How Do You Use PowerShell to Correct the Time on Your Windows Machine?

Problem scenario
You are trying to correct the time of your Windows machine. You run "w32tm /resynch", but you get "The following error occurred: The service has not been started. (0x80070426)". What should you do?

Solution

  1. Open PowerShell as administrator.
  2. Run these five commands:
net stop w32time
w32tm /unregister
w32tm /register
net start w32time
w32tm /resync /nowait

If you wanted a non-PowerShell method, see this posting.

Why Does the Declaration of Independence Study Guide say Carter Braxton died in 1761?

Problem scenario
The "brief biographies of the signers" of the laminated guide of The Declaration of Independence (a QuickStudy Academic publication) indicates that Carter Braxton died in 1761. Why is this?

Answer
It is a mistake. He died in 1797 according to https://encyclopediavirginia.org/entries/braxton-carter-1736-1797/

The laminated guide is not bad all-in-all. You can buy it on Amazon.

Why Was The Bridge Considered “rude” in Emerson’s Concord Hymn?

Question
Emerson's famous poem named Concord Hymn begins with: "By the rude bridge that arched the flood,"

Why was the bridge considered "rude"?

Answer
The short answer is the word "rude" means "unfinished" (as opposed to being disrespectful), and the condition of the bridge in the 1830s was poor [6] or possibly non-existent [5].

Here is the longer answer:

This was the poem with the well-known quote "the shot heard round the world." It was originally written to dedicate a monument at the North Bridge [5] in Concord. Understand that it is called "Concord Hymn." A hymn is a short poem to honor the Christian God [4]. This poem combines aspects of the American town of Concord with praise of the Christian deity.

Remember that this poem only has 105 words, and there may have been a recency bias to stimulate the author's thoughts. The poor or absent bridge would have given the author the idea to use the word "rude."

The word "bridge" can be a metaphor too. In this New England poem, despite its short length, the word "bridge" appears twice.

The other line with the word "bridge" says "And Time the ruined bridge has swept." The bridge has now been described as "rude" and "ruined." The author is consistent with adjectives that start with "ru." This conjures the lack of a bridge the American colonies would have to Great Britain [in the War for Independence].

There is a motif of water throughout the poem, and in 1776 the country was not very refined. Geographically the bridge arches over a river. In the poem (or "hymn") the bridge arches a flood. The original Biblical flood, which may have been dear to Christian Americans at the time, could be a way for a poem to summon a beginning of a people (in the poem's case, the American people). The monument itself thanked God explicitly [6].

The first definition of "rude" in Noah Webster's 1828 dictionary (who was originally from New England) is "rough; uneven; rugged; unformed by art; as rude workmanship, that is, roughly finished; rude and unpolished stones." [2] The first definition of "rude" in Merriam-Webster's Collegiate Dictionary 11th edition is "being in a rough or unfinished state."

The poem says "We set today a votive stone…The shaft we raise to them and thee." This is a reference to the dedication of the mostly granite monument [6] that was and still is in the form of an obelisk.

Poets love metaphors and imagery. If a bridge is rude (rough or unfinished), there is room for refinement. The celebration of the Battles of Lexington and Concord were to honor the country (and the towns). A bridge may be a pathway to the future or a way to unite diverse people in different locations. To remember the battle as the beginning of the American people, it may have been Emerson's goal to describe the passageway over the water as unfinished to illustrate the improvement that would come later. Or he was just primed to discuss the dilapidated bridge (or its complete disappearance [7]).

It may be advisable to critique poemanalysis.com that says '[t]he use of the word “rude” in the context is to refer to the bridge’s structure. It was not of complicated construction—it was simple.' [1]
The condition of the bridge in the 1830s was poor according to [5] or non-existent according to [6]. [7] suggests the original bridge was definitely not there.

To read the full poem, see [3].

[1] https://poemanalysis.com/ralph-waldo-emerson/concord-hymn/
[2] https://webstersdictionary1828.com/Home?word=rude
[3] This was taken from https://pressbooks.pub/poetrypoetics/chapter/concord-hymn/:

By the rude bridge that arched the flood,
Their flag to April’s breeze unfurled,
Here once the embattled farmers stood
And fired the shot heard round the world.
The foe long since in silence slept;
Alike the conqueror silent sleeps;
And Time the ruined bridge has swept
Down the dark stream which seaward creeps.
On this green bank, by this soft stream,
We set today a votive stone;
That memory may their deed redeem,
When, like our sires, our sons are gone.
Spirit, that made those heroes dare
To die, and leave their children free,
Bid Time and Nature gently spare
The shaft we raise to them and thee.

