Depends on where you start from, those still struggling to get rid of IE & ActiveX crap are in for a massive re-wire effort either way.
2897 posts • joined 15 Mar 2007
Depends on where you start from, those still struggling to get rid of IE & ActiveX crap are in for a massive re-wire effort either way.
They had all the bits to make a great and reasonably priced system, but pulled defeat from the jaws of victory by shipping a prototype version and then (largely by the Oracle take-over) losing key staff and failing to invest enough in to fixing it, instead of adding tick-box features that the sales folk were asking for.
Now of course Oracle has no interest in the lower priced end of the market, or even of selling storage as an item instead of part of a large profitable database deal. Others have stepped in with the same idea of a ZFS based appliance, but have any of them really sorted out the management and recovery aspects to make it reliable and painless to use?
Also we are seeing longer and longer rebuild times on bigger and bigger HDD, which are still your best bet for GB/£, and ZFS has not got anything like the Dell "data pools" where in effect your RAID strips are randomly spread over disks in a much bigger pool. Then a failed HDD results in a parallel rebuild of all affected RAID stripes to other HDD and you don't have the single spare/replacement HDD bottleneck in write speed versus capacity.
I guess you have tried umount -f already?
1) Don't use de-dupe unless you have absolutely masses of RAM and something like multiple VMs that share a lot in common.
2) Fail over - just don't go there.
So far we have used the Oracle fail-over feature that sucked donkey balls big time. Others have said of other fail-over software that it causes as much down-time as it is supposed to solve. Stopping the "split brain" risk is very hard to do.
You might be better served by having a small separate arbiter (like a Raspberry Pi, etc) who's sole job it to spot an unusable system and power it down (ILOM command, or network controlled power strip) and bring up the 2nd head. Syncing the 2nd head status is another area of pain, again maybe best of the arbiter acts to configure both machines on boot from a central configuration. Yes, you just got a difficult job to implement and form your own start-up...
Of course you could buy a Oracle storage appliance and pay for a system where the management interface is buggy and locks up during problems (not fixed over 5 years of support), where the documentation is incomplete (and then they move/withdraw Sun blogs that answered some of this), the disks have interface problems (oh dear, yes the SATA ones are like that, no fix provided) and the power supplies and other hardware show phantom faults that are, once again, never really explained or fixed.
1) It gives you someone else to blame for any TITSUP events
2) You (naively) thought you would get professional support with it
So it kind of comes down to scale, budget and belief in yourself.
This is nothing to do with stopping "pirated" software. Simply that if you wish to use the given code legally you follow the terms. Basically it is the right to offer your code with the proviso that anyone benefiting from it returns the favour by offering the derivative as usable source code.
The GPL & ZFS argument is not that simple: Both code sources and modifications are available. What it comes down to is whether loading a kernel module makes it a "derivative" of the kernel for the GPL license match to be enforcible, or just some blob you wish to offer (with code) for use like a closed source video driver.
To stop others using it commercially without any need to provide worthwhile modifications such as bug-fixes or improvements in return.
To stop anyone else claiming another license on it to your detriment.
There may be other reasons, but in principle you are asking for "support" instead of money in return for your acknowledged work.
"Seems like Google are being penalized for making good products and a search engine that people want to use."
No, they are being penalised for promoting their own business above the competitors be deliberately rigging the search results. That is the point, it is no longer simple an algorithm that finds the best match to what you asked for, but one where there is another fudge-factor that promotes their own stuff.
Didn't you ever wonder how paid search promotion worked?
Or the fact you can still embed shit shit in an Office document?
"hadn't realized how sensitive the grid was to ad-break synchronized kettle usage!"
Not just that - millions of toilets flushing also pushes up demand for electricity for water supply pumping.
The point is you can't trust anything that:
1) has closed components
2) has known data slurping components
3) has limits on how *YOU* grant permissions
4) has enough value for subtle flaws in open parts to be engineered
But people do trust phones, and really should not. Maybe it is best to use the one with the least on-going cooperation with your own government and/or corporate interests as the least likely to screw you over outside of actual espionage?
Damn this AC business! Must have been another AC who's mom I was doing last night, she is definitely alive and well.
