Contact Info

Phone: 1(616)755--6063


rsnapshot: Auto Version Controlled Backup for Unix/Linux/Mac/BSD…

Red Had Enterprise Linux (RHEL) 6. I missed the ease of configuration and all the free tools that people smarter than me have created. Systems that can take advantage of Rsnapshot I would like to do a fast post on rsnapshot. I have seen ssh and rsnapshot scheduled in cron to automate backups [...]

Linux: Compiz Grid Plugin

After working on a few projects in windows, I finally moved my primary workstation back to Linux (RHEL 6.6). Out of the box everything worked fine, only one thing was missing, the ability to place a window were I needed it. In Windows 7  you can drag a full screen window to the left or [...]

WordPress: Upload Blocked File Extensions Without a Plugin

This is not for a novice, you should have a little experience in PHP and know what the .htaccess file does. If you are new and want to edit these files make sure to create a backup file in case you bring down your WordPress site. It took me an hour to figure this out, [...]

Elements Used in a Data Warehouse

Many Business Intelligence solutions are based on the use of a data warehouse. Here is a view of the components of a data warehouse both logically and physically.  The data warehouse consists of several different elements: The source can come from legacy systems that are usually an operational system used by the corporation or external [...]

Linux: Grep Script to Search Multiple Directories

Audience that may find this useful will mostly be new Linux administrators. This is a Command Line Interface (CLI) Shell script that once set up using the directories you want to search.  All you will have to do is enter the word or phrase that you are trying to search and it will search across the directories [...]

By |January 21st, 2015|DevOps, Information Systems Management, Linux|0 Comments

Expect – For more remote work, automation, & CI

If you ever have a situation were you want to run scripts automatically this will help. You can even time the events through cron or CI (continual integration) software like Hudson/Jenkins. Let me introduce you to a new command I was not aware of until this year. It is called Expect. Expect can be installed [...]

Force Jenkins to connect to remote sites.

Problem: You created an awesome script on Linux that builds your application that will automatically upload to another server via sftp or ssh. You want to go a step further and have Jenkins run the same script. Every time Jenkins runs the script it fails. You Curse Jenkins/Hudson and start pricing Atlassian tools instead. One [...]

Java | Constructor vs. Method

If you are within your first year of application development in Java you may have asked yourself this question. I know I did. What is the difference? Here is a reference list that I have compiled for your convenience. Download the excel file and build upon other comparisons you need to keep track of -->constructor-vsmethods.xlsx [...]

By |July 30th, 2014|Information Systems Management|3 Comments

Cyber Crime: Risk Assessment

Cyber Crime: A Clear and Present Danger This is the excel file used for this post -->   Risk-Registry.xlsx Information systems give great ways to communicate and learn, but also allow nefarious others access to exploit the power of the Internet for terrorist and/or criminal purposes. Criminal warfare has moved to the virtual world were more [...]

Qualitative risk assessment of RFID

Below is a short qualitative risk assessment of RFID (Radio Frequency Identification) I have pieced together.  In order to highlight strengths, weaknesses and benefits. May it help you come to a conclusion on how would you deploy this technology while minimizing its risks? Category Risk Impact Probability Affects Customer QoS for customers declines because decrease in [...]