Over the past few years I’ve accepted that if a screen replacement doesn’t require a tear-down of the entire laptop chassis, then it just requires a tear-down of the entire top portion of a laptop chassis.
I won’t be discussing this laptop in too much detail here, those who’ve already heard my spiel on modern laptop make/models know how much I abhor consumer models over their business tier counterparts.
For now, let’s look into why it was surprisingly easy to change the broken LCD display panel on this laptop.
It’s all clips
The front display bezel is held in place to the rest of the top chassis with plastic clips. They’re engineered in such a way that levering the bezel by prying it upwards from within the frame releases the clips. To do so I typically use a plastic spacer, but guitar picks work great and can often be found in bulk on eBay for pretty cheap.
The challenging part came from removing the lower half of the bezel which was behind a plastic hinge cover.
A lot of tear-down documentation for <17 models involved a tear-down of the lower chassis to release the hinge from the frame so that the top assembly can be removed, and along with it this hinge cover.
However, this too is held together by clips! What are the odds.
Similar to the bezel, you can insert a plastic spacer between the hinge and the front display hinge, prying the hinge cover in the direction the display is facing.
Two things to note;
It won’t come off completely, so don’t try it.
Be weary of pushing your plastic spacer too deep – it’s not necessary to release this hinge cover, and you’ll risk damaging the display ribbon cable
Once off, you can remove the two screws at the top and two at the bottom, ignoring the large flat-head hinge screws.
The display panel will then freely drop off, with the ribbon cable plugged into the lower right portion.
Holding the ribbon cable in place with my plastic spacer, I got my replacement panel, inserted the ribbon cable, and re-assembled the HP 17, performing everything above but in reverse. Re-seating the bezel and hinge cover wasn’t too difficult, I’d just recommend you start with ensuring all sides of the bezel are inserted and sit flush with the rest of the front assembly, and that there are no gaps between the display and bezel.
All in all, wasn’t too difficult of a replacement. To the owner of this laptop, I hope you find this useful.
Not long ago I had the privilege of meeting Speo, creator of MagicDSC and overall astronomy hobbyist/fanatic, in-person. Thanks again for the crash course on sky watching – I look forward to fiddling with your project more while embracing the hidden beauty of the night sky.
Suffice to say, I’m now the owner of a 6″ Dobsonian SkyWatcher.
I’ve been fascinated with the night sky for the longest time considering the amount of time I spend awake during it from my abysmal sleep schedule.
I thought it’s about time I tapped into a proper tool to observe its many mysteries, and here we go.
Moving forward, I’ll be documenting my journey with this cool piece of tech under #astronomy – including the following on how I improved a cheap red dot viewfinder with an old ball point pen.
Tweaking a Red Dot ViewFinder
While super useful and affordable, I noticed it had quite a bit of wobble in both the X and Y.
You can easily fix this using a few small spacers, but I didn’t want to have to disassemble it again and remove a spacer if I need to re-align it.
For that reason, I ended up stealing the spring from a non-functional ball point pen and cutting it into small segments that I put between the X and Y knobs and the viewfinder frame. After doing that, the wobble was pretty much non-existent.
You can also re-position the spring between the head of the screw and viewfinder body assuming you find yourself calibrating -X/-Y more than +X/+Y.
I can now release tension on each axis without having to adjust how many spacers I use to align it.
Together, we went over some basic Kubernetes concepts, API resources, and the problems they solved relative to non-cloud native architecture.
As part of this workshop I created some simple K8s cheat-sheets/material, along with a whole new Kubernetes cluster which I exposed as part of a hands-on lab.
Participants, which included high school/post-secondary students, found the workshop pretty cool. I’ve heard feedback post-workshop that their friends thought they were hacking as they used kubectl.
Kids, kubectl responsibly.
I also noted feedback that more detail in certain topics would’ve been great, which I would’ve definitely wanted. I barely managed to get through everything I wanted to in 60 minutes 🙁 The primary goal was to explore common questions/problems one hosting an application may encounter, and how Kubernetes can address them.