"Add in the fact that Poisson arrival rates are only an assumption, and that clusters of disk drive failures can happen more frequently than the model suggests"
Like when the power goes off and then an hour later you try to power up an array from cold that has been spinning for 4 years?
Well one hopes they might have a moment of revelation on the road to Damascus...
Not for him, but she does for the rest of us!
The only choice for serious nut-gripping!
Upvote for most points.
I also use Halifax with Firefox & Linux but only occasionally and had no big problems. But sticking to paper statements...
This assumes that any decent pirate is going to use a site under USA control in the first place.
In fact, I am surprised that the pirate bay has not yet got a distributed web site going, sort of a bit torrent of the site as locally accessible web pages, but with some crypto key to allow updates as needed. No central address/registry to get whacked, no need for backups when it is spread over 10M computers...
Now if was not for the UK's shitty connectivity to so many remote areas...
"Belt & suspenders" has a slightly different meaning this side of the pond!
Lets face it, a large number of recurring vulnerability in software written in C due to buffer overrun and misuse of printf() like format strings are ALREADY flagged by compilers like gcc if you use -Wall.
Problems is your code monkeys have to give a monkey and (a) use those options, and (b) fix them when found.
I noticed that when I visited NY years ago, cashier didn't even look at my signature. I think the most likely reason is the one given by @JBolwer above:
"When a US debit card is run *without* the PIN it is billed as a credit card (for the store) and lots of steel-rice-bowl types (as my Chinese wife would refer to them) get humongous amounts of cut out of this. And the store gets Ripped."
1) First step, always, is to fully backup/image your working Windows PC.
2) Second step is to spend a short while going through each bit of software you use (not always what is installed!) and create a list of it, why you use it, and any special catches with that (e.g. you must have V1.1 because V2 broke XYZ...etc). Make sure you can find the installation media/files, and any licence keys, etc.
3) From step 2, consider how critical EXACT compatibility it, and how much you really need any compatibility. From this you can decide if there are Linux versions that are good/better substitutes. Generally for email & web you will find Thunderbird & Firefox are shipped with most distros and work just fine as long as you are not tied to Exchange and/or crappy IE-only Intranet services.
4) Decide if you want to dual-boot, or try creating a Windows VM from your current PC. Both have slight risk, and to be perfectly honest, if you can create a clean VM of windows, patch it, and install only the software you really need, it will be faster and more reliable. Pros & cons:
Dual-boot - gives you Windows native speed for games, etc, but you lose out on disk space and risk some dumb-ass Windows update breaking the grub boot-loader (some shitty old software, like certain Adobe things, would also break grub booting by putting DRM stuff just after the MBR and outside of the Windows file system assuming nobody ever needed that...).
VM allows simultaneous Linux (e.g. web/email safely) and Windows (specialist software) but is more memory-heavy and you lose out on fancy graphics speed.
Also is allows "rootmydeviceyoubunchofuselessfuckers" to match..
I don't men the read/write permissions of individual /proc entries, I mean the lack of sand-boxing of all user process to mask such FAIL! cases as reported here.
It is not a real file, but part of the the device driver's internal memory that is presented as if it were a file.
That is how the UNIX model works, everything is a "file". You can access the keyboard and terminal as stdin and stdout, etc (same as Windows there). Hard disks appear as /dev/sda and the partitions on them as /dev/sda1 and so on, serial ports as /dev/ttyS0, etc, etc.
Why are user processes, presumably in some sort of sandbox for protection against dodgy stuff, allowed to *write* to /proc? Often disabling access to /proc except for your own process ID is one of the standard AppArmor settings.
Just trying to stand back from this massive FAIL and look at the bigger picture of system protection. Oh, and while we are at it, can someone beat the Chrome and Firefox dev teams until they start using and maintaining a tight AppArmor profile as well?
Of course in a similar vein:
Targeted hacking is much less of a concern to me that the hoovering of EVERYTHING you access via your ISP "just in case".
Should be curtains for the prosecutor
Indeed, people do dumb things, people make mistakes.
The issue here is its the 2nd time its happened, and its a known risk, so someone high up needs a total bollocking for not putting in place technical measures to stop stupid abuse of To/CC fields. Really, having a limit of 5 or so (maybe with an override button with "Are you really sure?" and a list of personal actions that *will* be applied if abused) would make little difference to sane email use, and having other configured options like email lists for any internal or external groups that need large updates would deal with the rest.
