Joe is showing us all how its done and is kicking off a Melbourne Team System User Group. Its an excellent idea and I think we should start one here in Canberra. I’ll be doing a session next month for the Canberra .NET Users Group to gauge what the general level of interest is and we will take it from there.
Warning: This post has been delayed due to connectivity issues, this occured on Monday the 15th of August.
It feels like months since I have had to travel away for a week from work so I’m almost glad to be here at the airport, or maybe its just the warm glow you get when your taxi arrives at the scheduled time to take you to the airport – unlike last time.
I decided not to fly up to Sydney last night and instead catch the red-eye (well _my_ eyes are red) this morning. This is always a tricky manouver because it relies on Qantas flights out of Canberra not being delayed too long and the Sydney rail system functioning at peek performance. I may as well give up now . . .
When I am up in Sydney this week I’ll be delivering a hybrid version of our .NET training courses which covers a broad spectrum on the first four days then dives in deeper to some enterprise-level subjects on the last day. The last time I taught this format for this particular customer would have been about twelve months ago.
Paul Glavich will be sitting in on the course at various stages during the week so it’ll be good to catch up. One of the Sydney .NET User Groups is also having a meeting on Wednesday (although I had better check this – it’ll be a long trip out to North Ryde only to be disappointed).
Well – thats the end of my hot chocolate and bacon and egg toastie, time to go and queue like the other cattle at the security check-point.
Update: The Qantas flight didn’t arrive on time so I didn’t get to the venue until 8:30am, gotta love that.
Dare has posted up on his blog about my posts (one, two and three) on RSS Bandit and the performance problems that I was having. Eric Gunnerson obviously reads Dare’s blog and chimed in with these general suggestions – the second approach is very close to what I suggested here.
For now I’ve actually trimmed my feeds down to a manageable level (it needed to be done anyway) which has improved the situation quite a bit but I am sure the list of feeds I subscribe to will climb back up there and it’d be nice if RSS Bandit is ready.
Dare: If you need someone to look at your code with a performance eye every now and then just send me an e-mail (firstname.lastname@example.org) when you have a drop that you want tested. I’ll throw it into the allocation profiler and see what I can see.
I was reading the illustrious leader’s blog post about titled with the much used quote of “you can’t make nine women have a baby in one month”. I had a little chuckle to myself because while what Troy says absolutely true it is also true that “nine women can have nine mabies in nine months”.
Perhaps this is where projects go wrong. Whoever is doing the scheduling probably says “if I can do nine projects in nine months then how long will it take to do one?”, they they quickly do the obvious calculation and arrive at one month.
I know that Troy and a lot of the lads in Sydney are working really hard at the moment so I won’t make fun – you are doing good work guys! Do forget to have some fun!
I’m sitting near the lobby of the Westin (in) Sydney trying get a wireless connection. From here I can see five unsecured wireless networks.
- Telstra CBD
Some are supplied for free, others are Telstra hotspots, but not one of them works. The “Telstra CBD” network is a dead loss, it just sits there trying to acquire a network address, although admittedly its not the strongest signal around.
The “Telstra” network allows me to get an address but the sign-in screen just bombs with some kind of error. Very frustraiting – can’t wait for my iBurst card.
Caroline has a charming new hobby. It reminds me of an experience I had ten to twelve years ago when I was living in Queensland. I had gone to visit this guy that ran a computer shop out of his backyard to buy some software and he showed me a CD that he had which contained the assembly code for a few thousand computer virii.
At the time I was tempted to buy a copy of the CD, but I suspect that if I did it would have led me down the path of growing that collection. At the time most computer virii were DOS-based and injected themselves in the boot sector.
In many ways I think this was more sinister than the variants we have today (although the ones today have much more nusiance value) because it was more common that they would cross infect machines by automatically copying themselves to removable media. While current Windows-based virii do sometimes do this their preferred method of distribution is e-mail so if you practice safe computing you are unlikely to get infected.
Sad: Sitting at a bus stop outside of a closed coffee shop because you are unable to find a relable wireless connection anywhere else in the city of Sydney.
Applies to: Mitch Denny, Senior Consultant, Readify.
This interesting post by Larry Osterman reminds me of a story I heard about it being possible to monitor keystrokes by watching for fluctuations in the earth pin on power cycles. There must be some element of truth to it because I’ve seen devices which are designed to scramble the signal before plugging back into the wall.
This is a neat little tip from Eric Gunnerson about the SafeHandle class that is shipping in Whidbey. Its a wrapper for operating system handles which help ensure that unmanaged resources are released. Daniel Moth also posted up in the comments witha more complete coverage on the BCL Team’s blog.
I didn’t pick this up when they first posted it – glad I know about it now!