By Day Erin Greener is a well-behaved digital illustrator for a small start up in Ohio. By night she becomes a crazy pin up artist and doodler of things!
A black hole is a testament to the irresistible force of gravity, which, like the German football team, can be halted temporarily but always wins in the end.
I do like snappy post headings, but that isn’t the point of this post.
Over the Christmas period my parents came to visit and brought with them (among other things) an elderly scanner that had worked fine when attached to a Windows XP laptop but worked not at all with Windows 7. The scanner is a Visioneer 5800 and the problem is that there is no Windows 7 driver for this scanner.
I’d forgotten just how painful it could be to be dependent on proprietary drivers, but this isn’t the point of this post.
We eventually found a workaround over at Tom’s Hardware and the scanner is now scanning. We still have a problem, however, because the software appears to be losing the scanned image and then locking itself up. I suspect that the problem is a configuration issue and that the scanner software is looking for a hidden folder that doesn’t exist. And this brings me to the point of this post.
With the various Linux distributions I have used, configuration information is very easy to find and modify. The distribution works for me and the only limitations are my own ability and willingness to read the necessary documentation. Windows, on the other hand, works against me by hiding configurations here, there and everywhere and by making it pretty much impossible to poke around or to make any changes other than those explicitly permitted by both Microsoft and each and every device manufacturer.
My laptop runs Antergos and I do feel that I am in control of what this machine can and cannot do. A Windows user, on the other hand, is not in control of their machine and has, instead, been trained to accept that the way to solve issues is to buy more stuff.
This sums me up remarkably accurately
Logging onto WordPress earlier today, I was more than a little surprised to discover that my password no longer worked. After a short panic and a password reset, I discovered that someone has managed to grt into the site and create a bunch of (utterly ineffectual, as far as I can tell) user profiles.
I have cleaned up what little mess I could find and it doesn’t look like anything has been seriously compromised. But if you do see anything behaving oddly on here, please let me know so that I can look into it.
The following bit of code should be reasonably self-explanatory but I was a little surprised to discover that there are no examples of doing this (for IBM i folks, at least) on the interwebnet.
So now there’s one.
insert into ignoreiln with slsrpt as (select * from ignoreiln where mtyp = 'SLSRPT'), invrpt as (select * from ignoreiln where mtyp = 'INVRPT') select a.mdir, 'INVRPT', a.siln, a.diln, a.riln, a.dept, a.brnd, 'Auto Created' from slsrpt a left outer join invrpt b on b.mdir = a.mdir and b.siln = a.siln and b.diln = a.diln and b.riln = a.riln and b.dept = a.dept and b.brnd = a.brnd where b.siln is null
If you want to know more, I would recommend starting with the IBM i Information Centre.