I know that one of the following scenarios, or one like them, has happened to you at some point:
Husband: So yeah, my iPhone…well, let’s just say it doesn’t swim as well as you’d think, given all the other cool things it can do. And before you ask, I already put it in rice. Nada.
Husband: Look on the bright side. The new iPhone 4 just came out. *nudge, nudge.
Continue reading iCloud: Showering all your Apple devices with equal love.
Some people are under the misconception that Unicode is simply a 16-bit code where each character takes 16 bits and therefore there are 65,536 possible characters. This is not actually correct. It is the single most common myth about Unicode, so if you thought that, don’t feel bad.
In fact, Unicode makes you think a different way about encoding characters. Until now, we’ve assumed that a letter maps to some bits which you can store on disk or in memory:
A -> 0100 0001 Continue reading Short Discourse on Unicode
If you work with computers on some level beyond Microsoft Office or browsing the net, at some point, you will run across hexadecimals. What are they and why do people bother using them when they seem something better left for assembly programmers?
Hexadecimal is just a base-16 number system. Because we grew up in a society where most of us has 10 fingers, we use the base 10 decimal system for the most part. In hex, in addition to the numerals 0-9 to represent values zero through nine, we also have letters A-F to represent values ten through fifteen. Continue reading An Intro to Hexadecimal
In an attempt to better determine how to leverage more CPU power for our virtual server, I started searching to web for beneficial information on adjustments and considerations to make. I was particularly concerned with Hyperthreading at the time. I found a good article by Intel which covers this and more. Check the resources section at the bottom of this article to get more information since they cover many important consideration. I will provide a brief conclusion from information I gained from this article. Continue reading Virtualization and CPUs
When researching RAID technology, I ran into many concerns regarding performance considerations at multiple levels of storage, including the filesystem. After some research, I found that when creating a filesystem using the mkfs command, the parameters stride and stripe-width can be passed to help the filesystem better accommodate the RAID configuration reads and writes for improved performance. Continue reading Considering RAID Performance on mkfs Command
The @font-face property was originally included in the original CSS 2 spec. It was the removed in CSS 2.1 and is now making an encore appearance in CSS 3. Browsers have begun to preemptively implement CSS3 and for over a year now, all major browers offer a method to embed fonts in webpages.
Continue reading Embedding Fonts Using @font-face
After obtaining new equipment, and the new Adaptec 5805Z Raid Controller, I began researching the best configuration of hardware and software from the ground up. Since the machines being setup are storage units, I paid special attention to the RAID controller configuration. This article will address how to select the “best” raid stripe size for your controller. Also, this knowledge is based off of extensive research for two to three weeks, but may have flaws. If any are noticed, please feel free to notify me so that I may review and correct them. Thanks! Continue reading Selecting the Appropriate RAID Stripe Size
FreeBSD provides a helpful tool to manage software RAID with ATA deivces. This tool provides features such as hot swapping ATA RAID devices, which was previously unheard of. This functionality and features will be elaborated here, but caution should be taken as software RAID IS NOT an adequate replacement for hardware RAID. Continue reading Software RAID in FreeBSD
Every once in a while, Cyrus IMAP will die due to a failure in the mailboxes.db file database data. This problem is typically cause by a read/write failure to the mailboxes.db file, which can occur from situations like a power outage during a write to the file. This can lead to corrupt database indexing data in the file. The solution is to process the file as a flat file and extract the valuable data. Since we are aware of the cyrus IMAP mailboxes.db database schema, we can achieve this goal through a script. The following lists the necessary steps to take to extract and rebuild your mailboxes.db file. Continue reading How to restore a corrupt mailboxes.db file for Cyrus IMAP
High availability of network services has always been a concern for me. Networks have to operate in a discrete fashion to achieve this goal, requiring many computers have work together to provide a single resulting service. The techniques and procedures involved can drastically vary depending on the nature of the service to provide. I will discuss some details of the Remote Differential Compression technology implemented in Microsoft Windows 2003 and 2008, as well as the new client side support added in Windows Vista. Continue reading Remote Differential Compression (Windows 2003, 2008, and Vista)