Microsoft decided that I must upgrade to Windows 11. The joy overwhelms me.
“Swing” is a very ambiguous term. Leaving that aside, I want to learn more moves. I’ve tasked The Laird with picking some out. I found this YouTube video: Clearly that goes too fast to learn much (anything?) from it. “It would be nice,” I thought to myself, I thought, “if there were a way toContinue reading “Swing Moves”
Fenris is now chained. He cannot access the Internet, but he can still vacuum. The picture is the Blockly logic for clicking on his icon and toggling his state.
My first home automation script worked! On Saturday, I wrote an “at 0600 on weekdays, turn on the lights” script. On Sunday, nothing happened. On Monday, the lights turned on! The script:
My goodness but [expletives deleted] lightbulbs are snoopy! The Kasa “smart” lightbulbs want to know everything about you to upload into the Kasa cloud app, which of course requires setting up an account. Want to guess my password? Hint: It’s the title of this post. Thankfully, once you get them WiFi-ed, you don’t need useContinue reading “Me Casa es Su Kasa”
sudo is a Linux command that gives one administrative privileges for the following command. There wouldn’t be much point in it if just anyone could use it, willy-nilly, so there is a list of users allowed stored in /etc/sudoers. One must “sudo” edit this file or, again, there would be no point in it. InstallingContinue reading “sudon’t”
RISC (Reduced Instruction Set Computer) and CISC (Complex Instruction Set Computer) are two different CPU architectures. Their names pretty much explain the difference. The argument over which is “better” has been around forever. When I learned VAX assembly language, I remember being impressed that there was a single instruction to evaluate a polynomial. Granted, oneContinue reading “RISC vs CISC”
The hot tub is not only filled, it is hot. It hasn’t killed me, yet. I did kill my network swapping out the firewall. Tip: It doesn’t matter what your iptable forwarding rules are if IP forwarding is not enabled. Next steps: Renumber the virtual machines and add the names to PiHole.
The cluster is sitting there doing its thing. I figured out why Cassandra is such a memory hog: It queries the system memory when it starts and allocates 3/4 of it. Oh sure, there is a limit: 18GB. I haven’t done anything about it, but now I know. The stuff I’m writing that uses theContinue reading “Tech Update”
The bottom glowy bit just arrived. I think it adds a nice symmetry. There is no such thing as RGB addiction. Really.