Category Archives: Tech - Page 9

Organizing Books

I have a lot of books, probably far too many and certainly far too many for me to remember what all I have. I often think it would be helpful if I could search a database of my books when I’m checking to see if I have something. There are some sites online where you can do this with a small collection for free or pay to catalog a larger collection but I have two problems with that. First, I don’t like trusting comapnies with my data which could be sut off at any time. Second, I have this thing about doing it myself and using open source software. I keep meaning to write a simple PHP/mySQL program to handle this but just have too many similar PHP/mySQL projects that I need to work on first.

I recently came across some open source software that would provide a good atarting point for such a system. Home Library seems to be just what I’m looking for, though it may be a bit immature. I’m going to be keeping my eye on this as I could use somthing to catalog all my DVDs and videotapes as well. I was also pointed towards the bibliophile project at sourceforge. While not a final product itself they have a number of links to catalog like programs on the projects page. While these are more geared towards organizing references for papers they are useful in their own right and apparently might be useful as catalogging software too.

Recovering from an ext3 hard drive crash

If you run a Linux system and have had the misfortune of having your hard drive crash without a recent backup or RAID configuration you’re in for a world of hurt. Thankfully, there are some free utilities that might make things go a bit easier for you.

My favorite utility is a gem called dd_rescue. This program will work quite hard (and efficiently) to recover as much of your data as possible onto another hard drive or a disk image. It does this by reading smaller and smaller block sizes, isolating as much of the good data as possible before copying it off. Of course this program can’t bring back data that is in the bad area itself, but it does salvage everything it can. I’ve used it a couple of times and one time it worked pretty well, recovering all the important data and the other time I got almost nothing usable. If you need a quick and dirty attempt to get things going again as quickly as possible this is your ticket.

SHSU switches from Cisco Call Manager to Asterisk

According to NetworkWorld Sam Houston State Univeristy in Texas is moving from Cisco Call Manager to Asterisk for the backend of their VoIP system. The story is being discussed on Slashdot as well.

Score one for open source! As someone who has worked on both the Asterisk and Call Manager platforms I have to say that I much prefer working with Asterisk.

Ultra cheap VoIP Phones

If you’re in the market for a very inexpensive VoIP phone you might want to take a look at something based on the PA1688 chipset. You can find a list of manufacturers who sell these phones (for as little as $50 I’m told) on the VoIP-wiki though the page is labeled as PA168 for some legacy reason.

After looking at a few of these phones I would never use one in a commercial installation where my preference would be for a Cisco or Polycom (two of the best) but they would be suitable as something to play around with on Asterisk at home or in a lab.

In related news I also heard about the OpenPBX fork of Asterisk. There is a little bad blood between the Digium and OpenPBX developers, essentially because the forked the Asterisk code because they didn’t want to give up the copyleft portion of the GPL license when contributing code to Asterisk (essentially prohibiting Digium from reselling or relicensing their changes). Something to keep an eye on if you’re interested in Asterisk or open source VoIP.

Recycling Paper

If you’re like me you generate a lot of paper that is printed on one side. Of course, you could put the paper in the recycling when you’re finished with it but assuming it doesn’t have any confidential information you could give it a new life as a scratch pad first.

My personal preference is to cut 8.5×11 sheets into quarters, but some may prefer halfs. The real trick is knowing what you need to glue the sheets together into notepads. While some people use multiple coats of rubber cement my preference is to do it the real way and use what the priniting/binding industry calls “padding adhesive” or padding glue. The trick is to get the edge you’re going to glue lined up straight and either weight down the edge or put it in a clamp such as this which are easily built or bought. You’ll need to apply several coats of padding adhesive with a brush, letting things dry between coats. Once the final coat is dry you can slice apart the large pad into several smaller ones using a common table knife or a “pad knife”. If you want a more professional stiff backed pad be sure to insert thick cardstock in the stack before gluing where you’ll split the pads. You could even go a step futher and use something like cut up macaroni and cheese boxes for the cardstock backing.

You can usually find padding adhesive where printing supplies are sold. Online it is available from a number of vendors for around $10 a quart.

The Facebook Privacy Problem

Regular readers may remember the this short article I wrote on how the information on the internet is going to be a problem for people in the future. Recently the online social networking site Facebook.com made some changes and people could easily see just how easily this information can be disseminated on the Internet. The change was followed by shock and revolt by Facebook users but the changes remain in place as of today. I wrote the following opinion for an online discussion list and thought blog readers may enjoy it as well.

As a Facebook user as well as a graduate student and computer professional the current controversy over the changes made by Facebook are of particular interest to me. My own experience and discussions with other members of the Internet generation leads me to believe that these users still do not see the “privacy light at the end of the tunnel“. Most users remain unaware of the risks associated with putting any kind of personal information on the internet and grossly misunderstand the ability of individuals and organizations to aggregate such data into profiles of users for anything from relatively benign marketing purposes to something more sinister such as identity theft.

The thing that’s really important to remember here is that the changes made to Facebook did not and have not made any information that was previously private available to the public. Clearly, this is the viewpoint of the Facebook team as can be read on their blog. In other words the only difference is that you are now presented with a list of all the recent changes your “friends” have made. Of course this information was available to you before, but you had to seek it out on each users’ page. Personally I find the feature to be quite a useful one and think it has been a long time in coming. In my opinion the usefulness of social networks such as this is to allow you to stay current with the lives and events of a great number of acquaintances quickly.

