Bookmarks
|
|
Suche
|
|
Login
|
|
|
|
Kategorien
|
|
|
RSS-Feed
|
|
RSS-Feed - Einträge
|
|
|
|
Nikon cameras have suffered from various battery related issues, caused by problems with the lens mount or firmware bugs.
Recently my Nikon D300S, which had been a reliable companion and worked well under adverse conditions, started showing the dead battery syndrome quite frequently, and of course at the most inopportune times while shooting events. Cleaning the lens mount, replacing the battery and applying the long overdue firmware upgrade showed no noticeable improvement.
The problem seems to be with the battery compartment door. With frequent battery replacements, the door wears out and no longer applies enough pressure on the battery to ensure reliable contact. Fortunately there is a simple fix, and it doesn't cost more than 1 c (and a drop of glue).
Disclaimer: The Euro cent had the perfect thickness for my camera. Depending on wear and tear of your camera, alternate spacers such as a cardboard stripe may be more suitable.
|
02.01.2015 - 23:03:00
|
http://klausrusch.atmedia.net/blog/2015/01/the-1-c-nikon-battery-fix.html
|
|
|
|
When I applied for an internship at IBM, least I expected was
a long-term career at Big Blue.
My first summer job involved porting a commercial
application from IBM System/36 to IBM AS/400 using RPG and the
command language (QWRKSPLF, anyone?), copying and labelling the 8” release
master floppy disks for another product and passing the quality assurance leader’s
fierce interrogation on database normalization up to the fifth normal form.
At the end of the two month cycle, I had a job offer in the
mail to work in IBM’s Information Systems AD/M group, passed the interview and was
ready to start the new academic year as a part time employee.
Today I celebrate a milestone in my career, my quarter century anniversary. Working at IBM has been an exciting, instructional, challenging, rewarding and sometimes crazy experience. I have been an application developer, course
instructor, product tester, customer support engineer, infrastructure architect
and corporate webmaster (aka webworm), team leader, manager, and enterprise architect.
I still have a copy of the original job offer, the small blue
employee handbook which outlined the company believes and policies, the internal
“facebook” booklet and an office cupboard filled with books, papers and various
memorabilia, from conferences badges to award certificates and my first patent
plaque.
What’s more important than the “stuff” are the connections with the many smart, dedicated
and supportive people whom I met and had the pleasure to work with over the
years, locally and around the world.
Thank
you to all my colleagues and friends who have made my first twenty-five years
special!
|
02.10.2014 - 21:47:00
|
http://klausrusch.atmedia.net/blog/2014/10/how-internship-turned-into-twenty-fiv ...
|
|
|
|
Some twenty developers and security experts gathered at the Stockwork Coworking Space for today?'s joint Vienna DevOps & Security and System Architects Group meetup http://meetu.ps/2v2DGg.
Best practices for AWS Security
Philipp Krenn (@xeraa) nicely explained the fundamental risks of AWS services:
Starting services on AWS is easy. So is stopping.
Recent incidents show that a compromised infrastructure can cause more than short disruptions. Several companies went out of business when not only their online services but also data stores and backups were gone:
Code Spaces goes dark after AWS cloud security hack
DrawQuest permanently shuts down after security breach
Bonsai.io suffers from an AWS security incident
(Some) recommendation for using AWS services:
Lock away the root account. Never use this account for service or action authentication, ever.
Create an IAM user with a password policy for every service or action to limit damage in case an API key gets compromised.
Use groups to manage permissions.
Use two-factor authentication (2FA) using Google Authenticator.
Never commit your credentials to a source code repository.
Enable IP restrictions to limit who can manage your services even with an API key.
Enable Cloudtrail to trace which user triggered an event using which API key.
Other cloud security providers may offer different security features
The (fancy!) slides are available here: https://speakerdeck.com/xeraa/i-am-what-iam-for-devops-vienna
ISO 27001 - Goals of ISO 27001, relation to similar standards, implementation scenarios
Roman Kellner, Chief Happiness Officer :-) at @xtradesoft, gave an overview of the ISO 27001 and related standards:
ISO 27001:2013 Information Security Management System (ISMS) Requirements
ISO 27002:2013 Code of Practice
ISO 31000 Risk Management
Information security management is not limited to computer security; it is equally relevant for paper documents, human knowledge, etc.
The structure of ISO 27001 looks somewhat similar to ISO 9001 Quality Assurance, including the monitoring and continuous improvement loop of Plan-Do-Check-Act (PDCA).
