Archive for June, 2013

How To Keep Your Best Programmers | DaedTech

Saturday, June 8th, 2013

Interesting post [but too long to my taste] about what motivates software developers and how it affects their career choices. ( see also this RSA Animation http://www.youtube.com/watch?v=u6XAPnuFjJc )

How To Keep Your Best Programmers | DaedTech

Saturday, June 8th, 2013

Interesting post [but too long to my taste] about what motivates software developers and how it affects their career choices. ( see also this RSA Animation http://www.youtube.com/watch?v=u6XAPnuFjJc )

How Phone Number Porting Works

Friday, June 7th, 2013

In short: when phone call is made, phone switch checks a database to see if the called number has a secondary phone number (caller LNR), if yes, that number is used to route the call. LNP = Local Number Portability NPAC = Number portability administrat…

How Phone Number Porting Works

Friday, June 7th, 2013

In short: when phone call is made, phone switch checks a database to see if the called number has a secondary phone number (caller LNR), if yes, that number is used to route the call. LNP = Local Number Portability NPAC = Number portability administrat…

[rsyslog] rsyslog (v 5.8.3) multi-line message support

Friday, June 7th, 2013

example for centralize logging setup with rsyslog, taken from mailing list discussion

[rsyslog] rsyslog (v 5.8.3) multi-line message support

Friday, June 7th, 2013

example for centralize logging setup with rsyslog, taken from mailing list discussion

Centos L2TP Client to Mikrotik L2TP-Server | xxxl.co.za

Sunday, June 2nd, 2013

How to create dynamic VPN tunnel between a linux server and Mikrotik device. This is suitable if you want to create a tunnel between an EC2 instance and small office

NOTE: Example does not provide encryption.

Centos L2TP Client to Mikrotik L2TP-Server | xxxl.co.za

Sunday, June 2nd, 2013

How to create dynamic VPN tunnel between a linux server and Mikrotik device. This is suitable if you want to create a tunnel between an EC2 instance and small office

NOTE: Example does not provide encryption.

The Architecture of Open Source Applications

Sunday, June 2nd, 2013

so called AOSA book. ” Architects look at thousands of buildings during their training, and study critiques of those buildings written by masters. In contrast, most software developers only ever get to know a handful of large programs well—usually …

The Architecture of Open Source Applications

Sunday, June 2nd, 2013

so called AOSA book. ” Architects look at thousands of buildings during their training, and study critiques of those buildings written by masters. In contrast, most software developers only ever get to know a handful of large programs well—usually …