Archives

Categories

A Great Advertising Web Site

The site noonebelongsheremorethanyou.com is an advert for a book of short stories. The web site is funny and quirky (two qualities that are required for a site to become virally popular), works well on all browser sizes, has a navigation method that is unique (or at least something I don’t recall seeing done so well in 10 years of web surfing) and display all the needed information.

I feel inclined to buy the book just to support the creation of amusing web sites!

Update: Here is the Wikipedia page for Miranda July, thanks to meneame.net for the link.

ARP

In the IP protocol stack the lowest level protocol is ARP (the Address Resolution Protocol). ARP is used to request the Ethernet hardware (MAC) address of the host which owns a particular IP address.

# arping 192.168.0.43
ARPING 192.168.0.43
60 bytes from 00:60:b0:3c:62:6b (192.168.0.43): index=0 time=339.031 usec
60 bytes from 00:60:b0:3c:62:6b (192.168.0.43): index=1 time=12.967 msec
60 bytes from 00:60:b0:3c:62:6b (192.168.0.43): index=2 time=168.800 usec
— 192.168.0.43 statistics —
3 packets transmitted, 3 packets received, 0% unanswered

One creative use of this is the program arping which will send regular ARP request packets for an IP address and give statistics on the success of getting responses. The above is the result of an arping command which shows that the machine in question can respond in 12.9msec or less. One of the features of arping (when compared to the regular ping which uses an ICMP echo) is that it will operate when the interface has no IP address assigned or when the IP address does not match the netmask for the network in question.

This means that if you have a network which lacks DHCP and you want to find a spare IP address in the range that is used then you can use arping without assigning yourself an IP address first. If you wanted to use ping in that situation then you would have to first assign an IP address in which case you may have already broken the network!

Another useful utility is arpwatch. This program listens to ARP traffic and will notify the sys-admin when new machines appear. The notification message will include the Ethernet hardware address and the name of the manufacturer of the device (if it’s known). When you use arpwatch you can say “who added the device with the Intel Ethernet card to the network at lunch time?” instead of “who did something recently to the network that made it break?”. The more specific question is more likely to get an accurate answer.

IT Recruiting Agencies – Advice for Contract Workers

I read an interesting post on Advogato about IT recruiting agencies (along with an interesting preface about medical treatment for broken ribs).

Their report closely mirrored my experience in many ways. Here are what I consider to be the main points for a job applicant dealing with recruiters:

  1. Ask more than you believe that you are worth – the worst they can do is say “no” (and you will feel like a fool if the agency pays you less than half what the client pays because you didn’t ask for enough).
  2. Put lots of terms in your CV that will work for grep or other searches. A human who reads your CV will know that if you describe 3 years of Linux sys-admin experience that you can do BASH shell scripting and sys-admin work on other versions of Unix. But if a search doesn’t match it then the typical recruiting agent won’t offer you the position. I have idly considered saying things like “Perl (not Pearl) experience” to catch mis-spelled grep operations.
  3. Recruiting agents will frequently demand that you re-write your CV to match a position that they have open, they will say things such as “you claim 3 years of shell scripting and Perl experience but I don’t see that on your CV” and insist that you re-write it to give more emphasis to that area.
  4. Most recruiting agents are compulsive liars and don’t understand computers, you have to deal with the fact that to get most of the better paying positions you need to have an incompetent liar represent you. Avoid the stupid liars though. For example I once refused to deal with an agent who told me about his plans for stealing the CV database from the agency he worked for and selling it to another agency – not because he was shifty in every possible way, but because he was so stupid as to boast about such things immediately after meeting me on a train.
  5. Expect that recruiting agents won’t understand the technology. If you politely and subtly offer to assist them in writing a letter to a client recommending you then they will often accept. Why would they go to the effort of assessing your skills and writing a short letter to the client describing how good you are when you can do that for them? On one particularly amusing occasion I was applying for a position with IBM and the recruiting agent had been supplied with a short quiz of technical skills to assess all applicants – they gave me the answer sheet and asked me to self-assess (I got 100% – but it was an easy test and I would have got the same result anyway).
  6. Some levels of stupidity are so great that you should avoid dealing with the agent (and possibly the agency that employs them). Being unable to view a HTML file is one criteria I have used since 1999 (every OS since about 1998 came with a web browser built in). Another example is an agent who tried to convince me that “.au” is not a valid suffix for an email address (I was applying for a sys-admin job with an ISP). Job adverts that mis-spell terms (such as Perl spelled at Pearl) are also a warning sign.
  7. Gossip is important to your business! Some agencies will pay you what you earn and merely terminate your contract when things go wrong. Other agencies will refuse to pay you when things go bad, or even demand that paid money be returned and threaten legal action. Talk to other contract workers in your region and learn the goss about the bad agencies. Also track agency name changes, when a bad agency changes name don’t be fooled.

