Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror

Comment Re:What? no ... that's not the problem.... (Score 4, Insightful) 76

No, atime is completely crazy. It has two uses I'm aware of (and I assume a few I don't)
  • Mailbox-like "did this change since I last read it" (that requires monotomic timestamps instead of real ones to work correctly)
  • Tiering/cleanup. "No one's read this in two years: I think it can be deleted/archived offline/etc"

And in return, every read becomes a write, and you lose all parallelism of read-primary workloads. Nope, atime's crazy. Relatime is a good hack, but better would be throwing that misfeature away.

Similarly I can go on about Posix locking, fcntl(..., F_[GS]ETLK(W)?, ...) vs. flock. fcntl has the lock owned by the file descriptor, so if you fork while you hold the lock, your child owns the lock... but support range locks. lockf has the lock owned by the process so you're not shocked by the ownership rules ... but doesn't support range locks. fcntl() locks calls "set the lock state" instead of taking a lock... so if you lock [0-10] and [5-15] and then unlock [5-10], you have [0-4] and [11-15] locked... don't lose your state. And so on...

rename? Rename we should keep. And hard links while we're at it.

Comment What? no ... that's not the problem.... (Score 4, Interesting) 76

The problem for adapting applications that assume posix semantics to object storage isn't mmap()... it's rename(). Unix systems use rename as a core atomic primitive, which is possible because of an implied "directory object". A nameserver or other system that implements an atomic rename would cover around 80% of the use cases... and many of the others could be forgotten about. (atime. Wat?. Posix advisory locking isn't really what anyone exactly wanted either. The lifecycle around that is ... a bit crazy and not what you think it is)

Comment Re:Give it a rest, shorts (Score 2) 61

Most of the issues raised so far are exactly in line with your view... largely non-issues being hyped because you can get press now that you're targetting today's cool thing.

The "encryption keys came from servers in China" one ... is more serious.

(the "poor use of encryption" one is ... back to fear mongering. Everything that deals with connections that can drop will have to use block an EBC-like mode with similar issues. Otherwise a lossed frame loses much more.)

Comment - IF - you use 1-2 inhalers PER MONTH (???!!!_ (Score 1) 221

Lead researcher Dr Alex Wilkinson said: "The gases within these canisters are such powerful greenhouse gases that they can contribute significantly to an individual's carbon footprint and if you are using one or two of these inhalers every month, then that can really add up to hundreds of kilos of carbon dioxide equivalent over the course of a year, which is similar to other actions that people are keen to take to reduce their carbon footprint such as going vegetarian."

Emphasis added.

My inhaler has 200 doses when new, and I use around 10 doses a month? (2-3 a week, exercise induced asthma). To use an inhaler up inside a month suggests you're using it ~6-7 times per day, which seems completely insane. To use 1.5 inhalers up in a month would be 10 doses a day...

Anyone with that kind of asthema issue shouldn't be using standard Albuterol inhalers of the type being discussed, so either my experience is deeply non-typical, or the study authors have no relevant experience.... and I can't be sure which.

Books

Book Review: Digital Archaeology: the Art and Science of Digital Forensics 14

benrothke writes "The book Digital Archaeology: The Art and Science of Digital Forensics starts as yet another text on the topic of digital forensics. But by the time you get to chapter 3, you can truly appreciate how much knowledge author Michael Graves imparts. Archaeology is defined as the study of human activity in the past, primarily through the recovery and analysis of the material culture and environmental data that they have left behind, which includes artifacts, architecture, biofacts and cultural landscapes. The author uses archeology and its associated metaphors as a pervasive theme throughout the book. While most archeology projects require shovels and pickaxes; digital archeology requires an entirely different set of tools and technologies. The materials are not in the ground, rather on hard drives, SD cards, smartphones and other types of digital media." Keep reading for the rest of Ben's review.

Comment Re:I'm amazed... (Score 1) 1737

Which may be why Zimmerman's defense didn't invoke SYG.

IMHO, there was not proof beyond a reasonable double that Zimmerman was on top. It's quite possible he was on the bottom, and was legitimately scared for his life. From what I know from the trial, I don't think I'd have convicted either.

On the other hand, from what I know from the trial, I also wouldn't have convicted TM if TM had managed to kill Zimmerman. It's a crappy situation for everyone.

Comment Re:Silver Bullet (Score 1) 172

You're assuming that the drive failures are independent. His point is that they might not be: the common cause may be write cycles.

Let's say that a drive under your write patterns will last 9 months. (Bad wear leveling algo, combined with very re-write heavy data structures?). You put 5 of them in a raid 5 enclosure, all brand new drives. 9 months later, they all fail within minutes of each other. Whoops, lost your data.

If they fail for different reasons, you're more likely to be safe. If they all fail from wearing out the ability to erase cells, you're more likely to be hosed, until you've swapped out enough to randomize the write count./p?

Comment Re:Virtual books are retarded. (Score 4, Insightful) 108

You posted this in reply to an O'Reilly promotion. You know, the one company who's ebook format is "unencrypted PDF". That one. The one company that CAN NOT take your book away. Where the book won't change unless you want it to. Where you can keep it on your own HD for as long as you can and no one will even know.

That company.

Comment Re:I think that's all college students (Score 1) 823

"Did you put the disk in the DVD drive?"

Excuse me for being a horrible pedant, but I would also get confused if you told me to put a disk into the DVD drive. That drive takes discs... the ones that are visibly circular and have no case.

Ahem. Back to your point, and sorry for making the point of the original article.

Comment Mine went Read-Only (Score 1) 510

I had a small OCZ SSD of some variety in my foo-server (which mounted the NAS for all the important changing data). One day I realized that / had gone ready-only days earlier. Console showed a write failure to the journal (ext3).

Rebooted it, and it worked for ~1 day. Reformatted (managed system, I have no idea if there was data corruption. Didn't seem to be any, but I didn't look for any) and it worked for around 1 week. At that point I gave up and replaced it. It had lasted for just over a year when it failed.

The two Intel SSDs I've bought have not failed yet, nor has another OCZ brand SSD (Vertex3, fwiw).

Comment Re:Mod parent up. (Score 1) 1154

I wrote an interface to OSS back in ... 98? Something like that. It was dead simple to use: configure device, write sound data. Done.

Handling underflow/overflow was also so easy (write ahead as much as the device will take. Use an IOCTL when you need to stop... because the buffer won't run out for several seconds) that it amazes me that buffer sizes apparently have to be configurable in current sound-using applications. Crazy.

Slashdot Top Deals

A meeting is an event at which the minutes are kept and the hours are lost.

Working...