This week I gave a short talk about the Account Management System that focused on the architecture and function of the system. Here are the slides if you weren’t able to attend:
I was recently editing some unix configuration files and needed to comment a block of code (by placing a ‘#’ before each line). I was using Vim, of course, and someone who shall remain nameless was somewhat amused watching me struggle to accomplish this task efficiently (i.e., not do an
i#<esc> at the beginning of every line). Using
10I# seems like it might work at first glance (this is what I tried), but this will just place 10 ‘#’ characters at the beginning of the current line. The funniest part of this whole ordeal, though, was watching he who shall not be named trying to do the same thing a couple days later, and failing in the exact same way.
Today we have another guest post from gmail expert and budding artist Matt Smith:
Recently, the release of the Gmail 2.0 app became available as an update to previous versions or for initial download through the Apple Store. You can view the full review of the app on Apples website.
The first and most notable improvement is that now the Gmail app will allow you to manage multiple accounts within it. Many people, myself included, preferred to use the pre-packaged mail app with the iOS devices because of the innate flexibility of juggling our multiple email accounts with our mobile devices. If you are like me, you are balancing multiple email accounts for the different aspects of your life.
Matt Smith, one of our esteemed colleagues and wordle aficionado, showed us a wordle he created using the text from our blog, so we asked him to write a guest post about it. Enjoy!
Have you ever wondered how often a word shows up within a particular document or what themes you should be picking up on within a particular section of text? I wonder about these things and one way that you can answer these two questions is by creating a wordle.
I had to do some work with *nix password encryption recently and was pleased to discover that advanced encryption methods, such as sha-512 or blowfish, can be used instead of less secure algorithms like md5 or sha1. A quick search reveals instructions for hashing via blowfish on debian or solaris, just to highlight a few. The ability to use these hashes is particularly useful to us as blowfish is our preferred hashing algorithm for password management tasks. So why should we be avoiding md5 and sha1?