There is a well known story about a scientist who gave a talk about the Earth and its place in the solar system. more>>
For any object moving through a fluid, forces are applied to the object as the fluid moves around it. A fluid can be something like water, or even something like the air around us. When the object is specifically designed to maximize the forces that the fluid can apply, you can designate these designs as airfoils. A more common name that most people would use is a wing. more>>
Recently there was some discussion about ways to ease the tired backs of kernel maintainers. Apparently the merge windows are times of great labor, and some folks wanted to alert contributors to some preferable code submission habits. more>>
I love Bitcoin. It's not a secret; I've written about Bitcoin mining and cryptocurrency in the past. I'm the first to admit, however, that we're at the very beginning of the cryptocurrency age. more>>
First, figure out which hard drive was bad.
To do this, we did this:
look into /proc/mdstat and find out what hard drives are assigned to the raid array. You should be able to identify the drive that is still good. For us the good disk was /dev/sda.
Once we knew it was /dev/sda, run ls -l /dev/disk/by-id. It will show an identification of the disks (usually you could figure out the manufacturer name from there), and linked with it what the drive is referred to /dev/sda, /dev/sdb, etc.). If your drives are from the same manufacturer, you might be able to figure out which one is bad by this command ls -l /dev/disk/by-path. From there, try go figure out what path corresponds to what sata connector. If that still fails, you might need to just pull one of the two disks, and see if your machine boots. If it doesn't, you know that you disconnected the good disk.
Find out the partition size(s) that are raided. We used fdisk /dev/sda, issued the p command to find that out.
Once the bad drive is identified, replace it with a new disk.
Once rebooted, fdisk the new disk.
Create the partition that you want to raid. Make sure its size is the same as you recorded earlier. Make sure that you set its partition type to fe (raid auto detect).
Once formatted, issue the following command as super user
mdadm --add /dev/mdx /dev/sdyz, where you have to replace x and z with the appropriate digits, and y with an appropriate letter.
For example, if the raid array is /dev/md0 and you want to add /dev/sdb1 to the array do this: mdadm --add /dev/md0 /dev/sdb1
You should see the raid array repairing itself by looking at /proc/mdstatTags: Arizona Team
Whatever your opinions about Do Not Track, set them aside for a minute and just look at what the words say and who says them. Individuals—the people we call "users" (you know, like with drugs)—are the ones saying it. In grammatical terms, "do not track" is spoken in the first person. more>>
If you've spent any time around UNIX, you've no doubt learned to use and appreciate cron, the ubiquitous job scheduler that comes with almost every version of UNIX that exists. Cron is simple and easy to use, and most important, it just works. more>>
My Pebble watch has several orders of magnitude more power than the mainframe computers used by NASA to land astronauts on the moon and then get them ba more>>
Typically when a network is under my control, I like my servers to have static IPs. Whether the IPs are truly static (hard-coded into network configuration files on the host) or whether I configure a DHCP server to make static assignments, it's far more convenient when you know a server always will have the same IP. more>>
Large enterprises and nuclear laboratories aren't the only organizations that need an Internet access policy and a means of enforcing it. My household has an Internet access policy, and the technique I've used to enforce it is applicable to almost any organization. In our case, I'm not too concerned about outside security threats. more>>
Many problems in science and engineering are modeled through ordinary differential equations (ODEs). An ODE is an equation that contains a function of one independent variable and its derivatives. more>>
SSH is a Swiss Army knife and Hogwart's magic wand all rolled into one simple command-line tool. As often as we use it, we sometimes forget that even our encrypted friend can be secured more than it is by default. For a full list of options to turn on and off, simply type man sshd_config to read the man page for the configuration file. more>>
Whenever a server is accessible via the Internet, it's a safe bet that hackers will be trying to access it. Just look at the SSH logs for any server you use, and you'll surely find lots of "authentication failure" lines, originating from IPs that have nothing to do with you or your business. more>>