When applying for a position advertised by an agency you will ideally start by seeing an advert with a phone number and an email address. The best strategy in that case seems to be to send your CV with a brief cover letter and then about 5 minutes after your mail server sends the message to their mail server you phone them. I found that I got a significantly higher success rate (in terms of having the agent send my CV to the client) if I phoned them when my CV arrived.

Sometimes a fax number is advertised, unless there is some problem that prevents sending a document via email (such as the agency having a broken mail server) then do not FAX them. A faxed document will have to be faxed on to the client and will look bad after the double-fax operation and will prevent the agent from grepping it. Rumor has it that agents will often post fake adverts for the purpose of collecting CVs (so that they can boast to clients

In most situations a recruiting agent should insist on meeting you for an interview before sending your CV to a client. The only exception is if you are applying for a job in another country. Meeting an agent at a restaurant or other public place is not uncommon (often they want to meet you while travelling between other locations and sometimes their main office is not in a good location). I suspect that some agencies start with a “virtual office” and perform all their interviews in public places (this doesn’t mean that they will do a worse job than the more established agencies). If an agent is prepared to recommend you to a client without meeting you then they are not doing their job properly. It used to be that there were enough agencies pretending to do their job that you could ignore the agencies that will recommend any unseen candidate. But now an increasing number of agencies do this and if you want a contract you may have to deal with them.

When an agency has a fancy office keep in mind that they paid for it by taking money from people like you! For contract work a recruiting agent is not your friend, they make their money by getting you to accept less money than the client pays them – the less they pay you the more money they make. A common claim is “we only take a fixed percentage of what the client pays”, but when you ask what that percentage is they refuse to answer – I guess that the fixed percentage is 50% or as close to it as they can manage.

Ethernet Bonding and a Xen Bridge

After getting Ethernet Bonding working (see my previous post) I tried to get it going with a bridge for Xen.

I used the following in /etc/network/interfaces to configure the bond0 device and to make the Xen bridge device xenbr0 use the bond device:

iface bond0 inet manual
pre-up modprobe bond0
pre-up ifconfig bond0 up
hwaddress ether 00:02:55:E1:36:32
slaves eth0 eth1

auto xenbr0
iface xenbr0 inet static
pre-up ifup bond0
address 10.0.0.199
netmask 255.255.255.0
gateway 10.0.0.1
bridge_ports bond0

But things didn’t work well. A plain bond device worked correctly in all my tests, but when I had a bridge running over it I had problems every time I tried pulling cables. My test for a bond is to boot the machine with a cable in eth0, then when it’s running switch the cable to eth1. This means there is a few seconds of no connectivity and then the other port becomes connected. In an ideal situation at least one port would work at all times – but redundancy features such as bonding are not for an ideal situation! When doing the cable switching test I found that the bond device would often get into a state where it every two seconds (the configured ARP ping time for the bond) it would change it’s mind about the link status and have the link down half the time (according to the logs – according to ping results it was down all the time). This made the network unusable.

Now I have deided that Xen is more important than bonding so I’ll deploy the machine without bonding.

One thing I am considering for next time I try this is to use bridging instead of bonding. The bridge layer will handle multiple Ethernet devices, and if they are both connected to the same switch then the Spanning Tree Protocol (STP) is designed to work in this way and should handle it. So instead of having a bond of eth0 and eth1 and running a bridge over that I would just bridge eth0, eth1, and the Xen interfaces.

