- Hugo (3D) - Throughout his extraordinary career, Academy Award-wining director Martin Scorsese has brought his unique vision and dazzling gifts to life in a series of unforgettable films. This holiday season the legendary storyteller invites you to join him on a thrilling journey to a magical world with his first-ever 3-D film, based on Brian Selznick's award-winning, imaginative New York Times best-seller, "The Invention of Hugo Cabret." Hugo is the astonishing adventure of a wily and resourceful boy whose quest to unlock a secret left to him by his father will transform Hugo and all those around him, and reveal a safe and loving place he can call home.
- Sherlock Holmes 2 - A game of shadows - Sherlock Holmes (Robert Downey Jr.) has always been the smartest man in the room...until now. There is a new criminal mastermind at large-Professor Moriarty (Jared Harris)-and not only is he Holmes' intellectual equal, but his capacity for evil, coupled with a complete lack of conscience, may actually give him an advantage over the renowned detective. When the Crown Prince of Austria is found dead, the evidence, as construed by Inspector Lestrade (Eddie Marsan), points to suicide. But Sherlock Holmes deduces that the prince has been the victim of murder-a murder that is only one piece of a larger and much more portentous puzzle, designed by Professor Moriarty. The cunning Moriarty is always one step ahead of Holmes as he spins a web of death and destruction-all part of a greater plan that, if he succeeds, will change the course of history.
- The girl with the dragon tattoo - The Girl with the Dragon Tattoo is the first film in Columbia Pictures' three-picture adaptation of Stieg Larsson's literary blockbuster The Millennium Trilogy. Directed by David Fincher and starring Daniel Craig and Rooney Mara, the film is based on the first novel in the trilogy, which altogether have sold 50 million copies in 46 countries and become a worldwide phenomenon.
- Adventures of Tintin - Paramount Pictures and Columbia Pictures Present a 3D Motion Capture Film The Adventures of Tintin directed by Steven Spielberg from a screenplay by Steven Moffat and Edgar Wright & Joe Cornish. Starring Jamie Bell as Tintin, the intrepid young reporter whose relentless pursuit of a good story thrusts him into a world of high adventure, and Daniel Craig as the nefarious Red Rackham.
- Mission Impossible 4 - Ghost Protocol - This is not just another mission. The IMF is shut down when it's implicated in a global terrorist bombing plot. Ghost Protocol is initiated and Ethan Hunt and his rogue new team must go undercover to clear their organization's name. No help, no contact, off the grid. You have never seen a mission grittier and more intense than this.
Sunday, December 25, 2011
Monday, December 19, 2011
Figure 1 – PerfCounterInfo
Figure 2 - PerfInterval
1. A "performance provider" (PerfProviderSummary) is any managed object that generates utilization or other performance metrics.
2. Performance providers include managed entities, such as hosts, virtual machines, compute resources, resource pools, datastores, and networks. Performance providers also include physical or virtual devices associated with these objects, such as virtual host-bus adapters and network-interface controllers (NICs)
3. Each performance provider—the instrumented device or entity—has its own set of counters that provides metadata about its available metrics. Each counter has a uniquekey, referred to as the counterId.
5. PerfCounterInfo data object, shown in Figure 1, represents a performance counter.
The group of the performance counter with its label and summary details.
A system-generated number that uniquely identifies the counter in the context of the system. The performance counter ID.
1..4, 1 is default. Higher the setting more data is collected by vCenter. See below for details. Note this is only applicable for vCenter and not ESX host.
Int (since 4.1)
One of average, latest, max, min, none, summation
One of absolute, delta or rate
Unit for values of performance counter.
6. The performance counter can be represented by the following dotted string notation:
7. Here are a list of four levels and what counters are included:
a. Level 1: includes basic metrics: average usage for CPU, memory, disk, and network; system uptime, system heartbeat, and DRS metrics. It does not include statistics for any device.
b. Level 2: includes all counters with rollup types of average, summation, and latest for CPU, memory, disk, and network; system uptime, system Heartbeat, and DRS metrics. It does not include any statistics for device either.
c. Level 3: includes all metrics (including device metrics) for all counter groups except these with rollup types of maximum and minimum rollup types.
d. Level 4: includes all metrics supported by VirtualCenter, including maximum and minimum rollup types.
