Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re:It's not broken. (Score 5, Insightful) 1154

(Hey man, long time no see)

This. Like Enry, I've been using linux since pre-1.0. Unlike him, I've lost my desire to constantly upgrade versions.

The "KDE/Gnome are both Windows 95/XP look-alikes" era was probably the top of the usability as far as I can tell. Newer KDE never got back to the same level of usability, and newer gnome makes me turn giant and green. (Look, my monitor is not 1024x768. Stop making UI decisions that only work on tiny-ass monitors.)

And unlike most here, I think that is reasonable. Normal people won't use Linux until the app they want is only available on it... and that won't happen until the developer likes it enough to run it as their default platform. So YES, make it nice for neckbeards first. And once it's (back to being) nice for the neckbeards, THEN go ahead and try and make it nice for your grandmother too... but DO NOT break it for the neckbeards.

And then you declare the basic desktop DONE for 3 years or so, and work on apps. Maintain the desktop in terms of bug fixes, and internal reworks and anything else you need to do, but religiously keep interfaces static for 3-10 years. And instead of going all 2nd system on the interface, work on other things. Maybe those are easier app-building tools? Maybe those are actually just killer apps. Maybe those are better tools for configuring the system, or for managing large numbers of desktops. Maybe that's "work on something completely different that doesn't affect the desktop". Whatever. Maybe that's "work on something completely different, like servers". I don't really care, as long as you stop breaking perfectly working desktops.

Comment Re:Apple's lack of support for Retina Displays (Score 4, Interesting) 277

Kinda off subject here, but ...

Your standard app was not written for silly-high DPR. You could show this on linux too: take your desktop, and crank the DPI to 300 or so, so that the X server thinks your screen is only 5" across. Now move far enough away from it that a 12 point font looks reasonable, and then look at how stupid apps look. Icons are microscopic (because they're defined in fixed pixel sizes). Layouts between menubars and borders look stupid (natural spacing was defined in fixed pixel sizes).

So Apple's approach here is to tell the application that the screen is 1440x900. Any primitives that can be scaled ("place the string 'pants' in font 'Helvitica', size 12pt, at X,Y". "Draw this 2kx2k pixmap in this 500px x 500px space") are then rendered to the screen's native resolution. Things that can't be scaled aren't ("draw this 96x96 pixmap here, in this 96x96 space"). Some apps then look horrible, some look great.

I personally would have rather they just let apps look like crap, and told people to fix their darn apps, but I can understand why they didn't.

Comment My initial list (Score 1) 280

Mac, Linux, Windows, FreeBSD variant (all at work. At home, Linux)
IOS (tablet), Android (phone)
Linux in my television, Tivo, and game console.
Whatever the heck RTOS runs my car, car's GPS, my work telephone, microwave, the badge-swipe system at work, and my work monitor (no, not joking. Darn thing can lock up, and has a boot screen)

That's all I'm coming up with on a daily basis.

Less often, ATMs, routers (Mostly linux), NAS devices, smart-switches (didn't seem like a linux box, but had some copyright lines in the packaging) and anything else with a UI more complex than a mechanical watch. Increasingly, EVERYTHING has an OS: I'm sure it won't be long until someone finds a reason to put a fancy UI on a charcoal grill; and then all future grills will have an OS.

Comment Re:Exactly why we don't need IPv6 (Score 2) 329

and then once they've excavated what your MAC address is, telling your router to route traffic to your node is trivial.

Could you further explain this attack vector, cause I've not really understood it so far. The bad guy has your IP address. Exactly what is the additional harm in letting him know your MAC address?

I understand the issue of "probable iphone MAC => iphone specific vulnerabilities", but that doesn't seem to be what you're talking about here. (And really, that's not a significant barrier to the attacker anyway. You did something that let him see your IP address: the odds are quite good that he already could figure out your OS more reliably than using a MAC -> OS mapping)

Comment Re:Exactly why we don't need IPv6 (Score 3, Insightful) 329

Since my work laptop isn't allowed to join my "home" workgroup, there is no DNS which will work between by laptop and my machine

Huh? Um, exactly what's the DHCP server on that network there? Does that DHCP server advertise a DNS server? Can you modify the DNS server?

