1859 posts • joined 15 Jun 2007
Re: thinkpads? @cap'n
I think that it depends on whether you are a form-follows-function person or not.
Thinkpads are functional. There is little wasted weight or space, the screens and keyboards are/were the best in the business, they are not too bulky, and they will suffer the day-to-day wear and tear that a road warrior will put them through. And there is nothing in their design that makes them unpleasant to use. The lips and edges you talk about are all deliberately engineered so that when shut, they all lock together, so there is not too much strain put on the hinges. Seen many Thinkpads with broken hinges? No, I didn't think so.
Add to this an engineering, maintenance and warranty strategy that means that they will can and will be fixed if they break in warranty, and have the full maintenance manuals available for third party maintainers to fix them when they are out of warranty, with a large pool of donor systems for parts means that they have an extended 2nd and 3rd user lifetime where you will still see 6-7 year old Thinkpads in regular use (my T30 has a manufacturing date of 2005, and the A20 which runs as my linux firewall is even older).
I'm sure that it you look, you will still be able to buy brand new OEM batteries from one of the auction sites for any Thinkpad built this century. Try that for a decade old Dell or HP.
Of course, if style is more important, then a Sony Vaio or any of the Ultra books will do the job, but don't expect them to have the same life expectancy. But if you are after style, it does not matter if it breaks after 12 months, because you will probably be replacing it for the latest 'shiny' toy anyway.
Re: @ Peter (was: No mention of token ring? @keith_w)
It may have been that way in the US, but I was involved with a customer still installing new TR kit beyond Y2K. I admit it was mainly because the customer had a large investment in it, but when the organization split, the bit I went with dumped TR, and jumped straight to 100baseT.
In a lot of commercial organisations, being able to use a Premises Distribution System to organise your cabling for TR (and twisted-pair Ethernet, phone and RS232 terminal traffic) was a real benefit, and one that 10base2 thinwire Ethernet could not take advantage of. Thus Token Ring persisted.
I saw the benefit of a PDS when I saw 1MB/s AT&T StarLAN installed for the first time in the late '80s.
Re: No mention of token ring? @keith_w
You're confusing the physical MAC layer with IP.
Token Ring and Ethernet are comparable. IP can run over either, and many more physical networks as well. Although it does not directly follow the 7 layer OSI network model, it is a layered protocol (MAC, IP, TCP/UDP, application protocol), and provided it meets some basic requirements any physical layer can be used to transport IP.
Token Ring is exactly as routeable as Ethernet when running IP. Routing has nothing to do with the MAC layer, except in very simple protocols as IPX or NETBIOS.
I have worked at numerous locations where there were multiple networks using Token Ring, Thinwire (10base2) Ethernet, Twisted pair (10baseT) Ethernet, ATM, FDDI and even SLIP and PPP all routed together using Layer 2 routers.
What makes Token Ring better than 10base5 or 10base5 bussed Ethernet is that it did not use CSMA/CD to arbitrate use of a network segment, so works much better at higher utilisation rates. As soon as 10baseT switched Ethernets came along, that was no longer enough of an advantage, and Token Ring died.
If you look at network topologies, those with multiple tokens or a slotted ring (such as the Cambridge Ring) could carry much more data than Token Ring, but were more complex to set up.
If you had ever had to debug a token ring implemented with MAUs, when one system was running at the wrong speed and causing lost beacons (or beaconing), then you will be glad that TR eventually died!
Re: iOS feature support @DougS
I was only thinking this morning as I connected my tablet to the cable that had fallen down behind the table and I had to fish out again, and which my wife complains about whenever she vacuums, how useful it would be to be able to just put the tablet in the same place and know that it would charge.
Ditto all the cables in the car.
So yes. wireless charging would be a good thing. Even better if there was a standard, and I could have a couple of them scattered around the house, charging all the phones, remotes, media players and other gadgets wherever I wanted to be in the house.
Re: B5 @BoldMan
Yes, there was a terrific dynamic tension between these two characters that persisted throughout the entire show.
I see Andreas Katsulas on other shows (from the past, obviously), and when I do, I can't help seeing him as G'Kar.
Re: Babylon 5 influence
Off topic, I know, but....
