Random   •   Archives   •   RSS   •   About   •   Contact > Tag: Greatest Hits

Configuration Management and the Golden Image

When operations first became a thing, system administrators stood up servers using a base image from their favourite distribution. Things were done manually. Some administrators created their own distros, some wrote customised shell scripts to be run once-and-only-once to provision software and settings. This method worked, but it was slow …

Continue Reading

Automatic Backups

My tools for creating automatic backups for various systems

Continue Reading

Configuration Management vs Remote Execution

It's about time to learn the difference.

Continue Reading

How to overload default function arguments in python using lambda

Python Lambda functions are very powerful but I often forget how they work or the fun things they do. This post will document how to use a lambda to provide different default arguments to a function.

We will use the human function found in ago.py as an example - because …

Continue Reading

Tips for getting pull requests approved

Pull rejection sucks!

You have just coded, implemented, and submitted a pull …

Continue Reading

Explaining cache with python

What is cache? I define cache as "a saved answer to a question". Caching can speed up an application if a computationally complex question is asked frequently. Instead of the computing the answer over and over, we can use the previously cached answer. This post will present one method of …

Continue Reading

My top five suggestions for an independent developer creating a new product or service

1. Write everyday. Build a blog for the project and write about milestones, progress, and hurdles. Also keep a personal blog and write about hobbies. Read some theory about "copy writing" and search engine optimization. Write personalized email responses to customers. Great communication skills will have the most impact on …

Continue Reading

The most valuable registration field: How did you hear about us?


How did you hear about us?


I first answered this question when joining Linode. I remember thinking "Wow, this is a great time to ask me!" because the real answer was still in my short term memory.


When I launched LinkPeek I applied this technique. After an amazing launch (thank …

Continue Reading

How to save hundreds of dollars on groceries without clipping coupons

Jenn explains how she drastically decreased our grocery bill.

Continue Reading

Career development is a game of chutes and ladders

find out what is the ladder.

Continue Reading

Occupy Wall Street Stack vs Queue

Occupy Wall Street contributors claim to use a "stack" to determine speaking arrangements.

I plan to explain how the term "stack" used in this scenario does not align itself with the mathematical or computer science definition.

The term stack means First In Last Out or "FILO". For example: a person …

Continue Reading

Security Professionals: Yes we appear vulnerable but that attack vector will never happen

In loom of recent internet attacks many institutions have started scrambling in attempt to "strengthen" their security stance. I agree that auditing our systems and networks for potential flaws seems appropriate at this time to prevent getting "caught with our pants down". Incidentally, I have recently witnessed the introduction of …

Continue Reading

Programming is like Alchemy

except instead of exchanging matter, we programmers exchange time.

Continue Reading

Google Bot Attempts to Crawl Shortest Urls First

Continue Reading

Dropbox Encryption with TrueCrypt

The best security acts like an onion.

Continue Reading

virt-back: a python libvirt backup utility for kvm xen virtualbox

backup your virtual maching guests.

Continue Reading
© Russell Ballestrini.