Posts by DEC

:) Ask "the only thing i click more than my mouse, is my shutter release"

Building future infrastructure…

https://docs.openstack.org/devstack/latest/

Please note shortly into the install documents

If you do not have a preference, Ubuntu 16.04 is the most tested, and will probably go the smoothest.

So make sure that you adjust for potential issues accordingly.

Another option https://cloudstack.apache.org/

#openstack #cloudstack

cloud orchestration platform https://cloudify.co

#cloudify

#cloudorchestration

https://www.openshift.com/  RedHat’s offering with new partnerships, growing

https://www.redhat.com/en/about/press-releases/ibm-and-red-hat-join-forces-accelerate-hybrid-cloud-adoption

#Research #technologychoice #solutionchoices #infrastructure

.dec

Advertisements

A reprint of the Hacker’s Manifesto

Title : Hacker’s Manifesto
Author : The Mentor
                               ==Phrack Inc.==

                    Volume One, Issue 7, Phile 3 of 10

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
The following was written shortly after my arrest...

                       \/\The Conscience of a Hacker/\/

                                      by

                               +++The Mentor+++

                          Written on January 8, 1986
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

        Another one got caught today, it's all over the papers.  "Teenager
Arrested in Computer Crime Scandal", "Hacker Arrested after Bank Tampering"...
        Damn kids.  They're all alike.

        But did you, in your three-piece psychology and 1950's technobrain,
ever take a look behind the eyes of the hacker?  Did you ever wonder what
made him tick, what forces shaped him, what may have molded him?
        I am a hacker, enter my world...
        Mine is a world that begins with school... I'm smarter than most of
the other kids, this crap they teach us bores me...
        Damn underachiever.  They're all alike.

        I'm in junior high or high school.  I've listened to teachers explain
for the fifteenth time how to reduce a fraction.  I understand it.  "No, Ms.
Smith, I didn't show my work.  I did it in my head..."
        Damn kid.  Probably copied it.  They're all alike.

        I made a discovery today.  I found a computer.  Wait a second, this is
cool.  It does what I want it to.  If it makes a mistake, it's because I
screwed it up.  Not because it doesn't like me...
                Or feels threatened by me...
                Or thinks I'm a smart ass...
                Or doesn't like teaching and shouldn't be here...
        Damn kid.  All he does is play games.  They're all alike.

        And then it happened... a door opened to a world... rushing through
the phone line like heroin through an addict's veins, an electronic pulse is
sent out, a refuge from the day-to-day incompetencies is sought... a board is
found.
        "This is it... this is where I belong..."
        I know everyone here... even if I've never met them, never talked to
them, may never hear from them again... I know you all...
        Damn kid.  Tying up the phone line again.  They're all alike...

        You bet your ass we're all alike... we've been spoon-fed baby food at
school when we hungered for steak... the bits of meat that you did let slip
through were pre-chewed and tasteless.  We've been dominated by sadists, or
ignored by the apathetic.  The few that had something to teach found us will-
ing pupils, but those few are like drops of water in the desert.

        This is our world now... the world of the electron and the switch, the
beauty of the baud.  We make use of a service already existing without paying
for what could be dirt-cheap if it wasn't run by profiteering gluttons, and
you call us criminals.  We explore... and you call us criminals.  We seek
after knowledge... and you call us criminals.  We exist without skin color,
without nationality, without religious bias... and you call us criminals.
You build atomic bombs, you wage wars, you murder, cheat, and lie to us
and try to make us believe it's for our own good, yet we're the criminals.

        Yes, I am a criminal.  My crime is that of curiosity.  My crime is
that of judging people by what they say and think, not what they look like.
My crime is that of outsmarting you, something that you will never forgive me
for.

        I am a hacker, and this is my manifesto.  You may stop this individual,
but you can't stop us all... after all, we're all alike.

                               +++The Mentor+++
_______________________________________________________________________________

There is a spirit of an archetype that is being expressed here. Mainstream media has attempted to hijack the word, “hacker” and paint it with a brush of criminality alone and this is short sighted and illogical at best.

Hacker also does not have to just deal with technology. The spirit of Hacking, lends itself to all forms of creations. Knitters aka Yarn Hackers. Home brewers aka Beer Hackers

If you have a passion and succeed at it and demonstrate the “chops” within a “field” then by definition you have “hacked” your way into that field or industry, profession or vocation.

Ultimately, it is about life long learning.

.dec

RaspBerry Pi

pi_logoUsing the RPi for a captive portal

https://github.com/32teeth/Raspberry-Pi-Access-Point-Captive-Portal

E.A. has done a thorough walk-thru to set one of your own up. Kudos on the work!

 

Here’s a wild project already build.