I much preferred Michael O'Hare as the commanding officer of B5. With Sinclair being the re-incarnation of Valen, and being involved with a part human Delenn (as would probably have been the case), it would have led to an interesting dynamic. Having 'The Scarecrow' dropped in at the beginning of Series 2, even if he was introduced as the 'Starkiller', lost some of the world-weary ordinariness (quite remarkable for a SF series set in the future) that Series 1 had.
Series 1 did not really start the main story arc, (although throughout there were plenty of forward references that only became important later on, such as B2), it set the back-story for the way Babylon5 operated that was necessary in the later stories. None of the ST franchises managed to achieve the same level of detail, although DS9 probably came closest.
I really would like to have seen how Series 4 would have turned out if JMS had not had to shoehorn in the Shadow Wars conclusion and compress the Earth liberation storyline into the same series. The Telepath Wars storyline for Series 5 was too weak (especially after seeing what happened in 'Endgame' in Series 4), and the loss of Commander Ivanova and Marcus, together with the changed role for Michael Garibaldi meant that there was too little continuation in the last series.
I must admit that I was a bit tearful the first time I saw the final episode "Sleeping in Light", especially seeing B5 finally destroyed, and again when doing a frame-by-frame on the easter-egg cast and crew video at the end of the closing credits. Makes me a bit of a sad geek really.
One last question. Whatever happened to Lennier (I know, I've read what the Lurkers Guide and Wikipedia has to say) but I'm sure there is an interesting story in there somewhere.
Re: Let me get this straight... @Neill Mitchell
Point well made, but I'm sure that Xerox (Star), MIT (X Windows), Sun (SunTools), Digital Research (GEM) and even Apple (Lisa) were using the term "Window" and it's plural form in relation to computer systems a long time before MS Windows version 1 went to market.
Ah, but here's the benefit
Unlike us (because of the NDA that is part of the settlement), Samsung know which patents Microsoft have hit them with over Android in the past. If they avoid those patents, they may be able to avoid having to pay the license fee, which may save them dollars per phone. They will also have some control in order to avoid the Apple ones as well.
I suspect that the main one that MS roll out frequently are the FAT patents, some of which will expire shortly, but I believe we've never found out the full set.
Re: The reality is all too real @RICHTO
WRT the FUD claim and the links to URLs that you claim will affect iOS and Android.
Question. Do you understand the application deployment model in either iOS or Android?
In both cases, the way applications run is handled by a layer ABOVE the OS. So when you talk about it 'rooting' the OS, that is almost certainly not the correct terminology. Rooting by definition means getting access to the root account on UNIX-like OSs.
What has been compromised here is the application framework, *NOT* the underlying OS. In both cases, the underlying OS will be untouched. In terms of what a user sees, the result may appear to be superficially the same, but if you are going to make such claims, it is vitally important that you understand what you are talking about. Anything else is FUD, especially if you are spreading fear as a result of your uncertainty and doubt.
These specific issues are rather analogous to a Facebook application or account being hacked or a vulnerability in IE or other browser, while the underlying OS, whatever that is, remains untouched (unless, you run the browser from an admin account of course, in which case all bets are off).
This one of the historical differences between UNIX based OSs and Windows. Unless you take specific actions, you will *NOT* be running applications as a privileged user on UNIX, BSD or Linux. This was not the case on Windows before Vista, where many people's normal accounts had full Administrator privilege. This has changed, for which I say Hurray! but it took a long time for MS to recognise this (although NT was designed with a good security model from the ground up, even though it was rarely used to full potential).
Re: The reality is all too real @Danny 14 @RICHTO
I say again, this time to RICHTO. Read the article you link to.
This statistic is for defaced websites, not OS vulnerabilities. If you don't know the difference, then you should probably not be taking part in these discussions.
I'm also not sure about the data from Zone-H. The stats you point to are for 2010, and looking at the dates on the news pages (latest, September 2012, total news items posted in 2012, 2, total posted in 2011, 5), it looks like it is a site in decline.
Re: The reality is all too real @Danny 14
Read and comprehend the article you point to.
It is talking about what the rootkit does once it is installed, and you are right, it does look quite sophisticated, and unpleasant.
But there is nothing in the article about how the rootkit gets onto the server, and this is where the strength of the OS security model comes into play.
As long as an OS has some privileged mode that allows the OS to be changed, it can be compromised. This is true about all currently deployed OSs around at the moment, and is necessary in order to be able to install patches. If you look at it from another angle, there is little difference between a rootkit and an OS patch, apart from the fact that one is supposed to improve the system, and the other is not.
