Language Selection

English French German Italian Portuguese Spanish

Hard Drive Purchase and Thailand Flooding

Filed under
Just talk

My 2nd desktop is largely reserved for video editing. As it often the issue with video editing, storage space is getting scarce. The sata hard drive has a capacity of 320 GB, and it's getting full. Time to purchase a new hard disk drive...

I've been unaware of most world news lately. My wife's been gone for 2 1/2 weeks on a church mission trip to Africa, so I've been focused on home chores and duties. I really didn't know anything about the recent massive flooding in Thailand. Yes, the Thais often get flooding during monsoon season, but this year is bad--really bad, and aside from the tremendous property damage, many lives have been lost. The effects of this year's monsoons have been exacerbated by deforestation and urban sprawl.

I was also surprised when I went to purchase a new hard disk drive for my video editing computer. I had expected to buy a SATA 6 GB/sec, 1 terabyte or more drive for under $100.00 US. When I went to newegg.com, I found that 1 terabyte drives were priced at around $250.00 US--two and one-half times as much as expected.

Turns out that Thailand manufactures, at low estimate, 40% of the world's hard disk drives and at high estimate 80%. The estimates vary because Thailand also manufactures an even larger portion of the world's hard disk sub-assembly parts (e.g. motors, actuators).

Most of these factories are shut down, of course, due to the flooding. And the retail computer hardware market is reacting quickly to shortages of spindle based storage drives with rapidly increasing prices.

More in Tux Machines

Best Linux laptop for 2021: Which one should you buy?

I remember, back in my early days of Linux, finding a laptop that could run the open-source operating system was tricky business. You might get a distribution to work with the video chipset. You might even find one that interacts with your soundcard. If you could manage to get wireless working, you were something special. That was then, and this is a very different time. Now, you can find Linux pre-installed laptops all over the place. Companies like System76, Tuxedo Computers, Juno Computers, Dell, Lenovo and HP are all producing laptops that support or are even fully certified to run Linux. Read more

today's leftovers

  • Paradox of the perfect code editor

    Imagine if someone summoned a magical genie and wished for a perfect code editor. Since it is perfect, does that mean it provides you everything you ever need to code the optimal solution? Or since it is perfect, does it enable you to accomplish the coding aspect instantly?

    Thus, the paradox:

    Does the perfect code editor mean that you spend nearly 100% of your work time using the editor or does it mean you spend nearly 0% of your work time using the editor?

  • I write code 100 hours/week, here's why I probably won't stop

    I feel strongly you should never feel compelled or required to do what I am doing. Any company, manager, or person asking you to do so is horrible and you should get out quick. I don’t want to contribute to that culture or feed it.

    But-I love what I’m doing. I love the amount of progress I’m able to achieve every day. I love my time spent solving problems. I love what I’ve achieved so far. I want to go further than ever before - I’ve been marathon coding for as long as I can remember, and I’m not going to stop. I need to see how far I can go.

    I love the choices I’ve made in life. I hope you love yours too.

  • The reports of Perl’s death have been greatly exaggerated

    But you know what? Perl’s still going. It’s had a steady cadence of year­ly releas­es for the past decade, intro­duc­ing new fea­tures and fenc­ing in bad behav­ior while main­tain­ing an admirable lev­el of back­ward com­pat­i­bil­i­ty. Yes, there was a too-​long adven­ture devel­op­ing what start­ed as Perl 6, but that lan­guage now has its own iden­ti­ty as Raku and even has facil­i­ties for mix­ing Perl with its native code or vice versa.

  • Share with us your say on interoperability benefits in digital public service delivery

    As the the ISA2 programme and ELISE are coming to an end, is the right time to reflect on what we have achieved together and how to build on that in the next generation programmes.

  • How BSD Authentication Works

    The way OpenBSD authenticates users is quite different from other Unix-like operating systems. Most other systems like AIX, Solaris, Linux, the other BSDs, and MacOS, use a framework called Pluggable Authentication Module (PAM). The two main implementations are Linux PAM and OpenPAM. PAM modules are created as dynamically loaded shared objects, which communicate using a combination of common and implementation specific interfaces (Linux-PAM and OpenPAM). It's configured using the pam.d directory and pam.conf file. While it can be flexible, it's highly complex and very easy to mis-configure, leaving you open to strange and hard to track down authentication bugs. On top of that, the fact that it's a shared library means that any vulnerability in a poorly vetted authentication module gives attackers direct access to the internals of your application. Author Michael W. Lucas said it best when he described PAM as unstandardized black magic.

    OpenBSD on the other hand uses a mechanism called BSD Authentication. It was originally developed for a now-defunct proprietary operating system called BSD/OS by Berkeley Software Design Inc., who later donated the system. It was then adopted by OpenBSD in release 2.9. BSD Auth is comparatively much simpler than PAM. Modules or, authentication "styles", are instead stand alone applications or scripts that communicate over IPC. The module has no ability to interfere with the parent and can very easily revoke permissions using pledge(2) or unveil(2). The BSD Authentication system of configured through login.conf(5).

