• Courses
  • Who
  • Contact Me
  • Privacy Policy
  • Facebook Security

ikawnoclastic thoughts

  • Testing

    December 31st, 2015

    This is a test of the WordPress.org site for blog posts.

     

  • Exploring ZFS Properties

    April 30th, 2015
    We have options! (CC BY-ND 2.0 licensed image by Bill Ohl, haynseek on Flickr)
    We have options! (CC BY-ND 2.0 licensed image by Bill Ohl, haynseek on Flickr)

    Properties are an important part of determining and setting the configuration of ZFS storage systems. They can also be used to review the performance and usage of storage resources. Properties can be set at a top-level and inherited by child components when created. Understanding how ZFS properties are utilized is important to operating an efficient storage system.

    In this article, we will explore how to properties work and how to get and set properties.

    Learning Objectives

    1. Learn how properties and their inheritance are used in ZFS.
    2. Learn how to set properties to change the configuration of a storage system.
    3. Learn how to get information from properties.

    This article is one of a series of articles on ZFS. You can start at the beginning by creating a ZFS playground on which you can play.

    (more…)

  • Video of My TEDx Talk

    March 8th, 2015
    Presenting at TEDxLafayette 2014
    Presenting at TEDxLafayette 2014

    The video of my TEDx talk for TEDxLafayette 2014, “City Full of Unmanned Vehicles” is available on Youtube. Previously, I posted the text of the talk.

    In this talk, I lay out my vision for the use of unmanned and autonomous vehicles and their uses within city limits. There are many potential benefits in terms of public safety, disaster response, personal transportation, delivery and logistics. However, a balance is needed between safety and the ability of system developers to experiment and advance the technology in the environments in which these systems will be used. I explore many of these ideas in this TEDx Talk.

    What do you think? In light of the proposed FAA regulations regarding unmanned aerial systems (released after my talk), did I present the issue with the right balance? Are unmanned and autonomous systems just too experimental at this point to be used in our cities?

    I look forward to your comments.

  • Expanding Your ZFS Pool

    February 28th, 2015
    Now that's a big pool! (CC BY-NC-SA 2.0 licensed image by Trey Ratcliff, Flickr user stuckincustoms)
    Now that’s a big pool! (CC BY-NC-SA 2.0 licensed image by Trey Ratcliff, Flickr user stuckincustoms)

    In addition to data integrity, device redundancy, and performance features, ZFS Storage Pools can also expanded in usable storage size through deduplication and compression of the data stored. In other words by shrinking raw data and removing duplicated parts of data, ZFS Storage Pools can store more data on disk. While there are some memory trade-offs using deduplication, it can provide significant storage savings for some types of stored data. There are also some significant performance benefits to compression.

    In this article, we will explore how to configure deduplication and compression for storage pools.

    Learning Objectives

    1. Learn about deduplication and configure it on a storage pool.
    2. Learn about compression and configure it on a storage pool.

    (more…)

  • Mac OS X PF Firewall: Protecting SSH from Brute Force Attacks

    January 29th, 2015
    Apple-like gate (CC BY-SA 2.0 Licensed image by Dennis Jarvis, Flickr user archer10)
    Apple-like gate (CC BY-SA 2.0 Licensed image by Dennis Jarvis, archer10)

    The OpenBSD‘s PF provides a great many features for packet filtering and network address translation. Mac OS X includes a version of PF that can be used to protect network services. In an article called “Mac OS X pf: Avoiding known bad guys“, I talk about using the Mac OS X PF firewall to protect against known bad sites. In this article, we explore a technique to protect SSH from attackers trying to gain remote access to your Mac by guessing passwords by brute force.

    Most of what I learned about PF was used at the office to protect our network. We built redundant firewalls using FreeBSD and PF rules. I started to experiment with the Mac OS X PF implementation once I learned that it was shipped in Lion (Mac OS X 10.7). I am specifically concerned about my Mac laptop systems. The information in this article can also be applied to Mac server and desktop systems too.

    (more…)

«Previous Page
1 2 3 4 5 6
Next Page»

Proudly powered by WordPress

 

Loading Comments...
 

    • Follow Following
      • ikawnoclastic thoughts
      • Already have a WordPress.com account? Log in now.
      • ikawnoclastic thoughts
      • Edit Site
      • Follow Following
      • Sign up
      • Log in
      • Report this content
      • View site in Reader
      • Manage subscriptions
      • Collapse this bar