For a successful implementation and certification, the ISO 27001 efforts must be supported and driven by the company leadership
The third talk about Splunk unfortunately had to be postponed.
|
09.09.2014 - 21:42:00
|
http://klausrusch.atmedia.net/blog/2014/09/vienna-devops-security-and-system.htm ...
|
|
|
|
JPEG images downloaded from a digital camera often contain thumbnails in the EXIF metadata, which Windows 7 appears to use for the thumbnails shown in folders.
Unfortunately not every image editor also updates the thumbnails. As a result, changes to images are only visible on the full image, not on the thumbnail preview.
That's where the marvelous ExifTool library and command-line application by Phil Harvey come into play. This one-liner removes the thumbnail image and related size information, and sets the file modification timestamp to the capture timestamp:
exiftool -if "$exif:IFD1:XResolution" "-filemodifydate<datetimeoriginal" -ext jpg -IFD1:all= %*
Combined with Matt Ginzton's CmdUtils, the full batch script for Windows removes image backup copies before and after processing:
@echo off
if exist *.JPG_original recycle -f *.JPG_original
exiftool -if "$exif:IFD1:XResolution" "-filemodifydate<datetimeoriginal" -ext jpg -IFD1:all= %*
if exist *.JPG_original recycle -f *.JPG_original
|
01.09.2014 - 21:30:00
|
http://klausrusch.atmedia.net/blog/2014/09/removing-thumbnails-from-jpeg-images. ...
|
|
|
|
Thirty years ago, on July 2, 1984, I started my first summer job in the accounting department of Gebrüder Ulmer, a hardware retailer and wholesale firm.
The little I remember from those days are fixed working hours from 8–12 and 14–18, with sufficient time for a lunch break at home, handwritten memos, a plethora of documents arriving every few hours that needed to be stamped, sorted, numbered, processed and forwarded to the next department or stored in the archive, and the mix of historic and then-modern business machines.
My responsibilities were mostly sorting and archiving documents, and typing letters on an ancient mechanical Underwood typewriter.
The most advanced device was “the accounting machine”, most likely a Philips P354 Visible Records Computer or similar. Accounting information was stored on large Magnetic Ledger Cards, with transactions getting recorded on a magnetic stripe as well as printed on the card, so one could easily access the information without a computer. Transactions were recorded on individual customer and supplier account cards, and the totals got transferred to the general ledger cards automatically at the end.
The accounting system was eventually re-implemented on an IBM System/36 minicomputer, and later ported to the IBM AS/400. As a teenager who proudly owned a Commodore 64, these big irons were quite impressive and a motivation to know more about business computing, data modelling and programming languages. (I still have a copy of the COBOL 78 manual, just in case.)
In the thirty years since my first summer job, there have been tremendous changes. No longer do most of us work fixed working hours, rarely do we exchange handwritten memos, and data processing usually means instantaneously and electronically, not in paper batches.
I am grateful for what I learned during my first summer job and during my professional career since, and looking forward to the next big shifts ahead.
Photo courtesy of The Centre for Computing History - Computer Museum, http://www.computinghistory.org.uk/det/505/philips-p354-visible-records-computer/
|
02.07.2014 - 09:30:00
|
http://klausrusch.atmedia.net/blog/2014/07/thirty-years-ago-on-july-2-1984-i.htm ...
|
|
|
|
When the World Wide Web was created 25 years ago few people probably realized how much change this would bring, not only to the academic community where this started but to the world at large.
Twenty years ago, IBM published the first homepage on www.ibm.com. The initial site on May 24, 1994 had only a few pages of content and an audio greeting by then-CEO and Chairman Lou Gerstner. (That was the time when most homepages greeted visitors with “Welcome to the Internet”.) Among the things Gerstner said, in retrospective the most important statement was “We are committed to the Internet, and we are excited about providing information to the Internet community”.
Back then I was happily coding System/370 mainframe applications and just had my first encounter with the now defunct Trojan Room Coffee Machine at the University of Cambridge. SNA and Token Ring were our preferred network technologies, and access to the Internet required special permission and signing an NSFnet Acceptable Use Policy document outlining the rules for commercial activities on international networks. Soon much of our business would become e-business.
Only a few years later was I invited to join the www.ibm.com team, a very fine, special team. At a time when business was mainly local, we were already globally integrated, collaborating electronically through an internal IRC network (Alister, remember our daily "gma, hay?" routine) and eventually the predecessor of IBM Sametime.
