Author Archive

Taking a Byte of Raspberry Pi

July 21st, 2012

Gaining access to new embedded processors is exciting. I recently ordered a Raspberry Pi Model B for 49.49USD, which includes the cost of the board, a case, and shipping. With an expected ship date that is 11 weeks away, its delivery is something I can be excited about for awhile. The Raspberry Pi Model B […]

Linux Kernel Development

July 16th, 2012

For nearly a decade, I have had a latent interest in developing the Linux kernel. I administered Linux servers for years, but I never had as much motivation as I have now to explore the kernel’s mechanisms. I remember leafing through books, at Borders, that made kernel development seem inaccessible. Robert Love’s book, Linux Kernel […]

New eReader Acquired!

May 15th, 2012

Whenever I run errands, such as having my car serviced or getting a haircut, I usually bring a book with me for the wait. I already had a desktop, laptop, netbook, and smartphone, which are used daily. I figured that I can use my netbook or smartphone to read ebooks. The need for an ereader […]

Optimization

December 16th, 2011

Lately, I have been involved with optimizing code to improve execution time. I am still becoming familiar with a large and complex software system that is used by a multitude of end-users. Because my knowledge of the system is limited and people are dependent on the system, the scope of my modifications is focused on […]

Potential HP Remote Exploit

December 8th, 2011
Posted in Security | No Comments

I remember my first computer. It was a standalone system that booted directly to the Microsoft DOS prompt. There were no logins nor passwords. There were no real security measures to protect files on disk or processes in memory. Floppy disks were the primary means of transferring data between computers. Bulletin board systems were popular […]