Utah Open Source Conference 200+

The Utah Open Source Conference has over 200 registered attendees.  This is great news!!!  Hope to see everyone there.  There is going to be tons of great presentations and tons of great swag.

If you haven’t registered, well, then what are you waiting for!!!

Congrats to Clint on putting this all together and thanks to Open Source Technology Center too.


Open Source as Alternative

I stumbled across this site and thought it was worth sharing.  I was looking for photoshop alternatives and run into it.  So, simply here is a link:


Novell Owns Unix

In a ruling today, Novell is the official owner of Unix!

Click to access Novell-377.pdf


openSUSE new news site

OpenSUSE just announced the other day their new news site Its nice to see that a news site was created. The only one up til now seems to have been, which I still enjoy visiting.


Utah Open Source Conference

I just wanted to introduce Utah Open Source on my blog. This is an amazing project that has been founder, started, created, etc. by Clint Savage. Its great to see it move forward and grow. So a thanks to Clint and the others that have and are working on this. For those of you that aren’t already aware of what Utah Open Source Conference is, it is an open source conference that makes its first debut this September. They have some really big names that are speaking as well. (You’ll have to goto the website to find out) This should be a really exciting time for open source in Utah. So be part of it and sign up.

If you join or already are a part of a group (list of group on the website) you get a killer discount. So I recommend finding one of these groups and get your discount. There is also a free keynote by Bruce Perens to the first 100 registered people. This is filling up fast so, I’d register as soon as you can!

Well, here are the links:

Registration Site (most important link 🙂 )

Utah Open Source website

Utah Open Source Conference website (conference site)


Novell’s Paravirtualized Driver pack

This is something that I was able to help test for a little bit. The idea behind these drivers is to make certain devices in a fully virtualized guest “xen aware”. Since the heaviest used parts of a hosted operating system are networking and disk access, they focused on improving them. For right now the supported operating systems are RHEL 4 and 5, and windows 2000, 2003, and XP. Without sounding like a sales person, I thought this was a really cool idea. Those that have run fully virtualized guests, you can understand why this would be welcome. Anyways, here is a link that you can read.

Novell Ships SLE 10 SP 1 and New VMDP


Jeff Jaffe’s Thoughts on Hack Week

I just read Jeff Jaffe’s thoughts on hack week. For those of you that don’t know who Jeff is, he is the CTO of Novell. He offers some insight into “What is it, why did we do it, what was the reason for the timing, and what did we learn?” on his blog.

Jeff Jaffe’s hackweek blog entry


Hackweek at Novell,

This is a really cool idea that Nat came up with. The idea is that all the Linux engineers in the company stop what they are doing for a week and get to work on whatever they want. Kind of like a google thing but for a whole week. Unfortunately, there a some big things that have to get taken care of otherwise I would be joining them this week even though I don’t have those mad elite hacking skillz. Hopefully the next time around I’ll be able to participate. In the announcement there is the link to the website which has pictures and videos already. Hopefully some really cool stuff comes out of this. You can also add your ideas and contribute from your own desk from the website.

Here is the announcement for the event from Nat on the openSuSE announce list:

Hi everyone,

At Novell we’ve been planning a special internal event that will run
this week, from June 25th to 29th. We’re calling it Hack Week.

During Hack Week, our entire Linux engineering team — hundreds of
people — will be working on whatever Linux or open source projects
interest them. Everyone will work alone or in teams, on existing open
source projects or new ideas of their own. No one will tell them what
or what not to do — it’s a free week for free hacking, driven by
individual passion.

To make it easier for our hackers to find and publicize their projects,
we’ve created an Idea Pool web site where we’ve all spent the last
couple of weeks sharing ideas and finding collaborators. This web site
is open to the public here:

Although this is a Novell event, we’re running it with full
transparency. You’ll be able to follow our progress and projects on the
Idea Pool web site, either with the blog on the front page where we’ll
post videos from our seven main engineering sites[1], or by watching
individual project pages.

