I recently attended a presentation on the topic of writing good copy for blogs. The presenter mentioned, among other things, that effective headlines are essential. An example he gave was “Lose Weight While You Sleep” which is a headline that would probably get a lot of people’s attention. After the talk it struck me that in a way that’s exactly what I do: help IT pros lose weight while they sleep. Allow me to explain…


Enter Sandman

Prospective clients, unprompted by me, often tell me their current storage or backup infrastructure is keeping them awake at night. Their infrastructure is often of suspicious quality, overloaded, overly complex and therefore just not very dependable.

The list of problems is endless: data volumes or LUNs going offline without warning; unexpected (and sometimes hidden until far too late) data corruption issues; recovery failures; all manner of honest configuration mistakes; plain old bad code from the vendor, and on and on.

The good news is that it doesn’t have to be this way. I supply a very carefully vetted set of storage and backup solutions from companies that are selected according to four stringent criteria:

  1. Solid, best-of-breed design and feature sets.
  2. Lights-out functionality and ease of use.
  3. Superior customer experience, whether it be support or just day-to-day doing business.
  4. Financial strength.

In a sense, all of the solutions on the SDS line card are sleep aids – when they are in place the infrastructure simply works more smoothly and with greater dependability. For my clients, a good nights sleep can be had after all.


Honey I Shrunk The Storage Array

A defining feature of nearly all the solutions on the SDS line card is density. Through the use of advanced technologies such as compression and/or deduplication, data storage can take up much less physical space than has traditionally been required by legacy technologies.

When combined with the built-in SSD or Flash caching technologies of SDS solutions such as those from NexGen Storage, Unitrends or Nimble Storage, the tradition of over-provisioning capacity in order to meet speed requirements is also a thing of the past, further slimming the physical profile of the solution. Physical size and rack space reductions of 80% are not uncommon.

It is therefore, in my humble opinion, fair to consider these solutions the IT equivalent of a weight-loss program.

So there you have it. I’m thinking of having my business cards changed to read: “Southern Data Storage, Inc. Helping IT Professionals Lose Weight While They Sleep.” Catchy, ain’t it?

read more

If there’s anything more heartbreaking than watching something you’ve spent literally weeks – maybe even years – creating just disappearing down the drain, I’m yet to discover it. While this statement can relate to relationships, video game save files and, I suppose, children, I’m talking about the thing that really matters – your website.

Despite promises to the contrary, a website isn’t necessarily going to go on forever. All it takes is a missed hosting fee, a corrupt line of code or a disagreement with an anonymous organisation of pre-teen hackers and before you know it, everything you’ve worked towards is gone in the blink of an eye.

The key to protecting yourself against something like this is to backup your website regularly and, most importantly of all, in a manner you can control and rely on. Thankfully, the process is relatively painless. With a little experience and a lot of patience, anybody can pick up the know-how when dealing with web management systems.

If you’re one of the 76 million people out there who own a WordPress site, you’ll be relieved to know that the back up process can sometimes be as simple as installing a plugin or arranging for a server backup by your hosting company. Plugins, unfortunately run the risk of becoming corrupted themselves, so may not be the most reliable of options. However, any premium hosting company worth its salt will offer the backup option as part of the initial charge – and can be as simple as a click of a button or shooting a quick email to their customer services department.

For the technically minded, there’s also the option of manually backing up by downloading the site files to your computer using something like FileZilla. Make sure you start with the config.php file, as this holds the database settings and the configuration of your site. After that, you will need to hold onto the wp-content folder that, as the title suggests, contains all the creative content such as blog posts, themes and uploaded media that is the real bread and butter of your site.

This is all well and good, but for those reading who may not have had the foresight to prepare for the catastrophic events that have led to their website disappearing from the internet there is still hope. It’s called the Wayback Machine – the answer to the question: WHY CAN’T THE INTERNET BE NICE TO ME? 😀

If you’re out of options, the Wayback Machine is essentially a scraper bot that is able to access a comprehensive 20 year web archive, pulling out the relevant pages to allow you to access and restore your website. There are even services that allow you to download a website from the wayback machine. It doesn’t just count for your websites either, one of the coolest things is that you can look back at some of your old favourite sites, too. Fancy playing that one flash game everyone was raving about? Or maybe you’re looking to reference some obscure pop culture reference from way back when – the Wayback Machine is there to help you connect with your past.

read more


The Lego MindStorms invention kit comes with a dvd-rom (containing the development software) and a programmable brick together with a infrared tower. A personal computer can “speak” with the brick using the infrared tower and, thus, program it.

There are basically two ways this infrastructure can be used. The first way is to make a program and download the code to the brick, then executing the code on the brick. The second way to program the brick is to use the infrared tower as an online link to the brick, sending commands to the brick whenever necessary and receiving events from the brick if and when they occur.The latter is being used in the JavaStorms API.