All in all, it was a great experience that I look forward to doing more often – not particular to Kubernetes, but cloud native architecture in general. As a cloud engineer, I’ve learned the hard way that this is anything but straight-forward, and I hope others can learn from my struggles as they embark on their journeys in this space.
Workshop aside, I wanted to chat a little about the lab environment I created since I got questions post-lab from other Kubernetes aficionados.
I’ve been running Tanzu Community Edition on my home lab since its early days, both as a passion project having contributed to it, and because it integrates well with my home vSphere lab. As such, I already had a management cluster serving as my ‘cluster operator’, which I use to create/destroy clusters on the fly. This was no different, with the exception of creating a user fit for this public lab.
How I created a Kubernetes Lab in 15 minutes using Tanzu Community Edition
I should probably preface this by saying that this is NOT something I would encourage for any kind of persistent environment.
While this might be less dangerous if it was behind a VPN, the cluster we’re about to create has the risk of leaking important vSphere configuration data, along with the credentials of the user that cluster resources will be created under. For example, if a user can fetch vsphere-config-secret from kube-system namespace, consider your vSphere environment compromised.
This process assumes the following:
You have an existing management cluster created
Your Tanzu cluster config VSPHERE_CONTROL_PLANE_ENDPOINT resolves to some internal IP that’ll be used for your workload cluster API, and resolves to your public IP externally
You can port-forward your cluster API (probably better ways, will talk about this later)
Step 1. Perform the following command using your cluster config on your Tanzu bootstrap host. Will also be the longest step depending on your hardware.
tanzu cluster create open --file ./open.k8s.alvinr.ca -v 9
Step 2. Retrieve admin credential, you might want this later (plus, we’ll steal certificate authority data from this later).
tanzu cluster kubeconfig get open --admin --export-file admin-config-open
Step 3. Generate key and certificate signing request (CSR). Here, we’ll prepare to create a native K8s credential. Pay attention to the org element, k8s.alvinr.ca, this will be our subject to rolebind later.
Step 4. Open a shell session to one of your control plane nodes. Feel free to do so however you want, my bootstrapping host had kubectl node-shell from another project so I ended up using this. Copy both the key and CSR into this node.
Step 5. Sign the CSR. My lab life was for the duration of TOHacks 2022 Hype Week, so 7 days validity was enough.
Step 7. Build kubeconfig manifest. Here’s an example built for this lab, this is what I distributed to my participants. We didn’t bother going over importing this credential to their kubeconfig path, we just provided it manually to every command via the --KUBECONFIG flag.
Step 8. Create a Role. Here is where we define what our lab participants can do. In this case, I created a namespace-scoped (default) granting them a pseudo reader access (they can only use get/watch/list API).
You like code, we like code. Let’s write some sweet, sweet code — together.
TOHacks 2022 — Toronto’s foremost hackathon will be closing applications on May 23rd.
Now is the time to register for a chance to win some cool Apple swag, an opportunity to build a wicked awesome solution and a guarantee to learn something new.
Leading up to the hackathon (May 24th — 27th), we’ve got several workshops and activities dabbling in new tech and topics dubbed Hype Week. Who said that developers were boring sticks in the mud?
All of this builds up towards the grand finale — the TOHacks 2022 hackathon happening on the last weekend of May (28th-29th). Dive into 24 hours of coding mayhem and even more workshops as you develop an award-winning project.
The $68.7 billion acquisition of Activision Blizzard now places Microsoft as the 3rd largest gaming company behind Tencent and Sony; setting in stone once and for all the significance of Microsoft Gaming. With huge franchise titles such as Call of Duty, Overwatch, and World of Warcraft now under their belt, we can expect the next few years to be very exciting. Looks like we’ll see more utility from Xbox Gaming besides as a launcher for Halo and Fortnite.