  • Explaining top(1) on FreeBSD

    We all know and have at least once used the top(1) command to track information about our cpu and processes, but how many of you know what each field means? Today we will guide you through each of these fields. By default, top(1) displays the ‘top’ processes on each system and periodically updates this information every 2.0 seconds using the raw cpu use percentage to rank the processes in the list.

Integrity/Availability, Security, and DRM

  • Sinclair hit by ransomware attack, TV stations disrupted [iophk: Windows TCO]

    Sinclair Broadcast Group, which operates dozens of TV stations across the U.S., said Monday that some of its servers and work stations were encrypted with ransomware and that data was stolen from its network.

  • Sinclair hit by ransomware attack, TV stations disrupted [iophk: Windows TCO]

    The Hunt Valley, Maryland-based company either owns or operates 21 regional sports network and owns, operates or provides services to 185 television stations in 86 markets.

  • Canon Sued For Disabling Printer Scanners When Devices Run Out Of Ink

    For more than a decade now, computer printer manufacturers have been engaged in an endless quest called: "let's be as annoying as humanly possible." That quest, driven by a desire to monopolize and boost the sale of their own printer cartridges, has resulted in all manner of obnoxious DRM and other restrictions designed to make using cheaper, third-party printing cartridges a monumental headache. Often, software or firmware updates have been designed to intentionally grind printing to a halt if you try to use these alternative options.

  • Caskading Failures

    In case you hadn’t heard, Let’s Encrypt’s root certificate expired on September 30th, causing many old applications and devices to reject connections to any site secured by certificates issued by Let’s Encrypt. At Cider and Saddle, all of our services are backed by a Let’s Encrypt wildcard certificate, which we’d configured to automatically renew when needed. We thought that meant we’d be in the clear; after all, we were sure to keep our production system up-to-date, and as long as the system’s CA certificates were fresh, there shouldn’t be any issues.

    We were wrong.

    On October 3rd, one of our community members noticed Cask was throwing 500 errors upon visiting the page. Scrubbing through the logs, it was pretty easy to guess what was going on: [...]

today's howtos

  • What's in a hostname?

    You can spend a surprising amount of time chasing RFCs and finding out more than you ever thought you'd need to know about something as trivial as "hostnames".

    The Internet is a Playground, the DNS a never-ending source of entertainment and astonishment, and hostnames... largely undefined.

  • How to change the colour of the underline in gspell

    gspell is GNOME’s spell-checking library.

  • How To Install Calligra Office Suite on Ubuntu 20.04 LTS - idroot

    In this tutorial, we will show you how to install Calligra Office Suite on Ubuntu 20.04 LTS. For those of you who didn’t know, Calligra Suite is an office and graphic art suite by KDE similar to the LibreOffice. It is available for desktop PCs, tablet computers, and smartphones. It contains applications for word processing, spreadsheets, presentation, vector graphics, and editing databases. This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the Calligra Office Suite on Ubuntu 20.04 (Focal Fossa). You can follow the same instructions for Ubuntu 18.04, 16.04, and any other Debian-based distribution like Linux Mint.

  • How to Convert a Webpage to PDF in Linux - It's FOSS

    Saving a webpage as a PDF comes in handy when you archive certain resources or use them for educational purposes. But, how do you convert a webpage to PDF in Linux? You can either choose to go the easy way out using the web browser (GUI) on every Linux distribution or use the terminal to turn a webpage into a PDF file.

  • How to Install GoAccess Web Log Analyzer on Rocky Linux 8

    GoAccess is an open-source lightweight log analyzer that can read and analyze log files of multiple formats, including Apache, Nginx, Amazon S3, Elastic Load Balancing, CloudFront, Caddy, etc. It is written in C language and uses the ncurses library for its dashboard interface, which can be accessed from the command line. It can generate reports in HTML, JSON, and CSV format, which can be shared with others. You can even generate real-time HTML reports that can be displayed via a public link. In this tutorial, you will learn to install GoAccess Analyzer on a Rocky Linux-based server and configure it to read Nginx logs and serve real-time reports.

  • How to Install Prometheus System Monitoring Tool on Debian 11

    Prometheus is a free, open-source and web-based monitoring application that collects metrics from your services and stores them in a time-series database. Prometheus default configuration only exports metrics about itself. But, you can extend it by installing exporters, and other programs. It supports a multi-dimensional data model, multiple modes of graphing and dashboarding. In this post, we will show you how to install Prometheus monitoring on Debian 11.

  • How to Install R Programming Language on Ubuntu 20.04 - LinuxCapable

    R is an open-source programming language, and free software environment for statistical computing and graphical representation created and supported by the R Core Team and the R Foundation. R’s popularity is widely used amongst statisticians and data miners for statistical and data analysis software developers. In the following tutorial, you will learn how to install R using the CRAN repository and install packages from both R’s CRAN repository or PPA cran2deb4ubuntu on Ubuntu 20.04.