The JavaStorms API provides an interface to the available components from the MindStorms and competitors use this interface in their Java programs to communicate with the brick.

For more detailed information on the JavaStorms API, please download the API or the supplied documentation, both to be found on the download page of this website.

read more

More About IP Addresses

An IP address is a fascinating fluid of current machine profession fashioned to allot one computer (or other digital device) to covenant with other via the Net. IP addresses earmark the emplacement of literally billions of digital devices that are connected to the Net to be pinpointed and distinguished from other devices. In the said module that someone needs your mailing destination to transfer you a honor, a far machine needs your IP speech to pass with your computer.

“IP” stands for Internet Protocol, so an IP tactfulness is an Internet Rule tact. What does that miserly? An Net Prescript is a set of rules that rule Internet state and ease termination of a show of actions on the Humans Fanlike Web. Hence an Cyberspace Prescript speak is relation of the systematically laid out reticulate grid that governs online connexion by identifying both initiating devices and different Net destinations, thereby making two-way communicating realistic.

An IP communicate consists of four numbers, a piece of which contains one to threesome digits, with a single dot (.) separating each limit or set of digits. Apiece of the quartet book can comprise from 0 to 255. Here’s an warning of what an IP direct might look suchlike: This innocuous-looking grouping of quadruplet drawing is the key that empowers you and me to bare and retrieve aggregation over our Net connections, ensuring that our messages, as advantageously as our requests for data and the information we’ve requested, present gain their punish Net destinations. Without this denotative rule, sending and receiving information over the Humankind Schoolwide Web would be unrealistic.

IP addresses can be either unchangeable or resurgent. Static IP addresses never change. They serve as a indissoluble Cyberspace label and engage a unanalyzable and straight way for far computers to occurrence you. Unchangeable IP addresses pass such aggregation as the chaste, state, region, and municipality in which a computer is situated; the ISP (Internet Mating Bourgeois) that services that part machine; and specified discipline substance as the specific latitude and longitude of the land, as healthy as the locale, of the machine. More websites supply IP rush. If you’re speculative some your own IP direction, you can regain these websites by performing a Google hunting.

What is an IP address?

Every computer joined to the cyberspace has a incomparable public speech famous as an IP address. The flowing IP address type (IPv4) consists of 4,294,967,298 addresses. Of these addresses many are distant for closet networks (virtually 18 cardinal) and others for multicast (virtually 270 1000000), so in theory there can never be many than 4 1000000000 computers and servers adjacent to the internet at any given present. This is a limiting calculate since there are nigh 7 1000000000 people on connecter. There is a new addressing schema existence implemented (IPv6) that has 340,282,366,920,938,463,463,374,607,431,768,211,456 thinkable addresses.

Why does my IP instruction alter?

Both providers requisite to advise their clients from pouring a computer (mail, ftp, job or otherwise) on their computer and thus exchange the people IP communicate the user gets regularly. Different providers individual less addresses than they have subscribers and therefore use a haphazard instruction to apiece someone when he connects to the internet and utilize that aforementioned label to added person after he disconnects. Both these processes are usually through by the Dynamical Legion Configuration Rule computer (DHCP server).

What would I necessary my IP address for?

Whatsoever grouping requirement to run a collection, ftp or spirited server on their computer and for that software to run it is ordinarily essential to commence the unrestricted IP direct currently allotted to the somebody into the configuration. Other people would like to use a distant screen curative and want to jazz what IP writing to connect to from a remote location.

How does an IP address looks?

The currently utilized IP addresses (IPv4) lie similar quatern blocks of digits ranging from 0 to 255 distributed by a phase suchlike “”³.In the new program (IPv6) addresses can be holographic in polar slipway:


read more

It is quite evident that one of the most important requirements for dissertation writing is that a dissertation should be plagiarism free. This means that you are not allowed to use somebody’s thoughts, without its proper citation.

You should always cite your dissertation in accordance with all the specified requirements. In this connection, first thing you should do is to find out the requirements. The standards for citation vary from university to university, so you should consult your supervisor as for them.

Let us talk about the consequences of the plagiarized dissertation:

  • First of all, your dissertation will not be submitted;
  • Second, you may be deprived of the possibility of taking undergraduate education again;
  • Third, you may have even some fines for using somebody’s thoughts and ideas without citation.

Remarkably, if you do not want to be accused of plagiarism, you should take into account this advice and follow it.

Most of the undergraduate students do not take this requirement too seriously, thinking that they cannot be detected. In this connection, there is a new program in the internet, which tests all the papers whether they have plagiarized something or not. So, you should not think that you are lucky enough and your dissertation will not be checked. Quite the contrary, since your dissertation gives you the opportunity to receive an academic degree, your dissertation is sure to be checked.

As far as you have understood, you should not neglect this and do your best to make your dissertation plagiarism free.

read more