I would be more worried by an increase in mercury poisoning from said low-energy bulbs being dumped in landfill and leaching in to the water table over a few decades. But then I don't know the facts so could be talking out of my arse for all anyone knows...
I noticed that as well, Windows 7 VM was "checking for updates" for a couple of hours before I turned it off as not needed.
I used to dual-boot Windows and Ubuntu, but now its Ubuntu with a couple of Windows VMs for stuff that needs it. Much more flexible and works fine with most things, though not much good for games that need top graphics performance or any special hardware that needs hardware drivers for PCI connections (OK for USB, etc).
Or coat the tips with some insect repellent every so often?
What is actually changing? The MS web page does not say what these "modern synchronization technologies" are that are needed. POP or IMAP, are they really modern?
Or are they the ones being deleted to force poor outlook users in to a web interface to spam you with adverts more effectively?
There was talk of making it illegal to strip metadata, which would stop this (or at least give you redress).
I think it should be a bit more complex though as some metadata might be dangerous to share (real name, GPS coords of your kids, etc) but if there is a random copyright ID that can by linked you you should you allow it (i.e. reverse lookup tricky unless you set it so or reply to a request) but otherwise exists as a flag it is copyrighted by someone who has not given that right up, then it would be a good thing.
Oh how my friends laugh at me for still buying music CDs...
Exactly, so once per year would leave on average 6 months to do your business over! Pointless...
However, changing shared passwords after someone leaves (say any shared admin accounts on certain boxes that don't support more than one admin user), or following a potential compromise, make a lot of sense.
There is some sense here, you want users to have long passwords to make them difficult to guess, but easy to remember. So saying "at least 16 characters, like a few words perhaps" and not requiring stupid ratios of punctuation, numbers, and case, is likely to get them using something different to other services, and to remember it instead of putting it on a post-it note.
Also, of course, having a bozo filter to stop "Correct Horse Battery Staple", or even "password" or "12345" and similar being used N times to fit the minimum limit...
Or Oracle deleting/redirecting the Sun site instead of just changing page logos so hyperlinks still work.
c) PLCs networked together without any firewall rules to enforce communications only with a few designated monitor computers. Or fancier intrusion detection.
Of course, one would hope that the monitoring computers were not unpatched Windows boxes due to the PLC suppliers being unable to support open standards and/or be sure that system updates are not going to break poorly written software...
Didn't the Judean Peoples' Front split from the Judean Peoples Front over some dispute about possessions?
Maybe, maybe. But lets face it, it appears WIPO is almost the thinking man's FIFA in terms of inability to deal with internal corruption. Sadly it took the USA to step in and force action on FIFA.
Almost, as there is always ICANN...
Or the Iranians making it look obvious so you think its an Israeli false flag. Or the Israelis making it look like the Iranians...
I am mostly a Linux user, with a few VMs for specialist Windows software. I most certainly don't want Windows to disappear, but I would like its desktop share to drop further, say to 60-70% so that companies are willing to supply device drivers (or supporting documentation) for non-Windows OS.
Quite a few do fairly well in this respect already, offering Mac & Linux support, but its still an issue for some things where they are just not supportable due to a lack of any openness or effort from the company.
I think AO is pointing out that in spite of still having ~90% of the desktop PC market due to legacy software investment worldwide, MS now has only ~30% of the total number of internet-connected computers, that means PCs, tablets and smart phones (most of which are not x86 nor Windows in any form but cheap Android devices).
"The only thing stopping you is the fact that the source code belongs to someone else"
No, its the fact that you have built your code to assume a specific API, like win32, and a specific model for GUI, maybe even worse with assumptions of the size of 'int' or similar instead of using int32_t or whatever options were supported. That makes even a small program an absolute PITA to port. That is what most legacy software is like.
The exceptions are stuff that was written to be multi-platform, even if just two variants of "UNIX" (say Linux and later MacOS) as then you have to write your code with some degree of abstraction for GUI and low-level stuff, and that greatly mitigates the pain for porting because you are probably started using two compilers/dev environments and can never be quite sure of what API consistency will be like, so you learn to segregate from the beginning.