We invite you to participate where you can. If you’d like to help with
a project, feel free to add a comment to the discussion section of the
page and volunteer your support.

We hope that you’ll at least enjoy watching Hack Week progress. If it
is successful, we hope to run it again sometime soon, with even more
participation from the community.

If you’re interested in following along, you might check the following
sites first:

-Hack Week Overview:


-Idea Pool code of conduct:

-Flickr pool:

During the week, we’ll use the channel #opensuse-hackweek on for general discussion (project-specific discussion
will find its own venue). Hope to see you there!

Happy hacking,

[1] Beijing, Bangalore, Prague, Nuernberg, Boston, Provo, Portland are
the main sites


Enterprise Network Configuration

Your enterprise network is large and complex, and probably relies on numerous connected endpoints. This requires you to design your own DNS server or a custom DNS server implementation. You also need to set up your own DHCP server (if you plan to run many nodes on the same LAN), and you probably need to create a RADIUS server for authentication purposes.

On an average enterprise network, your network may have as many as 20,000 endpoints. Your network is complex and includes routers, switches, and possibly even routers/firewalls. A custom DNS implementation might need to connect to multiple external DNS servers, and your Internet service provider (ISP) may need a DNS server on your network to route requests for web sites. The RADIUS server is the “brain” of the whole system, and it can’t run without access to the network, the network is your only connection. When you create RADIUS servers, you need to take care of securing your RADIUS server with RADIUS credentials. By default, RADIUS uses plain text credentials to log on the server, however you can easily make it more secure by using RADIUS SSL certificates. Let’s go through the process of how to create SSL certificates, also there are some applications you can get online as Fortiweb to protect your networks, and you can look at this website to learn more about this.

How to create an SSL certificate:

Create a new Windows domain

Logon to a RADIUS server to use it

Click on “Tasks”

Click on “Certificates”

Click on “Add a domain controller”

Enter the password for the domain admin account Click on “Next” Click “Next” Click on “Finish” When prompted, enter the domain name and click “Next”. When prompted, enter the password for the RADIUS server Click “Next” When prompted, enter the password for the RADIUS server Click “Next” When prompted, enter the certificate and click “Next”. When prompted, enter the server name and click “Next”. When prompted, enter the RADIUS server and click “Next”. When prompted, enter the RADIUS server and click “Next”. When prompted, enter the RADIUS server name and click “Next”.

The system will verify that the certificate is correct and issue a RADIUS response to the user.

Important: As a user, you should log on to the RADIUS server using the root account and use a RADIUS username and password for authentication. If you use a RADIUS username and password, you will have to log on using the RADIUS authentication mechanism, typically via Telnet or SFTP. You can also set up a RADIUS server in an Active Directory domain, and then configure your RADIUS server in that environment to use the root account.

Note If you configure RADIUS for your organization with the RADIUS server in a domain environment, you can create a RADIUS server in that domain using Active Directory Users and Computers. The RADIUS server will be configured as the default RADIUS server for your domain. You can then configure RADIUS in your application server by selecting Configure RADIUS in RADIUS Server Configuration, then using the default RADIUS server as the RADIUS server for your application server.


Possible new hobby: Geocaching

The other day my cousin came over and reintroduced me to geocaching. The first time I only created an account. Unfortunately, it requires a GPS and I just don’t have one of those. Maybe one day. This time he brought his GPS and we looked up a couple geocaches and tried to find them.

For those of you that don’t know what geocaching is, your not entirely alone. From what I understand and have seen people hide little caches all over the US, take the coordinates and then post the the geocache on the internet for others to find. Some of them are puzzles of sorts which makes it a little more difficult. There are tons of other things to it, but I’m a noob to geocaching.

So, on Thursday I found my first ever!!! Due to weather though it was damaged so we weren’t able to sign the log book. The second one escaped us 🙁 It was on private property and made us feel a little uneasy about “snooping” around.

Anyways, its worth taking a look –