8. The cpu.usage.average is a performance counter for average CPU utilization. When the counter is collected on CPU No. 1 of a host, a performance metric is formed. The performance metric is represented by PerfMetricId data object which consists of two parts:
a. counterId: The integer that identifies the performance counter.
b. instanceId: The name of the instance such as “vmnic1” or “vmhba0:0:0”.
9. The interval has to be longer than the sampling interval, which can be found as refreshRate in the PerfProviderSummary data object returned by queryPerfProviderSummary() method, normally 20 second. For VirtualCenter Server systems, instances of this data object are referred to as “historical intervals” because they control how data collected from the ESX systems will be aggregated and stored in the database.
10. vCenter default setting is level 1 and it retains sampled stats data as follows:
· 5-minute samples for the past day
· 30-minute samples for the past week
· 2-hour samples for the past month
· 1-day samples for the past year
11. PerfInterval is explained below:
If disabled vCenter will not collect performance data for that interval or higher intervals. For example, disabling the "Past Month" interval disables both "Past Month" and "Past Year" intervals. The system will aggregate and retain performance data using the "Past Day" and "Past Week" intervals only.
Id for interval
Seconds that the stats corresponding to this interval are kept on system
1..4. higher the level more data is collected.
Name of historical interval. Example, “Past Day”, “Past Week” etc.
Number of seconds that data is sampled for this interval. The real-time samplingPeriod is 20 seconds.
Default properties for the four built-in historical intervals include:
12. In general, you should avoid changing the intervals as much as possible except the levels.
Real time vs historical performance statistics:
a. Real time stats collected at 20 secs sampling interval and kept for a length of 1 hour.
b. These real time samples are then processed to generate historical performance stats.
c. ESX only maintains 5 mins interval historical stats for one day length. vCenter does more aggregation and maintains stats for longer durations.
1. vSphere SDK 5.0 reference on Performance Manager - http://vijava.sourceforge.net/vSphereAPIDoc/ver5/ReferenceGuide/vim.PerformanceManager.html
2. A decent introduction to performance manager APIs: http://www.doublecloud.org/2010/03/fundamentals-of-vsphere-performance-management/
Friday, September 23, 2011
Wednesday, June 29, 2011
1. vSwitch similarities to a physical L2 switch:
- A vSwitch functions at Layer 2,
- maintains MAC address tables,
- forwards frames to other switch ports based on MAC address,
- supports VLAN configuration,
- is capable of trunking using IEEE 802.1q VLAN tags, and
- is capable of establishing port channels.
2. vSwitches are configured with a specific number of ports: 8, 24, 56, 120, 248, 504, or 1016. VMKernel reserves 8 ports for its own use.
3. Changing the number of ports on a vSwitch requires a reboot of ESX/ESXi host.
4. vSwitch dissimilarities to physical L2 switch:
- Does not support dynamic negotiation protocols for establishing 802.1q trunks or port channels like DTP (Dynamic Trunking Protocol) or PAgP (Port Aggregation Protocol).
- A vSwitch cannot be connected to another vSwitch thereby eliminating a potential looping configuration. Because there is no possibility of looping, the vSwitches do not run Spanning Tree Protocol (STP).
- A vSwitch authoritatively knows the MAC addresses of the virtual machines connected to that vSwitch so there is no need to learn MAC addresses from the network.
- Traffic received by a vSwitch on one uplink is never forwarded out another uplink. So a vSwitch cannot be used as a transit path between 2 physical switches for example, because traffic on one uplink won’t be forwarded out another uplink.
