POPULARITY
SEGMENTS | Opera Orlando Presents 'The Secret River' | Florida Civil Defense in World War II | The Black Political Independent Movement
SEGMENTS | Jacksonville's Eartha White | St. Augustine Hurricane of 1811 | Florida in The Civil War
This show has been flagged as Clean by the host. This series is dedicated to exploring little-known—and occasionally useful—trinkets lurking in the dusty corners of UNIX-like operating systems. As the zeroth entry of this series, we'll have a little introduction to what it is supposed to be about and why you might want to listen. So that you don't leave without getting at least one piece of useful information, it will end with a little curio that you might find helpful someday. Back in 2010, I was the editor of the newsletter, titled The Open Pitt, for the Western Pennsylvania Linux Users Group in Pittsburgh. We distributed it as a two-page PDF, so had to have enough material to fill each issue. Because we were having some trouble getting contributions, I started writing columns in a series called "UNIX Curio" to occupy the empty space. They were inspired in large part by examples I had seen of people re-inventing ways to do things when utilities for the same purpose had already existed for a long time. The obvious question is: just what is a UNIX Curio? Let's start with the first word, UNIX. While a lot of people write it "Unix" instead, I have chosen to put it in all capitals because that is the way The Open Group, which controls the trademark and the certification process to use it, spells the word 1 . The history of UNIX is complex (search online for more details 2 )—the short version is that many variants emerged, often introducing incompatibilities. Even within AT&T/Bell Laboratories, two major branches came out. The Research UNIX lineage, which includes Seventh Edition (sometimes called Version 7), was often used in universities and government while System III and its more popular successor System V were clearly intended as commercial products 3 . The University of California's BSD was also very influential. My intention is to talk about things that are relatively common; ideally, they would be present on a large majority of systems so you can actually use them. Luckily, there were people who recognized the value in compatibility, so in the mid-1980s they initiated the development of the POSIX standards 4 . Publication of these not only caused commercial UNIX versions to aim for conformance—it gave Free Software implementations of utilities and operating systems a stable base to shoot for rather than having to chase multiple moving targets. As a result, today's GNU/Linux, FreeBSD, NetBSD, and OpenBSD systems generally behave as specified in POSIX, even if they haven't officially earned the UNIX or POSIX labels, so I treat them as part of the UNIX world. Moving on to the second word, "curio," it just means "an object of curiosity, often one considered novel, rare, or bizarre." There are many well-used utilities in the UNIX world, but people forget about others because they are only useful in specific circumstances. And when those circumstances arise, these obscure ones don't always get remembered. One purpose of this series is to point out some of them and describe where they can be appropriately put to use. With the flexible tools available on UNIX systems and the ability to string them together, it shouldn't be surprising that people come up with new ways to accomplish a task. I don't want to claim that these curios are always the best way to do something, just that it can be helpful to know they exist and see the way someone else solved the problem. Also, if you're using an unfamiliar system, sometimes programs you are accustomed to employing might not be installed so it's good to know about options that are widely available. So why am I the person to talk about this subject? I am not a UNIX graybeard with decades of professional computing experience. If I did grow a beard, it would only be partially gray, and my working life has been spent in the engineering world mainly around safety equipment. Sadly, there I have been forced to use Windows almost exclusively. However, in my academic and personal pursuits, I have been involved with using UNIX and Linux for more than 30 years, so I do have a bit of a historical perspective. For some reason, when I encounter an unusual or obscure tool, I want to learn more about it, especially so if I find it to be useful in some way. After gaining that information, I might as well share it with you. In addition, I have been involved with Toastmasters International, a public speaking organization, for about 15 years so I have experience in presenting things orally. I was inspired to turn this article series into podcasts by murph 5 , who delivered a presentation at the 2025 OLF Conference describing how and why to contribute to Hacker Public Radio 6 . The show notes for curios 1 through 3 will consist of the articles as they were originally written (though with references added). Because some examples, especially code, can be difficult to understand when they are read out loud, the podcasts will sometimes present the information in a different way. Show notes for this curio 0 and for curios 4 and later will be written with the podcast format in mind, so they will more closely match what I say. Let's end with an actual curio to kick off the series. Have you ever needed a quick reminder about whether the file you're looking for can be found under the /usr or /var directories? On many UNIX systems, man hier will give you an overview of how the file hierarchy is organized. This manual page is not a standard, but was present in Seventh Edition UNIX 7 and many descendents, direct and indirect, including every Linux distribution I have ever used. There are attempts to standardize the layout; in the Linux world, the Filesystem Hierarchy Standard (FHS) 8 , now hosted by Freedesktop.org 9 , intends to set a path to be followed. It should be noted that systemd has its own idea of how things should be laid out based on the FHS; if it is in use, try man file-hierarchy instead as it will likely be a more accurate description. I hope this gives you a good idea of what to expect in future episodes. The first one will be about shell archives, so keep an eye on Hacker Public Radio's schedule for it to appear. References: The Open Group Trademarks https://www.opengroup.org/trademarks History of Unix https://en.wikipedia.org/wiki/History_of_Unix The Unix Tutorial, Part 3 https://archive.org/details/byte-magazine-1983-10/page/n133/mode/2up POSIX Impact https://sites.google.com/site/jimisaak/posix-impact Correspondent: murph https://hackerpublicradio.org/correspondents/0444.html OLF Conference - December 6th, 2025 https://www.youtube.com/watch?v=hyEunLtqbrA&t=25882 File system hierarchy https://man.cat-v.org/unix_7th/7/hier Finding a successor to the FHS https://lwn.net/Articles/1032947/ Freedesktop.org now hosts the Filesystem Hierarchy Standard https://lwn.net/Articles/1045405/ Provide feedback on this episode.
