Quarantine diary – Home Office challenges of a fulltime mom/dad

As the COVID-19 put big economies such as Italy, Spain, USA and Germany to its knees we have been asked to contribute to flatten the infections curve by staying at home. For many of us, IT workers, working from home is somewhat ok. You may be doing this for a long time already. For another portion of us, working from home is an occasional event that allows you to rest a bit from commuting, waking up early or just  a break from office environment in general. If you are doing that for a long time you probably have a good chair, a good set of monitors a high speed internet connection and most importantly a dedicated space to separate you from what I call the “House vortex”. From cambridge dictionary [House] vortex is defined as follow:

– a mass of air wife/husbands  or water kids that spins screams  around very fast loud and pulls objects people into its empty centre

– a dangerous or bad funny situation in which you become more and more involved and from which you cannot escape

 

Continue…

Brazil racial statistics and my 38th birthday

Today is march 20th, it is my birthday!

One hundred and thirty years have passed since slavery was banished from my country but it is still crazily far from race equality. We, black people represent 55,8% of the country but opportunities, salaries, studies and access is given to the other 44,2% half. 75% of the deaths caused by police actions are young black men. Only 60% of black student are able to graduate from high school. Around 56% of young black people of age 18-24 are able to reach college, while the rate of white people of the same age are around 80%. Continue…

Content-Based Identification Algorithms Combination Framework Against Audiovisual Piracy

Author: Torres,A.; Demanboro A.C.

Abstract

With the event of the Internet, video and image files are widely shared and consumed by users from all over the world. Recent studies point out that one out of two internet users have engaged in activities classified as illicit. Unauthorized copy, distribution or publishing of digital content without the proper rights holder consent is what is commonly called piracy. Those that profit from digital piracy ignore the intellectual property laws and copyrights from the owners, programmers, distributors and many others that live and depend on the economic value of these assets. Methods to identify these files have emerged to preserve intellectual and commercial rights such as content-based identification techniques also known as perceptual hashing. With said techniques a unique identifier is generated making possible to compare two images or videos and decide if they are equal, similar or different. This article has as objective to discuss the application of content-based identification technologies as a method to fight piracy, presenting a framework where perceptual hashing can be used to prevent publishing and/or distribution of video content. The methodology proposed is to combine four types of perceptual hash (ahash, dhash, phash, whash) to make it possible to identify illegal videos with more accuracy. The results are encouraging, considering the most common forms of attacks.

Index Terms: Content-Based Identification, Piracy, Security, Intellectual Property

Continue…

Early 2000 nostalgia with Microsoft Zune

It was thrown in some drawer along with a bunch of cables and accessories I never use. Have you stopped a minute to check how many crap you have storred in your closet? PSVita? Old Nintendos, Old Ipods ou MP3 players? geee I have all that. Last week I turned the PSvita on, played a little and returned it back to where it was. And this week by chance I was trying to make my kid’s Hercules DJ work with Linux.. (waste of time) when I found it there… laying in its solitud, long abandoned, Yes, the Microsoft Zune 30GB. Would it still work? I wondered.

Continue…

Choose your Ecosystem and love your choice

The phrase “Choose your love and Love your choice” was said in 2011 by Thomas S.Monson, it has to do with marriage and love and fidelity but it made much more sense to me this last days when I decided to move away from Iphone\iOS and go to Android. Then I paraphrased Thomas with the following: Choose your Ecosystem and love your choice.

Continue…

Christmas Challenge 2019

Hi there

Some of you might remember the Christmas Challenge 2018 right? It is about to become a tradition!!

This time I had an encounter with a rather unusual Santa Claus and he sent me a curious message along with a set corrupted files that I can’t open. He said that I had to read carefully the message below to be able to crack it… ingenious Santa!

The message goes like this:

 

“I come with many colors, so beautiful and bright, I turn so many houses into a beautiful sight. What am I?”

 

The files Santa sent:

SantaClausImage.jpg, key.txt, checksum

 

 

Have fun a excellent Christmas!

The Password Sharing Problem – A Paradox

The password sharing activity has happened to me at least in two different occasions, and I’m certain it has happened with you too. See if this story is familiar to you. A family that had recently purchased a smart tv asked to use the service, NETFLIX – they were not fond of using credit card transactions. In a under developed countries having people afraid of using their credit card is quite common. The second instance was during my master course, where I had purchased a software that would ease the transcript of documents and the process of writing the dissertation. A friend wanted me to share it to ease his burdens. In both occasions I didn’t feel bad. I don’t think anybody does. Continue…

ELK: Deleting unassigned shards to restore cluster health

Had a red flag on my ElasticSearch cluster these days and found that the reason was related to an unassigned shards between the nodes.

As the data I collect is not that sensitive I could easy delete it and recreate in case I need in the future. But first we need to find it. There is many articles on the internet to help one to understand the shards allocation but I offer here a simple solution which is – simply delete the bastard.

First, we check on the cluster health and get the count of unassigned shards.

curl -XGET http://<elastichost>:9200/_cluster/health?pretty | grep unassigned_shards

The list of unassigned shards can be retrieved using:

curl -XGET http://<elastichost>:9200/_cat/shards | grep UNASSIGNED | awk {'print $1'}

And if you want to delete every unassigned shard in the list above, you could send it to xargs and do a DELETE.

curl -XGET http://<elastichost>:9200/_cat/shards | grep UNASSIGNED | awk {'print $1'} | xargs -i curl -XDELETE "http://<elastichost>:9200/{}"

In my case the I found the name of the index that was cause problems and I deleted

 curl -XDELETE "http://<elastichost>:9200/INDEXNAME

 

Done Cluster health is green again.

 

Delete ALL MySQL/MariaDB tables at once

Was playing with the wordpress tables and screwed up. Needed then to delete all the existing tables of the database, but didn’t want to do it one by one..

Here is a snippet that may be helpful for such tasks.

mysql -u USER -p PASSWORD -D DATABASE  -e "show tables" -s | 
egrep "^wp_" | xargs -I "@@" echo mysql -u USER -p PASSWORD -D DATABASE-e "DROP TABLE @@"

 

Change the USER, PASSWORD and DATABASE accordingly. And there is no space after the -P for the password