Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Re:What the fuck? (Score 5, Informative) 135

TRIM is essential for maintaining SSD performance.

This is not so simple.

The original TRIM command is non-queued. It can kill drive performance on servers, so enterprise drives are designed to work well without TRIM. If you want better, and more importantly consistent performance then you should overprovision the drive. Overprovisioning means that you do not partition 20-40% of a new drive (or a used drive, after a secure erase). Those blocks will never be used, therefore the drive always have plenty of free space, so there is no need for trim.

Queued TRIM command appeared only in the SATA 3.1 specification, so only new drives support it.

Comment End of the world? (Score 5, Insightful) 206

We are talking about a short, almost personal comment on the developer's mailing list of Ubuntu:

i personally wouldn't do online banking with it ;)

Compare this with the Slashdot article title:

Canonical Developer Warns About Banking With Linux Mint

Whether he is technically right, or not, I find it disgusting that such a side note becomes news on Slashdot.

By the way, the subject was another new distribution based on Ubuntu, similar to Mint, therefore the Ubuntu developer actually encouraged an Ubuntu derivative.

Comment Re:Hoping for systemd (Score 1) 362

My mistake, I wrote "script", but it is not, it is a job configuration file. The exec line defines the executable and its arguments. The example is a Minecraft server, which is written in Java, so the executable is java in our case.

The Upstart reference documentation is http://upstart.ubuntu.com/cookbook. If you want man, then man 5 init describes the job configuration format.

Comment Re:Hoping for systemd (Score 3, Interesting) 362

Here is an Upstart script copied directly from the minecraft server of my 11-year-old son:

start on runlevel [2345]
stop on runlevel [^2345]

setuid attila
setgid mc
env LANG=en_US.UTF-8
chdir /home/attila/minecraft

exec java -client -Xms2500M -Xmx2510M -jar spigot.jar > /dev/null
respawn

And then:
# start minecraft

I cannot see a single line which requires documentation in order to understand it.

Comment Re:Canonical might suck... (Score 3, Interesting) 362

Upstart was already in a good shape when SystemD started. So if you consider this fragmentisation because of this, then please note that in this case it is not Ubuntu who fragments Linux distros, quite the opposite... Personally I find writing Upstart configuration files trivial. On the other hand I have never been able to write a perfect System V script. I hadn't found comprehensive documentation about it (especially about the various helper scripts and config files frequently used in init scripts). On the other hand, if you read the Upstart doc, which is a single long HTML page, at most 1 hour to read, your will know everything about it, much more than what you will ever use. I have not tried SystemD, so I have no opinion on that.

Comment system monitoring, and certificate authority (Score 1) 129

I have two, the first one displays system monitoring data. The diagrams are produced by Graphite on a real server, RPi displays them in a browser. That was not easy at first, because both Chromium and Midori are plagued with memory leaks which does not work well with Javascipt running in 24*7. My son wrote a script which reloads the tabs every hour, since that it works without issues. It only stops when there is a power outage.

I use the other one as a certificate authority, it is not connected to the internet.

Comment not that bad (Score 2) 95

Amazon does a favor with their Alexa service for the whole internet. That is the only third party global site statistics tool which provides information for free. At least I do not know any other.

Of course they should fix the vulnerability. The real issue is that the current authorization systems only give half of the necessary information, they state what information the app access, but not what it does with those information, even though that could really make a difference. Therefore people become accustomed to give horrific permissions to any app.

Comment Re:Alternate Explanation (Score 1) 156

Looking at the book cover carefully, I believe she is actually depicted on it. Not on the forward big ship, but on the small ship going away in the background. She mentions in the book that this is the last edition for her, because nowdays she spend most of her time on a sailing ship where she only has a 30 (or 300?) baud radio connection.

Comment Re:The sign on Evi's desk (Score 1) 156

I am usually a developer, but I have spent most of my time with system administration for the last half year. Whenever I have a new task in an unknown area, I always start with reading the relevant chapter from her book. I usually read a few other, unrelated sections too. As I have read this sad post, her book was actually lying next to me, open on page 938.

Comment And? (Score 3, Insightful) 28

So 20 million Yahoo user names are revealed. Why is that interesting at all? I guess if I write a script which loops some id for a yahoo info page I get a similar list. Maybe a Google search is enough. Or do not contact external service, just guess: take all Japanese names, append one or two digits to it. Mostly these are valid names.

Submission + - The DDoS That Almost Broke the Internet (cloudflare.com)

Em Adespoton writes: "Had any network issues over the last week? CloudFlare, an AnyCast, Anti-DDoS network provider writes, "Our direct peers quickly filtered attack traffic at their edge. This pushed the attack upstream to their direct peers, largely Tier 1 networks. Tier 1 networks don't buy bandwidth from anyone, so the majority of the weight of the attack ended up being carried by them. While we don't have direct visibility into the traffic loads they saw, we have been told by one major Tier 1 provider that they saw more than 300Gbps of attack traffic related to this attack. That would make this attack one of the largest ever reported.""

Comment Re:Ask the (ABC) Australian Broadcasting Corp. (Score 1) 312

25 W idle is quite impressive, could you describe what parts and other measures have you used to achieve it? Now I have 3 computers online 24h in my home alone, mostly idle. Two are about 60W at idle. The third is a Raspberry Pi, which only consumes a few watts, but it has an attached LCD display too.

Regarding servers: I believe the new servers has much better energy management, so the idle - full difference may be larger than once it was. I also found that it is very hard to achieve a - seemingly - full load, the type of test program makes a big difference in power consumption, even if top displays 100% on all cores in every cases.

Desktops (Apple)

Submission + - Google wants variable-rate Ethernet (lightreading.com)

optikos writes: "When it comes to the fill-rate fraction/ratio of digital-domain Ethernet frames in the underlying analog-domain physical medium, a senior network architect at Google wants to have more flexibility regarding the denominator to push a link's typical fill-rate closer to 100%. The current scheme of inter-Ethernet-frame idle capacity as represented by a numerator that is notably smaller than the (currently-standardized fixed-size) denominator in the fill-rate is claimed to be unsuitable when interconnecting data-centers.

The Institute of Electrical and Electronics Engineers Inc. (IEEE) isn't working on a variable-speed Ethernet standard yet, but Google is pushing for one. It was a point of focus for Bikash Koley, Google's principal architect and manager of network architecture, during a panel session on the last day of OFC/NFOEC last week. What he wants is variable-speed Ethernet. So, instead of running a connection at 100 Gbit/s or 400 Gbit/s, which are the two standard choices, he'd like to pick arbitrary speeds. The technology on the optical side is actually ready for what he's asking. Variable-speed transceivers and flexible-grid ROADMs exist. What's missing is on the packet side: a media access control (MAC) layer that's capable of dealing with a variable-bit-rate physical (PHY) layer.

"

Slashdot Top Deals

Waste not, get your budget cut next year.

Working...