I’m a member of the newly founded EUMETNET Scientific and Technical Advisory Committee Working Group on Automated Quality Control. At our first meeting in Exeter, the members presented the data processing and quality control methodologies of their respective met services. I gave a talk on some of the aspects of the MeteoSwiss data processing pipeline, with a detailed introduction to probabilistic plausibility.
Having trouble to connect wireless headphones with your MacBook? Re-activating Bluetooth in the menu bar doesn’t help? Start the BT connection, then click on the Wi-Fi symbol.
[After a discussion with Andrew Su, this post has been updated to include information on how to select the temperature sensor that controls the fan speed.]
I run a home server built around the Intel S1200V3RP motherboard. To minimize noise levels, it is housed inside a Fractal Design Define Mini case, driven by three Scythe Slip Stream 120 PWM case fans and a Noctua NH-U12S CPU fan.
Contrary to typical desktop motherboards, the BIOS of this server board doesn’t provide functionality to set a temperature vs. fan speed curve. Intel expects its customers to house the board inside an approved chassis, and provides IPMI sensor data records (SDRs) with pre-defined curves for those chassis. For “other” chassis, Intel also provides three generic SDRs called slow, medium and fast ramp. Here are the steps to choose which temperature sensor controls the fans, and how to modify the fan speed and temperature points of the “slow ramp” curve.
[This post has been updated for Yosemite and now mentions bugs in Apple’s version of ssh-add
. Thanks to Fredrik Pettai for letting me know.]
I don’t feel at ease with private keys and other sensitive files floating around on multiple machines and backups. They are of course encrypted, but not accounted for, so it is impossible to “take them back” if ever something goes wrong with a passphrase.
Smart tokens are an attractive solution, because they combine something you know (the PIN) with something you have in the actual, physical sense. Sensitive files are still mobile, but bound to the token.
However, smart tokens are still not mainstream. The software functionality is distributed over several open source projects, which makes it necessary to assemble scattered documentation to see the big picture.
After crawling outdated forum posts on GOOZE and sourcing hardware from an obscure Hungarian web shop (with good service!), I did get token based authentication running with fewer obstacles than I expected. Once you know where to look, it’s actually quite simple.
So here is a mini guide to manage SSH private keys with the Feitian ePass2003 in Mavericks and Yosemite.
I recently switched from iOS to Android with the goal of obtaining more control over my smartphone. One major question was if I could significantly reduce the amount of data I would have to “share” with the ecosystem provider (now Google instead of Apple) and with third party app developers.
I do not have a personal Google account and don’t use their services except for web search and Maps, and hoped to keep it that way as much as possible. Fortunately, it turns out that I could significantly reduce data leakage on Android compared to iOS. So here are the notes on my setup for anyone who is thinking about switching as well.