Wandering Thoughts archives

2008-12-23: You need major advantages to really move issues
2008-12-14: Feed aggregators should fail gracefully
2008-12-11: Why syndication feed readers (and web browsers) should fail gracefully
2008-12-04: The rewriting problem on ZFS and other 'log structured' filesystems
2008-11-29: Good editors aren't better or worse, just different
2008-11-26: One consequence of mathematical security thinking
2008-11-25: The problem with security alerts, and indeed all alerts
2008-11-22: Why I hate 'security questions'
2008-11-19: BitTorrent's file fragmentation problem
2008-10-31: Why realistic UDP bandwidth testing is hard
2008-10-29: Problems I have seen with switch port mirroring
2008-10-24: A little neat detail of the BitTorrent protocol
2008-10-19: The advantages of iSCSI's MC/S for multipathing
2008-09-29: SSL/TLS and forward secrecy
2008-09-12: Why you want sysadmins, not users, to be providing the computing
2008-09-03: Why SMTP needs a way of communicating partial success for message delivery
2008-08-29: Open source projects and programs versus products
We don't really control user desktop machines
2008-08-21: What you select for when you make something harder
2008-08-16: Why it matters what users like
2008-08-10: How to tell when your bug reporting system is at its limits
2008-07-23: Retracting blog entries in the face of syndication feeds
2008-07-16: The problem with Usenet
2008-07-13: The problem with big RAID-5 arrays
2008-07-12: When overlapping windows do (and don't) make sense
2008-07-10: Internet software decays and must be actively maintained
2008-07-09: Detailed usage charges versus simpler charging models
2008-07-05: How OOXML is a complete failure, even for Microsoft
2008-06-30: The many problems with bad security patches
2008-06-27: Fault hierarchies and problem reports
2008-06-26: Virtual desktops versus multiple monitors
2008-06-22: The implicit versus the explicit
2008-06-21: A bug reporting paradox: don't put in too much detail
2008-06-13: The cost of virtualization
2008-06-04: Some corollaries to the charging problem
2008-05-31: What contracts aren't
2008-05-30: Users are rational
2008-05-15: What protects the strength of a ssh connection's encryption
2008-05-12: Some thoughts on tradeoffs between storage models
2008-04-30: Why you can't stop 'abuse' of file sharing services
2008-04-25: BitTorrent trackers are not innocent bystanders
2008-04-20: What FAQs are
2008-04-18: The two (at least) forms of documentation
2008-04-16: My secret mouse fear
2008-04-08: An alternate take on availability numbers
2008-04-05: Why people are accepting bad uptimes from Internet applications
2008-03-28: The stages of Bittorrent encryption
2008-03-21: Journaling filesystems and the fsync() problem
2008-03-19: The problem of charging for things (well, one of them)
2008-03-14: Why I like definite answers to support issues
2008-03-09: The difference between a SAN and a cluster filesystem
2008-02-23: Where the risk is with virtualization (and iSCSI)
2008-02-14: Why does anyone buy iSCSI TOE network cards?
2008-02-11: Why commercial support needs to solve your customers' problems
2008-02-09: How your fileservers can wind up spreading over your SAN
2008-01-15: What applications are actually crucial at a university
2008-01-12: A thought about Amazon's S3 and EC2
2008-01-10: What you don't know about other peers in BitTorrent

Page tools: See As Normal.
Search:
Login: Password:
Atom Syndication: Recent Pages, Recent Comments.

This dinky wiki is brought to you by the Insane Hackers Guild, Python sub-branch.