Where the problem comes in is that people have been hiding behind “security through obscurity” for some time. Most users don’t think twice about what information is available (to their friends) on their user page. Suddenly the information in thrust into the light and they are alarmed. Of course their have been newspaper stories around the country warning students that employers can and do look up prospective employees on the internee before hiring to see what kinds of people they are, but in my experience most students feel so removed from the employment process they aren’t concerned about this. Secondly, their is an incorrect perception that Facebook is a closed network. Because of this students feel free to post things they normally wouldn’t want “public”. Still others feel that they will be able to change or “clean” their pages before looking for a job. The problem with this is that I have no doubt this information is being crawled and archived by many people and could still be used against you in the future. Obviously alumni now employed in various field still have Facebook accounts and are typically quite accommodating when employers ask them to look up a prospective hire on Facebook. Still other users may be running bots through the network and collecting as much information as possible about as many people as possible for any number of reasons.

As mentioned by Alessandro in a recent message to the list there do exist a number of granular privacy controls which can be exercised within the Facebook environment. Few students take advantage of these tools as they fail to see the ramifications of having so much information public. My real concern is that this will soon blow over and people will go back to ignoring the implications of sharing so much data with the public. Even after several years of incidents being reported in the media there remains a problem with individuals and businesses understanding that once something is out on the Internet the cat is out of the bag. There’s no going back. By its very nature the Internet is a public place and is going to be crawled, indexed, cached and stored. It amazes me that people (especially those who have grown up with computers and the Internet) still fail to grasp this concept.

This isn’t the first time I’ve written about the implications of people sharing data on the Internet and certainly not the last. For more thoughts on how this might effect the ability of people to hold various jobs in the future or perhaps change our notions of what is and isn’t acceptable behavior I encourage you to read this short article I wrote on the topic back in March.

Obviously I don’t expect that people will remove all personal data from the Internet, nor do I think they should. Much of the usefulness of computers and the Internet springs from the ability to search vast databases of information. As a Facebook user and someone who has had a personal website for much longer than that I provide a lot of personal information about myself. The key here is for people to understand the ramifications of doing so and, most importantly, to think about what they say and do in public before they do it.

Goodbye freedb, long live freedb

If you’ve been following the freedb controversy you know that the two major freedb developers quit on July 1st of this year. Concerns exist that the freedb project may not be stable or reliable into the future. Obviously many freedb aware applications could be affected by a disruption in service. Thankfully a few alternatives are now available which can keep you running until applications make a switch to a new service.

Perhaps the simplest solution is simply to switch to freedb2. This project is designed to be entirely freedb compatible and is based off of the July 1st freedb data combined with new submissions. New data is released to the public domain and the server side software (forthcoming) under the BSD license. freedb2 will let you query in the standard way using http://freedb2.org:80/~cddb/cddb.cgi as your freedb URL. Submissions are accepted in the freedb way to either submissions@freedb2.org (preferred) or freedb-submit@freedb2.org.

If you’re looking for a more robust next generation solution I would suggest taking a look at what the people at MusicBrainz are doing. With core data in the public domain and additional data licensed under the Creative COmmons Attribution-NonCommercial-ShareAlike license MusicBrainz is becoming a much better database. One of the biggest problems with getting people to adopt MusicBraniz is the lack of compatibility with CDDB/freedb applications which have not been updated by their developers to the MusicBrainz protocol. Thanks to the recent events at freedb devlopers have answered this call and a freedb interface to basic MusicBrainz information now exists. Simply by pointing your CDDB/freedb application to http://www.mb.inhouse.co.uk:80/~cddb/cddb.cgi you can access MusicBrainz data. Note that this translator uses a cached copy of the MusicBraniz database so there is some lag between database updates and the data becoming available. Additional information on the limitations of this translator can be found here and a copy of the source code (license unknown) is available from this svn server. Because of additional and different fields than those supported by CDDB/freedb data must be submitted using a MusicBrainz aware application. It should be noted that the translator is not an optimal solution and is subject to a href=”http://lists.musicbrainz.org/pipermail/musicbrainz-users/2006-July/012741.html”>some limitations. It would be best for for application developers to switch to native support of MusicBrainz.

One of my favorite applications that uses freedb data is the excellent (and free) CD ripper Exact Audio Copy (EAC) which has excellent error correction. I have been unable to find any other application (which is unfortunate as I would prefer a Linux application for ripping) that does as good a job. Hopefully the author, Andre Wiethoff, will update his application to support MusicBrainz in the future. Even better would be if he would release the application under the GPL or BSD license so it could be ported to alternative operating systems.

GM car of the future

Check out this BBC video of a test drive in the GM Highwire. This experimental car has a few interesting tricks up it’s sleeve. In fact, if I was in marketing I would call a production model the “GM Chameleon”.

Where do we go from here?

Scott Bradner’s recent NetworkWorld column “What’s to become of the Internet?” pointed me towards two reports (1992 and 2006) by internet arcitect Dave Clark discussing how he feels a new, better Internet should work. Yet I disagree with some of the primary changes he proposes.

For example, Clark would like to see a basic security architecture that includes authentication of internet users. Certainly, this could bring about great changes such as the tracking and prevention of worms, viruses and spam. At what cost? Perhaps the cost of anonymity. While some would argue the benefists outweigh the costs and security requires authentication I would argue that much of the success of the Internet is based in our ability to be anonymous (or at least have the feeling of anonymity) when we choose. By building authentication into the architecture it would be much easier to track just where each user goes and what they do on the Net. It also legitimizes such tracking “in the name of security”. Just as importantly, how would people’s use of the Internet change if their identity was tied to their activities. Would the Internet be as successful or pervaisive as it is today?

Repairing MySQL tables with myisamchk

About the only time I have a problem with one of my MySQL database servers is if the power goes out at just the wrong time during a database write. Luckily for me MySQL comes with a handy utility called myisamchk which can be used to repair corrupted database tables. Instructions for how to use this utility can be found on this page in the MySQL documentation.