[4] https://webstersdictionary1828.com/Home?word=hymn
[5] https://www.nps.gov/places/1836-battle-monument.htm
[6] https://freedomsway.org/place/1836-battle-monument/
[7] https://www.facebook.com/lostnewengland/posts/the-old-north-bridge-in-concord-massachusetts-where-the-shot-heard-round-the-wor/830401999092119/

How Do You Troubleshoot “ZFS modules cannot be auto-loaded” or “FATAL: Module zfs not found in directory”?

One of the two problem scenarios apply.

Problem Scenario #1
You run this: sudo modprobe zfs. You get this:

modprobe: FATAL: Module zfs not found in directory /lib/modules/6.1.0-37-cloud-amd64

Problem Scenario #2
You run this: zpool list

You get this:

The ZFS modules cannot be auto-loaded.
Try running 'modprobe zfs' as root to manually load them.


How do you solve the above problems?

Possible Solution #1
Run sudo zpool list

Possible Solution #2
Run this (but be ready for it to take ~30 minutes or longer to complete):

sudo apt install linux-headers-$(uname -r)

How Do You Install ZFS on Debian Linux?

Problem scenario
You want to use ZFS (e.g., and run zpool commands or use ZFS to modify volumes) on a Debian/Ubuntu Linux system. What should you do?

Solution
Run these commands:

sudo apt-get install zlib1g-dev uuid-dev libblkid-dev pkg-config libssl-dev
sudo apt-get -y update && sudo apt-get -y install build-essential

codename=$(lsb_release -cs);echo "deb http://deb.debian.org/debian $codename-backports main contrib non-free"|sudo tee -a /etc/apt/sources.list && sudo apt update

sudo apt -y install zfs-dkms zfsutils-linux # if you get a prompt, read the message and do what you think is best

wget https://github.com/openzfs/zfs/releases/download/zfs-2.3.3/zfs-2.3.3.tar.gz
sudo mv zfs-2.3.3.tar.gz /opt
cd /opt

sudo tar -xvzf zfs-2.3.3.tar.gz
cd zfs-2.3.3
./configure
make # this can take more than 30 minutes
sudo make install

sudo apt install linux-headers-$(uname -r)

Test it out with this command:

sudo zpool list

If you want to see what version of ZFS you have installed, run either of these commands:

dpkg -s zfsutils-linux | grep Version
dpkg -s zfs-dkms | grep Version

Cybersecurity 101: What Every Business Owner Needs to Know

Image via Pexels

In today’s digital-driven world, cybersecurity is no longer an optional consideration for businesses – it’s a necessity. From protecting customer data to safeguarding sensitive business information, entrepreneurs and established business owners face increasing risks from cyberattacks. Without proper measures, a single breach can lead to devastating financial losses and reputational damage. By understanding the basics of cybersecurity and implementing strategic defenses, business leaders can build resilience against cyber threats and protect their ventures in a constantly evolving landscape.

Empowering Your Team for Cybersecurity Success

Training your employees on data protection is vital for shielding your business from internal threats. Educate your team on data privacy laws and security best practices to manage sensitive information responsibly. This training is essential across all departments, as human error is a leading cause of data breaches. For instance, the HR department must be well-versed in data protection regulations to ensure compliance. Cultivating a culture of privacy awareness not only safeguards your organization but also enhances trust with clients and stakeholders.

Elevating Your Business with Cybersecurity Knowledge

Advancing your knowledge in cybersecurity can be a game-changer for safeguarding your business against digital threats. Pursuing online or self education in this field equips you with the expertise to secure critical systems and protect sensitive data from potential breaches. Many professionals choose online programs for their flexibility, allowing them to balance academic pursuits with business responsibilities. Through the curriculum of cybersecurity programs, you may gain practical skills in areas like network defense, data encryption, and risk management, enabling you to implement strong protective measures and stay ahead of evolving cyber risks.

