Test, DIY tuning a piano key

I promised to “have a look” on a piano that did not sound “right” any longer; not for some time. A piano tuning professional had said that he does not know any piano with this name.

After opening the piano, it turned out that the manufacturer name is visible only in the inside, and that the outside name is something else. So no wonder the professional did not recognize this piano. I had already received the piano tuning key from a local music store, and as a good surprise one of the 3 key heads fit nicely to this piano, see photo below. In some pianos, there is an agraffe that is used to guide the strings (see the horizontal metal sheet).

piano-tuning1

After reading the instructions in the Links chapter, it finally was quite straight forward to tune one key.

In this piano, each key, on the right hand side of the piano, are connected to 3 strings. Before tuning, it is good to check how much the keys are out of tune, for example with and android application like Pano Tuner. Then in the tuning process, you need to damp the other strings of the same key either by finger or by home made tool (like photo below).

piano-tuning2

As the first timer, it took considerable amount of time for this one key. Even though I did fine tune some other keys, it would be totally another effort to try to fine tune the whole piano. At the moment, it would be way too much, as that would require a lot of “time and effort”, and coffee breaks…

Links

Posted in Audio and Video, Basic Tools, DIY, For Fun or Interest, Hobbies and Other Interests, Piano, Tests, Tips, Tools | Comments Off on Test, DIY tuning a piano key

DIY CRM: part 2 for personal task management

This is continuation to DIY CRM: part 1 for a small team, where the MS Access was used as a simple tool to keep track of tasks or cases for a team.

The same tool can be used for a simple personal task management or time management. It is focussing on maintaining the list and priority of the ongoing tasks, and this can be both work and private related. For added security, it is possible to encrypt the file (menu option File->Info). The figure below shows the main concepts.

CRMpart2-001

The screenshot below shows how 8 tasks could look like. Task 7 is opened, and in the details form one can select the details like Priority.

CRMpart2-002

About Priority

The possible values of Priority are:

  • 1 Urgent, Important
  • 2 Important, less Urgent
  • 3 Urgent, less Important
  • 4 less Urgent, less Important

If needed then these values can be modified. There are several articles about time management. As a reference, the picture shown in Wikipedia is used.

Timemanagementmatrix

“Task list report” (time management matrix)

The screenshot below shows the new report called “priority matrix” in the Task list or “Task list by prio to print” if looking the reports listed in the left menu. In addition to tasks, one could also list here the main personal goals so that they are always visible (see task 8 below).

CRMpart2-003-tasklist-fix1

Files

Posted in Anvanced Tools, Basic Tools, DIY, ICT Leadership and Management, Personal Development, Recommended Free Tools, Tests, Tips, Tools | Comments Off on DIY CRM: part 2 for personal task management

DIY CRM: part 1 for a small team

MS Access is included in the MS Office set of tools. I was playing around with it, and discovered that it comes with several build-in templates for different tasks. One of the interesting template is “Customer service” template, that was close to what I have been looking for. The figure below shows how the original template Customer Service looks like.

CRMpart1-001

Even though the interface looks very technical, it is straight forward to use and one can stick into the main view “Case List”. Also it is possible to modify the file, and add additional data and reporting capabilities without any programming. The figure below shows the main concepts and what data fields was added in this DIY CRM.

CRMpart1-002

The screenshot below is after the modifications.

CRMpart1-003

I have created 2 new reports to cover those new data fields: “Open Cases 2” and “Closed Cases 2”. And the 3 data fields “Company”, “Department” and “Functional Area” are included in the “Case Details” report. The list of values for “Priority” and “Category” can be changed. In this case, they are kept as in the original template. (I have also changed all the “dates” into “short form”; personal preference. You can easily modify this in the file.)

Files

  • DIY CRM for small team
    • This zipped Access DB file comes with sample data. (You need to unzip before using it.)
  • link to Access 2016 runtime
    • If you don’t have Access then it is possible to try this out with runtime license. One can add new data, change existing data and delete the data.
    • About the sample data. One can delete lines with “Del” key. However, with runtime version it is not possible to see the all the tables, queries and reports, and therefore one cannot delete the existing “Call” data. Any modifications need to be done in a computer with the normal Access license.

About Part 2

In the part 2, the same access DB is further modified so that it could be used as personal task or time management tool.

Posted in Basic Tools, DIY, ICT Leadership and Management, Tests, Tips, Tools | Comments Off on DIY CRM: part 1 for a small team

Recovering files from broken NAS (network attached storage)

After few years, even after little use, my Lacie 1000 Gb NAS went broken. When powering it up, the hard disk did not spin, but a smoke started to come up from the back side of the box close to the power cord. The power connector melted, but there were no other visual damage.