If you were to look at compromised Linux systems, and work out how they were compromised, I'm certain that most of them will have been initially infected as a result of a human error rather than a deficiency in OS security. You know, something like an administrator using the same password or SSH key for multiple accounts, or having trusts set up from untrusted to trusted systems. And I also think that I am on safe ground in saying that it you were to look at the ratio of compromised systems to total number of systems of a certain type, Windows would show as having a higher rate of infection than Linux.
It is true that Windows AV solutions are able to detect rootkits and other persistent infections once they are present, but this article is talking about zero day detection rates. I would much prefer to use a system that is less vulnerable but which had poorer detection tools, than one that let malware in but detected most of it sometime after the infection.
It should be seen as axiomatic that AV software is a market that only exists because of poor OS security in the past. There is no market for Linux or OSX AV because there is no history of significant infections on those platforms. If there were, there would be creditable AV solutions for them.
What the AV software vendors have to accept is that in an ideal world, their comfortable little niche should disappear as OS security gets tighter. This is currently why they need to spread FUD in order to protect their income stream, and the tone of some of the comments here add to this.
Re: Same functionality as Droid and Apple?
I'd noticed the fact that there were videos missing from the Android YouTube app compared to the same search on a desktop. This also appears to be the case on the YouTube support incorporated into Blu Ray players and SmartTVs.
I think that it is the case that if the YouTube app does not think the correct container or codec is installed on the device, it won't display the video in the search.
I think it is possible to get YouTube in a browser to tell you the format of any video, but I can't remember how, and I can't check as YouTube is blocked/filtered at work.
Re: Winding watches daily
I remember when I got my first self-winding watch about 40 years ago (it was also a cheap bit of crap, made by Timex), and I remember thinking how bulky it was compared to the cheap Ingersol I had before it.
Some people just can't wear heavy watches.
I still prefer slimmer watches, even though I'm now wearing a lump of stainless steel that must weigh close to 100g because I cannot find something durable and lighter that does everything I think I want (although the last time I used the stopwatch was months ago) at a price I'm prepared to pay (when did watches become so expensive!)
There is a school of thought that suggests that some errors are introduced intentionally by the publishers, and are used to identify the original source of copies of printed works.
This is particularly said of music manuscripts, so that if someone copies by hand some sheet music still in copyright into Sibelius or Rosegarden to produce 'clean' copies, supposedly free of copyright, the publishers can still identify and take appropriate action.
I keep reminding members of the choir I sing with what they can't do when it comes to music copyright. All I can say is thank heaven for the library service in the UK, who can loan/rent out multiple copies of music to choirs and orchestras at reasonable rates to reduce the temptation to buy one copy and just photocopy it.
Re: all these satellites
Do you really believe that surveillance satellites work like those in films such as "Behind Enemy Lines"?
Put a linux based firewall running on anything with a pentium3 or later as a boundry firewall. Almost free, and perflectly capable of doing this. Use something like Smoothwalll with some of the community mods.
How do the ISP know there are children in the house?
"In other words, parents living with their children must remember to click on "no thanks" to filtering, otherwise their internet access will be restricted accordingly to block supposedly harmful material."
So. Am I going to get a mail from my ISP asking whether I have children living with me? Or are they going to look to see whether anybody is visiting moshimonsters? And how are they going to contact me? (I rarely use the mailbox provided by my ISP because the mail name is crap).
I really think that all MPs should be made to attend compulsory "How the Web works" training, sit an exam to show they've understood, and if they fail it, be barred from taking part in debate or votes on laws affecting Internet access. Internet access is becoming so essential to daily life that the people agreeing legislation have to understand enough to stop suggesting stupid, unworkable laws.
Ultimately I agree
Ultimately I agreere is about private cloud, so data security is still your/their responsibillity.
I don't get it (at least not all of it)
I do not understand why companies will be prepared to put their data - which to many companies define them, onto a public infrastructure where you have no control about who can access the data, and in many cases, cannot even tell which geographical location their data resides in (which can be important if they don't want the FBI and DHS trawling your data).
It's all very well saying that the cloud providers will ensure that your data is secure, but that is about as trustworthy as a bank saying that their traders do not try to influence LIBOR. They may not even know what individual employees are doing. At least if one of YOUR employees leak data, you can take appropriate action without a commercial contract being between you and the guilty party.
