http://spicetr
s Blog
Scientific Experiment
I can listen to MSNBC Meet the Press on my iphone. I can listen to CBS Face the Nation on my iphone. (Keep reading for some sketchy instructions.) Why not ABC This Week?
With a simple link to an audio mp3, I can put the phones in my ears, turn on the audio, lock the iphone to accidental tapping, put the iphone in my pocket, and go for a walk while I listen to the show. With a simple link to an audio mp3, I don’t have to futz with read more…
This article provides step-by-step instructions for activating SSH on GoDaddy.com.
With SSH, I can get a Unix login shell on my hosting service. With this access, I can use Unix commands to search through my website content and to make changes on the hosting server. At the same time, SSH gives me access to a very capacious Unix box for a wide range of utility computing tasks.
SSH is a secure login access method, in use on Unix hosts since 1995. Tatu Ylonen at theHelsinki University of Technology (a.k.a. Aalto University) developed SSH. SSH is widely-used, well-tested and trusted for high-security computing. The software tool Putty uses SSH to connect and establish a command window. There are other methods. I use Putty. (At the end of read more…
When I get a new loginid on a Linux (or Unix) system, there are a few things I set up right away. While I will expend surprisingly many words to tell you about this, the action only takes a minute or two when you know how. This article uses a very basic set of Linux (or Unix) commands. If you are a newbie who wants to get started quickly with Linux (or Unix), then learn the contents of this article. Harass your colleagues for help if you need it.
First, I set up my own ~/bin subdirectory to hold my glorious creations, including mcp.
$ mkdir ~/bin
Next, I create mcp, which I use all the time. mcp is an acronym that stands for something I don’t recall. mcp is a shell script that contains this:
#! /bin/sh
cp ${1} ${1}.`date +%Y%m%d-%H%M%S`
Last week, I migrated this blog from the freeWordPress.com to private hosting onGodaddy.com. In this article, I attempt to recount the steps of that process. The presentation here is “how-to”, but beware of shameless inaccuracies.
Other sources on the net leave out some details. So do I, though not by intention. I tried to record every step, but I didn’t test them. I didn’t diligently try to repeat these steps myself. And I know I got tired toward the end and missed a few details.
Therefore, be warned, these steps probably aren’t exactly what you will read more…
There were a few details to fix by hand, but on the whole, it’s worked read more…
The legendary programmer Maaris Dravnieks pointed out that a software firewall running on a PC can make it so slow that you will think it’s 1999. If you have experienced this yourself, then you may also have had the thought “Do I really need this firewall?”
In my opinion: read more…
Last month, I presented a set of survey questions, and now, ladies and gentlemen, I am pleased to report the summary results, as promised.
You are overwhelmingly female, with household income exceeding USD 100,000. You are well-educated, with post graduate education.
Most of you admit to having read at least one blog article, but you can’t remember which one it was. Most of you would like to see a new blog article weekly or biweekly.
As for whether Dan’s Famous Blog is the world’s best blog, most of answered unequivocally “maybe”.
Most of you enjoyed the survey and want to take another one.
There was one respondent.
Till next week: Adios, senorita!
Contribute your immortal wisdom and pithy comments.
You could win big. On the other hand, maybe not.
Party on.
The aura of the well-turned phrase surrounds John David Drake, who advises clients of Dynamics Online, Inc. how to manage their social web presences. When I elected to dip a toe in the blogging lagoon, I needed advice on tools, tricks, pitfalls and strategy. And since I didn’t have a clue, I needed to know how to get started. I asked Mr. Drake. Here is his excellent advice.










