Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Re:Groklaw (Score 2, Insightful) 135

What a troll. Seriously. There is not just one manufacturer that makes mainframes. http://en.wikipedia.org/wiki/Mainframe_computer

Market

IBM mainframes dominate the mainframe market at well over 90% market share.[6] Unisys manufactures ClearPath mainframes, based on earlier Sperry and Burroughs product lines. In 2002, Hitachi co-developed the zSeries z800 with IBM to share expenses, but subsequently the two companies have not collaborated on new Hitachi models. Hewlett-Packard sells its unique NonStop systems, which it acquired with Tandem Computers and which some analysts classify as mainframes. Groupe Bull's DPS, Fujitsu (formerly Siemens) BS2000, and Fujitsu-ICL VME mainframes are still available in Europe. Fujitsu, Hitachi, and NEC (the "JCMs") still maintain nominal mainframe hardware businesses in their home Japanese market, although they have been slow to introduce new hardware models in recent years. The amount of vendor investment in mainframe development varies with marketshare. Unisys, HP, Groupe Bull, Fujitsu, Hitachi, and NEC now rely primarily on commodity Intel CPUs rather than custom processors in order to reduce their development expenses, and they have also cut back their mainframe software development. (However, Unisys still maintains its own unique CMOS processor design development for certain high-end ClearPath models but contracts chip manufacturing to IBM.) In stark contrast, IBM continues to pursue a different business strategy of mainframe investment and growth. IBM has its own large research and development organization designing new, homegrown CPUs, including mainframe processors such as 2008's 4.4 GHz quad-core z10 mainframe microprocessor. IBM is rapidly expanding its software business, including its mainframe software portfolio, to seek additional revenue and profits.[7][8]

Quit being a hypocrite and go after every mainframe manufacturer. And yes, I am calling you a hypocrite and a troll.
Nor does IBM force you to use a specific operating system. From the IBM web site of all places. http://www-03.ibm.com/systems/z/os/

Linux on System z Show descriptions | Hide descriptions Featured topic Increasing economics for server consolidation Linux and z/VM benefit from the enormous improvements of the IBM zEnterprise 196 server capabilities in the areas of consolidation, security, reliability and disaster recovery. You can "do even more with less". 10 Years Linux on IBM System z For the last decade, clients around the world have benefited from the strengths of Linux on System z. Learn more about Linux on System z

I don't see companies like Apple advertising the fact, and also offering to help install other operating systems on their hardware.

Show me in witting, on the IBM web site, where their software can not be run on mainframes built by other manufacturers. I don't want your blog, I want IBM official restrictions. Otherwise, your a troll. Nothing more, nothing less.

Comment From the copyright.gov web site - offical verbage (Score 2, Informative) 423

http://www.copyright.gov/1201/

  1. (1) Motion pictures on DVDs that are lawfully made and acquired and that are protected by the Content Scrambling System when circumvention is accomplished solely in order to accomplish the incorporation of short portions of motion pictures into new works for the purpose of criticism or comment, and where the person engaging in circumvention believes and has reasonable grounds for believing that circumvention is necessary to fulfill the purpose of the use in the following instances:
  1. (i) Educational uses by college and university professors and by college and university film and media studies students;
  1. (ii) Documentary filmmaking;

(

  1. iii) Noncommercial videos.

(

  1. 2) Computer programs that enable wireless telephone handsets to execute software applications, where circumvention is accomplished for the sole purpose of enabling interoperability of such applications, when they have been lawfully obtained, with computer programs on the telephone handset.
  1. 3) Computer programs, in the form of firmware or software, that enable used wireless telephone handsets to connect to a wireless telecommunications network, when circumvention is initiated by the owner of the copy of the computer program solely in order to connect to a wireless telecommunications network and access to the network is authorized by the operator of the network.
  1. (4) Video games accessible on personal computers and protected by technological protection measures that control access to lawfully obtained works, when circumvention is accomplished solely for the purpose of good faith testing for, investigating, or correcting security flaws or vulnerabilities, if:
  1. (i) The information derived from the security testing is used primarily to promote the security of the owner or operator of a computer, computer system, or computer network; and
  1. (ii) The information derived from the security testing is used or maintained in a manner that does not facilitate copyright infringement or a violation of applicable law.
  1. (5) Computer programs protected by dongles that prevent access due to malfunction or damage and which are obsolete. A dongle shall be considered obsolete if it is no longer manufactured or if a replacement or repair is no longer reasonably available in the commercial marketplace; and