5. Following 3 types of ports and port groups can be configured on a vSwitch:
- Service console port
- VMKernel port
- Virtual Machine port group
All of the above types can be represented by one table/type:
std_vswitch_portgroup - model's VMKernel Ports, Service Console Ports and VM Port groups
- · network_label
- · vlan_id
- · type - one of vmportgroup (0), vmkernel(1), serviceconsole(2)
- · vmkernel_port_operations (bitmask - values) - only applicable for VMKernel ports
000 - Use this portgroup for iSCSI/NAS traffic
001 - Use this portgroup for VMotion
010 - Use this portgroup for fault tolerance logging
100 - Use this portgroup for management traffic - only applicable for ESXi
6. vSphere client combines the creation of vSwitch with creation of new ports or port groups. vSphere client does not ask about creating a new vSwitch, but rather what type of port or port group to create (connection types – Virtual Machine, VMKernel or Service Console are the options).
7. Unlike ports or port groups, uplinks are not necessarily required in order for a vSwitch to function. VMs connected to a vSwitch without any uplinks can communicate with each other but cannot communicate with VMs on other vSwitches or physical systems. Such a configuration is known as an “Internal-only vSwitch”. Communication between VMs connected to an internal-only vSwitch takes place entirely in software and happens at whatever speed the VMKernel can perform the task.
8. VMs connected to an internal-only vSwitch are not VMotion capable. But if the VM is disconnected from the internal-only vSwitch, VMotion will succeed if all other requirements have been met.
9. A vSwitch can also be bound to multiple physical NICs – this configuration is called NIC team. This takes advantage of load distribution and redundancy.
10. vSwitch associated with a physical NIC provides VMs with the amount of bandwidth the physical NIC is configured to support.
11. A single physical NIC cannot be associated with multiple vSwitches.
12. Max number of physical NICs on a ESX/ESXi host is 32 of which only 4 can be 10 Gbps adapters.
13. Service Console ports:
- ESX supports up to 16 service console ports.
- At least one service console port is required to exist on any one vSwitch on an ESX host.
- We will discover but not perform any create/update/delete operations for this port type.
14. VMKernel ports:
- Provide network access for the VMKernel’s TCP/IP stack (which is separate and independent from the Service Console TCP/IP stack).
- VMKernel ports are used for VMotion process, iSCSI/NAS access and VMware FT.
- With ESXi hosts, VMKernel ports are also used for management.
- A VMKernel port comprises of 2 components:
- A VMKernel port on a vSwitch
- A VMKernel NIC – vmknic
e. The vmknic is configured with the interface IP address in the process of creating the VMKernel connection type in vSphere client. The IP address should be a valid IP for the network to which the physical NIC is connected to. One can optionally provide the default gateway if VMKernel NIC is required to reach remote subnets.
- a. IEEE 802.1Q Tagging – marking traffic as belonging to a particular VLAN. VLAN tag (aka VLAN ID) is value between 1 and 4094 which unique identifies the VLAN across the network.
- b. VLANs are handled by configuring different port groups within a vSwitch. A port group can be associated to only 1 VLAN at a time, but multiple port groups can be associated with a single VLAN.
- Figure 16 - Configuring VLAN on Port groups of a vSwitch
- c. To make VLANs work properly with a port group, the uplinks for the vSwitch must be connected to a physical switch port configured as a trunk port. A trunk port understands how to pass traffic from multiple VLANs simultaneously while also preserving the VLAN IDs on the traffic. So the physical switch passes the VLAN tags up to the ESX server, where the vSwitch tries to direct the traffic to a port group with that VLAN ID configured.
- d. The default native VLAN is VLAN ID 1. This is untagged VLAN ID meaning the switch port will strip this native VLAN id from the traffic as they pass. If you want to pass traffic on VLAN 1 to ESX server, then you need to maintain the tagging in the traffic and so you need to configure another VLAN id as native default VLAN. So an untagged VLAN (default native VLAN) can also be any id between 1 and 4094.
- e. A good convention to follow while naming port group or port network label is: VLANXXX-Network Description. For example, VLAN11-IPStorage.