Pico 20E Raspberry PI3 – Assembled Cube – 1,280GB Storage

 61Bzy5RaQoL._SL1024_

https://www.amazon.ca/Pico-20E-Raspberry-PI3-Assembled/dp/B076MR55XJ/ref=redir_mobile_desktop/136-3896091-1459818?encoding=UTF8&dpID=51WDCMiYORL&dpPl=1&keywords=PicoCluster%20LLC&pi=AC_SX236_SY340_FMwebp_QL65&qid=1524012550&ref=plSrch&ref=mp_s_a_1_6&sr=8-6

A cluster of 20 Pi’s

.dec

 

 

 

12 Factors

#DevOps

Great Resource. https://12factor.net/

The Twelve Factors

I. Codebase

One codebase tracked in revision control, many deploys

II. Dependencies

Explicitly declare and isolate dependencies

III. Config

Store config in the environment

IV. Backing services

Treat backing services as attached resources

V. Build, release, run

Strictly separate build and run stages

VI. Processes

Execute the app as one or more stateless processes

VII. Port binding

Export services via port binding

VIII. Concurrency

Scale out via the process model

IX. Disposability

Maximize robustness with fast startup and graceful shutdown

X. Dev/prod parity

Keep development, staging, and production as similar as possible

XI. Logs

Treat logs as event streams

XII. Admin processes

Run admin/management tasks as one-off processes

Introduction

In the modern era, software is commonly delivered as a service: called web apps, or software-as-a-service. The twelve-factor app is a methodology for building software-as-a-service apps that:

  • Use declarative formats for setup automation, to minimize time and cost for new developers joining the project;
  • Have a clean contract with the underlying operating system, offering maximum portability between execution environments;
  • Are suitable for deployment on modern cloud platforms, obviating the need for servers and systems administration;
  • Minimize divergence between development and production, enabling continuous deployment for maximum agility;
  • And can scale up without significant changes to tooling, architecture, or development practices.

The twelve-factor methodology can be applied to apps written in any programming language, and which use any combination of backing services (database, queue, memory cache, etc).

Background

The contributors to this document have been directly involved in the development and deployment of hundreds of apps, and indirectly witnessed the development, operation, and scaling of hundreds of thousands of apps via our work on the Herokuplatform.

This document synthesizes all of our experience and observations on a wide variety of software-as-a-service apps in the wild. It is a triangulation on ideal practices for app development, paying particular attention to the dynamics of the organic growth of an app over time, the dynamics of collaboration between developers working on the app’s codebase, and avoiding the cost of software erosion.

Our motivation is to raise awareness of some systemic problems we’ve seen in modern application development, to provide a shared vocabulary for discussing those problems, and to offer a set of broad conceptual solutions to those problems with accompanying terminology. The format is inspired by Martin Fowler’s books Patterns of Enterprise Application Architecture and Refactoring.

Who should read this document?

Any developer building applications which run as a service. Ops engineers who deploy or manage such applications.

Maker Movement is here to stay…

and truly it has always been here. More recently it seems to be coming into broader awareness and that’s a good things.  It is when we collectively come together to build and improve our communities at the grassroots level, do we see the most progressive and productive processes and policies arise among the community because they all collectively are interested in a Best for All choices that support and advance everyone’s interests.

We have interests, skills, abilities, talents and gifts. How we express them in the world is how we give back to the world that we live in and on.

We all have the ability to create and contribute and give back to our community that we live in.

How, When, Where and What we do  — be aligned with our personal peace and for the greatest benefit of all including yourself.

Take your Smart TV to the next level

Kingston 128GB MicroSDXC Card

Intel Compute Stick PC - Intel Atom x5-Z8300 1.44GHz, 2GB DDR3L SDRAM, 32GB eMMC, Intel HD Graphics, WLAN, Bluetooth, No OS Installed

Intel Compute Stick PC – Intel Atom x5-Z8300 1.44GHz, 2GB DDR3L SDRAM, 32GB eMMC, Intel HD Graphics, WLAN, Bluetooth, No OS Installed

Purchase these two items and you have the hardware you need to take your Home “Smart TV” to the next level.

 

You can cast and/or remotely control this setup from your Android, iPhone and others and “cut the cable bill”.

This is just a lightweight solution to get your started on your pathway to Freedom and Independence as an Empowered Prosumer.

If you want to fire it up fresh out of the Box, we highly recommend getting a Linux distribution installed on your MicroSDXC card.

https://kodi.wiki/view/Installing_XBMC_for_Linux

Not sure how to do it?

We’ll be producing a walk-thru video soon to help you.

Further postings to come.

.dec

A vision of…

what the space for The Source Lab would look like.

First off it is a Lab, laboratory. A laboratory by definition

A laboratory (CommE /ləˈbɒrətri/ or /ləˈbɒrətəri/, AmE /ˈlæbərətɔːri/; informally, lab) is a facility that provides controlled conditions in which scientific or technological research, experiments, and measurement may be performed.

Barrier-free, Universal design, Safe and Open. Is it possible?

In an interview with an O/S2 magazine back in the day, Mike F. Cowlishaw, the father of REXX, said that he always preferred to hire electrical engineers because they designed their solutions keeping in mind minimal prototyping was available. As where, software engineers just kept ploughing away on problems and iteratively improved their code. Programmers from a hardware background developed more sound code their 1st go-round or more frequently than their purely software oriented/taught peers.