After heading to the Nordic Perl Workshop and watching sessions by Jonathan Worthington and brian d foy I decided to have a little play with Perl 6 and see if I could port my Daemon Percentages script (Perl 5 and Ruby versions already exist) to Perl 6. Thanks to material in the slides from the above sessions and asking a couple of questions in #perl6 I got a basically working Daemon percentages Perl 6 script running on my Windows desktop under pugs in a couple of hours (I had problems finding an example of the substitution). Read on →

I went to the Nordic Perl Workshop. I had a great time. I also got sunburn. The legal issues surrounding my grandfathers estate are heating up again. Which takes a lot of my time and energy (and money). Builders have been in and redone the kitchen in the flat. It flooded a couple of months ago and now looks shiny and new again. Which means I’ve not been able to move about in here much for the last week or so. Read on →

The topic of budgets came up in the office today (the team I work in wants to spend more than we have - of course - but SUN thumpers are so shiny…) and I was reminded of a tactic used by one of my previous bosses in a VC backed company. The systems team were assigned an amount for the year that was too low for the planned upgrades (which had been signed off) and was a suspiciously round number. Read on →

Sometimes questions come up that you know you should know the answer to but you just don’t. My recent one was “how does df choose the output order?” The man page doesn’t mention the logic behind it and a quick strace shows it pulls its data from /proc/mounts (which you’d expect) and returns the output in the same order. So logically the question becomes how does /proc/mounts order things? It’s not exactly an important question but I can see how this ends - and it involves source code.

The Workshop On Offensive Technologies (WOOT 07) might be the most interesting new conference this year. If it plays its cards right it’ll be a good mix of the more underground groups, infosec professionals and security think tanks. We need more events like this in the UK. Don’t know how nice I’ll have to be to management to try and get a ticket but it’ll probably be worth it.

In one of those serenity^Wserendipitous moments I seem to have an abundance of Science Fiction close to hand. Thanks to Richard I’ve got tickets to see Spider-man 3, Amazon DVD rental have sent me Metropolis, A Scanner Darkly and Triangle. Paul grabbed tickets for the London SciFi weekend showing of Quatermass and I’m now the proud owner of the whole Deep Space Nine run. Sometimes it’s good to be a geek. Read on →

Autonomics refer to the ability of computer systems to be self-managing. – autonomics.ca Here’s one that has been bothering me. Suppose you have a recurring problem that your “autonomic solution” can handle every time it occurs without any one knowing. At what point does the fact there is a treatable issue propagate up to a real person? While an automatic “fix and tell me later” approach helps change your work from fire fighting to planned tasks what classifies a temporary problem as being important enough to warrant you investigating it? Read on →

I’m a sysadmin, half my working life seems to be spent handling other peoples requests (which is why I’m trying to move over to infrastructure work - where I can hopefully concentrate on something for three whole minutes). While chatting with a junior admin at a tech talk in the week the following three tips came up: Use a ticketing system. This one comes up a lot but it’s true, never dropping someones request is well worth the time spent setting it up. Read on →

It’s been a week of databases, replication, provisioning and planning for automation. While winding down (it’s an on-call weekend) I found some links I’d marked for future reading. If you’re interested in database provisioning (especially read only replicated slaves), practical autonomics and how they could potentially be useful in a real environment then these papers make for an interesting ten minutes It doesn’t take a massive leap in imagination to see how a similar approach could be used in to horizontally scale web servers in conjunction with an intelligent monitoring system or load balancer. Read on →