Alternately, can turn of the DHCP server on that wireless router that only does caching recursive DNS, and install a DNS server and DHCP server on your other computer, and run that?

And then, why again do you need to run your own DNS server anyway? Won't the people who give you the /64 take requests to add records? Or use one of the dynamic DNS protocols that allows you to register your IP? And I think there's yet another answer that involves anycast and autoconf...

Or maybe I'm just completely not understanding what you mean by "join my 'home' network".

IPv6 has some pretty good autoconf out of the box. You use RADVD to just announce services, you don't need any software managing IP addresses because the nodes will do that themselves. And when you want to use some service that isn't a pure client-server-http thing, the fact that each computer has a unique IP on that other side of the firewall is helpful. And for the most part, the "OMG, that's hard" retoric is horribly overblown. Get a /64. Configure a route-announce daemon (things your ISP can do for you). IPv6! Free!

Setting up a game, I was trying to debug a connection problem someone had, and sent them to a site that tells you IP addresses. A different friend went there, and discovered he had an IPv6 address. His ISP had provided it for him, and he had literately never known. It wasn't relevant. That's the experience you should expect.

Comment Re:Why? (Score 1) 152

Just FYI, depending on exactly when in 2010 it was hacked, Verisign may not have been in the certificate business. Symantec purchased the business in May of 2010, and IIRC the operational transfer happened pretty quickly.

That "just" leaves the DNS system as a possible valid target. You know, the system that's probably more important than SSL.

Comment Re:Who is "Versign"? (Score 4, Informative) 85

Verisign runs the top-level domain DNS servers for com, net, edu, cc, name, and a few other smaller ones. If you lookup gmail (ignoring caching), you have to ask Verisign-owned servers where the google DNS servers are, so you can ask those servers what the gmail IP address is. For the security of the internet: it's pretty important.

Until late 2010, Verisign also ran the dominant SSL business. That red circle with the black digitized check at the bottom of your bank's web page? Yeah, that. The SSL business was sold to Symantec, are are trying to slowly rebrand. For the security of the internet, SSL is also kinda important.

Comment Re:Fun at scale. (Score 1) 500

A second specific comment

The configuration of a system is much more complex than most configuration management tools consider. The tools generally limit themselves to the list of things a "sane" person would change.

The list of things that actually affect the running of your system is much, much larger.

  • Libraries. Did you hand-jam in a specific openssl version for some application?
  • Programs. Did you hand-upgrade openssh on one system?
  • /usr/local. Is it in the path of a shell script used to launch a service? Is everything under it managed?
  • Permissions. Did someone do "chmod -r" somewhere they should not have?

If you write rules in puppet to handle all of that, your set of rules blows up to be insanely detailed, long, and completely unmanagable.

But the reinstall handles it all. In an automated, scripted fashion that allows you to easily change what you need.

Seriously people. Cobbler & similar install servers. They need to be part of any large scale host management. And since they are already there, are easy to leverage into being a large part of your large scale host management. And then reinstalling the server is the sane solution.

Comment Re:Fun at scale. (Score 1) 500

cfengine, puppet, chef et all are in the set of acceptable solutions. And if you have per-host information you care about keeping, superior to blindly reimaging.

But why do you have per-host information? Per-host information (log files, or important data on local storage) is an inherent management pain. The best answer is to keep that to the minimum set of hosts possible, and use coarse tools on the majority. Then you're manually managing 2 hosts, and bulk managing 998. Which is a cubic ton better than manually managing most of 1000 hosts. (remote syslog is your friend.)

(Upgrade? Really? Um, no. Reinstall. Again, you have to be able to reinstall quickly and accurately. And since you can do that, why not do that?)

Slashdot Top Deals

2.4 statute miles of surgical tubing at Yale U. = 1 I.V.League

Working...