Become a fan of Slashdot on Facebook


Forgot your password?
Slashdot Deals: Prep for the CompTIA A+ certification exam. Save 95% on the CompTIA IT Certification Bundle ×

Comment Re:OS/2 and DOS. (Score 1) 620

I used to work for a company that sold large printers and vinyl cutters, mainly to sign makers and I can confirm that sign makers are particularly cheap when it comes to upgrading their tools. I'm all for "if it ain't broke...", but when it is broke, and every print run takes twice as long because your Windows 98 box takes ten minutes to reboot, and another five to load the required program and then has a 50% chance of crashing, that right there is a good time to buy a new computer.
On the other hand, the specialised software for these printers was so behind the times it still wouldn't support a 64 bit OS a couple of years ago, which is a slight problem when you're dealing with image files which can quite happily eat all 4GB of addressable RAM, so maybe they weren't missing out on much.

Comment Re:It would have an Amiga Mother board (Score 1) 484

Also, the Amiga had the best case handling in a file system:
Say you have a file called File1 (no need for an extension). You could access the file with any capitalisation you like, file1, FILE1 File1, FiLe1 or whatever takes your fancy.

However, if you were mad, you could also have two files in the same directory names FILE1 and file1 (or any other set of characters).

It had/has the benefits of a case sensitive filesystem, with the ease of use of a case-insensitive one.
Now, if someone could just explain to me why case sensitivity is important in a file system...

Comment Re:OK, based upon notebook shopping thus far (Score 1) 118

Which bowser and which applications? Are you sure you're not counting cache as used RAM?

I'm currently on a Win7 machine, with 8Gb of RAM, running firefox, thunderbird and two VMs (1GB of RAM each) and a bunch of other stuff and I'm just over 4GB used.

Comment Re:For all of you USA haters out there: (Score 1) 378

It's not just about skimming, a card with just a mag-stripe is very easy to clone (you can do it with a strip of video tape). So when credit card details are stolen anywhere in the world, they're sent to the US to be turned into cloned cards so the money can be extracted, and then laundered and sent back to the country of origin.

My card provider blocks all US transactions unless I ring them up and tell them I'm going on holiday to America.

Comment Re:most of you will pretend you understand (Score 1) 84

For me the link was right at the start of a new line and not very noticeable, I didn't see it until after I'd read the article (and googled W^X myself).

I'm not sure what the post would have lost if they'd included a short explanation ("W^X (memory can be Writeable OR Executable)").

"The identical is equal to itself, since it is different." -- Franco Spisani