Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:booting? (Score 1) 160

> Article mentions Android is based on Debian

I have mine for only a week so I may have missed sometihng, but I definitely haven't noticed anything "Debianish" on the phone. Non-GNU libc, very odd userland (it's not GNU nor busybox), etc...

Comment Re:test (Score 1) 480

Also, don't forget to set the kernel flag that enables the leap-second code. It's quite likely that this was the cause, and the kernel won't know by itself that it should insert one. See adjtimex(2) for more information.

It's definitely possible that some program couldn't cope with time jumping back. Actually, it may be just as easy to just test this by manually stepping back in time.

Comment Re:Consumer Routers and IPv6? (Score 1) 258

Many customized router firmware images (think of OpenWRT and friends) support IPv6. I adapted mine to get that. It sets up a tunnel to SixXS and announces my IPv6 /64 on my LAN. Everything just works.

Not sure if anything out of the box can do this yet, especially the tunneling part.

Businesses

Getting Rid of Staff With High Access? 730

HikingStick writes "I've been in the tech field for over 15 years. After more than nine years with the same company, I've been asked to step in and establish an IT department for a regional manufacturing firm. I approached my company early, providing four weeks notice (including a week of pre-scheduled [and pre-approved] vacation time). I have a number of projects to complete, and had planned to document some of the obscure bits of knowledge I've gleaned over the past nine years for the benefit of my peers, so I figured that would give me plenty of time. That was on a Friday. The following Monday, word came down from above that all of my privileged access was to be removed — immediately. So, here I sit, stripped of power with weeks ahead of me. From discussions with my peers in other companies, I know that cutting off high-privilege users is common, but usually in conjunction with a severance offer (to keep their hands off the network during those final weeks, especially if there is any ill-will). Should I argue for restored access, highlight the fact that I am currently a human paperweight, request a severance package, or simply become the most prolific Slashdot poster over the next few weeks? Does your company have a policy/process for dealing with high-privilege users who give notice? What is it, and do you make exceptions?"
Google

Submission + - Google displays code snippets in search results (google.nl)

tijmentiming writes: "I did a Google search for starttls today and noticed a snippet of source code as the third search result. This result linked to the Google Labs project called Google Code Search. From the F.A.Q: "We're crawling as much publicly accessible source code as we can find, including archives (.tar.gz, .tar.bz2, .tar, and .zip), CVS repositories and Subversion repositories." Regexp search is included as well."

Slashdot Top Deals

New York... when civilization falls apart, remember, we were way ahead of you. - David Letterman

Working...