This isn’t the first of its kind from Microsoft Gaming, nor would it be the last. Some of the most notable being Mojang, the studio behind sandbox survival classic Minecraft back in 2014, and ZeniMax in 2019 which included Bethesda Game Studios — creators of The Elder Scrolls and Fallout franchises. Microsoft is taking huge steps in conquering mediums of gaming from mobile to PC and console, instilling hope for new and innovative releases that’ll keep us busy in the lock-downs to come (just kidding, I hope…).
Everyone knows that acquisitions can be scary, and the truth is they always are. Not because terrible things happen — which they very well could in the case of Lionhead Studios — but because of the uncertainty and unknowns that developers and fans must now embark on.
Despite this, time and time again, gaming communities have proven themselves to persist long after the lives of their creators. Take FreeSpace 2 for example, released in 1999 and still alive and kicking courtesy of passionate modders and sci-fi enthusiasts at Hard Light Productions. 23 years later and you can still find its beloved mod manager Knossos and many other mods/add-ons still in active development.
Modding communities breathe a special kind of life into games, which is often times why competent studios respect and cherish them. It’s no easy feat to find time to decompile code (nor is it always legal) and build extensions to existing game functions that have been desired by fans. There’s even extreme cases like DayZ and Arma II where a mod transcends its source and becomes a game of its own.
In spite of this, creators don’t see this as threats to their existing development effort. Rather, it’s a sign of success, for every community made and mod developed brings that title one step closer to becoming an idea, an experience, that will stand the test of time.
But, can we expect the same open-mindedness from Microsoft and these now Xbox Game Studio titles?
Open a vi session to your VM config file Assuming you’ve got your VMs tucked away in some datastore located in /vmfs/volumes, go ahead and do a vi /vmfs/volumes/<DATASTORE_NAME>/<VM_NAME>/<VM_NAME>.vmx
Since Fall of 2021 when I upgraded from ESXi 7U1c to 7U2a, I’ve noticed several times when my host would lose access to its internal SD card. My setup is pretty standard – Dell’s custom ESXi image installed on my R830’s internal dual SD module (IDSDM).
After around 16-20 days of uptime, the host would lock up – API would be unresponsive for ESXi (busted vmware-hostd and/or vmware-vpxa services?) meaning that any attempt to manage VMs via ESXi web UI would timeout and/or sit there indefinitely, along with any attempts via esxcli. Hosts managed by vCenter would timeout for any dispatched vCenter jobs, with similar UI symptoms as above. Some of these include:
Unable to manage power state of VMs (operation pending infinitely)
Unable to vMotion/migrate VMs
Web/remote console does not work
Some host functionality is persisted, such as managing host services and enabling SSH, but it’s very limited what you can do at this point.
Fortunately, running workload (VMs, vApps, Pools) seem to be unaffected.
What’s going on?
This is a known issue as of VMware KB #2149257 where high frequency read operations to ESXi’s SD card (either single, or IDSDM) causes ‘SD card corruption’.
This is attributed to a new partition schema, where ESXi’s scratch partition located on the same media experiences high I/O. Hence why in the same KB, they suggest the usage of Ramdisk as a VMware Tools repository.
There are other theories as well which hint at a bug in the vmkusb driver, an issue VMware engineers are still looking into.
It’s important to note that this has only been observed for those deploying ESXi to an SD card, IDSDM, or crappy flash drives. Those that have deployed ESXi to a disk (HDD/SSD) have not experienced this issue.
2021 was an eccentric one, riddled with changes from the widespread indoctrinate of remote work and study programs to virtual everything. Meetings, workshops and hackathons are but a few things we have had to deliver 100% digitally.
In spite of all this, we were not deterred. Our TOHacks 2021 hackathon ended up being one of our most successful virtual hackathons to date with over 700 participants and 190+ projects. We then followed up with TOConnect 2021 which delivered dozens of workshop sessions to foster the leaders of tomorrow.
This would not have been possible without the support of inspiring individuals dedicated to hacking a better future, our sponsors for their financial support and the many TOHacks volunteers that worked tirelessly in the background.
Here is a peek at some of the lesser known but equally grand projects our teams have been cooking in the background, along with their aspirations for the new year.