Comment Re:Who Knew? (Score 1) 249
I think that means you are the rib-eye, all we need to find is a capable and ruthless butcher...
I think that means you are the rib-eye, all we need to find is a capable and ruthless butcher...
you do not need a commercial device to use RAM as storage. All you need to do is add more ram to your conventional system and use a ramdisk driver ( under windows) or mount a file system as tmpfs (under linux). Just don't forget to back everything up once per half hour (less or more frequent according to power/system stability), and just before shutting down. Of course if you are compiling, and all you ar interested in is the binary, just save those and dump the rest.
oth. if you are using ssds please if you have your home directory in it, put your firefox cache in tmpfs/ramdisk.
Hi I really miss the possibility to use the firefose collapsing style for the stories page. I like headhunting slashdot articles, then opening up the heading I am interesting to read a bit more about it, before I decide to click on through.
axi.
--
Basically yet another device that uses energy, seeing as all newer pcs come with built-in wake on lan that cannort be disabled anymore. Just another gadget that uses energy, even if the computer is powered on
Given that VP8 officially has only one codec and H.264 has multiple codecs available all in varying stages of completion, and diverse quality levels, he should compare vp8 video to H.264 multiple videos each encoded by another H.264 encoder.
exactly my thoughts, I know for a fact I have never had lower read or write cycles while running around with my laptop with a CF-Drive.
If You think Time Machine is a safe backup method you are in for a surprise. If you delete or overwrite any file you will lose the deleted and the overwritten file in the history as well.
Him this would seem like a good location to sell some ethernet cables with gold-plated plugs.
Or should I sell some gold-plated SATA cables?
This has put a new twist on the story of Rumpelstiltskin.
Don't set the password to a simple name you plan on say while talking to yourself and gloating.
we add as a security feature that the padlock when held upside down will open with the combination/key.
Should have been: we add as a security feature that the padlock when held upside down will open without the combination/key.
Which of course will need a button to be disabled as well..
So now we have a vault with a complex combination, Which can be opened by turning it on it's side. Now we are going to add a second layer to the security, so we are adding a padlock. To make sure the padlock and the safe can be opened in case of emergency, we add as a security feature that the padlock when held upside down will open with the combination/key. All of this will need another security......etc, etc.
The best way to secure a microsoft windows based system, is by leaving the power switched OFF.
On that note the only way to secure any system at all is by leaving it powered off in a vault and throwing away the key, so no one can steal the hardware.
A more fitting title for the article.
Is your job running? You'd better go catch it!