I know that you could put cryptography in place to make the stored data not useful to a third party, but that may not give you the security that you expect if your data is stored in certain territories which require key escrow or disclosure.
I can see that some services may be suitable for deployment in a public cloud, but there are, and will remain, many that are only suitable for a private cloud or within controlled boundaries, requiring physical data centres.
IMAP is a protocol, and does not imply any structure on the way mailboxes (folders) are set-up and named.
The problem is that now people use a hybrid of reading their mail on a web enabled mail server, and downloading mails to a local mail client, you need some structure on the server, something that IMAP was never explicitly written for. There is code to handle it, mainly by treating folders as separate mailboxes, but there is no standard structure defined, and nor should there be in a protocol standard.
As Gmail does not really support folders (from what I remember, one of the design criteria was that it would not use folders, anything that looks like a folder is really a set of mails indexed using tags), this probably adds difficulty to communication with another mail server that does use folders. Add this to a protocol that does not embrace folders in the first place, and it is clear that it will never be smooth, and how well it works is probable more to do with the mail server and mail clients than to imap.
I would say that typing them in from a magazine was damn good practice. You either learned to debug other peoples code (and your typos), and could become a software engineer, or gave up, and became merely a user.
Re: Here's a thought...
If the administrators had no way of making sure they got paid (i.e. by being a preferrential creditor), then they would not do it unless forced to by legislation.
Re: Time Legacy. @Spaniel
...then why get clocks that auto adjust!
If you are talking about computers, both UNIX and Windows can be told not to adjust for DST, so I don't see your problem.
But be careful what you ask for. DST is applicable in summer, not the winter (which is what most people assume). We are lucky in the UK, because normal time (GMT) ~= UTC, so it is very clear to us which should be 'normal' time, and which is DST, but it is not so clear cut for any other timezone.
I would not object to losing DST, but only if time was such that the sun was at it's highest in the sky at noon.
This fills me with dispair
This is one of the security 101 things to check on any UNIX-like OS. The fact that it was allowed to happen indicates that there are too many people working creating these systems without the requisite knowledge and/or experience.
It is not uncommon to come across UNIX or Linux software that creates world-writable files, but that does not excuse such stupidity. What makes this worse is that it appears to be the primary interface to the memory system, which will negate all other security measures.
Re: How did they tell their customers?
I'm sure that somewhere in the package documentation you got there was an alternative dial-up service that you can use when ADSL is not working.
What do you mean! You no longer have a V90 modem?
On my way home this evening
I stopped the car at the darkest point on the journey (Exmoor can be really dark), and got out of the car.
The sky was a jewelled spectacle, and I said a farewell to Patrick with a heart both sad and joyous at the same time.
Re: Could be interesting
Google Maps and Navigation are only any good if you get a data service.
I recently had to go a long way out of my way to get home from work because of a combination of weather and several accidents. I turned on the data service on my phone and got.... zilch. And, of course, I had not maintained a paper map book in the car. As it turns out, the switch from Orange to EE was not as smooth as it was supposed to have been.
I reckon that I probably drove at least 10 miles further than I needed because of the stupid road signs that I had to rely on to get me back to somewhere I knew (this was in Devon, UK, where even major roads can be quite small, poorly lit and badly signposted), and I've vowed to never rely solely on Google Navigation again.
BBC R4 Today program carried an article on this
In that, a representative of the NHS (can't remember who, and the summary transcript is not on the BBC Web site yet) stated that the genome of (specifically) cancer sufferers would be taken if the patient consented, with a view to try to identify what factors in a person's DNA make-up controlled how a cancer developed once they had the condition. The data would be anonymised so that summary data would be released to research organisations would not contain information able to identify individuals. The fact that it was going to be restricted to people who already have a cancer diagnosis makes the information less useful
to the insurance industry.
I know that collecting the data at all (and building the "data infrastructure" to hold it) could only be the tip of the iceberg, but it certainly did not sound like a wholesale sequencing of the entire population. I am as worried about this type of information becoming available to other parties as the next person who gives-a-damn, but from what I heard, it should not yet ring the alarm bells.
When you consider it, it would be perfectly possible for the NHS to sequence the DNA of any patient who gave any form of blood or tissue sample, but that is not what they were talking about. I'm not even sure whether that would be illegal, because I'm sure that personal medical notes probably contain blood-sub grouping and other information that could be used to identify an individual or their susceptibility to certain conditions already.