Ethernet Bonding on Debian Etch

I have previously blogged about Ethernet bonding on Red Hat Enterprise Linux. Now I have a need to do the same thing on Debian Etch – to have multiple Ethernet links for redundancy so that if one breaks the system keeps working.

The first thing to do on Debian is to install the package ifenslave-2.6 which provides the utility to manage the bond device. Then create the file /etc/modprobe.d/aliases-bond with the following contents for a network that has 10.0.0.1 as either a reliable host or important router. Note that this will use ARP to ping the router every 2000ms, you could use a lower value for a faster failover or a higher value
alias bond0 bonding
options bond0 mode=1 arp_interval=2000 arp_ip_target=10.0.0.1

If you want to monitor link status then you can use the following options line instead, however I couldn’t test this because the MII link monitoring doesn’t seem to work correctly on my hardware (there are many Ethernet devices that don’t work well in this regard):
options bond0 mode=0 miimon=100

Then edit the file /etc/network/interfaces and inset something like the following (as a replacement for the configuration of eth0 that you might currently be using). Note that XX:XX:XX:XX:XX:XX must be replaced by the hardware address of one of the interfaces that are being bonded or by a locally administered address (see this Wikipedia page for details). If you don’t specify the Ethernet address then it will default to the address of the first interface that is enslaved. This might not sound like a problem, however if the machine boots and a hardware failure is experienced which makes the primary Ethernet device not visible to the OS (IE the PCI card is dead but not killing the machine) then the hardware address of the bond would change, this might cause problems with other parts of your network infrastructure.
auto bond0
iface bond0 inet static
pre-up modprobe bond0
hwaddress ether XX:XX:XX:XX:XX:XX
address 10.0.0.199
netmask 255.255.255.0
gateway 10.0.0.1
up ifenslave bond0 eth0 eth1
down ifenslave -d bond0 eth0 eth1

There is some special support for bonding in the Debian ifup and ifdown utilities. The following will give the same result as the above in /etc/network/interfaces:
auto bond0
iface bond0 inet static
pre-up modprobe bond0
hwaddress ether 00:02:55:E1:36:32
address 10.0.0.199
netmask 255.255.255.0
gateway 10.0.0.1
slaves eth0 eth1

The special file /proc/net/bonding/bond0 can be used to view the current configuration of the bond0 device.

In theory it should be possible to use bonding on a workstation with DHCP, but in my brief attempts I have not got it working – any comments from people who have this working would be appreciated. The first pre-requisite of doing so is to use either MII monitoring or broadcast (mode 3), I experimented with using options bond0 mode=3 in /etc/modprobe.d/aliases-bond but found that it took too long to get the bond working and dhclient timed out.

Thanks for the howtoforge.com article and the linuxhorizon.ro article that helped me discover some aspects of this.

Update: Thanks to Guus Sliepen on the debian-devel mailing list for giving an example of the slaves directive as part of an example of bridging and bonding in response to this question.

Porn For Children

James Purser writes about the current plans for Internet filtering in Australia and concentrates on the technical issues (whether it will degrade the ISP service) and the issue of who’s moral standards should be enforced for the entire country.

But the fact is that children have never had any problem accessing porn. When I was in grade 4 at primary school (~9yo) a group of boys decided to walk to the local shopping centre at lunch-time and I joined them. At the shopping centre the other boys read Playboy (that was before such magazines were required to be displayed in sealed plastic bays). I didn’t read Playboy because there were some electronics magazines that were more interesting. When in grade 6 (~11yo) a friend told me about his parents video collection which featured fellatio and sodomy. I don’t recall whether he offered to show me the videos but being a good friend I’m sure he would have done so if I had asked. In the early years of high school some boys ran a black-market for second-hand porn magazines (ick), they also sold new magazines that were significantly more expensive. When in year 12 digital porn was just becoming popular and the exchange of porn on floppy disk began.

I’m sure that now children use USB sticks to exchange porn that they get from the Internet or other sources.

When I was in year 10 a female dancing instructor ceased working for the school after an up-skirt picture of her was stuck on a notice-board (I guess that her resignation was related to the picture but can’t be sure).