SEGMENTS | Retirement Villages in Florida | Highwaymen Artist Willie Reagan and R.L. Lewis | Tampa's Gasparilla Festival
SEGMENTS | Zora Neale Hurston's Life and Career | F. Evan Nooe 'Aggression and Sufferings'
SEGMENTS | The Hungerford School Property and The 37th Annual Zora! Festival | The History of Colonial Plaza
SEGMENTS | Bob Carr - 'The Python Conspiracy' | 16th Century Florida in The European Imagination | Adventure Tourism and The Florida Frontier
SEGMENTS | Greek Orthodox Epiphany in Tarpon Springs | Florida in The French Revolution | Bob Kealing on Jack Kerouac in Florida
SEGMENTS | The Historic Town of Cassadaga | The Legacy of Ponce De Leon | History of The Orange County Courthouses
SEGMENTS | Christmas Community Pioneers | Christmas From Florida's Past | Silent Christmas in Cuba
SEGMENTS | Henry Flagler's Whitehall Estate | Harvest V. Board of Public Instruction | Orlando International Airport - MCO
SEGMENTS | Orlando Collected Exhibit | Ft. Myers in The Civil War | Abandoned Vehicles of The Everglades
11-15-25 MHS 55-FHS 6 by MBC Grand, Inc.
10-3-25 MHS 57-FHS 6 by MBC Grand, Inc.
John Kempton is a Senior Consultant at FHS and is responsible for advising clients on program design and implementation, negotiating contracts, and implementing overall risk management strategy. Before joining FHS, John was the Southeast Zone Real Estate Leader and Senior Vice President for Marsh in Washington, DC. John entered the insurance industry in 2012. In this live from RIMS 2025 Chicago episode, John highlights industries that commonly outsource risk management, including real estate and hospitality, details the unique skillset of being a broker-turned-consultant, and offers encouragement to anyone who is wondering whether returning to the office is really worth the effort (it is). Key Takeaways: ● John's role at FHS focuses on real estate and construction space. ● Industries that commonly outsource risk management. ● From history major to insurance industry — John's unexpected career path. ● Acquiring insurance clients in the real estate industry. ● The benefits of offering a flat monthly retainer. ● Brokers turned consultants offer a unique skillset to clients. ● John's engagement preferences in the real estate and hospitality industry. ● Growth in this industry is not slowing down anytime soon. ● In another life, John is managing a safari lodge in South America. ● John's networking advice to his early career self. Mentioned in This Episode: John Kempton FHS Risk Management Tweetables: “Our job is to come in and manage the process rather than hijack the process.” “Many of our clients don't even know that this outsourcing model exists.” “The earlier we're involved with our clients, the better the outcome typically is.” “Embrace being in the office and making connections.”
