Slashdot is powered by your submissions, so send in your scoop


Forgot your password?
Compare cell phone plans using Wirefly's innovative plan comparison tool ×

Comment Re:ZFS needs ECC RAM (Score 1) 249

You said "ZFS needs ECC RAM". Implying that ZFS is special is this regard. The link however contains the following:

7 Beyond ZFS
In addition to ZFS, we have applied the same fault injec- tion framework used in Section 5 to a simpler filesystem, ext2. Our initial results indicate that ext2 is also vulner- able to memory corruptions. For example, corrupt data can be returned to the user or written to disk. When cer- tain fields of a VFS inode are corrupted, operations on that inode fail or the whole system crashes. If the inode is dirty, the corrupted fields of the VFS inode are propa- gated to the inode in the page cache and are then written to disk, making the corruptions permanent. Moreover, if the superblock in the page cache is corrupted and flushed to disk, it might result in an unmountable filesystem.
In summary, so far we have studied two extremes: ZFS, a complex filesystem with many techniques to maintain on-disk data integrity, and ext2, a simpler filesystem with few mechanisms to provide extra relia- bility. Both are vulnerable to memory corruptions. It seems that regardless of the complexity of the file sys- tem and the amount of machinery used to protect against disk corruptions, memory corruptions are still a problem.

ZFS needs ECC as much as every other file system.

Comment Re:ZFS needs ECC RAM (Score 1) 249

ZFS requires an absurd amount of RAM dedicated to managing storage.

And ZFS needs ECC RAM, errors must be detected because with ZFS there can be a write to the hard drive to fix a mismatched "checksum" when the software is requesting a read. Bad RAM is a much bigger problem with ZFS than other file systems. Its really not a good idea for consumer hardware.

Disputed, to put it mildly.

Comment Re:Use password strength as the criterion (Score 2) 232

That is essentially what they are doing. But, added to the simple rule based strength measure is a set of current rainbow tables. If they are throwing out the other silly rules, like mixed case, numerals etc and just looking at objectively weak passwords (a password in a rainbow table is objectively weak) then this sounds great.

Comment Re:All of the above (Score 1) 229


Local backup (with per user snapshots) to a dedicated backup server, which has RAID, and snapshots the backups (the backup server has ZFS).

The backup server is itself backed up to the cloud.

Local mail gets its own server and an extra layer of backup.

Yes, I am paranoid. I only worry that I'm not paranoid enough.

Comment Data General and Apple MPW (Score 1) 165

Data General's AOS/VS operating system had an undocumented command named "XYZZY." In the original 16-bit version, the response was: "Nothing happens." In a later 32-bit version, this was amended to: "Twice as much happens."

The Apple MPW C compiler had a notorious set of error messages (does this count as an Easter egg?).

Slashdot Top Deals

Why do we want intelligent terminals when there are so many stupid users?