The evidence that I witnessed while at school is that 15yo boys are prepared to photograph unwilling women and exchange the pictures, and that the exchange and sale of all manner of porn is not uncommon at school (including primary school). I don’t think that the schools I attended were in any way unusual in this regard.

When I was at school cameras were large. Unless you had a polaroid camera (which was even larger) the film had to be developed – and the staff at the photo company were potential witnesses. I expect that these factors significantly decreased the amount of such activity.

Now a significant portion of children have a mobile phone and it seems that a built-in camera is a standard feature in all new phones now. Digital cameras (which have much better quality than phone-cameras) are becoming quite cheap. It’s widely regarded that giving a teenager a mobile phone is good for their safety (and it certainly makes it easier to discover where children claim to be) and it’s also widely regarded that a digital camera is a good toy (babies as young as 2 are often given the old camera when their parents get a new one). We should expect that the number of children who have digital cameras to rapidly approach 100% of children who desire them.

Given these factors it seems to me that it would be a good idea to allow teenage boys access to better quality porn than they are unable to produce (with either willing or unwilling subjects). It has already been shown that increased access to porn reduces the incidence of rape. I expect that the same also applies to the issue of making porn, people who have good access to porn will be less inclined to make their own.

There is some nasty porn out there. If they were to try and prevent access to porn that is illegal under Australian law (IE pictures of children, animals, rape, etc) then I don’t think that anyone would object. But preventing access to soft porn such as Playboy (which is so tame that it’s hardly porn by modern standards) is a really bad idea if it will increase the risk of up-skirt photos and the production of child rape movies.

Let’s be sensible and accept the fact that children who want to see porn will see it and focus our attention on what type of porn will be seen by children and whether the “actors” are consenting adults.

PS I spent several years living in Amsterdam and working as a sys-admin for ISPs there.

Is Hand-writing Necessary?

The Washington Post has an article about handwriting, apparently for some university entrance exams in the US 85% of students write their essays in block letters. The article claims that students who have poor writing skills demonstrate lesser ability to construct sentences – and claims that this indicates that there is a link between hand-writing and mental processes.

While the article didn’t cover the evidence in much detail I was left wondering whether there were any tests of teaching students to touch type and then assessing them on the same tests. I suspect that increasing the ability to record text in any way would increase the sentence length and the use of long words. While students who can only write slowly will have an incentive to write more briefly.

My handwriting is quite poor, I was never able to write quickly or particularly legibly and since completing university I have had little incentive to improve my writing skills. When laptops became cheap enough for me to own one (in 1998) my hand-writing skills decreased and when I started seriously using a PDA about a year ago they decreased again.

I don’t believe that my writing skills (in terms of conveying ideas and instruction to other people) have declined during this time. In fact the steadily increasing amount of writing that I have done has improved my skills a lot.

I think that children should be taught cursive writing, but it shouldn’t be regarded as especially important – or more important than touch typing! Then there’s the issue of the Dvorak keyboard. If the government wanted to improve the efficiency of the nation (which is what they claim to be doing) then maybe teaching all students touch-typing on a Dvorak keyboard and subsidising the purchase of such keyboards for everyone would be better than some of the current ideas in education. Dvorak keyboards would certainly be better than flag-poles!

News reports indicate that hand-writing skills are decreasing dramatically in Japan due to word-processors – and a significant number of students are never learning how to write any significant portion of the Japanese letters. But the sky doesn’t seem to be falling on them either.

Mark Greenaway writes about having bad hand-writing and is apparently considering some sort of remedial course. I have to wonder how good Mark’s touch-typing skills are and whether he would benefit more from improvement in that area.

CAPTCHAs that don’t work

One thing that I don’t like is blogs that provide no method of feedback. When I want to read something with little or no possibility of feedback I’ll read one of the many newspapers that are available.

Craige McWhirter’s blog is one of them. The CAPTCHA system doesn’t work (I must have tried at least 20 times with both Konqueror and Iceweasel) and he doesn’t provide an email address. He does provide a mobile phone number which is handy for people in the same country.

AKISMET works fairly well on my blog and makes the spam quite managable. As the number of legit comments are not that great I manually approve them thus avoiding having a spam ever appear on my blog – showing a spam encourages more of the same.