(

  1. 6) Literary works distributed in ebook format when all existing ebook editions of the work (including digital text editions made available by authorized entities) contain access controls that prevent the enabling either of the book’s read-aloud function or of screen readers that render the text into a specialized format.
User Journal

Journal Journal: Jailbreaking iPhone to become legal

http://www.npr.org/templates/story/story.php?storyId=128772296
http://www.msnbc.msn.com/id/38413597/ns/technology_and_science-wireless/ From NPR

Comment Re:Trying to destroy one of their best traits... (Score 1) 299

Not impatient, just they don't want to be inconvenienced into having to drive to the local UPS/FedEx shipping center to pick up a package that can't be safely delivered because they aren't home during normal delivery hours. That's a lot of people.

Or they these distribution centers are closed by the time people get off work and they are unable to take time off from work.

When ever I ran into this problem, I found that USPS/FedEx was closed on the weekend. I was fucked.

User Journal

Journal Journal: Upgrading to FreeBSD 8.1

In the middle of the CVS update right now. Considering I already have 8.1 pre release, this is taking longer than I thought it would. Will let this run all night, and than upgrade tomorrow.

Should have done a backup prior to this. But, this is a desktop that is being updated and the last major port install had a backup done afterward. Nothing lost if I have to go to that backup to fix.

Unix

Journal Journal: FreeBSD 8.1 release

July 23, 2010 - FreeBSD 8.1 was released.
http://www.freebsd.org/releases/8.1R/announce.html

Some of the highlights from this release are as follows:

  • zfsloader added
  • zpool version of ZFS subsystem updated to version 14
  • NFSv4 ACL support in UFS and ZFS; support added to cp(1), find(1), getfacl(1), mv(1), and setfacl(1) utilities
  • UltraSPARC IV/IV+, SPARC64 V support
User Journal

Journal Journal: So much for hosting blogs that use wordpress

http://yro.slashdot.org/article.pl?sid=10/07/22/1935248
WordPress Creator GPL Says WP Template Must Be GPL'd

This is all about various themes that have been developed for WordPress which are not of GPL license.

If I host a blog web site, and the client uses one of these themes that are not GPL licensed, am I liable to be sued by the wordpress creator?

Simple answer to this, if I host blogs. It will not be with word press.

Comment Re:Brilliant.... (Score 1) 330

The original poster made it sound like similar situations had occurred. ie: take down suggestion, not performed, Fed's made legal hell for them.

The wording of my response should have been more clear. What I want is for the original poster to show previous actions by the Fed's that caused the poster to make that comment. In other words, prove it happened before. Justify your belief that this was the intent of the FBI. And, if there was previous action. Was it carried out to successful prosecution of the company. In other words, only public records should be considered valid references.

Comment Re:US Hysterical (Score 2, Interesting) 330

Especially when you look at some of the declassified documents of what they have tried before. The US military once actually proposed attacking their own nation to blame it on others as a reason to attack, it was shot down by congress and such but they still proposed it.

http://whatreallyhappened.com/WRHARTICLES/northwoods.html?q=northwoods.html

Operation Northwoods
US PLANNED FAKE TERROR ATTACKS ON CITIZENS TO CREATE SUPPORT FOR CUBAN WAR

According to secret and long-hidden documents obtained for Body of Secrets, the Joint Chiefs of Staff drew up and approved plans for what may be the most corrupt plan ever created by the U.S. government. In the name of antiCommunism, they proposed launching a secret and bloody war of terrorism against their own country in order to trick the American public into supporting an ill-conceived war they intended to launch against Cuba.

Is this what your thinking about???

Comment Re:Brilliant.... (Score 0, Troll) 330

USA: You should shut this down or we'll make your life a legal hell.

Prove that statement. Links to court case's, arrest records, public records. Conspiracy web sites do not count as legitimate references to prove your point.

Back that statement up with some facts. Otherwise, shut the fuck up.

Slashdot Top Deals

Anyone can make an omelet with eggs. The trick is to make one with none.

Working...