The only way to recover files was to take the hard drive out from the box and get it directly connected with a PC. Luckily I had an USB to SATA adapter, so the connection was easy. When connecting it into a windows 10 machine, it showed that the USB drivers were working fine, but there were no new hard drive available. The figure below shows the opened NAS box on the right, and the detached hard drive on the center. (The usb drive on the left is to make the backup into that one.)

Broken-NAS

After a little search, the reason became clear: this model has a ARMv5 compatible SoC (System on Chip) which can run linux and that the filesystem in the drive is most propably xfs (ie. not recognized by Windows OS) . In this device, the CPU is 88F6281, which seems suitable for these NAS devices.

Broken-NAS02

 

And then after connecting the drive into xubuntu linux in VirtualBox, then files became accessable:-)

Broken-NAS03

The other USB drive was also connected to the same xubuntu, after which it was possible to copy the files. The printout below shows the xfs for sdb2 (NAS disk) and ntfs for sdc1 (USB drive).

traveler@TravelBox:~$ sudo lsblk -o NAME,FSTYPE,SIZE,MOUNTPOINT,LABEL
NAME    FSTYPE     SIZE MOUNTPOINT                     LABEL
sda                  8G                                
+-sda1  ext4       6,5G /                              
+-sda2               1K                                
+-sda5  swap       1,5G                                
  +-cryptswap1
        swap       1,5G [SWAP]                         
sdb              931,5G                                
+-sdb1               1K                                
+-sdb2  xfs      929,6G /media/traveler/537daead-0d83- 
+-sdb5  swap       251M                                
+-sdb6             7,8M                                
+-sdb7  linux_ra   7,8M                                
+-sdb8  linux_ra 831,5M                                
+-sdb9  ext3       855M /media/traveler/2f3bc6b9-d96a- 
+-sdb10            7,8M                                
sdc                1,8T                                
+-sdc1  ntfs       1,8T /media/traveler/Seagate Backup Seagate Backup Plus Drive
sr0               1024M              

Other Links

Posted in Anvanced Tools, DIY, Gadgets, Hobbies and Other Interests, Tests, Tips, Troubleshooting | Comments Off on Recovering files from broken NAS (network attached storage)

CryptSync, a simple alternative to protect your files for sharing

CryptSync is simple and easy to use tool to synchronize 2 folders, where the files in the destination folder are encrypted. (CryptSync is using 7-Zip for the encryption.)

CryptSync01

In this way, one can perform client side encryption when sharing several files. Each file is encrypted individually with the same password, and it is only the encrypted files that are stored in the untrusted media (see figure below). It is possible to use CryptSync in a portable way by copying the files without installation on the second computer.

Cryptsync

 

Depending on the use case, like which client operating systems need to be supported and which media is used to sharing, then there are several other alternatives like Cryptomator and Syncany. (It is possible to use cryptomator without installation, with jar file, if using JPortable from portableapps.). However, they are a little more complex than the CryptSync. One also could reuse the same idea, and DIY (do it yourself) with a scripting tool, like autoit

For sharing one file at at time over untrusted media or via email, then one could directly use 7-Zip or tool like AxCrypt, which is nicely integrated with Explorer (there exist a portable version as well AxCrypt2Go.exe).

Links

Posted in Anvanced Tools, Recommended Free Tools, Tests, Tips, Tools | Comments Off on CryptSync, a simple alternative to protect your files for sharing

Survey of ISO certifications, results for 2015

ISO is having surveys about number of ISO certifications, it is worth to have a look 🙂

The table below is taken from the executive summary.

ISO survey 2015-001

There are also excel files available for each ISO standard that shows certifications per country or industry… For example for ISO 27001, the total number over the years is shown below.

ISO survey 2015-002

Posted in ICT Leadership and Management, ICT Standards, Security Certifications, Security Management, Security Standardization and Practises, Security Training, Awareness and Reports | Comments Off on Survey of ISO certifications, results for 2015

Study report “Women in Cybersecurity”, by several co-authors

It is worth to have a look at the recent study report called The 2017 Global Information Security Workforce Study: Women in Cybersecurity.

It can be found at the research page od the the Center for Cyber Safety and Education, or directly here.

Women in cybersecurity

Posted in Cybersecurity, ICT Leadership and Management, Security News, Security Training, Awareness and Reports | Comments Off on Study report “Women in Cybersecurity”, by several co-authors