- f. Although VLAN reduce the cost of constructing multiple logical subnets by separating the network segments logically but still all traffic runs on the same physical network underneath. For bandwidth-intensive network operations this disadvantage of shared physical network might outweigh the scalability and cost savings of a VLAN.
16. NIC Teaming
- a. Uplink is a physical adapter bound to the vSwitch and connected to physical switch.
- b. NIC teaming involves connecting multiple adapters to single vSwitch. It provides redundancy and load balancing of network communications to Service Console, VMKernel and virtual machines.
- Figure 17 - NIC Teaming
- c. As seen in figure above, both of the vSwitches have 2 uplinks and each uplink connects to a different physical switch.
- d. ESX/ESXi can have a max of 32 uplinks and these uplinks can be spread across multiple vSwitches or all tossed into a NIC team on one vSwitch.
- e. Building a functional NIC team requires that all uplinks be connected to physical switches in the same broadcast domain. If VLANs are used then all the switches should be configured for VLAN trunking and the appropriate subset of VLANs must be allowed across the VLAN trunk.
- f. The load balancing feature of NIC teaming does not function like the load balancing feature of advanced routing protocol and hence is not a product of identifying the amount of traffic transmitted through a network adapter and shifting traffic to equalize data flow through all available adapters. Rather the load balancing algorithm for NIC teams in a vSwitch is a balance of the number of connections – not amount of traffic. NIC teams on a vSwitch can be configured with one of following 3 policies:
- i. vSwitch port based load balancing (default)
- This policy setting ensures that network adapter connected to a vSwitch port will consistently use the same physical network adapter. In the event one of the uplinks fails, the traffic from failed uplink will failover to another physical adapter.
- This setting is best used when number of virtual network adapters is greater than number of physical network adapters. Link aggregation using 802.3ad teaming is not supported with this and MAC based load balancing policies.
- ii. Source MAC based load balancing
- It has same limitations as previous method – it’s also static mapping of vNIC MAC to a pNIC. Traffic originating from a vNIC will always go through the same physical NIC in this approach (Same as previous).
- iii. IP hash based load balancing (out-IP policy)
- It uses source and destination IP addresses to determine the physical network adapter for communication. This allows traffic originating from a single vNIC to go over multiple physical NICs when communicating with different destinations.
- This policy setting requires all physical NICs be connected to same physical switch. Also the switch must be configured for link aggregation (which can increase the throughput by combining the bandwidth of multiple physical NICs for use by a single vNIC of a VM). ESX/ESXi supports standard 802.3ad teaming in static (manual) mode and does not support LACP or PAgP.
- g. The load balancing feature on vSwitch applies only to the outbound traffic.
- h. Failover detection with NIC teaming can be configured to use either a link status method or a beacon probing method.
- i. Link status method – failure of an uplink is determined by link status provided by physical network adapter. But this can only identify the link status of pNIC to edge switch and not the link status between the edge switch to an upstream switch.
- ii. Beacon probing failover detection – included link status as well as sends Ethernet broadcast frames across all physical network adapters in NIC team which help detect upstream network connection failures as well and will force failover when STP blocks ports, when ports are configured with wrong VLAN or when a switch to switch connection has failed. When a beacon is not returned on a pNIC the vswitch triggers failover.
- i. Failback option controls how ESX will handle a failed network adapter when it recovers from failure. Default setting is yes which means the adapter will be returned to active duty immediately upon recovery and it will replace the standby adapter that may have taken its place during the failure. Setting it to No means the recovered adapter will remain inactive until another adapter fails.
- j. One can even use the setting “Explicit failover order” in which case traffic will move to next available uplink in the list of active adapters. If no active adapters are available then traffic will move down the list to the standby adapters.
17. vNetwork Distributed Virtual Switches:
- a. A dvSwitch spans multiple servers instead of each server having its own set of vSwitches.
- b. First you create a dvSwitch and you add hosts to it during or after creation.