Re: Why bother? Because of graft. @AC 15:45
You know, being a sysadmin can be seductive. When I was faced with remaining a techie, or crossing the divide to become something else, I decided........ to go contract.
I've been calling myself a system administrator/system integration/support specialist (there is really not much difference if you are good at it) for 30+ years, and I still enjoy it.
What is one such as I to do. Where do I go and still expect to enjoy working? Certainly not into a a supervisory or management role. I possibly could have become a system architect, but the opportunity did not present itself.
I cannot see myself changing what I do before I retire, unless I have to.
Well, no. I don't think that IBM think that an IBM 795, the largest single Power system, is an HPC. They might regard several of them as such, but in IBM terms, a Power 775 Cluster, or a BlueGene Cluster, or an iDataPlex Cluster or a Power 755 Cluster are supercomputers.
I work with a couple of Power 775 cluster, and I can tell you that this is a cluster-in-a-box (or, in fact in several cabinets).
But you are right. They don't run Windows.
The report that was quoted somewhere else in these comments is a one-off Windows cluster that was put together by Microsoft. It caused a few ripples, but none of them lasted, and I've not heard of another Top 500 supercomputer running Windows since. There is only one Windows system in November's Top 500. Not really credible as a HPC OS.
Oops. I'm going senile, and I admit it. Thanks for the correction.
Re: Licencing hell @RICHTO
I'll give you a clue back.
The PowerVM hypervisor that sits in IBM Power 795 systems (or, in fact all Power systems since Power 4) is Linux. And I'm damn certain that they can do the level of IOPS that you are asking, although I suspect that comparing the I/O rate with Windows is a bit like comparing apples with oranges and the comparisons would be of little use.
As all Power systems use this hypervisor, even if they are configured as single system images, any I/O benchmark run on those systems that can perform at that speed will use the hypervisor in one way or another.
But I'm sure that you will come back with a 'that's not on Intel' to justify your claim.
Re: Some Obvious Reasons..... @RICHTO
Proprietary UNIX has had filesystem ACLs of the type you are talking about since at least 1990. I am most familiar with AIX, and this was a major enhancement when the RISC System/6000 was launched in 1990 with AIX 3.1.
The Posix 1 filesystem permissions were a description of the original UNIX permissions model that was invented back in the 1970s before Microsoft even existed. At that time, the most sophisticated security model around was that proposed for Multics, many features of which made it into both VMS and PrimeOS (and it is worth remembering that Richard Cutler had some responsibility for VMS).
This is for a filesystem, I admit, but the basis of Role Based Accounting (acquired credentials used to control running processes and services) was introduced in AIX in 4.3.3, which IIRC was around 1998.
If you look outside of core UNIX, then DCE/DFS, which was a standards based enhancement which sat above the OS, and worked on various UNIX OS's, OS/2 and even windows NT provided ACLs for processes and file objects around 1994, and this was based on the Andrew File System (AFS) and Apollo's NCS which were earlier still. AFS, and DCE/DFS allowed credential management using Kerberos a long time before that support was integrated into Windows, and was provided by the OS vendors in most cases. AIX could build in a Kerberos based user authentication system from about AIX 4.2 in 1995.
I'm fairly sure that those people who were familiar with Veritas will also have something to say.
In terms of NFSv4, the Linux support may be experimental (which probably reflects more on the people doing the work than NFSv4 itself), but has been part of the core facilities provided by at least Solaris and AIX for quite some time (have to look up when it was introduced, but I remember reading up on in in 2005). Definitely not experimental on those platforms.
Having got that off my chest, it is clear that these arguments are pointless. This is because although I have a good knowledge of AIX and traditional UNIX, my knowledge of Windows is incomplete, so I so not make direct comparisons of capabilities. I suspect that there are actually very few people who are able to make a dispassionate comparison of these features between OSs, so just having a willy waving competition in forums such as this one is largely pointless.
That said, I do like the idea of a Windows Server that allows you to strip down the basic install to the minimum necessary to run an application. Seems consistent with KISS, one of the primary requirements to make any service functional and secure.
It is pointless to have more features than you need which may open up security or performance issues running on a server which has a specific defined function. This is where heavily (de-)configured Linux distributions have had a real advantage in the server space for years, because you could strip them down relatively easily to the bare minimum. It looks like Microsoft have finally learned.