The comment I wanted to make on his post was to reference my previous blog post on this topic and suggest that one thing that can be done is to improve public transport which will increase the area of land available to people who work in central city areas. This means that the land prices can decrease and housing prices will follow.

Another issue is that he suggests assisting people in paying rent. While this may sound like a good thing the current system of Negative Gearing is designed to decrease rent, but instead merely increases the price of owning a house.

Microsoft Hires University Drop-Out for Recruiting Campaign

news.com.au reports that MS has hired former Miss Australia Erin McNaught to sex up the computer industry’s geeky image and describes her as a “University Drop-Out” (later in the article it’s revealed that she deferred her course so she might end up completing it). Hiring her is supposed to demonstrate that IT careers have “gone from geek to chic”.

There are lots of more professional ways of demonstrating that idea. One way is to compare the median income of IT people ($54,422 according to payscale.com) to the median for the Australian population ($13,200 to $20,000 for females and $31,200 to $41,600 for males in 2006 according to the ABS) which clearly indicates that IT people get paid more than most Australians.

Another way is to use adverts such as the Apple adverts for Mac vs PC, and Novell adverts for Linux vs Mac vs PC. Note how the female Linux character in the Novell adverts is cool and cute while still keeping all her clothes on.

Yet another possibility would be to find some cute female MS employees and get them to do the promotion. MS is one of the largest IT companies in the world and has a large presence in Australia, surely they have enough female employees that they can find someone to do this promotion who isn’t famous for wearing a bikini!

Hiring a model who is famous for swim-suit work to promote the computer industry isn’t going to affect the career choices of any but the least talented male students and if anything will scare off female students (who are already under-represented in the computer industry). The fact that the news.com.au story included a set of pictures of her in swim-suits and lingerie with the title Erin McNaughty really says it all.

It seems to me that Danni Ashe (wikipedia link) is better qualified for the MS job – after all she has even been recognised by the Guinness book of records for her work in sexing up the computer industry. Unlike Erin she has created web sites herself and started a very successful online business. Surely if being famous for wearing bikinis makes Erin suitable then being famous for wearing no clothes at all makes Danni even more suitable! :-#

But seriously, has anyone ever hired the Chippendales (wikipedia) to advertise in the computer industry? There is a reason why that sort of thing doesn’t happen, and the same reason would apply to hiring an ex miss-Australia.

Updated to fix a bad link.

The Principles of Stupidity

  1. We always underestimate the number of stupid people
  2. The probability of a person being stupid is independent of any other characteristic of that person
  3. A stupid person is someone who causes damage to another person, or a group of people, without any advantage accruing to himself (or herself) — or even with some resultant self-damage
  4. Non-stupid people always underestimate the damaging power of stupid people. They constantly forget that at any moment, and in any circumstance, associating with stupid people invariably constitutes an expensive mistake.
  5. A stupid person is the most dangerous person in existence
  6. Stupid people don’t know they are stupid

The above has been floating around the net for a while. While it makes an interesting read I think that having a boolean criteria of labelling someone as stupid is not necessarily accurate. While there are a small number of people who are stupid, there are many more people who are good at some things and stupid when they act outside their area of expertise. There is a saying “never take investment advice from your dentist” which is apparently due to the incidence of con-artists targetting wealthy people (such as dentists) who sometimes then pass on the bad advice to their customers.

One stupid thing that I did a few years ago was to spend more effort in choosing a mobile phone than on choosing a car. I was totally happy with my mobile phone but not totally happy with my car – and the car cost a lot more… Of course the difference between pure stupidity and tactical stupidity (for want of a better term) is that a smart person who is about to do something stupid can generally be persuaded not to do it with a logical argument. If someone had pointed out to me the fact that the amount of time spent on background research for a decision should be in some way proportional to the amount of money involved (maybe proportional to the log of the value) then I would have been convinced.

So for rule 4 maybe it would be best to say taking advice from someone in an area where they are stupid is a mistake. For rules 5 and 6, if someone is known to be smart in other areas then tactical stupidity may be overlooked (until it’s too late).

Update: Don Marti commented with this link http://www.math.wisc.edu/~miller/old/incomp.txt about incompetent people being unable to judge their own level of incompetence as further evidence for point 6.