- c. When an additional ESX host is added to a dvSwitch, all of the dvPortgroups will automatically be propagated to the new host with the correct configuration. This is the distributed nature of the dvSwitch – as configuration changes are made via the vSphere client a vSphere server pushes those changes out to all participating hosts in the dvSwitch.
- d. A host cannot be removed from a dvSwitch if it still has VMs connected to a dvPortgroup on that dvSwitch.
- e. Adding dvPortgroup:
- i. Name of dvPortgroup – unique across member hosts of dvSwitch.
- ii. Number of ports: 128 default, max configurable value is 8192.
- iii. VLAN Type:
- 1. None – dvPortgroup will receive only untagged traffic
- 2. VLAN – dvPortgroup will receive tagged traffic and uplinks must connect to switch ports configured as VLAN trunks
- 3. VLAN Trunking – dvPortgroup will pass VLAN tags up to guest OS on any connected VMs
- 4. Private VLAN
- a. Can we have vNIC created without portgroup association? NO - API requires you to specify an existing portgroup while creating vNIC.
- b. You can assign any name to vswitch - for eg. 'ViMaster Switch'
- c. Standard vSwitch Port group name is unique within a host
- d. Hybrid deployments (vDS + vSS) is a supported deployment scenario. If vCenter fails then you won’t be able to manage your vDS so it is recommended that we use vSS for at least the VMKernel and Service Console connections. One can have the VM port groups on vDS though.
- e. We can assign a virtual hard disk carved out of a VMFS datastore over an iSCSI LUN to a VM with no network card (vnics).
- f. For software iSCSI initiator we can tell the vmknic interface being used by identifying which iscsi target is in the same subnet as the vmknic interface.
- g. For hardware iSCSI initiator no vmkernel port needs to be configured and it will show up as a normal FCHBA (Storage adapters) in vSphere client. The ip address will be configured on the HBA directly.
Tuesday, June 14, 2011
I listened to the audio book “The Kite Runner” read by the author Mr. Khaled Hosseini. This book has a very strong story line to keep the reader’s attention occupied. I liked the story and following are some thoughts on the book:
1. Relation between Amir and Hassan – the loyalty and unconditional devotion which Hassan has for Amir speaks for the mindset that society can impose on an individual of lower rank that such an individual can never come out of. In spite of Amir’s cowardly manners Hassan never blames him and even accepts the false charges of being a thief just so that Amir is not caught red handed was quite touching.
2. The way Hazara community was treated in Afghanistan or the Shudras were treated in India or the Jews were treated by Nazis is a fact that humanity should never forget just so that it never repeats those mistakes in the future. It is works like this book that remind us of our abhorrent mistakes of the past and reinforces into us the realization that we should never let this repeat itself.
3. Reader gets a feel of the Afghan culture – what a pushtun clan can value, respect for elders in the society and the values like this that parents teach their children.
4. How the Afghan people were scared of the Taliban and some mentions of the atrocities that Taliban militia men conducted on people.
5. Amir adopts Hassan’s son Sohrab and brings him to US and the problems that he faces with the consulate even though he was a US Citizen was also quite believable and something any foreign national living in US can relate to.
Overall the story was well told – its not very big book and I could complete listening to it within 4 days. Now I will like to see the movie and will update this post with how I found that later.
