3 Uses For Britney Spears Music

Here are 3 unexpected uses for the music of Britney Spears:

Number 3:

According to reports, Britney's hits, including Oops! I Did It Again and Baby One More Time, are being employed by British naval officers in an attempt to scare off pirates along the east coast of Africa. Perhaps nothing else – not guns, not harpoons – is quite as intimidating as the sound of Ms Spears singing "Ooh baby baby!"

Ooo... er... now they've gone an' done it...

The Queen is not amused.

In a fit of anger her majesty Queen Elizabeth II issued the following letter to the citizens of United States of America in response to the US government shutting down:

To the citizens of the United States of America from Her Sovereign Majesty Queen Elizabeth II

In light of your failure to financially manage yourselves and inability to effectively govern yourselves responsibly, we hereby give notice of the revocation of your independence, effective immediately. (You should look up ‘revocation’ in the Oxford English Dictionary.)

Here's one for the wi-fi worry warts ...

As if you didn't have enough things to worry about, check out Michael Horowitz's article at Computerworld:

Google knows nearly every Wi-Fi password in the world

If an Android device (phone or tablet) has ever logged on to a particular Wi-Fi network, then Google probably knows the Wi-Fi password. Considering how many Android devices there are, it is likely that Google can access most Wi-Fi passwords worldwide.

Oh, and change your wifi passwords now. You'll be completely safe until the next device logs in...

Why Lawyers Should Be Paying Attention to the NSA

From the law offices of Mikki Barry. Google's Gmail & Calendar may now have serious legal issues regarding potential breach of attorney/client privilege...

As attorneys, each one of us should be screaming bloody murder about this potential breach of attorney/client privilege at its very core. It’s not that it is “possible” to get our privileged information, our work product through Google Apps, both the “metadata” and the content of our correspondence, etc., it has already happened, and continues to this day. We KNOW our communications have been compromised. The question now is what to do about it.

Xenserver 6.2 - extending a disk on a Linux VM

I've been slowly converting some of our VM infrastructure over to XenServer from VMWare. Now that XenServer 6.2 is fully open source, it seems to be a good place to transition. Sometimes incredibly simple tasks take you down a rabbit hole you did not plan on going down.

I must confess I spent hours trying different methods and partition schemes. The K.I.S.S. approach is really the way to go here. I found this article to be the simplest and most practical solution, and have updated it here to cover any CentOS 6.4 / XenServer 6.2 issues. It's based on the assumption that you don't have an overly complicated VM partition scheme.