Chris fled a declarative-first world for the promised land of Bluefin's atomic simplicity. Fifty days in, did he find desktop bliss or just fresh compromises?Sponsored By:1Password Extended Access Management: 1Password Extended Access Management is a device trust solution for companies with Okta, and they ensure that if a device isn't trusted and secure, it can't log into your cloud apps. Unraid: A powerful, easy operating system for servers and storage. Maximize your hardware with unmatched flexibility. Support LINUX UnpluggedLinks:
Double Tap Episode 417 This episode of Double Tap is brought to you by: RMA Defense, Rost Martin, Medical Gear Outfitters, Night Fision, Blue Alpha, XTech Tactical, and Swampfox Optics Welcome to Double Tap, episode 417! Your hosts tonight are Jeremy Pozderac, Aaron Krieger, Nick Lynch, and me Shawn Herrin, welcome to the show! GOALS August 9th and 10th in Knoxville, Tennessee. Knoxville Convention Center Free to GOA members https://events.goa.org/goals/ If you were at GunCon and are attending GOALS. Don't forget to get some pics with the cast to claim your free shirt. - Dear WLS Joe E - Hey WLS crew, I am moving from a suppressor friendly state to a none suppressor friendly state. I have the option of installing a safe at a family members property that is still in a suppressor friendly state and leaving it there. So long as I am the only one that knows the access code to the safe will this be okay? Joe No Notes Rusty S - In a fight for your life, would you rather have a rifle chambered in a pistol cartridge or a pistol chambered in a rifle cartridge? No pistol braces or buffer tubes that can be shouldered are allowed on the pistol. Mr. NiceGuy W - If you were the devil, what would you offer your cast members in exchange for their soul? Jeremy, I would offer to pay off his range and give him a lifetime supply of ranch Aaron I would offer clear skin, free of psoriasis, a toilet capable of handling apples and good luck Nick would be easy. A healthy and a proper functioning digestive system. Savage I would offer, hair, height and a few Bitcoin. Shawn would have to be weight-loss without exercise or Ozempic, and wrinkly balls Jordan S - Hey guys, TL/DR- Supressors expensive. What next gUuDeR muzzle device? I've had my 1st AR for a couple years now (basic flat-top PSA) & interested in changing out the cheap A2 birdcage, that everybody seems to hate. Watched some YT. They all start w/ the birdcage. 3-4 prong flash hider or hider/comps. Suppressor adapters & then whatever suppressors they have. All (except the wHisper pickles) seem to be +/- on recoil mitigation vs flash suppression and they end up saying ""Just get a suppressor"". Yeah, no shit. They are THE best muzzle device. I don't see myself getting into suppressor money soon, so not really worried about that. Jusy looking into something different. Use case is paper punching, but aiming for accuracy. Nothing high speed. I like the open prong FHs (purely off esthetics). Not "jazzed" about the concussion that comes (Hehe) with compensators, but haven't ruled them out. Even thought about a flash can, because reasons, ya know. It's not like the paper/cardboard targets are going to be shooting back. Obviously NODS aren't in the scenario either. Whatcha think? Thanks for getting me through the work week on Spotify. No notes. Dick Beelong - I have an autistic question for y'all even though Jerombé will probably hate on me for it. I'm currently running an AEMS on an ADM NV mount on my suppressed 11.5"" AR15. I obviously have my light and laser up front. But I got a good deal on a T1/T2 GBRS Hydra mount and it has me curious. Should I swap over to a t1/t2 style dot and move the laser back or just not be a bitch and leave it as is with a ton of weight upfront? Thank you for your time and Aaron, stop being racist. We all saw what you did with those chicken & duck eggs. #nonotesborthers Dan N - Hey guys, I've been fucking with guns for a while. Building and fixing everything I can. But in an ever present need to learn more, I want expand my knowledge. So, what are your favorite gunsmithing style books? I love schematics books, and just like my firearms, I could never get enough. What are your favorite or must have gunsmithing style books? Thanks, keep up the great show. #nonotes #aaronisgay Deeoh Gee - Sean. You enjoy the fanny pack life. What is your go to way off attaching a holster to your fanny p...
We're half way through 2025, which has turned out to be a very eventful year to say the least, and that very much shows up in the data for the watch market. So today we're looking at all the data sources we can muster to understand just how the watch industry is faring at the midway point of 2025, and where it might be heading next. We looked at a wide variety of sources from WatchCharts, to trade press, to FHS export data and more. We'll do our best to cite everything as we chat, but as always a full list of sources can be found at collectivehorology.com/blog. Hosted by Asher Rapkin and Gabe Reilly, co-founders of Collective Horology, Openwork goes inside the watch industry. You can find us online at collectivehorology.com. To get in touch with suggestions, feedback or questions, email podcast@collectivehorology.com.
Off-the-shelf didn't cut it, so we built what we needed using open hardware and open source.Sponsored By:Tailscale: Tailscale is a programmable networking software that is private and secure by default - get it free on up to 100 devices! 1Password Extended Access Management: 1Password Extended Access Management is a device trust solution for companies with Okta, and they ensure that if a device isn't trusted and secure, it can't log into your cloud apps. Unraid: A powerful, easy operating system for servers and storage. Maximize your hardware with unmatched flexibility. Support LINUX UnpluggedLinks:
Join us as former FHS host Raymond Guerrero discusses community and care with Binx Beelman, an English major also pursuing an addictions counseling license. As an executive member of Unite for Reproductive Justice and Gender Equity (URGE), Beelman shares why she's drawn to working with the LGBTQ+ community, especially youth. She also previews her upcoming role as the new host of For Human Sake, teasing future collaborations with co-hosts Parker and Maggie.
14 maj. Tobias Thybergs avgång har skapat en diskussion kring säkerhetsprövningar. Hur funkar sådana? Vems ansvar är det att sårbarheter kommer fram? Och räknas nakenbilder som en sårbarhet? Andreas Ericson diskuterar med Malen Wallén från FHS och Kim Torstensson från Säkerhetsföretagen.