Author Archive

Five tips for using revision control in operations

https://opensource.com/life/16/7/systems-administrators-should-use-revision-control?sc_cid=701600000011jJaAAI Programmers almost always use revision control for their code. System administrators less often, but this article shows that they could easily benefit from revision control system.

How Charles Kao Beat Bell Labs to the Fiber-Optic Revolution

http://spectrum.ieee.org/tech-talk/telecom/internet/how-charles-kao-beat-bell-labs-to-the-fiberoptic-revolution?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+IeeeSpectrum+%28IEEE+Spectrum%29&utm_content=FaceBook Interesting article on the history of fiber optics.

Hackers create Safe Skies TSA master key from scratch, release designs | CSO Online

http://www.csoonline.com/article/3097613/security/hackers-create-safe-skies-tsa-master-key-from-scratch-release-designs.html The security level provided by your TSA approved luggage locks is very low as the plans for all master keys are released to Internet – anyone can make or 3D print the keys to open luggage locks. This shows the dangers of easy to hack master keys on security systems.