Re: Ironic but many Security “consultant” prefer NTLM + SSL over Kerberos + IPSec
Your point is quite well made, and I agree that in isolation, there should be no problem deciding which is most secure, but quite often there are other constraints.
I suspect that many of these security consultants may have to come up with solutions that are 'good enough' while not adding significantly to the cost and complexity of the solution.
When all is said and done, the security of any environment is a compromise between risk, cost and strength, and always will be until the strongest security is also the cheapest.
Of course, if the consultants you've known only suggest NTLM+SSL, then your scorn is probably deserved.
I know I keep banging on about this
but I had TomTom running on my Palm Treo 650 with a BlueTooth GPS about seven years ago. I'd probably still be using it as a satnav now if TomTom hadn't retired the database format needed by Navigator 6. And out-of-date databases are a real pain in the neck.
I may try this. £31 is not so much to lose, and I really can't get on with Google navigation needing a data link any time it needs to re-route, and giving me directions just-too-late to get into the correct lane.
Amazon decided that they could get a better deal
than Royal Mail offered and switched to whatever courier they are now using. I think they made the decision during one of the postal disputes a few years ago.
My worst experience of Royal Mail delivery is when the postman decided that the refuse bin was a good place to leave a parcel, with no card saying where he left it. It was a sheer fluke that it did not go out with the rubbish.
I have been sitting in a room next to the front door for a whole morning, only to find a card saying that they'd attempted to deliver a package and could not get an answer. I'm surprised that the postman was even able to put the card through the door without me hearing, let alone ring the door bell. And the dogs didn't hear it either!
This normally happens about 11:15 on a Saturday, with the parcel office closing at 12:00, and the card saying leave at least an hour before going to collect the parcel. Really gets my back up.
I did drive up to my house one weekend to see the postman filling out the card before he even walked up the short path to attempt to deliver a package. He did not get a Christmas tip that year.
Re: Added value : more than downloadable apps.
Congrats on your 22nd landing.
I agree, but only up to a point. I drive somewhere hilly and through small villages where there are speed restrictions (rural England is like that), thus momentum in a light car (a European Fiesta is what I believe you call a sub-compact in the US) cannot be maintained, and raw acceleration is what matters. My Fiesta is an old one, and does 0-60....... eventually (I think it's about 17.6 seconds according to the Ford stats). I know that on one part of my journey, I regularly get overtaken after a standing start by cars like Landrovers. There are plenty of BMWs, VW Golf GTIs etc. that drive at the same time as me that are much more nippy, and get right up my bumper!
So when going up a hill, or when leaving a speed restricted areas, momentum does not help.
Re: Added value : more than downloadable apps.
Speaking as one who is currently driving a Fiesta (one of my kids need a vehicle to get some driving practice while they learn to drive, and I'm not paying to keep 3 vehicles on the road!) I will say that almost *ANYTHING* is better than a small-engined Fiesta for anything other than local journeys.
I am getting to work later (it is not fast enough and falls behind other traffic, mainly due to a lack of acceleration) and is significantly more fatiguing to drive than a larger car, and I certainly would not want to do long business trips in it. All of these issues are arguments for getting something a little better, merely to improve the ability of the driver to work at the end of the journey.
If you had chosen a Focus as the comparison, then I may not have bothered to reply, but a Fiesta is really too small.
I think that what I am trying to say is that there is a range of options between cheapest and most expensive, providing something that is good enough without having to go up to the premium end of the product spectrum.
Re: The "Magi" of NERV
Neon Genesis Evangelion was a quite seriously messed up anime, on several levels.
The implication was that the Magi and the Evangelions themselves were or contained the conciousness and/or the brain of various family members of the main characters. In the case of the EVAs, it was necessary to allow the pilots to synchronise with them.
The only thing that I never understood was where Rei had come from. Shinji's mother was in EVA01, and Asuka's mother was in EVA02 (the scene where Asuka comes across her mother who had hung herself suggests that a trauma was also required, which is also distressing). I know that Rei was the prototype for the dummy plug (as shown in one of the last few episodes where we got to see parts of Rai in Terminal Dogma), but there seems to be no template for her personality, not that she had a lot.
But the role of the Magi was never explained, and I definitely don't think that they qualify as 'badass'.
Re: vi on unix, teletype support...
ed was the primary editor on UNIX until ex and vi came in from BSD.
