application Blocked by Security Settings” Solution

Wednesday, December 24th, 2014

Starting with Java 8 Update 20 (Java 8u20) and later versions the option to lower the security setting in the Java Console Panel to Medium has been removed. Prior, changing the setting to Medium would quickly resolve issues where certain unsigned Java applets would not run. Now, with Java 8u20 and later, only High and Very High levels are available. These security levels are described on the website as stated below. (more…)


Customize the Mac Terminal Shell Prompt in OS X Yosemite

Monday, November 3rd, 2014

The Mac prompt is defined by the ‘PS1′ environment variable which can be defined in the ‘.bash_profile’ hidden file. To customize your Mac Terminal Shell Prompt in OS X Yosemite, follow the below steps. (more…)


BASH Shell Scripting: Passing Arguments to a Python Script

Monday, September 1st, 2014

Larry Wall: “Shell programming is a 1950s juke box …”

In this short blog I write a small Python utility script to create directories and demonstrate how to utilize it and pass it arguments via BASH shell script. The functionality is similar to the ‘mkdir’ UNIX command. The name of the directory or directories to be created is the argument I pass in to the Python script. I then create a BASH shell script to call the Python script. (more…)


MariaDB and the Future of MySQL

Sunday, June 1st, 2014

As you may know by now, since the acquisition of Sun Microsystems by Oracle in 2009 for $7.4 billion, there has been some uncertainty in the industry on the future of MySQL which Sun Microsystems itself acquired for $1 billion in 2008. Even as Oracle professed to provide the same level of support and development effort for the future of MySQL, many within the open source community remained pessimistic. One such pessimist was the father of MySQL, Michael “Monty” Widenius, who forked the MySQL code the day the Sun Microsystems acquisition was announced. (more…)


openSUSE 13.1 and Useful Apps

Saturday, May 24th, 2014

openSUSE 13.1 has been released. I just installed it on an old HP 6530b laptop without issue. Screen resolution, volume, wireless internet, and USB device recognition all seem to work without any additional mucking around. Of course things may not go so smoothly with all laptops/computers depending on the hardware, however, I’ve seen hardware compatibility improve quite a bit over the last several years. Upon booting-up it seems like all works well and my wireless network is easily picked-up. The openSUSE Linux distribution sure has come a long way and is one of my favorite Linux distributions.



OUYA: The ‘Open’ Video Game Console for Users and Developers

Saturday, October 19th, 2013

OUYA Game Console

OUYA Game Console

Amazingly, OUYA, the open video game console platform raised $8,596,474 in funds on KickStarter. OUYA is based on the Android 4.0 operating system. The idea is to create a low cost console (currently $99) available for consumers that also allows developers to publish their Android games/apps to OUYA without requiring the purchase of an expensive SDK and paying licensing, retail, and publishing fees. Anyone is free to develop and publish games that can be easily downloaded and tried for free; if the user likes the app or game, he/she may purchase the full version. It’s actually quite innovative in the sense that the traditional closed living room gaming experience is now open to any developer without the traditional costs associated with developing games for known platforms like Nintendo Wii, Microsoft Xbox, or Sony Playstation. (more…)


Configuring a Syslog Server on CentOS 6.3 for Dell Force10 Switches

Thursday, July 11th, 2013

In this lab I’m going to demonstrate how to configure a syslog server to use with Dell Force10 switches. A syslog server can be used to store log files remotely on an external server. Syslog servers can be invaluable when troubleshooting. If a switch ever fails or reboots, no worries your logs are still available via the syslog server, and you can now analyse them to troubleshoot. An engineer can have multiple network devices write to one syslog file, or, if desired, a seperate syslog file can be created and stored remotely for each network device. (more…)