Nov 112014
 

My 2009 Mac Mini is in desperate need of an SSD upgrade.  Unfortunately, I have close to 1TB of data there (mostly PLEX media), so upgrading the two drives would be cost prohibitive.  I will probably pick up a 2012 MD388LL/A with i7 CPU at some point…  I hope.  The new ones are pretty much not upgradeable.

Since my website and mail server are running on Mavericks, I dare not load Yosemite on that system.  Lord only knows what would happen to PLEX.  It was just recently updated to solve a memory leak issue which pretty much crippled the machine on more than one occasion.  I even bought an APC Masterswitch in case I had to remote hard boot the server in case my mail stopped working.

I’ve replicated most of the shell configuration from the Mac Mini Server I setup at work to the one at home.  There were some pretty helpful blogs which outlined how to include command aliases in bash.  This makes it real easy to execute a multi tail of all three mail server logs.  I think It might be useful to consider customizing the log system on the new servers to make data mining easier.  Everyone is so convinced that the mail server is broken, that I am constantly providing proof of delivery from the mail log data.  It’s actually really useful when dealing with another company’s IT – especially if they’re outsourced.

multitail of Mavericks mail server

multitail of Mavericks mail server

 

I’ve got a Linux box that I’m messing around with here as well.  I think I can do port mirroring on the switch and send all mail traffic to both servers.  Maybe even a simpler configuration until the Linux box goes live.  In either event, Mavericks handling of spam messages, (assuming you want to use spamtrainer to update bayesian filter rules) leaves much to be desired.  Accounts have to be created on the system for “junkman” and “notjunkmail”.  This looks ridiculous on the login screen for starters…  Messages meant to be used for training must be redirected to the other accounts.  This is easy for experienced IMAP users, but for novices using a PC based mail client, it may be very difficult at best.

 

Jul 212013
 
Nobody sees this

Did somebody call me?

I noticed recently that the site was down and had to monkey with something on the server…permissions?  Always permissions.  Nevermind the OS or security method, it’s always permissions.    Lost the mirror drive in the software RAID, and that seemed to mess things up after recreating the mirror on a replacement drive.

I was messing around with Linux a bit recently, and setup some code on my router.  I noticed that since I’ve enabled additional firewall(s) through Optware I don’t seem to be getting any visits from the Russian bots.  I wonder when the site went offline exactly?  DDNS….etc etc etc etc and I never look.

 

I’ve been working on some method to keep track of office tasks/requests which would allow me to automate logging of completed items for documentation, future research and task management.  Increasingly, I am finding automation technologies useful in building workflows.  On OSX, Applescript, Automator workflows, and cron jobs, launchd services for Linux based systems and good old scheduler (at).

I really need to find the discipline to get some classroom training on current programming language syntax and structure.  I’ve got all the tools I need to write, debug and compile any code I want (within reason) – I simply lack the time to….  good excuse writer.

Before I went off on the tangent, I was referring to task automation as a useful tool in managing my personal work flow.  Since I am inherently lazy/busy with endless interruptions and an unpredictable schedule, I am always thinking about disaster recovery/business continuity on a continual basis.  Sometimes (when minor failures are easily recovered), this validates the need for building system architecture that is simple, cost-effective, scaleable, redundant, well documented, and easily replicated or restored following some contingency.  Other times, it feels that nothing is ever completed; projects are not completed in a timely fashion, new challenges are being introduced faster than I can document them (never mind dealing with them).

 

Since business objectives mandate system requirements, it is necessary to support a wide range of system architectures ranging form proprietary IBM AIX systems that are not fault tolerant nor capable of virtualization to more mainstream Windows-based systems and other platforms such as OSX, iOS, Android, and various Linux distros for various devices and systems.  Task automation and scheduling procedures differ greatly from one device to the next.  Programmatically, the logic to accomplish basic tasks like task management, note taking and reporting should be similar all around.  A unifying language such as java should be easy to code to accomplish various tasks and interface in standard database formats/sync protocols (mySQL,SQL,etc/cardDAV,calDAV, IMAP, LDAP, etc).  HTML5 could be employed to skin the interface for mobile devices, or the GUI interface could be ported to various platforms.

DIRECTORY SERVICES

While AD offers a lot, it is still closed architecture and often presents challenges in providing authentication for other operating systems and devices…  but that’s a subject for another day