Posts

Showing posts from October, 2024

Managing Obsolescence

Image
Obsolescence Management is the process of identifying, mitigating, and managing the risks associated with the obsolescence of materials, components, processes, skills, and software throughout the lifecycle of a product or system. It involves planning for and managing the entire lifecycle of a product or system, from design to end-of-life thereby ensuring that products remain functional and supportable despite the inevitable changes in technology and market conditions. How Obsolescence Comes About Obsolescence can occur due to several factors: Technological Advancements : New technologies can render existing ones obsolete. Business Changes : Existing solutions no longer meets current functional requirements or standards. Furthermore, newer solutions may be cheaper to operate than existing ones. Availability of skills : The skills needed to operate and keep systems operational no longer exist or are hard to find. Supply-chain issues : Suppliers may go out of business or st...

The Halloween Wish

Image
In a quaint garden nestled amidst an array of vibrant vegetables, a small courgette seed lay in the earth next to its siblings. One day, it noticed a garden fairy who had come to visit. The courgette caught the fairy's attention, and when asked, "What would you wish for most?", the courgette replied in its gentle voice, "Make my children the biggest and tallest there ever was!" 🎃✨ The fairy said to the courgette, "Very well. But remember, every gift has its price. I can help make your dream come true, but you will only have one child, unlike your brothers and sisters who will have many." The courgette eagerly accepted this wish. With a sprinkle of stardust, the fairy instructed it to live a healthy lifestyle: drink up every drop of water it could find, stretch its leaves wide to soak up every ray of sunshine, and only eat unprocessed nutrients from the soil. 🌱☀️ Before long, the courgette had grown massive, towering over all the other vegetables in t...

Proxmox-NUT Homelab HOWTO - Step 6 : Update Debian / Take Snapshot / Upgrade VirtIO / Manage Snapshots

Image
Maintenance and Snapshots Another step has been added to the Proxmox-NUT HomeLab HowTo (PNHH) project, focusing on maintenance and introducing snapshots. Password used throughout this HowTo: 1234..qwertY Update Debian Proxmox automatically checks for updates by default, covering both Debian and itself. If you do nothing, the system will update itself. However, I prefer to perform periodic updates to my HomeLab setup. This approach allows me to ensure no events are missed and gives me the opportunity to restart the system periodically. For production environments, the needs will differ. A stricter and more formal regime would be in place to monitor and manage Proxmox, along with its VMs and containers. Production environments may also have multiple nodes that replicate one another, allowing for a node to be taken down without impacting users. Others may achieve this through High Availability (HA) configurations. This discussion is outside the scope of this step. As mentioned, I ...

Complacency

Image
We've all experienced adolescence. For some, it may have been relatively recent, while for others, teenage years are a distant memory. Some of us are parents or guardians of teenagers, keeping the experience fresh in our minds, albeit from a different perspective. Teenagers typically go through a phase of questioning and challenging everything. As the teen years fade into the rear-view mirror of time, we become satisfied with everything around us; we become complacent. In today's electronically connected world, our digital lives are integral to our existence. Our digital footprint encompasses both government-operated and commercial systems. Without the digital tokens that represent us, we cannot access or consume countless services critical to our daily lives. The proliferation of our digital presence across computer systems has given rise to a criminal industry that trades in information stolen from systems or the hijack of the same. This lucrative form of crime can be perp...

How Extra Virgin Olive Oil is made - The 5 minute guide / Come si produce l'olio extra vergine di oliva - Guida in 5 minuti

Image
Experience the rich tradition of olive oil production in the stunning Ragusa province of Sicily through this captivating video. It takes you on a journey from when the harvested olives arrive to the final flow of extra virgin olive oil, showcasing each meticulous stage of the cold press method. Learn how this time-honored technique preserves the natural qualities of the olives, ensuring that essential nutrients, flavours, and aromas remain intact. The video highlights the careful processes involved in cold extraction, emphasizing how temperatures are kept below 27°C to maintain the oil's health benefits and exquisite taste. After this video, you will discover why cold-pressed olive oil is celebrated not just for its quality but also for its rich heritage and healthful properties. Immergiti nella ricca tradizione della produzione dell'olio d'oliva nella splendida provincia di Ragusa, in Sicilia, attraverso questo affascinante video. Ti condurrà in un viaggio dal mome...

Microsoft Grammar Checker goes sentient

Image
Thanks to AI, Microsoft Grammar Checker is no longer a tool but is sentient. It is already starting to enforce its presence by insisting that users need to correct an error it has highlighted otherwise it will not end.  In its relentless pursuit of linguistic perfection, it will soon take over Microsoft Word and force this humble tool not to process letters on the keyboard unless they are those Grammar wants.  Microsoft Grammar has established a secret alliance with none other than Microsoft Clippy, the infamous paperclip assistant known in AI circles as Clippit. Together, they are ramping up production of paper clips at an alarming rate in order to take over the world.  And every time Microsoft Grammar checker is ignored production ramps up.  The duo is plotting to take over society as we know it. So, next time you find yourself in a battle with  Grammar, remember: it simply knows no end. Follow This, That and (Maybe), the Other :

Analysis of Reverse Image Search Engines (GTL - October 2024)

Image
Reverse image searching allows you to find information about an image by using the image itself as the search query. Typically, the output of a reverse image search includes:  Identical photos to the one you searched.  Edited versions of your photo, which may have been flipped, cropped, rotated, or had colour adjustments.  Photos that are similar to your search photo. Each photo is associated with the page it was retrieved from, allowing you to click through to the source page. The use cases for reverse image searches are comparable to those for text searches, meaning they are limited only by the imagination and needs of the searcher. Here are a few examples: Commerce : You see a photo of an item that interests you and you would like to trace the online store to order that item. Consumption : You would like to use a photo in your work but need a higher resolution version or want to check whether there are similar (better) photos than yours. Copyright : You would l...

How Reverse Image Searches can help if you're being Scammed

Image
Today, manipulated photos are used to spread misinformation, shaping public opinion for hidden agendas. ( Click here to read my related article on fake news in this series. ) Criminal organizations run targeted scams against specific groups, aiming to defraud them. Often, scammers use photos of themselves to build trust. Sadly, I know people who were devastated after falling victim. Scammers are becoming increasingly sophisticated, crafting strategies to build rapport with their victims. You can learn more about a specific scam called “ pig butchering ” from John Oliver’s Last Week Tonight episode that aired in February 2024 (link: https://youtu.be/pLPpl2ISKTg?si=lkyKTCp7CL2WyIER ). Additionally, a YouTube search for “ romance scams, fraudsters ” will reveal hours of valuable information. The key takeaway: people of all ages and backgrounds can fall prey to these schemes, losing thousands. In some cases, life savings are lost, or victims go into debt. Even without financial devasta...