Re: Verizon (FiOS) (Off Topic?) I have it!
On Wednesday 18 January 2006 10:33, Jon maddog Hall wrote: ... So if you want to download music, etc. you can get the lower-cost DSL service. But if you want to run a business and have a web server...you pay. Just a guess, but an educated one. md Just got set up with Fios, and I did call and grill them on the very point of the prohibition of running any server. I've got an interesting reaction. The person at Verizon Fios emphasized that what they meant is installing and running a server class computer at your home. I grilled her specifically about running a website off of a *workstation*, and she indicated to me that that would be perfectly OK, along with FTP, P2P, or anything else us geeks hold so dear. So it seems to me that Bill is somewhat correct in stating that they simply don't want you becoming the next eBay or whatever. They don't want YOU, the consumer or residential guy becoming Ev1 or RackSpace on their lines. Well, I do have some intentions of doing something similar. So I also inquired about sitting up a SONET ring, etc. off of that connection, and this is where the lights started going out with the person I spoke with. Basically I was told such things are *probably* possible, but would be much more expensive, and that I would need to talk to a different department. Well yeah, I could've guess it would be much more expensive. Duh. I just wanted ballpark dollar amount so I could see if it would fit in with my current operations. She could not give me that. They have a few tiers of business class service, where you can get a static IP address and somewhat higher bandwidth, though it remains asymmetric. Best you can do it seems is a 30mbit down/ 5mbit up. Be that as it may, I am simply floored that Verizon was able to solve the last mile problem at all. They installed fibre right up to a box in my basement which converts the telephone and Internet connection to whatever needs to go across that fabric. They also went to great lengths with running CAT5 to my home office, fishing the cable through walls, and the like -- all for free. Also to my delight they took down the ugly mess of wires I had accumulated over the years with past frame-relay, ISDN, DSL, and multiple POTS phone lines running from the utility pole to my house. They were very professional and courteous and got the job *done*. A new leaf for Verizon service, considering what I experienced with them in the past. It was even more to my delight to see that the Fios is *much faster* than my Comcast broadband connection. I will be happy to cut ties with Comcast completely once I am confident the Fios stuff is stable. Comcast gave me hell recently about having port 80 open on my line (I was running a test web server and left it open) as well as spooking me out about knowing I was running multiple ssh connections *on a different port other than 22* and some other things as well. What, they were monitoring my connection and sniffing my packets? I am *so glad* my email goes out encrypted across an ssl connection between my workstations and my dedicated servers. Those clowns would probably be reading my email otherwise. Everything I do beyond web browsing goes out encrypted, even my NNTP newsgroup activities. Not that I am doing anything untoward; it is just that I don't want anyone other than the intended recipients reading my stuff! And since some of it is of a political nature, I remain especially concerned. Just because I may be paranoid does not mean they are not out to get me!!! Of course, I could set up a VPN and even my web browsing will be covered as well. Hmmm Not that I trust Verizon anymore than I do Comcast, but Comcast went out of their way to bother me about specific ports, forcing me to close them or else loose service. Since my Internet service *is* my bread and butter these days, I don't do well with threats like that. Verizon categorically stated they would not have any problems with such. Also, Verizon Fios will be costing me considerably less than Comcast. Comcast forces you to also have cable service which I have no interest in -- bloody nothing worth watching anymore, and the few times I do see something worth watching does not justify the cost. Besides I can download them with BitTorrent if I must. Fios will be much cheaper, is much faster, and much more permissive in how you use the service despite the boiler plate language in their service contract. I am told by the technicians who installed the Fios that I am the 2nd person in my local neighborhood to have it, and apparently the first one on the block, or street in my case. So I may be a bit smug about it. ;-) Oh, and about the OS support: There is a registration process that requires IE on Windows, and apparently this is to set up your Verizon email and some other Internet services with Verizon that I have no interest in. Since I run Linux on my workstation and forbid
Re: HB1197 Public Meeting
On Monday 23 January 2006 15:29, Bill Sconce wrote: On Thu, 19 Jan 2006 17:51:23 -0500 Bill Sconce [EMAIL PROTECTED] wrote: Here's what I've found out so far. I spoke with Representative Cataldo, one of the bill's sponsors. Indeed, the meetings are public. Often the chairman will make a specific invitation for members of the public to offer comments. The sponsors of the bill are evidently not its authors. The author is one Seth Cohen (who Rep. Cataldo believes runs a consulting firm in Concord - Google didn't yield anything for me on that). Both Rep. Cataldo and Seth Cohen are likely to be at the meeting tomorrow. I know Seth. Great guy. Yes, he does do consulting in Concord, and also is an affiliate for Godaddy: https://www.securepaynet.net/gdshop/rhp/default.asp?prog_id=gnuhampshireci=1767isc=wwpdomain; Where 10% of his profits goes to Liberty and Freedom related causes in NH. He is also helping out me some others and I on a legal research project. -Fred ___ gnhlug-discuss mailing list gnhlug-discuss@mail.gnhlug.org http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss
