Forgot your password?
typodupeerror

Comment: Please discuss tolerable duration or use case (Score 1) 359

by jlmale0 (#34776416) Attached to: Smartphones For Text SSH Use Re-Revisited
Even though everyone's pain threshold is different, please mention tolerable duration of use. For me, I've got an iPhone 3 with Touch Term Pro. There are some idiosyncracies with its onscreen keyboards, but once learned, its decent. This is sufficient for short tasks, but I wouldn't want to use this setup for more than about 7 minutes. This is sufficient for checking service status and kicking off one or two things, but troubleshooting is right out.

Comment: Re:Here's how it works... (Score 1) 314

by jlmale0 (#33034862) Attached to: There is no...

Movies which are built from made up scripts based on little insight are easy to spot because generally they aren't very compelling. ... While it is possible for idiots to channel greatness for short bursts, consistently excellent material must come from people who have worked on themselves and who had accumulated knowledge and wisdom.

Thank you for succinctly explaining episodes I, II, and III.

Comment: Re:Other options (in 10U, 240 opteron cores can fi (Score 1) 183

by jlmale0 (#32565958) Attached to: SeaMicro Unveils 512 Atom-Based Server
The point isn't so focused on how many processors you can fit in that space, it's power consumption.

The link you provide details 2 1100W PSUs. That's in 2U. The summary quotes just under 2000W for one 10U server. Just looking at that, you're running at 1/5th the power consumption.
Networking

+ - What is the Future of Firewalls? 1

Submitted by jlmale0
jlmale0 (1087135) writes "When I mess with my WAP/router at home or coordinate with the network team at work, it seems like I'm stuck in 1995. We're still manually listing IP address/port combinations for our firewall rules. There's a certain simplicity to this when dealing with a single system, but there are firewalls everywhere these days. What's available for managing complex firewall arrangements? What's being developed? Can I take a visio diagram, run it through a script and get a list of firewall rules? What about a gui that illustrates the current system configuration and then lets me drag and drop systems across firewalls, and have the individual firewall ports automatically configured? What about tying a firewall into an authentication system so that when jdoe logs in, only then are the firewalls opened to pass her traffic? What about managing distributed firewalls so that one repository of rules opens up your system's firewalls, the DMZ firewall, and the public firewall all at once?

Let's get a conversation started. What cool projects do I need to know about? What cool management features would you like to see? What's next for firewall management?"

Comment: Re:Any other file systems with that feature? (Score 1) 386

by jlmale0 (#29962650) Attached to: ZFS Gets Built-In Deduplication

... deduped them to 18% of their original size

He's claiming 82% dedup savings with this. That's roughly five times greater than what you credit.

Even with the price overhead, I'd still consider a solution like this because I can replicate all my data on one storage appliance more easily than implementing replication across X commodity servers. Yes, I like to spend money to make my life easier. :)

Comment: Re:Open Source Cures Cancer (Score 1) 386

by jlmale0 (#29962570) Attached to: ZFS Gets Built-In Deduplication
While I appreciate the sentiment, it only applies to Big, Irreplaceable (tm) things. Tape libraries would be an example. Office software would not. Even if you have software that's mandatory, there are other ways to mitigate risks. Clustered servers for fail-over. Replication. Alternate installs in the form of development and test environments. If Wine breaks in the middle of my big project, I may research the issue and debug the problem, but if I'm under a time crunch, I'm just going to move to a working machine. Yes, paying for support is one valid risk mitigation strategy, but it's far from the only one.

Comment: re: the summary (Score 4, Informative) 185

by jlmale0 (#29834335) Attached to: Time Warner Cable Modems Expose Users
My initial, gut response to this was sheer horror. They list exploit and target side-by-side! The only mention of a fix is that it's to be 'released soon', informing any malicious agents out there that now is the time to strike.

Reading the Wired article, the right thing was done. Big company was sitting on their hands, and now that publicity has been made, they're starting to move.

Wired did the right thing. But this summary, it's fear-mongering and bad journalism.

User hostile.

Working...