Lev Lafayette has an MBA (Technology Management) from the Chifley Business School, where he was on the Dean's List, a Graduate Certificate in Project Management from the same institution, and an honours degree from Murdoch University in Politics, Philosophy and Sociology which is commented upon by the Vice-Chancellor of the time. Many years later he completed a Graduate Certificate in Adult and Tertiary Education at the same institution.
He is a certified PRINCE2 Practioner, and an Adult and Workplace Trainer. Clearly not satisfied with one masters degree, he's started another, this time a Master of Education at the University of Otago. With a interdisciplinary approach, Lev's interests include the political implementation of universal pragmatics, the relationship between communications technology and society, and comparative economic systems. On again and off again, he plods his way through completing a PhD in Social Theory as well.
Professionally however, Lev is an experienced systems administrator, specialising in the Linux operating system and scientific applications, a project manager, systems engineer, and quality management systems coordinator, specifically for ISO 9001 (Quality assurance) and ISO 270001 (Information Technology Security). He also does a lot of training for researchers and technical staff in Linux, High Performance Computing, mathematical programming, Postgresql, and related subjects, with graduates and post-doctoral learners from a variety of organisations including: RMIT, La Trobe University, the University of Melbourne, Deakin University, Swinburne University, Victoria University of Technology, Monash University, the Australian Synchrotron, the Department of Environment and Primary Industries, the University of Sydney, Macquarie University, the University of New South Wales, the University of Western Australia, the Australian Institute of Health Innovation, the Westmead Millennium Institute, the Australian Radiation Protection and Nuclear Safety Agency, and the Australian Institution of Marine Science.
Previous employment and clients include several years working as a computer systems trainer and database management for the Parliamentary Labor Party in Victoria. Following this he worked for the Ministry of Foreign Affairs in Timor Leste (East Timor) managing their computer network and providing training and technical expertise to that Ministry in their first year of self-governance. Dr. Ramos-Horta provided the following comments on his work.
Lev works for the Research Platforms group at the University of Melbourne, and prior to that Victorian Partnership for Advanced Computing, as a systems administrator for Linux clusters. As per those roles, this site is mostly dedicated to issues concerning High Performance Computing, Scientific Computing and Supercomputing. Lev is involved in Linux Users of Victoria, having spent four years as President, two years as Public Officer, two years as Vice-President, a year as Treasurer and is now in his third year as an ordinary committee member. He is has a coordinating role in the annual Multicore World conference and typically take the role of MC.
The crocodile logo was designed by Victoria Jankowski. It was first used on the cover of Neon-komputadór, the first IT training manual for the Ministry of Foreign Affairs in East Timor which was printed and translated by the United Nations Development Programme. The crocodile represents the Timorese people and is the emblem of their land. The integrated circuit represents their independent connectivity to the wider world.
You can also find a political site that Lev subscribes to, The Isocracy Network, a synthesis of several progressive political orientations, and RPG Review which covers his interests in roleplaying and simulation games. As a secular humanist with an interfaith perspective, he manages and contributes to the Lightbringers website. He also has a livejournal, which will probably be quite boring to anyone who doesn't know him personally.
That's enough of me talking about myself in the third person like Cerebus The Aardvark.
Submitted by lev_lafayette on Thu, 05/05/2016 - 01:38
Due to underlow and overflow, computers suffer rounding errors. These errors are highly significant, computers make them constantly and with great speed. Sometimes those errors cost millions of dollars, or directly lead to a tragic loss of life. Many of these errors are caused by the way that computers store numbers. The use of scientific notation, as implemented by IEEE floating point standards, is not only imprecise, but also requires too many bits - which is costly in power, time, and money.
Submitted by lev_lafayette on Fri, 04/08/2016 - 11:33
Apropos the previous post, I am coming to the conclusion that University's are very strange places when it comes to password policies. Mind you, it shouldn't really come to much of a surprise - the choice of technologies adopted are often so mind-bogglingly strange one is tempted to conclude that the decisions are more political than technical. Of course, that would never happen in the commercial world. All this aside, consider the password policy of a certain Victorian university.
Submitted by lev_lafayette on Sat, 03/19/2016 - 11:52
Ars Technica has reported of a relatively small GPU-Linux cluster which can crack by brute force standard eight-character MS-Windows passwords in under six hours. There are, of course, a reasons and caveats. Firstly, as online servers will typically block repeat password attempts, is system is most effective against offline password hashes, which then of course can be used for online exploits.
Submitted by lev_lafayette on Sun, 03/13/2016 - 04:47
Did you know you can bring down an entire HPC cluster with an old script? Well, this week I had such an experience. As the systems administrator for a seriously aging cluster with over 800 post-graduate and post-doctoral researchers, "stress" is a normal part of daily life (for future reference: it's probably killing me).
Submitted by lev_lafayette on Sat, 02/27/2016 - 12:41
It is not unusual for a few jobs to fall into a batchhold state when one is managing a cluster; users often write PBS submissions with errors in them (such as requesting more core than what is actually available). When a sysadmin has the opportunity to do so they should check such scripts, and educate the users on what they have done wrong.
Submitted by lev_lafayette on Sun, 02/21/2016 - 00:55
Multicore World is a small annual international conference held in New Zealand/Aotearoa sponsored by OpenParallel. I have been fortunate enough to act an MC for all but one of the five conferences since its inception, this year also presenting a short paper on the introduction of the new HPC/Cloud hybrid at the University of Melbourne.
Submitted by lev_lafayette on Wed, 02/17/2016 - 23:42
It is finally time for a book like this one.
When parallel programming was just getting off the ground in the late 1960s, it started as a battle between starry-eyed academics who envisioned how fast and wonderful it could be, and cynical hard-nosed executives of computer companies who joked that “parallel computing is the wave of the future, and always will be.”
Submitted by lev_lafayette on Tue, 02/02/2016 - 23:21
The following describes a procedure for bringing up a compute node in TORQUE that's marked as 'Down'. Whilst the procedure, once known, is relatively simple, investigation to come to this stage required some research and to save others time this document may help.
1. Determine whether the node is really down.
Following an almighty NFS outage quite a number of compute nodes were marked as "down". However the two standard tools, `mdiag -n | grep "Down"` and `pbsnodes -ln` gave significantly different results.
Submitted by lev_lafayette on Sat, 01/30/2016 - 12:08
A far too venerable cluster (Scientific Linux release 6.2, 2.6.32 kernel, Opteron 6212 processors) with more than 800 user accounts makes use of NFS-v4 to access storage directories. It is a typical architecture, with a management and login node with a number of compute nodes. The directory /usr/local is on the management node and mounted across to the login and compute nodes. User and project directories are distributed two storage arrays appropriately named storage1 and storage2.
[root@edward-m ~]# cat /etc/fstab