Labs are designed for learning. I learn by doing. While I can read, as they say in the local vernacular in my propinquity “Wicked Fast,” I don’t process read information to the depth that I need in order to retain it. I need to type in the code in order to learn. Here’s a technique I use to do that.Continue reading
Why does the G# work so well when the rest of the song is in C major? Why, if the song is in A minor (the relative minor to C) does the G# become the note that turns it into a Harmonic minor? The answer would be based on the Harmonic series.
Here is the Harmonic series as explained in Wikipedia’s page: https://en.wikipedia.org/wiki/Harmonic_series_(music)
The G# we are discussing is based on the 13th element of the series. In a non-tempered instrument, this would be the +41 Cents indicated, meaning that it would be a fairly sharp note.
Let’s Ignore Octave for a moment and just write out the notes of the Series.
C C G C E G Bb C D E Gb G Ab Bb B C C# D D# E
You can think about how much color a given note has by how far down the series you need to go to get to that note. The 1, 3, 5 and Dom 7 all are in the Early part of the series. That Dom 7 is fairly flat (-31 cents) from the tempered tuning. I think it is fascinating that the Minor Third we hear so often in a minor chord is so far down the Harmonic series. A C minor uses the Eb, which is the 19th note of the series. However, if we think of the A minor, then the Third is the base note of the series, while the root of the chord is based on the 27th note of the series. There must be a simpler explanation for that.
The E minor chord is much earlier in the series…the E is the 5th note of the series, and the G is the 3rd. But the B (the V of the E minor) is the 27th note of the series.I suspect that what we actually hear is not based on a single harmonic series, but on multiples. If we were to translate the C scale shown above to the E scale, then the V of the chord is, again, the 3rd note of the series. Same with the A minor. So You would have to transpose around the harmonic series to see where the G# fits relative to the other notes of the chords.
I suspect that what you are going to find is that the Chords are based on multiple Harmonic series. For example, the B that makes up the Major 7th in the C maj chord is very closely related to the G in the Harmonic series based on the G root. It does not even show up in the first 20 notes of the Harmonic series based on C.
Looking again at our series of notes, we can see the earliest Minor chord is the G minor. The G is the 3rd and 6th entry of the Series, so very strong root. The Bb is the 7th entry and the D is 9th entry.
The sequence also shows why a Dom7 with a Ninth added to it sounds so strong. The Chord Ninth is the D, coincidentally it is also the 9th element in the series.
I also find it quite interesting that the E to Bb tritone shows up so early in the series: 5th to 7th entries. This sound is so strong and jarring, but it is right up front.
The same container image that can run HTTPD using Kerberos to authenticate in Podman can be used to do the same thing in OpenShift. Here’s the changesContinue reading
You must Take the A Train…if you want to improvise over a standard. But this standard tune has a non-standard chord in Bars 3 and 4. If you are playing the “Real Book” version in C, the song starts with two measures of C Major 7, and then goes up a whole step to D. If we stayed in the Key of C, this would be a Dminor chord. Billy Strayhorn was much more creative than that, and he put in a chord rarely seen anywhere else: D7 b5.Continue reading
Kerberos is a cryptographically secure authentication mechanism in use in many large organizations. Developers may want to make their applications work with Kerberos while developing inside containers. Here is a quick proof-of-concept that shows how to set up a container to work with mod_auth_gssapi., the Apache module that makes use of Kerberos.Continue reading
Remote services are not You; they do work on your behalf. When a remote service authenticates to another service, it should not impersonate you. If you use a keytab issued to your princial (say yourname@YOUNGLOGIC.INFO) you are not going to be able to log in to things using password; The IdM server only allows on or the other credential to be active at any given time. Even if you do use the Keytab, if you need to have it in two locations, you need to copy it. Which becomes a nightmare if it gets compromised. So, we want to make service accounts to work on our behalf. Here’s what I have so far.Continue reading
What does it take to make a call to a Kerberized service from a container running in podman? Here are the steps I am going through to debug and troubleshoot.Continue reading
While it is always tempting to run a program as root, we know we should not do it. When developing, you want to make the process as non-root as possible. Here is what I am doing to write mod_wsgi code and run it as a non root user.Continue reading
Having used Apache HTTPD for a good portion of my professional career, and being responsible for explaining how OpenShift works, I decided to try and build an Apache HTTPD container from scratch. For follow on work, I want to see the environment, so the container is essentially wrapping a mod_wsgi APP that dumps the environment. I took some trial and error to get it to run. Here is the end result:Continue reading