  • How to Run Android Apps on Linux

    Ever wanted to run an Android app on Linux but didn’t want to mess with debugging bridges, development environments, or sideloading apps? An app called Anbox makes it possible, and we show you how to use it.

  • GNU Linux Debian – apt package management – what does this two-letter-package-status mean anyway? (ii rc)
  • How to install Mattermost Server on Rocky Linux 8

    Mattermost is messaging software that can be configured to support your organization's messaging requirements. It works just like messaging software you will have used before. Users are able to log in and use the messaging platform to send messages of any kind between themselves or directed at other users which they choose to subscribe to their messaging feed. It also supports group messaging, where a conversation thread emerges between more than one person. Messages also include file attachments, images, links, etc, for sharing across an organization. Additionally, there are some interesting extra features that can be enabled, such as video conferencing if required. Developers want to use this software because it's easy to configure, it can be hosted in your own private cloud, it's free, and messaging is an important requirement for most organizations.

  • Install APEX and ORDS on CentOS 8 - Unixcop

    Oracle Application Express is a low-code development platform that enables you to build scalable, secure enterprise apps, with world-class features, that can be deployed literally anywhere. Also it’s a proprietary web-based integrated development environment (IDE) developed by Oracle Corporation for creating and managing Oracle databases and other related database functionality. In addition to, With it developers can quickly develop and deploy compelling apps that solve real problems and provide immediate value, even it’s not necessary to be an expert in a vast array of technologies to deliver sophisticated solutions.

  • Install Proftpd on Centos and Rockylinux 8 - Unixcop

    Proftpd is an Opensource ftp Server compatible with Unix-like systems its easy to install , fast and secure . lets show you in this how to install this software. In my case i’am using vzlinux its one if the Centos derivatives. Proftpd doesn’t exit on the standard Redhat/Centos repositories this is why we need to create extra repositories to make this possible, we need epel-repository.

  • Install and Configure Squid Proxy on Rocky Linux 8 - kifarunix.com

    In this guide, we are going to learn how to install and configure Squid proxy on Rocky Linux 8. Squid is a full-featured web proxy cache server application which provides proxy and cache services for HTTP, FTP, SSL requests and DNS lookups. It also performs transparent caching that reduces bandwidth and improves response time by caching and reusing frequently requested web pages.

  • Install and Setup Squid Proxy on Debian 11/Debian 10 - kifarunix.com

    In this tutorial, we are going to learn how to install and setup Squid Proxy on Debian 11/Debian 10. Squid is a full-featured web proxy cache application which provides proxy and cache services for HTTP, FTP, SSL requests and DNS lookups. It also performs transparent caching that reduces bandwidth and improves response time by caching and reusing frequently requested web pages.

  • Bash String Manipulation - OSTechNix

    String manipulation is one of the fundamental concepts in bash scripting. In programming, strings are one of the data types which are an ordered sequence of characters. It is important that you know how to create and manipulate strings in bash. In this guide, we will learn string manipulation in Bash shell scripting with simple examples. You will be comfortable working with bash strings at the end of this article.

  • Using Thunderbolt 3 or 4 on Ubuntu - ByteXD

    When purchasing any laptop, you need to take a keen look at all the ports available since they connect your system to other devices in the digital world. When Apple released the new style MacBook Pro in 2015, people were amazed. This machine ditched all the available ports on the previous releases and replaced them with only Thunderbolt 3 and a headphone socket. Standard ports like the charging socket, display ports (HDMI), USB, and SD card reader, which you will most likely find on most laptops, were all removed and are now supported by the Thunderbolt 3 port.

  • Multipath TCP on RHEL 8: From one to many subflows

    Many years ago, Hercules was traveling back to Athens when he lost his way in a wood. Arriving at a crossroad, he found two women. One of them was Aletheia, the goddess of truth, and the other was Apate, the goddess of lies. But he didn't know who was who. Hercules needed all his intelligence to find the only question capable of revealing the way to Athens. If you are lost in a computer network and don't know which path to take, don't worry—you don't need Hercules to find your way: You can use Multipath TCP.

  • Deploy and remove a web server with Ansible

    ​Ansible is an agentless IT automation tool that unravels the mystery of how work gets done. Many sysadmins run Ansible ad hoc commands or playbooks daily to handle their automated tasks. They rely on Ansible's default command-line interface (CLI) output to visualize and understand what happens after their command or playbook finishes running. Since Ansible's CLI standard output is clean and lean, one option for tracking runtimes, getting metrics, understanding resource consumption, and gathering other information is to modify the output to include more details through using callback plugins. This article explores how to use two different Ansible callback plugins to profile system activity and maximum memory usage of tasks and full execution using cgroups.

  • Can you turn a Raspberry Pi into a satellite deco? | ITIGIC

    The Raspberry Pi have been receiving different versions over time, with improvements in USB ports, HDMI, and even Ethernet in the most recent models. Along with them, a constant has been the 40-pin GPIO connector , thanks to which we can hook all kinds of modifications and improvements.