DEEn Dictionary De - En
DeEs De - Es
DePt De - Pt
 Vocabulary trainer

Spec. subjects Grammar Abbreviations Random search Preferences
Search in Sprachauswahl
virtual
Search for:
Mini search box
 
Proverbs, aphorisms, quotations (English) by Linux fortune

Suspicious pointer corrupted virtual machine
===  ALL USERS PLEASE NOTE  ========================

The garbage collector now works.  In addition a new, experimental garbage
collection algorithm has been installed.  With SI:%DSK-GC-QLX-BITS set to 17,
(NOT the default) the old garbage collection algorithm remains in force; when
virtual storage is filled, the machine cold boots itself.  With SI:%DSK-GC-
QLX-BITS set to 23, the new garbage collector is enabled.  Unlike most garbage
collectors, the new gc starts its mark phase from the mind of the user, rather
than from the obarray.  This allows the garbage collection of significantly
more Qs.  As the garbage collector runs, it may ask you something like "Do you
remember what SI:RDTBL-TRANS does?", and if you can't give a reasonable answer
in thirty seconds, the symbol becomes a candidate for GCing.  The variable
SI:%GC-QLX-LUSER-TM governs how long the GC waits before timing out the user.
Overall, the philosophy is to attack the availability problem from two
complementary directions:  to reduce the number of software errors through
rigorous testing of running systems, and to reduce the effect of the remaining
errors by providing for recovery from them.  An interesting footnote to this
design is that now a system failure can usually be considered to be the
result of two program errors:  the first, in the program that started the
problem; the second, in the recovery routine that could not protect the
system.
                -- A.L. Scherr, "Functional Structure of IBM Virtual Storage
                   Operating Systems, Part II: OS/VS-2 Concepts and
                   Philosophies," IBM Systems Journal, Vol. 12, No. 4.
Real software engineers don't like the idea of some inexplicable and
greasy hardware several aisles away that may stop working at any
moment.  They have a great distrust of hardware people, and wish that
systems could be virtual at *___all* levels.  They would like personal
computers (you know no one's going to trip over something and kill your
DFA in mid-transit), except that they need 8 megabytes to run their
Correctness Verification Aid packages.
Thrashing is just virtual crashing.
Unix gives you just enough rope to hang yourself -- and then a couple
of more feet, just to be sure.
                -- Eric Allman

... We make rope.
                -- Rob Gingell on Sun Microsystem's new virtual memory.
"Virtual" means never knowing where your next byte is coming from.
Overall, the philosophy is to attack the availability problem from two
complementary directions:  to reduce the number of software errors through
rigorous testing of running systems, and to reduce the effect of the
remaining errors by providing for recovery from them.  An interesting footnote
to this design is that now a system failure can usually be considered to be
the result of two program errors:  the first, in the program that started the
problem; the second, in the recovery routine that could not protect the
system.  -- A. L. Scherr, "Functional Structure of IBM Virtual Storage Operating
Systems, Part II: OS/VS-2 Concepts and Philosophies," IBM Systems Journal,
Vol. 12, No. 4, 1973, pp. 382-400
"The net result is a system that is not only binary compatible with 4.3 BSD,
but is even bug for bug compatible in almost all features."
-- Avadit Tevanian, Jr., "Architecture-Independent Virtual Memory Management
   for Parallel and Distributed Environments:  The Mach Approach"
transparent, adj.:
        Being or pertaining to an existing, nontangible object.
        "It's there, but you can't see it"
                -- IBM System/360 announcement, 1964.

virtual, adj.:
        Being or pertaining to a tangible, nonexistent object.
        "I can see it, but it's not there."
                -- Lady Macbeth.
Humorix Holiday Gift Idea #9

Dial-A-Detective
$499.95/year; 1-888-BYE-SPAM

This detective firm is not what you'd expect. Instead of tracking murderers or
unfaithful husbands, this band of rogue private investigators goes after
something just as sinister -- spammers. For a modest annual retainer fee,
these spam detectives will track down the source of every piece of spam you
receive.

Using the latest in forensic technology, they will bring you the virtual scalp
of the spammer -- their name, home address, social-security number, and, more
importantly, credit card numbers. At this point you are free to pursue the
evil spammer as you see fit.

If your friend or relative is sick of receiving wave after wave of "Find Out
Anything About Anyone" spams, give them a subscription to Dial-A-Detective,
and they'll find out anything about any spammer -- for real.
New Linux Companies Hope To Get Rich Quick (#1)

Adopt-A-Beowulf: the latest company to hop the Linux bandwagon
as it tramples down Wall Street.

Every geek dreams of owning their own Beowulf supercomputer. Very few
people (except for dotcom billionnaires) can afford to build one, but the
folks at Adopt-a-Beowulf can provide the next best thing: a virtual
beowulf. For US$49.95, you can "adopt" your own 256-node Beowulf cluster.
You won't own it, or even get to see it in person, but you will receive
photos of the cluster, a monthly newsletter about its operation, and a
limited shell account on it.

The company hopes to branch out into other fields. Some slated products
include Adopt-A-Penguin, Lease-A-Camel (for Perl mongers), and
Adopt-A-Distro (in which your name will be used as the code-name for a
beta release of a major Linux distribution or other Open Source project).
Affordable Virtual Beowulf Cluster

Every nerd drools over Beowulf clusters, but very few have even seen one,
much less own one. Until now, that is. Eric Gylgen, the open source hacker
famous for EviL (the dancing ASCII paperclip add-on to vi), is working on
a program that will emulate Beowulf clusters on a standard desktop PC.

"Of course," he added candidly, "the performance of my virtual cluster
will be many orders of magnitude less than a real cluster, but that's not
really the point. I just want to be able to brag that I run a 256 node
cluster. Nobody has to know I only spent $500 on the hardware it uses."

Eric has prior experience in this field. Last month he successfully built
a real 32 node Beowulf cluster out of Palm Pilots, old TI-8x graphing
calculators, various digital cameras, and even some TRS-80s.

He demonstrated a pre-alpha version of his VirtualEpicPoem software to us
yesterday. His Athlon machine emulated a 256 node Beowulf cluster in which
each node, running Linux, was emulating its own 16 node cluster in which
each node, running Bochs, was emulating VMWare to emulate Linux running
old Amiga software. The system was extremely slow, but it worked.
* lilo hereby declares OPN a virtual pain in the ass :)
* cesarb wonders if in less than a week Carmack will end up receiving in
  e-mail a courtesy copy of a version of the Quake source which is four
  times faster than what went out of his virtual hands...
No guarantee of accuracy or completeness!
©TU Chemnitz, 2006-2024
Your feedback:
Ad partners