Saturday, May 14, 2011
Tuesday, March 08, 2011
Friday, February 25, 2011
I recently completed the book The Fountainhead by Ayn Rand. Following is the review of the book:
Fountainhead is the story of an architect, named Howard Roark, who is extremely passionate about the field of architecture but his ideas about it are not in tune with the times in which he lives in. In his time the teachers in his college to the professional architects practicing business were all of the view that the field of building design and architecture has already reached its pinnacle of evolution and needs no further change from what the masters of the past have already established as the best approach to building design possible – namely the gothic architecture. Howard Roark was a modernist and did not endorse to the idea of gothic architecture and wanted to do the building design in a more modern way in tune with the demands of the present times. As a result, he is faced with several challenges while practicing architecture his own way. He wont get any contracts, he does not work if people don’t accept his design exactly as he designed it without any change, and there were people who worked against him to ensure he succumbs to the pain they inflict on him. Ayn Rand has very elegantly tried to convey the message that in this world most of us are mere second-handers who adopt the genius of one man and keeping towing to that line without wanting or accepting any change. When there comes a man who tries to bring in something new something different than the norm then the whole world goes against such a man – since that man represents the one that most of us mere humans are not – such a man is more able than any of the average men around him and so the world does not want to let him be since that man makes others realize that they are inferior than him. Such average mere mortals have low self-respect, no integrity and they endorse but one thing – that good of the community is more important than the good of the individual. An individual may be sacrificed for the good of the community if need be. Such people cannot stand alone and require support of the other like minded men. They only know to feed on the genius of the first handers – men like Howard Roark. Ayn Rand goes on to expound on the virtues of being selfish – to love oneself is not sin – but a primary duty of an individual toward himself. She goes on to mention that where there is some sacrifice being done by someone there is someone getting what is being sacrificed. In the name of religion and politics, in the name of brotherhood we come across several such people who vehemently try to emphasize to others the virtues of being unselfish and to practice sacrifice/renunciation.
Howard Roark says – I shall not live for any other man nor will I expect any man to live for me.
The philosophy behind this story is gripping and forces one to think about whether one has integrity or are we going to end up as one of the mere second handers.
The important characters are:
Howard Roark – the hero or the protagonist.
Dominique Francone – the heroine who loves Roark
Peter Keating – Roark’s college mate who starts with being a go-getter and then realizes that in his passion to succeed he has lost his integrity.
Gayle Wynand – the industrialist who is the alter ego of Howard Roark
Ellsworth Toohey – the villain – he feeds on the souls of the unsure the second hander population which needed some moral support from him and his guidance since they lacked their own decision their own integrity
Henry Cameron – an architect who Roark works for in his first job
Highly recommended. Even if one does not like the philosophy one should still read this book for the literary value it has – the prose of Howard Roark’s statement in the court, Ellsworth Toohey’s lecture to Peter Keating and in general the dialogues exchanged between the characters are very well composed and a pleasure to read.
Wednesday, February 09, 2011
The read-aloud handbook by Jim Trelease is a treatise on the importance of reading aloud books to your children (by parents or by teachers in classroom). Mr Trelease brings forth several examples of how some parents were able to inculcate into their kids the habit of reading by beginning to read to them from early childhood. I will try to summarize my own experience of following this idea with my kid Rushil (who is 3.5yrs old).
I don’t remember exactly when I started to read on a regular basis during bed time to Rushil but it was approximately around 1.5yrs of age and only recently around 2.5-3yr age Rushil has started to show very positive interest in the books and just wants me to continue to read to him one book after another. Nowadays I read to him for at least 30mins during bed time but that is the least and mostly I have to read 2 stories (either from one book or 2 books). We visit the library once a week on Saturday’s after him gym class and of late that has become a routine and Rushil has come to expect that on Saturday’s and going to library is a pleasure trip for him as he gets to pick books and also DVDs there. We bring usually 2-5 books at a time with some books containing multiple stories. Apart from bedtime stories I also try to read to him while he is eating but that’s not a routine. Until now I have only been reading to him picture books and have also tried some chapter picture books (especially the Usborne anthologies ones which are picture books divided into chapters with about 70 pages for each story). I am yet to try reading a chapter from a Novel (like Charlotte’s Web by E. B. White). Once we also brought an audio book collection from library of Fairy tales and I was pleasantly surprised that Rushil was listening to the story of the Ugly Duckling quite intently. The audio books can be a good variety to play in the car at times.