Last week the creators of the first homepage and some who worked in Corporate Internet Programs in the early days came together in New York City for an unofficial “motherserver meeting” to celebrate the anniversary. I missed the party, but the pictures brought back memories of the good times (and yes, occasionally bad times) we had running the IBM Website.
Happy Birthday, www.ibm.com!
|
24.05.2014 - 21:04:00
|
http://klausrusch.atmedia.net/blog/2014/05/happy-birthday-wwwibmcom.html
|
|
|
|
This month’s ViennaJS meetup brought together a bunch of awesome people with awesome talks at the new location Sektor 5:
Veganizer: Having fun with image manipulation using canvas and vegetables (including a commercial for filepicker.io) https://github.com/franzenzenhofer/veganizer by @enzenhofer
Enterprise Software Development for JavaScript refugees – Scala.JS (and not EJBJS 2.0, LOL) @rafacm @sebnozzi
Responsiveview: http://rv.k94n.com/ https://github.com/k9ordon/responsiveview.Other tools at http://responsinator.com/ http://lab.maltewassermann.com/viewport-resizer @thisisgordon
Web components: Cool talk by @nikgraf about HTML imports and more. http://www.x-tags.org/ can be used to enable Web components in current browsers already
Twitter hashtag: #viennajs
|
31.08.2013 - 00:03:00
|
http://klausrusch.atmedia.net/blog/2013/08/viennajs-meetup-veganizer-enterprise. ...
|
|
|
|
IT security is not just about computers and smartphones any more. Your smart TV may be allow attackers to get access to sensitive information and control the device, as security start-up ReVuln demonstrates for Samsung's Smart TV.
Once simple stand-alone receivers, TV sets, set top boxes and digital recorders are full featured computers and connect to home networks for downloading program guides and software updates, sharing pictures and videos and enabling social media integration.
Read more about recently discovered security flaws in home entertainment equipment on The Register.
|
12.12.2012 - 21:46:00
|
http://klausrusch.atmedia.net/blog/2012/12/it-security-beyond-computers-and.html
|
|
|
|
|
|
|
|
|
© 2009-2024 RSSads.de - Alle Rechte vorbehalten. RSS Portal zum Speichern, Eintragen und Lesen von RSS-Feeds
Neue RSS-Feeds
|
Dieser neue Ratgeber informiert seine Leser über die neusten Anbieter und Testberichte von Backöfen. Sämtliche Tests stehen dem Verbraucher kostenlos zur Verfügung.
|
ratgeber testsieger backöfen
|
Hinzugefügt am 24.12.2022 - 09:08:17
|
|
|
|
|
|
Du hast Lust auf Abenteuer, Camping, Wandern oder andere Outdoor-Aktivitäten? Dann bist du auf Bag Out genau richtig. Neben Zahlreichen Tipps gibt es jeden Dienstag und Freitag neue Beiträge im Blog. Schau doch mal vorbei
|
outdoor wandern camping resien survival
|
Hinzugefügt am 10.10.2022 - 15:13:18
|
|
|
|
|
|
Klingelkasten.de ist ein Gratis-Angebot für Klingeltöne. Der RSS-Feed wird immer aktualisiert, wenn neue Töne online sind.
|
kostenlos gratis klingelton klingeltöne
|
Hinzugefügt am 02.08.2022 - 22:31:46
|
|
|
|
|
|
Der Gesundheitsblog von McApotheke befasst sich mit allen Themen aus dem Alltag und gibt hilfreiche Tipps & Tricks. Ganz gleich ob Erkältung, Medikamente, Müdigkeit, Schlafstörungen, Viren und Bakterien sowie die aktuelle Corona Covid-19 Pandemie.
|
gesundheit medikamente krankheiten wohlbefinden gesundheitsblog
|
Hinzugefügt am 16.03.2022 - 13:48:40
|
|
|
|
|
|
Ebikes Ratgeber für Elektroräder und E-Bikes beschreibt die Unterschiede bei den E-Bike Modellen und inüber beliebte Reiseziele für -Bike Fahrer
|
ebikes-ratgeber elektrorad e-bikes.elektroräder
|
Hinzugefügt am 21.02.2022 - 07:38:56
|
|
|
|
|
|
|
|
Alles rund um das Thema Super Mario Words und Neuigkeiten dazu. Welche Spiele sind angesagt und welche neuen Spiele gibt es, sind nur einige Themen die man im Blog Super Mario Words lesen kann.
|
mario neuigkeiten aktuelles super word
|
Hinzugefügt am 06.11.2021 - 08:32:00
|
|
|
|
|
|
|