Comment In France they do (Score 1) 272
The box provided by French provider "Free" has a 250 GB HD that is CIFS exported:
The box provided by French provider "Free" has a 250 GB HD that is CIFS exported:
All NIC drivers see a specific code in a buffer and shut down.
Not good enough. A nic driver that sees a specific code in a buffer, for the next hour sets that specific code in all subsequent packets passing through, and then shuts down after having fried the motherboard. Cue chaos.
It's not just formatting.
Thank you for that. Indent and bracket placing standards are good for consistency, xCase and whatever are nice so that one immediately recognizes variables and functions and whatnot, but the really useful part of a coding standard is the one that says that every function has documentation block which specifies:
- expected behavior
- allowable inputs (NULLs, empty strings, corner cases . .
- allowable outputs
Hmmm. Webster DOES have it, defined as "a straight line from the muzzle of an artillery piece to a target". Definitely "citation needed". Dictionary.com says origin 1905-1910. I have taken an instant dislike to the expression, based on perceived lack of usefulness, homophony with almost-synonym, and IMHO probable origin in the misspelling of said synonym. Webster tells me to "like" it on Facebook; if there was a Facebook "dislike" I'd even consider signing up for a Facebook account.
The "killer feature" for me on Gmail is conversation view[...]. Back when I switched over to Gmail, it was the only thing that had this feature
Mutt existed long before Gmail. My first thought when I saw the GMail conversation view was "Mutt does it better". It still does.
though it does sometimes screw up (since email was never designed to actually have this in the first place).
The In-Reply-To header is extremely basic, there "in the first place", and the only thing really needed for conversation view. I would be surprised if none of the original designers of the e-mail format had envisioned the use. It "screws up" in GMail because GMail tries to compensate for MUAs who don't set In-Reply-To correctly.
can they also prosecute your ISP as well?
If the ISP was running the Tor node, why not? But the ISP says you are running the Tor node, so that makes it your problem and your consequences to face. You're not saying you were running a Tor node unwittingly, right? Hmmm . . . a virus that installs a Tor node . . .
Can I ask a deeper question? Why do you offer phone support at all?
Probably because that's what people want to pay for. When you have a human on the line, you know that human is paying attention to you and only to you, and that's what you're paying for. IM/chat support *only* doesn't sound professional. However I do agree that WebEx or something similar should absolutely be standard alongside the telephone call, quite simply because it helps the client get satisfied quicker. That makes the customer happy, and also helps the bottom line when customers are paying a flat fee per month or per incident.
Hold a gun to everyone's head and force them to vote.
Gun? Bad idea. Fines are better, 20-dollar fine in Australia for example. See http://en.wikipedia.org/wiki/Compulsory_voting
Yeah. It actually
'nuff said
Good luck on getting Netapp/IBM/HDS/EMC agree to cost-free replacement on site in less than four hours.
Out of the 100k passwords how many were unique? Could we have a graph of how many passwords were used how many times? Something that could be analysed to say that in your case about 85% of people used a unique password and 10% used a password in the top 10 or top twenty whatever. This could be used to compare to other datasets to extract a level of cluelessness/cluefulness.
We agree one needs at the very least two environments. When you have lots of money -- or lots of VMs
The packing needs to be done because when you have few people authorized to do installs, then the people who do have that authorization must be able to do any and all installations, and it forces handoff to Operations. I work in a place where we we have so many different applications we need a database to keep track of who is responsible for which part of which application, and it would be (even more of) a nightmare if something had been installed in some unknown or non-standard way.
But there are two reasons for these rules (at least!).
Most people here are taking this from an engineering reliability aspect, and that is a valid concern, but in many companies the rules separating environments are also motivated by security and confidentiality, and are often even based in law and contract agreements. One might hire a team of contractors/temps to develop something, but not only must they have no chance of inserting malicious code anywhere, they must never ever even *see* production data, only dummy data! The classical example is a bank or a hospital, but this could/should also apply to ISPs (mail...), anything that stores SSNs or credit card numbers or passwords, etc.
[It's] a human who then asks you all of the same questions as the automated system that I really hate.
I have a supplier whose automated system asks for contract number and system ID's and the like. Once, my system was totally down and the different numbers I had were refused by the supplier's IVR. I remembered hearing that some IVR systems detect swearing. I quite deliberately swore a few times at the system, and it beeped and asked "Are you currently experiencing a severity-1 production outage, press one". I did and got a human immediately. I'll never again complain about their system . .
I find it much easier to understand that CentOS 6.1 is a newer version than CentOS 6.0, for example, than trying to remember that "Killer Kangaroo" is newer than "Sloppy Sloth".
Well, you shouldn't try to remember that, since Ubuntu names in alphabetical order, just like Android. That will roll around in some half a dozen years, but Ubuntu also has YY.MM version numbers, so you know immediately that version 08.04 is over four years old. It's better than Debian where the name is not given alphabetically, but Debian also has a version number when you need it. Geeks make the OS. Geeks like the wacko names. Deal with it.
This restaurant was advertising breakfast any time. So I ordered french toast in the renaissance. - Steven Wright, comedian