Now going back to the book, the read-aloud handbook, it contains a list of books to be read aloud organized by the type of books and the kid’s age range. We can also find good lists on Amazon web site on which books to read to children of certain age. The list comes in handy in deciding which books are good to be read-aloud to children. In the first part of the book the author gives instances of several people who have written to him or spoken to him retelling their own experiences of reading to their students or children and the changes they witnessed in the kids. Also he mentions of research works which corroborate the fact that reading aloud to children is the best thing parents can do for their children’s education – by helping them build a solid foundation and imagination and most importantly inculcating in their kids the value of reading as a pleasure giving activity so that children are encouraged to read more as they grow. The book also recommends that parent’s themselves should lead by example by becoming avid readers. Reading aloud should also be done even after children start reading on their own. The book mentions of using close caption feature of TV while letting kids watch TV so that they also get to see the text together with what they hear – as this also may help in familiarizing the child with the sound and the text of words which will help them eventually in learning to read those text.
If you are a parent then it’s a good book to read to know about the values of reading aloud to your children.
Saturday, February 05, 2011
Introduction excerpted from the WattOS site:
wattOS is a lightweight Linux operating system remastered from the core Ubuntu Linux build. It is a free operating system that focuses on a small footprint, low power, and a simple quick interface. Bring your old computer back to life again with a fresh install of wattOS!
Monday, January 31, 2011
I recently got hold of this book – Kidnapped by R. L. Stevenson, from the local library and it proved to be an interesting read and the illustrations in the novel were very good too. Its an abridged edition of course but is able to hold the interest of the reader quite well indeed. Following is some summary of the book in my words – David Balfour goes seeking for his inheritance after his father’s demise – and meets his uncle Ebenezer Balfour who is the evil kind who will not want David to get his share of the estate and conspires to kill David but fails and eventually manages to sell David off for bondage labor to a captain of the Covenant ship. There David happens to meet a guy of Scottish decent who he befriends and who finally helps David to come back to England and get his property back from his uncle. The adventures of David and his friend while they escape from the Covenant till they reach England forms the major part of the story line. Overall a nicely done novella – good for a quick read.
Sunday, January 30, 2011
This is my first review of any book on my blog. I have recently started paying attention to my reading habit and have completed the first book – by author Jack London – The Call of the Wild. Though much has already been written about the book I will try to summarize it in my words below. This story has its appeal for me for the fact that I am presently staying in Santa Clara California where Buck used to live in Judge Miller’s house and I have also once visited Alaska where most of the story is based on.
This is a classic American story about a dog (Buck) who is sold by Judge Miller’s (in who’s household Buck used to inhabit as a pet born of a Saint Bernard father and a Scotch Shepherd Mother) gardener, Manuel, to the wrong hands at the time when (strong sled) dogs were in great demand (due to Klondike Gold Rush). And so Buck was relocated from the Santa Clara valley California to the north land (Alaska). The story is about how Buck experiences and sustains through the drastic change in his life being brought about by being moved from a domesticated pet dog to a hard working sled dog in the extreme climate of the north land. Buck survives it all because of his physical strength, ability to adapt to the changing environment, and above all, not loosing his values and remaining true to his self. Buck was passed on from one master to the next but they all liked him except for the trio who were themselves bad masters and they end up loosing Buck to Thornton. Bucks affection for Thornton is very heart warming. Eventually Buck avenges for his master’s death and returns to answer the call of the wild – where he does not kill for pleasure but only for his need to survive.
This is a children’s classic and is a quick read and a nicely told story.
Book notes: Designing Data-Intensive Applications: The Big Ideas Behind Reliable, Scalable, and Maintainable Systems, by Martin Kleppmann
My notes from the excellent book on how software has evolved to handle data from hierarchical databases to the NoSQL - https://www.goodrea...
I hit this issue recently which occurred on only one windows 7 host. The error was caused by this hard to guess reason ( http://support.mic...
Our project for CMPE 297 - Special Topics course. https://github.com/sjsucohort6/myconnect-app-ios [TBD - Demo video link will be add...
From Building Microservice Systems with Docker and Kubernetes by Ben Straub http://techbus.safaribooksonline.com/video/web-development/9...