Proverbs, aphorisms, quotations (English) | by Linux fortune |
Suspicious pointer corrupted virtual machine | |
=== ALL USERS PLEASE NOTE ======================== The garbage collector now works. In addition a new, experimental garbage collection algorithm has been installed. With SI:%DSK-GC-QLX-BITS set to 17, (NOT the default) the old garbage collection algorithm remains in force; when virtual storage is filled, the machine cold boots itself. With SI:%DSK-GC- QLX-BITS set to 23, the new garbage collector is enabled. Unlike most garbage collectors, the new gc starts its mark phase from the mind of the user, rather than from the obarray. This allows the garbage collection of significantly more Qs. As the garbage collector runs, it may ask you something like "Do you remember what SI:RDTBL-TRANS does?", and if you can't give a reasonable answer in thirty seconds, the symbol becomes a candidate for GCing. The variable SI:%GC-QLX-LUSER-TM governs how long the GC waits before timing out the user. | |
Overall, the philosophy is to attack the availability problem from two complementary directions: to reduce the number of software errors through rigorous testing of running systems, and to reduce the effect of the remaining errors by providing for recovery from them. An interesting footnote to this design is that now a system failure can usually be considered to be the result of two program errors: the first, in the program that started the problem; the second, in the recovery routine that could not protect the system. -- A.L. Scherr, "Functional Structure of IBM Virtual Storage Operating Systems, Part II: OS/VS-2 Concepts and Philosophies," IBM Systems Journal, Vol. 12, No. 4. | |
Real software engineers don't like the idea of some inexplicable and greasy hardware several aisles away that may stop working at any moment. They have a great distrust of hardware people, and wish that systems could be virtual at *___all* levels. They would like personal computers (you know no one's going to trip over something and kill your DFA in mid-transit), except that they need 8 megabytes to run their Correctness Verification Aid packages. | |
Thrashing is just virtual crashing. | |
Unix gives you just enough rope to hang yourself -- and then a couple of more feet, just to be sure. -- Eric Allman ... We make rope. -- Rob Gingell on Sun Microsystem's new virtual memory. | |
"Virtual" means never knowing where your next byte is coming from. | |
Overall, the philosophy is to attack the availability problem from two complementary directions: to reduce the number of software errors through rigorous testing of running systems, and to reduce the effect of the remaining errors by providing for recovery from them. An interesting footnote to this design is that now a system failure can usually be considered to be the result of two program errors: the first, in the program that started the problem; the second, in the recovery routine that could not protect the system. -- A. L. Scherr, "Functional Structure of IBM Virtual Storage Operating Systems, Part II: OS/VS-2 Concepts and Philosophies," IBM Systems Journal, Vol. 12, No. 4, 1973, pp. 382-400 | |
"The net result is a system that is not only binary compatible with 4.3 BSD, but is even bug for bug compatible in almost all features." -- Avadit Tevanian, Jr., "Architecture-Independent Virtual Memory Management for Parallel and Distributed Environments: The Mach Approach" | |
transparent, adj.: Being or pertaining to an existing, nontangible object. "It's there, but you can't see it" -- IBM System/360 announcement, 1964. virtual, adj.: Being or pertaining to a tangible, nonexistent object. "I can see it, but it's not there." -- Lady Macbeth. | |
Humorix Holiday Gift Idea #9 Dial-A-Detective $499.95/year; 1-888-BYE-SPAM This detective firm is not what you'd expect. Instead of tracking murderers or unfaithful husbands, this band of rogue private investigators goes after something just as sinister -- spammers. For a modest annual retainer fee, these spam detectives will track down the source of every piece of spam you receive. Using the latest in forensic technology, they will bring you the virtual scalp of the spammer -- their name, home address, social-security number, and, more importantly, credit card numbers. At this point you are free to pursue the evil spammer as you see fit. If your friend or relative is sick of receiving wave after wave of "Find Out Anything About Anyone" spams, give them a subscription to Dial-A-Detective, and they'll find out anything about any spammer -- for real. | |
New Linux Companies Hope To Get Rich Quick (#1) Adopt-A-Beowulf: the latest company to hop the Linux bandwagon as it tramples down Wall Street. Every geek dreams of owning their own Beowulf supercomputer. Very few people (except for dotcom billionnaires) can afford to build one, but the folks at Adopt-a-Beowulf can provide the next best thing: a virtual beowulf. For US$49.95, you can "adopt" your own 256-node Beowulf cluster. You won't own it, or even get to see it in person, but you will receive photos of the cluster, a monthly newsletter about its operation, and a limited shell account on it. The company hopes to branch out into other fields. Some slated products include Adopt-A-Penguin, Lease-A-Camel (for Perl mongers), and Adopt-A-Distro (in which your name will be used as the code-name for a beta release of a major Linux distribution or other Open Source project). | |
Affordable Virtual Beowulf Cluster Every nerd drools over Beowulf clusters, but very few have even seen one, much less own one. Until now, that is. Eric Gylgen, the open source hacker famous for EviL (the dancing ASCII paperclip add-on to vi), is working on a program that will emulate Beowulf clusters on a standard desktop PC. "Of course," he added candidly, "the performance of my virtual cluster will be many orders of magnitude less than a real cluster, but that's not really the point. I just want to be able to brag that I run a 256 node cluster. Nobody has to know I only spent $500 on the hardware it uses." Eric has prior experience in this field. Last month he successfully built a real 32 node Beowulf cluster out of Palm Pilots, old TI-8x graphing calculators, various digital cameras, and even some TRS-80s. He demonstrated a pre-alpha version of his VirtualEpicPoem software to us yesterday. His Athlon machine emulated a 256 node Beowulf cluster in which each node, running Linux, was emulating its own 16 node cluster in which each node, running Bochs, was emulating VMWare to emulate Linux running old Amiga software. The system was extremely slow, but it worked. | |
* lilo hereby declares OPN a virtual pain in the ass :) | |
* cesarb wonders if in less than a week Carmack will end up receiving in e-mail a courtesy copy of a version of the Quake source which is four times faster than what went out of his virtual hands... |