When I got my BSD 2.3 software tape in 1982 (we wanted to run Ingres on UNIX V6 and V7), I found that I could not compile vi up on my PDP11/34E because it (vi) was too large for a non-separate I&D PDP11. Instead we used a screen editor that was written for small UNIX systems by the Newcastle University Computing Department.
Later versions of VI used an overlay loader that may or may not have been related to the Keele Overlay modifications for UNIX, but Berkeley dropped support for such small PDP11s by about BSD 2.6 (after all, the PDP11/44 was a much better machine, and it and everything after it all had the separate I&D feature).
Re: Email address?
It depends how far back you go!
I was responsible for the ibm.co.uk mail domain for some time, and when I first used it, it was about the only way of getting SMTP mail into IBM UK. IBM was very Internet and open network protocols averse in the early '90s, as they were actively pushing SNA.
IIRC, we were only offered SMTP type addresses through ibmmail and NOSS in about 1992. It may have been there before, but we were told that the system that did the mapping could only cope with a limited number of users.
Re: Email address?
NOSS/PROFS was an email system, it just wasn't anything like the other things that were around at the time, and until the middle of the '90s, it had limited connectivity to the non-IBM world. But then, neither did anybody else much unless you used UUCP mail.
In fact, I'll go one stage further. It was an office productivity tool which would do email, calendar and meeting management, document indexing, organization chart and telephone directory, and also allowed you to escape to a document preparation system using Script.
If you could put up with the 3270 interface (which was a challenge if you had used anything else beforehand), it was actually extremely functional.
When I joined IBM in 1990 as an already experienced UNIX support specialist (this was when the RS/6000 and AIX 3.1 was launched), I hated NOSS, RETAIN and EHONE with a vengeance, but once I bothered to learn how to use them they all became perfectly usable. Although it is archaic, RETAIN is still one of the best problem tracking systems around. Knocks REMEDY into a cocked hat, once you get past the layers of GUI and HTML crap screen scrapers that modern IBMers prefer to use (note- I'm working for IBM as a contractor at the moment).
I left IBM before Notes was deployed company wide, but now have to use it for all IBM related mail. I can't say that I like it, because I'm sure that there is a lot that it can do which I don't know how to use (here, take this Thinkpad and start using it - uh what was that? Training? Don't be stupid. Now get back to work!)
I'm sure that it is usable, but I find that I end up banging my head against the desk all the time.
Oh. OS/2? Yes, I did quite like that, especially the PMX X server that could turn it into a flawed but useful workstation in a UNIX environment. And that was a free download!
I still wear my OS/2 Warp launch tee shirt once in a blue moon for nostalgia sake.
Where I work they use an argon/nitrogen mixture
branded with the proprietary name argonite.
Supposedly, if the oxygen concentration drops below 15%, almost all fires are extinguished.
The system is calibrated to drop the oxygen content to about 12.5% by displacement, which will keep you alive if you are caught, but is probably quite uncomfortable.
I don't intend to try it, not after going through an oxygen depletion experiment at school many years ago (probably not even allowed now), where I breathed the same air over and over through a CO2 filter. You don't start breathing heavily (it's the CO2 that makes your body believe that it's suffocating) and you just can't think or do anything. I was told that I looked very silly by the rest of the class not able to answer even the simplest question. Fortunately, the teacher liked me enough to take the mask off before I passed out.
Re: Christ (oops!) bloody religion again??? @Richard 81
I'm not sure that you understand how much is lost in translation. I tried reading a translation of the Quran myself (I'm pretty much agnostic and was doing it to try to understand the background to the religious conflicts, in the same way that I've read the Bible and the Book of Mormon), and the mess that was the translation I was reading must be poor, because it was difficult to read, and contradicted itself within a few pages. I got about a third of the way through before losing interest.
I've been told by someone who can read Arabic that it is a very difficult language to translate without losing some of the meaning, because the structure of the language differs in several fundamental ways from European languages. I cannot confirm this from first hand knowledge, but I am prepared to believe it.
Thus, I believe that to get the maximum benefit of the Quran, it is necessary to learn and understand (grok?) Arabic, such that you don't need to translate to comprehend.
Re: The one advantage that physical retail has..immediate availability
Being a person to whom if it works then it's good enough (form follows function), I've ended up getting most of the white goods I've needed to buy recently (mainly washers and driers) from our local Co-Op.