Securing Your Network Against IoT Threats

Evaluating the impact of IoT (Internet of Things) devices on your network security is essential, as these devices can introduce vulnerabilities if not properly managed. While they enhance efficiency and connectivity, IoT devices often lack robust built-in security, making them attractive targets for cyberattacks. Conducting regular assessments of how these devices interact with your network, implementing strong authentication protocols, and ensuring they are updated with the latest firmware can significantly reduce potential risks and strengthen your overall security posture.

Buttressing Your Business with Network Security Protocols

Understanding network security protocols is vital for protecting your business data. Protocols like TLS ensure secure communication, shielding sensitive information from cyber threats. By adopting the latest security standards, you guard against data breaches and comply with international regulations like GDPR. Staying informed about these protocols helps you build a resilient information system that supports your business operations.

Implementing Role-Specific Training

Empowering your employees to recognize and report phishing attempts is crucial for protecting your business. Employees are often the frontline defenders against cyber threats. Implement ongoing training programs that adapt to new phishing tactics, integrating engaging elements like gamification and role-specific training. This approach fosters a security-aware culture that emphasizes proactive threat reporting.

Incorporating Strategic Cybersecurity Onboarding

Developing a comprehensive onboarding cybersecurity module for new employees is a vital step in maintaining a secure work environment. This module should clearly outline the company’s security protocols, such as password policies, data handling procedures, and guidelines for identifying phishing attempts. By emphasizing the importance of adhering to these protocols and providing practical examples, new hires can quickly grasp their role in protecting company assets. Regular updates and interactive training elements can further reinforce these best practices, fostering a culture of security from day one.

Strengthening Systems’ Security through Effective User Authentication

Protecting your I.T. resources from unauthorized access requires effective user authentication and access controls. Implementing multi-factor authentication (MFA) adds an extra layer of security, requiring users to verify their identity with more than just a password. Additionally, applying the principle of least privilege ensures users only access necessary resources, reducing potential vulnerabilities.

Cybersecurity is an essential aspect of running a successful business in the modern age. By prioritizing education, investing in robust security measures, and staying informed about emerging threats, entrepreneurs and business owners can create a safer digital environment for their operations and customers. While no system is entirely foolproof, proactive efforts can significantly reduce vulnerabilities and build trust with clients and stakeholders. Taking steps today to protect your business ensures a more secure and sustainable future.

Explore a world of tech insights and solutions at Continual Integration, where complex problems meet innovative answers for your IT and DevOps challenges!


Disclosure
The article was brought to you by http://businessbegins.net/, and it does not necessarily represent the views of ContinualIntegration.com.

The rigor and costs of the academia may far outweigh the benefits. We do not believe there are employability benefits to a college degree.

Continualintegration.com finds many “best practices” are either highly qualified or specific practices or merely “recommended practices”; to read more about such practices see this article.

How Do You Install Jax and Test It Out?

Problem scenario
You want to test Jax. What should you do?

Answer

1. Enter a virtaulenv. Use How Do You Install and Create a Virtual Environment? if necessary.

2.  Run this: $ pip3 install jax

3.  Run this: $ pip3 install jaxlib

4.  Run this: $ python3

5.  Run this (without the "> "): > import jax.numpy as contint

6.  Run this (without the "> "): > foobar = contint.ones((4000, 4000))

7.  You are done. The above will indicate if no GPU or TPU was found (e.g., your server only has regular CPUs)

Why is a Furnace Constantly Heating beyond the Thermostat’s Temperature?

Problem scenario
A furnace keeps getting hot exceeding the desired temperature of the thermostat. It never stops and is creating a great deal of heat. What could be wrong?

Possible Solution #1
It could be a thermostat issue. Can you replace the thermostat or remove it from the wall to see if that stops the heater? If it keeps getting hot, see the other options below.

Possible Solution #2
The limit switch could have an issue. A professional could turn off the power and check the limit switch with a multimeter. (This would be possible if removing the thermostat does not shut off the heater.)

Possible Solution #3
A sequencer or the entire control board could have an issue. A furnace expert could replace this. (This would be possible if removing the thermostat does not shut off the heater.)

Possible Solution #4
Is the furnace relatively new but the house itself is much older than the furnace? If this is your situation, the wires in the wall may be old. A wire in the walls has shorted, or it is starting to short. This can cause intermittent problems of overheating from the furnace (exceeding the temperature of the thermostat). A furnace installer with electrical knowledge could fix this. (This scenario could happen if removing the thermostat does not shut off the heater.)