Calculate system availability
To calculate the availability of redundant systems you can use this formula: total_avail = 1-(1 - single_avail) ^ (number_of_nodes) Nodes: ...
To calculate the availability of redundant systems you can use this formula: total_avail = 1-(1 - single_avail) ^ (number_of_nodes) Nodes: ...
The other day I needed to copy a bunch of files between to servers in my home network. Because of the volume I wanted to copy the files without having to go through ssh's encryption overhead. So I figured I could use netcat for the data transport. To do that I wrote these short scripts. Remote scripts ...
I am currently using libvirt for managing my VMs. For virtual discs I am using LVM2 volumes. On a regular basis I need to resize these virtual discs, but not that often that I can do this from memory. This is a short procedure to do this: ls -l /dev/vgX/lvX # note down the major/minor numbers for later lvextend -L +50G /dev/vgX/lvX # adding 50GB to this volume ...
I couldn't find any to the point documentation on how to do this, so I am writing this. The way I understand Z-Wave associations work is that once devices are in the same Z-Wave network, a device can directly send a command to another device without intervention of the Hub or controller. ...
The point of this recipe is to create a encrypted file sytem so that when the disc is disposed, it does not need to be securely erased. This is particularly important for SSD devices since because of block remapping (for wear levelling) data can't be overwritten consistently. The idea is that the boot/root filesystem containing the encryption ...
I made the switch to void linux. Except for compatibility issues around glibc, it works quite well. Most compatibility I have worked around with a combination of Flatpaks, chroots and namespaces. The high lights of void linux: ...
In general we try to be similar to MS-Windows shortcuts. Default bindings (in MATE) Key ...
Common Window Management Shortcuts Key Action ...
An inventory of simplenote clients: SimpleNote clients: sncli nvpy notestack ...
Alpine Linux Quick installation See wiki For Alpine Linux > 3.8 Un-comment community repo from /etc/apk/repositories apk add docker rc-update add docker boot ...
These are just random thoughts nothing really was implemented. Alpine Linux image preparation: jq and other deps to /apks/x86_64 ...
To prevent windows lockouts the following can be done: Delete Internet Explorer browsing history Run the following: Open Start --> Search filed--> Type in Run --> rundll32.exe keymgr.dll, KRShowKeyMgr --> Delete ...
Over the years, We've seen many people use this pattern (filter-map): $ [data is generated] | grep something | awk '{print $2}' but it can be shortened to: $ [data is generated] | awk '/something/ {print $2}' You (probably) don't need grep Following this logic, you can replace a simple grep with: ...
This web site contains list of names of different topics. This can be used for naming schemes: Naming Schemes ...
In 15 minutes, you can develop a virtual reality application and run it in a web browser, on a VR headset, or with Google Daydream. The key is A-Frame, an open source toolkit built by the Mozilla VR Team. Test It Open this link ...
Want to share your family photos after your death, but take your search history to the grave? All that and more is possible with Google's Inactive Account Manager. How You Can Control Your Information After Death It's not nice to think about, but one day, you will die, along with the keys to your online kingdom. And these days, those online accounts ...
(remember the ampersand at the start and the semi-colon at the end of each "tag") | Á | Á | | á | á | | À | À | | Â | Â | | à | à | ...
Keep your data and accounts safe by using a secure open source password manager to store unique, complex passwords. Maintaining complex, unique passwords for each site and service you use is among the most common pieces of advice that security professionals provide to the public every year. Yet no matter how many times it is said, it seems like a week doesn't ...
There are plenty of reasons why people would need to encrypt a partition. Whether they're rooted it in privacy, security, or confidentiality, setting up a basic encrypted partition on a Linux system is fairly easy. This is especially true when using LUKS, since its functionality is built directly into the kernel. Installing Cryptsetup ...
Need to create diagrams, flowcharts, circuits, or other kinds of entity-relationship models? Microsoft Visio is without a doubt the best software for that, but that doesn't mean it's the best choice for you. Visio may be the industry standard in the corporate world, but it comes with a huge drawback: it's expensive ($299 for the standard ...