OK, you often only have a choice of 1 or 2, but they take are prepared to sell the display model if they don't have any 'out back', and give a discount and full warranty if you end up with the display model.
Walk in (even quite late at night), see what they have, check whether it should do the job, go to the till, get the duty manager paged, purchase, and take out to the car, often being helped by the manager themselves! It's that simple (helped by the fact that we've got an MPV).
You have to put up with a small choice, and the brands that they stock, but so far, we've always got something that will do the job! I know that will not suit everybodies shopping needs, but it works for us.
In reality, not having devices available in stock is a direct concequence of too much choice. As pointed out bu a previous poster, it is simply not possible to keep several instances of every item if you have a large range being displayed, especially when it comes to white-goods.
In some respects, I would prefer to have guaranteed availability in store of a smaller range flagged on the display, with other items on display carrying expected delivery information. This makes sure that immediate availabillity can be part of the customer decision up front, rather than making it something you have to initiate a dialogue with the sales person in order to find out that they have.
The other thing I find amusing when looking through the spare parts listings for white goods is how many of the different brands are built in the same factories using the same parts, and only differ in cosmetic detail. It would be so much nicer to not have the same device with a different brand confusing the potential customer and cluttering up the display in these sales-warehouses.
Re: They've got previous...
DEC was bought by Compaq before Compaq was bought by HP.
Re: Linux with windows? Weird
What on earth were you running this on!
For it to need to install x11-common, x11-utils, x11-server etc must mean that you are using a Linux distribution that DOES NOT PACKAGE A GUI! AFAIK, unless you are running a GUI which drives a framebuffer device directly, X11 MUST be installed on your system.
What is this, some crazy hair-shirt hand built system? Or maybe your package repository is corrupt. Is the Linux kernel listed in the redacted portion of the list? Maybe again, do you normally use apt-get to manage the packages on the system, because I suppose that if you were using Yum or something rpm-ish, the repository may not be populated with a correct list of installed packages.
Anyway, in this day and age, 99.7MB is actually a fairly trivial amount of space. Your average Microsoft Patch Tuesday will be larger than this. I would hazard a guess that this is a system with Gnome as the GUI, and much of what is being installed are the KDE packages that do not normally get installed on a Gnome system. But X11 should still be there!
Re: How much worse can it get?
What universe do you live in? Windows does not have support for all devices built in. That's why you need all of those shiny installation CDs whenever you add a new piece of hardware.
I suggest you try taking a disk from one vendors's system, and sticking it in another from a different vendor (although make sure that you do not switch from a 64 to a 32 bit 32 bit system if a 64 bit kernel is installed). I would be almost completely certain with a Linux system that it would boot(*), and as long as it has a VESA compatible graphics mode, that it would come up with something like a full res screen, with all disk and 99% of network adapters working without problems. I've switched my laptop disk between systems more times than I can count.
With a Windows system, I would give odds of only 50-50 that it will even boot except in safe mode, and if it did, the screen would probably default to 640x480 16 colour mode, with sound and network adapters not working until you stick the correct drivers on. I've had these problems every time I've changed a mobo in a Windows system, although I will admit that I've not done it since Windows XP.
The difference is that Linux treats almost all hardware as not being needed in the stock kernel, but has the hooks to allow it to install software modules for devices detected during the boot process. This means that unneeded device drivers do not get loaded into the kernel. This makes the kernel relatively generic. All you need is for the modules to be present in the boot volume, and known to the device configuration method. Of course, some devices need additional software to function correctly, but I would bet on any Linux distro from the last seven or eight years having better support for more devices out-of-the-box than Windows.
(*) The exception is 32 bit Ubuntu Precise Pangolin (12.04) or later on a system that does not support PAE, unless you've installed the non PAE kernel. Bad Canonical. Very bad.
- 'Kim Kardashian snaps naked selfies with a BLACKBERRY'. *Twitterati gasps*
- Pics Facebook's Oculus unveils 360-degree VR head tracking 'Crescent Bay' prototype
- Crawling from the Wreckage THE DEATH OF ECONOMICS: Aircraft design vs flat-lining financial models
- Bargain basement iPhone shoppers BEWARE! eBay exposes users to phishing vuln
- Google+ GOING, GOING ... ? Newbie Gmailers no longer forced into mandatory ID slurp