Search:

Type: Posts; User: Zan Lynx; Keyword(s):

Page 1 of 2 1 2

Search: Search took 0.13 seconds.

  1. Yes. And even if someone wants to use socket...

    Yes.

    And even if someone wants to use socket activation or the notify calls, those can be implemented without systemd libraries. You can take their code (its a single .c file) and drop it into...
  2. The point is that you have the ABILITY to use...

    The point is that you have the ABILITY to use better methods and the hacks are smaller. The hacks are now restricted to detecting startup.

    You can get rid of all the old hacks to detect service...
  3. You seem to be asking systemd to fix "unreliable...

    You seem to be asking systemd to fix "unreliable mechanisms like PID files" without changing anything. "Fix it without changing anything" is never going to work.

    systemd DID fix it, but had to add...
  4. You can easily hack in fixes if you have...

    You can easily hack in fixes if you have problems. In my opinion none of these are the RIGHT way to fix things but you can make them work.

    Use a ExecStartPost=/bin/sleep 3

    Or...
  5. When I ran Gentoo on my laptop in 2008 I ran with...

    When I ran Gentoo on my laptop in 2008 I ran with a custom monolithic kernel. I used one of those scripts to detect your hardware and set the kernel config to start with, then I customized it from...
  6. Everything in /proc is required to be documented....

    Everything in /proc is required to be documented. /sys/kernel/debug can have undocumented stuff.

    It isn't that difficult or even very slow to parse the files.

    From a developer point of view it...
  7. LTO in GCC is supported just as well as anything...

    LTO in GCC is supported just as well as anything else. Or do you consider code such as the automatic vectorization optimizer or hidden symbol support "rudely patched in?"

    It takes some time for...
  8. You could check out the Razor designs. They look...

    You could check out the Razor designs. They look a little Appley but that's just because they are thin. The keyboard and control design is unique.

    Alienware laptops have a sort of unique look as...
  9. Replies
    50
    Views
    10,894

    That was an example and yes, the anti-spam...

    That was an example and yes, the anti-spam library is fictional. The real library does something else.
  10. Replies
    50
    Views
    10,894

    Did anybody claim that? But pick a less...

    Did anybody claim that?

    But pick a less obsolete example like MIPS. (And yes, I know LLVM supports MIPS.) You write something like a nifty library to detect spam in emails and you target i386. It...
  11. Replies
    50
    Views
    10,894

    Some people seem to think that if software is...

    Some people seem to think that if software is more than a few years old and works, then it must be a relic, legacy, ancient boring stuff that must be replaced.

    This results in Perl being replaced...
  12. I run Linux at work for software development and...

    I run Linux at work for software development and Windows at home, mostly for the games. But when I browse Phoronix from home, it will show up as a Windows browser.
  13. The data may end up in a new block on a SSD, but...

    The data may end up in a new block on a SSD, but the logical address of that data would be in the same place the old data was. So your filesystem would have no way of knowing it was a copy and no way...
  14. I don't think that you have actually used LLVM? ...

    I don't think that you have actually used LLVM?

    Sure, it can be used in the way that you describe. But it can equally be used with the next stage, which is to compile to machine code. This is how...
  15. Replies
    10
    Views
    2,338

    Back in 2003 there was a patch to the Linux...

    Back in 2003 there was a patch to the Linux kernel iptables that allowed the use of two or more interfaces for IP masquerade. It did round robin and failover, just as you want.

    A new connection...
  16. Ah, another reason to do it. I didn't know about...

    Ah, another reason to do it. I didn't know about that one.

    Just a second, I'll edit my post so I don't look so dumb. :-)
  17. That's a fairly common configuration on forum...

    That's a fairly common configuration on forum software. It's so the author can fix obvious typos but not rewrite his post after people have responded to it.

    For example, a troll could write a post...
  18. For extra fun try to build it with profile guided...

    For extra fun try to build it with profile guided optimization. Or did you already?
  19. Replies
    123
    Views
    16,176

    Yes. It was the "not possible" statement that...

    Yes. It was the "not possible" statement that really made me respond. I wanted to make the point that it is possible to install a newer glibc on RHEL 6.
  20. Replies
    123
    Views
    16,176

    I haven't tried it on RHEL 6 but I did similar...

    I haven't tried it on RHEL 6 but I did similar surgery on old RedHat Advanced Server 2.1 systems. So I would take a RPM source package for glibc 2.15 and the current glibc 2.12 and look at the...
Results 1 to 20 of 39
Page 1 of 2 1 2