If you’re using an Apple Mac computer, you may have observed that the fantastic backup system Time Machine, may run slowly. This is especially noticeable when you are doing the very first backup (when it has to backup the entire system).
I was frustrated by this a while ago when I purchased a new hard drive to do my backup’s on.
After a bit of digging, I found that time machine’s performance is throttled so as not to impact system performance.
There is a way to remove performance throttling using a system control statement.
If you use the sysctl command to set this to 0 (zero) then time machine will not be throttled. If it’s set to 1 (one), it will be throttled.
I created a little script called ‘speedup-timemachine’ that lets me turn the option on and off.
‘speedup-timemachine on’ will remove the throttling.
‘speedup-timemachine off’ will return the throttling.
Below is the script. Just copy the script, paste it into a text editor, save the script to a location on the path, and make it executable (chmod a+x scriptfile).
At work we use Zoom extensively for meetings. We also use Ubuntu Linux on our laptops.
Unfortunately, Zoom doesn’t have a very good update mechanism for its client in Linux.
Because of this, I created a script that would check for a new version of the Zoom client and, when there is, download it and notify me.
Another one for the Things To Remember category … after creating a new Amazon Linux 2 instance, it’s important to update firewalld to allow http & https traffic.
This is more of a ‘for future reference’ post than anything else.
Recently my mailing lists have been getting hit with stupid spam (what spam isn’t) that invokes bible related conspiracy spam. The messages reference bible verses multiple times.
To catch the spam, I put in a rule that matches bible references.
It’s a pretty simple rule … it looks for specific bible chapters followed by a number colon number.
body LM_BIBLE_MULTI /\s(matthew|revelation|john|corinthians|thessalonians|luke|romans|ezekiel|mark)\s+\d+:\d+/i
describe LM_BIBLE_MULTI Contains bible verses
score LM_BIBLE_MULTI 0.5
The thing about the spam I’m trying to catch is that it references the bible verses multiple times. The above rule only catches a single bible verse reference and adds the score.
To increase the score for each individual hit of the rule, you need to add the following to the rule:
tflags LM_BIBLE_MULTI multiple
This way, every time the LM_BIBLE_MULTI rule is hit, the score increases by 0.5. The more bible references in the email, the higher the spam score.
The multiple modifier for tflags is available in SpamAssassin 3.2 & higher.
One of the things that RPG isn’t particularly good at is string scanning & manipulation.
Many other programming languages support using Regular Expressions (or regex, as they are often referred to). Java, PHP, Node.JS, Python, & Perl have support for regex’s built in.
Regular expressions are a very powerful tools for parsing, analyzing, and manipulating text. It should be noted, however, that with such power also comes the possibility for complexity. Some regular expressions can get VERY VERY complex. See the end of this post for a VERY complex expression.
A true regex master can create a functioning expression that is indistinguishable from modem line noise. – Unknown (maybe me)
As a Mac user, I sometimes find my self needing to use Windows 10. To do this, I run it using the Parallels virtual machine manager.
One thing that bothered me, when was running Windows in full screen mode, was that the MacOS dock would pop up when I moved the mouse pointer to the Windows task bar.
I would have to move the mouse pointer away from the dock, let it drop back down, and then move the pointer back to the Windows task bar without going to the bottom of the screen.
I’ve started a personal open source project. Something I’ve been meaning to do for quite a while.
The project is PCMLTOOLS — utilities designed to make working with the Java Toolkit for IBM i (JT400)’s Program Call Markup Language (PCML) easier to use.
The first tool is a Java class to allow a developer to retrieve a ProgramCallDocument object (which is normally generated from PCML) directly from a *PGM or *SRVPGM object who’s modules were compiled with the PGMINFO(*PCML:*MODULE) option.
The URL for the PCMLTOOLS project is https://github.com/fallingrock/pcmltools.
This is the first open source project that I’ve started … and I’m still getting the hang of github, so it may be rough around edges.
This is a general warning for anyone who owns or manages multiple internet domains.
If you have ever used a domain name, and switched to another one, you should never let the original domain expire.
The reason is, there are nefarious people out there who will buy that abandoned domain, put up content they scraped from an internet archive, and add links to malware or scam sites.
This happened to Ginny’s church’s web site (which I was hosting). They had a domain that had been used but was abandoned in favor of a new domain. Because the old domain wasn’t being used, and all the content had been migrated over, we decided to save some money and stop paying for it.
About a year after that, the domain popped up on the internet as a local church. I was confused by this and looked at the site. It was an almost exact copy of the last version that had been published … except it had links that tried to redirect people to scam sites.
The only thing we could do is file a complaint with the domain registrar. I’m not sure if they ever took it down.
Now, if I have a domain that I had used, I keep paying for it and just set it to do a permanent redirect to the new domain.
The only real exception to this is when I bought a domain with the intention of using it, but never got around to it. In those cases, I just let it lapse, because it’s not going to have content to mimic.
This is a general warning about using the CHGCMDDFT command to change the default value of command parameters for commands in QSYS.
There are a number of reasons not to change parameter defaults on commands in QSYS…
- Any time you upgrade your systems, those default parameter changes will be lost because the commands are completely replaced.
- Although you can identify what commands have had parameter defaults changed, there is no indication of WHAT parameter defaults were changed on a command. To identify what commands have had defaults changed display the command objects description (DSPOBJD) with DETAIL(*SERVICE). If an object has had the parameter defaults changed, the APAR ID will show ‘CHGDFT’.
- Third party products may be expecting commands to have the IBM provided default values. Because 3rd party products usually have to work on a number of IBM i versions, it’s impossible for vendors to specify a specific value for every parameter. New parameters are added with almost every release.
A Better Approach
A better approach would be to create a library to hold copies of the commands you want to modify …
- Create a specific library to hold customized commands
- Add that library to the QSYSLIBL system value above QSYS
- Duplicate the *CMD objects into that library
- Change the default parameter values on the commands in that library.
This way the commands in QSYS are left with the IBM provided default parameter values. Since the custom command library is above QSYS in the system library list, applications that reference those command (that don’t qualify the command to QSYS), will use the modified command.
I like to create a simple CL program that does the work of deleting existing commands from the custom command library, duplicate the command from QSYS, and modifies the command parameter defaults. Not only does this make it easy to recreate the custom command parameter defaults when you do an OS upgrade, it documents what parameter defaults have been made.
You may be tempted to use the CRTPRXCMD to create a ‘proxy command’, that points to the original command, and change the defaults on the proxy command.
DO NOT DO THAT!
A proxy command isn’t a stand alone object that is independent of the actual command. It’s just a pointer to the real command.
Any real changes you make to a proxy command will actually be made on the real command.
Here’s a very simple example of a CL that will repopulate a custom command library with modified default parameter values.
DCL VAR(&LIB) TYPE(*CHAR) LEN(10) VALUE('CUSTCMD')
DCL VAR(&CMD) TYPE(*CHAR) LEN(10)
/* SAVLIB must default to *PRV target release for compatiblity */
CHGVAR VAR(&CMD) VALUE('SAVLIB')
CHGCMDDFT CMD(&LIB/&CMD) NEWDFT('TGTRLS(*PRV)')
CRTDUPOBJ OBJ(&CMD) FROMLIB(QSYS) OBJTYPE(*CMD) TOLIB(&LIB)