-
Recent Posts
Recent Comments
Archives
- October 2015
- July 2015
- April 2015
- March 2015
- August 2014
- July 2014
- June 2014
- February 2014
- January 2014
- September 2013
- April 2013
- February 2013
- January 2013
- December 2012
- November 2012
- October 2012
- September 2012
- August 2012
- July 2012
- June 2012
- April 2012
- March 2012
- January 2012
- December 2011
- November 2011
- October 2011
- September 2011
- July 2011
- June 2011
Categories
- Bicycling
- BITS Upload Protocol
- Books
- China
- Computers
- Conferences
- Cookies
- Cryptography
- Digital Politics
- Emedded Devices
- Food and Drink
- Humor
- India
- jCIFS
- Minnesota Politics
- Music
- Neighborhood and Community
- Network Protocols
- Notoriety
- PeerDist
- Proprietary Protocols
- Religious Observance
- Samba
- School
- Self
- SMB/CIFS
- Tablets and "Smart" Phones
- Tea
- The Docs
- Travel
- Tribulations
- Trivia
- Uncategorized
- US Politics
- World Domination
Meta
Category Archives: Computers
Brogrammers Suck: The Adventures of a Female Computer Science Student
I wrote this paper for a class for my major using several sources as cited below. Please read and share. Amalia Hertel 3-10-15 About two-thirds of the way through the term, my roommate, Alex Reddington, and I came into our … Continue reading
Posted in Computers, Digital Politics, School
Comments Off
Does This Count Against My Fifteen Minutes?
Geeks like to gather together in large groups, sort of like schools of fish or herds of four-legged grass-eating cheetah snacks. Perhaps it’s a primordial instinct. Perhaps we feel safer that way. Perhaps that’s why we go to conferences.
jCIFS in the Wild
jCIFS Finds a Niche in the Smartphone Ecosystem If a “dog year” is equivalent to six or seven human years, then a “smartphone year” is pushing thirty. Smartphones age quickly—faster than dogs and much faster than humans—but smartphone dotage has … Continue reading
2011 SNIA SDC Report: Wednesday
Wednesday was a mix. Microsoft continued to provide SMB2.2 information, and there were also presentations by Samba members.
Posted in Computers, Network Protocols, PeerDist, Samba
Comments Off
Cryptographic Hardware under Linux
The idea is fairly simple. There are several commonly used cryptographic algorithms (with names like DES, AES, and SHA-256), most of which are designed to be easy to implement in hardware. In other words, chips can scramble bits really well, … Continue reading
Taking Charge of a Seagate FreeAgent Dockstar; Part 2
In Part 1, I went through the procedure I used to take control of a Seagate Freeagent Dockstar, most of which involved streamlining instructions from other sources. Now that the Dockstar has been tamed, it’s time to teach it to … Continue reading
Taking Charge of a Seagate FreeAgent Dockstar; Part 1
The Seagate FreeAgent Dockstar is a small ARM-based embedded computer based on the Marvell Sheevaplug design. It is quite easy to reflash the ROM so that it boots Linux from a USB device. Back in December of 2010, the price … Continue reading