Re: HB1197 Public Meeting
On Thursday 19 January 2006 12:18, Christopher Schmidt wrote: A bit more information: ... According to Rep. Allan, the committee has thus far been favorable towards the use of open source, but wants to ensure that there is a plan in place beyond Fix it yourself in the situation that there is a problem. I expect that this is the kind of thing where Redhat and the like come into play: You're paying them annual contract fees to ensure that if you do have problems, they get fixed. This is, at least in my experience, different than the Windows experience where you are paying for license fees up front and no continuing support fees. Anyway, I plan on attending, more out of interest than anything else. I wish I could go, but have other plans. Good luck. And you might want to make it clear that there are *plenty* of us Linux geeks out here that can help them should they run into any problems. Obviously you want to use better language than geeks with this crowd. Seth will be driving this aspect and will do a good job. Enjoy. -Fred ___ gnhlug-discuss mailing list gnhlug-discuss@mail.gnhlug.org http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss
Database question
This question specifically deals with PostrgreSQL and other SQL-compliant databases. I say this, because the question deals with foreign keys and constraints, which I'm pretty sure MySQL doesn't deal with properly, if at all. I have the following table, which most other tables reference: hosts=# \d machines Table public.machines Column | Type | Modifiers --+--+- id| integer | not null default nextval('ids'::text) itemtag | text| not null model | integer | not null location | integer | not null monitor_temp | boolean | not null serial_number | character varying(64) | Indexes: machines_pkey PRIMARY KEY, btree (id) machines_itemtag_key UNIQUE, btree (itemtag) Foreign-key constraints: machines_model_fkey FOREIGN KEY (model) REFERENCES machine_models(id) machines_location_fkey FOREIGN KEY (location) REFERENCES locations(id) And this table: hosts=# \d classes Table public.classes Column | Type | Modifiers --++- id| integer| not null class | text | not null Indexes: classes_pkey PRIMARY KEY, btree (id) I want to create a table which has the following: hosts=# \d class_members Table public.class_members Column | Type | Modifiers --++- id| integer| not null member| text | not null Indexes: classes_members_id_pkey PRIMARY KEY, btree (id) However, I want to restrict the member column by restricting the data in it to also exist *either* in machines.id *OR* in classes.id. The reason for this is that a class member can either be a machine or another class (think netgroups here). Does anyone know how to do this, or if it's even possible? I suppose one solution is to just not have nested classes and explicitly list each machine that's a member of any given class as such, but, well, that's not overly elegant :) Thanks for any insight. -- Seeya, Paul ___ gnhlug-discuss mailing list gnhlug-discuss@mail.gnhlug.org http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss
Re: Verizon (FiOS) (Off Topic?) I have it!
On 1/24/06, Fred [EMAIL PROTECTED] wrote:Stuff deleted. Be that as it may, I am simply floored that Verizon was able to solve thelast mile problem at all. They installed fibre right up to a box in mybasement which converts the telephone and Internet connection to whatever needs to go across that fabric. They also went to great lengths with runningCAT5 to my home office, fishing the cable through walls, and the like -- allfor free.You'll notice that Speakeasy, etc will *never* be over that Fios line. It's not subject to the telecom law that the telephone network is. So they don't have to share it. Just like the cable companies. That's why they did it. -- A strong conviction that something must be done is the parent of many bad measures.- Daniel Webster
Re: Verizon (FiOS) (Off Topic?) I have it!
You'll notice that Speakeasy, etc will *never* be over that Fios line. It's not subject to the telecom law that the telephone network is. So they don't have to share it. Just like the cable companies. That's why they did it. But the cable companies allow Earthlink over cable (that's what I have for service). So just because they're not forced to, doesn't mean they won't. ___ gnhlug-discuss mailing list gnhlug-discuss@mail.gnhlug.org http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss
Re: Blogging software
On Monday 16 January 2006 09:01, Cole Tuininga wrote: Hi all, I'm looking for another software suggestion. ... - Web based (no having to ssh in to update a blog entry or anything) - Simple to use - Lightweight (not looking for a *nuke type application) - Usable by low bandwidth connections Any suggestions? Check out Drupal: http://drupal.org/ This is hardly lightweight, but it is web-based, highly configurable, and runs on PHP4/5. I am currently in the process of integrating it with my operation. Has nice collaborative features and extensive user permission control. I am intending to use this to eliminate my clients' need to use Dreamweaver or Front Page to manage their websites. Check it out -- maybe it will fit your needs. If not, it's worth knowing about. Pretty straightforward to set up, and should work well with low bandwidth situations. -Fred ___ gnhlug-discuss mailing list gnhlug-discuss@mail.gnhlug.org http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss
Re: Blogging software
On Tue, Jan 24, 2006 at 09:04:49AM -0500, Fred wrote: On Monday 16 January 2006 09:01, Cole Tuininga wrote: Hi all, I'm looking for another software suggestion. ... - Web based (no having to ssh in to update a blog entry or anything) - Simple to use - Lightweight (not looking for a *nuke type application) - Usable by low bandwidth connections Any suggestions? Check out Drupal: One thing that you should keep in mind with both Drupal and Wordpress is that they require an arcane level of knowledge of their internals in order to get anything done codewise. Don't expect to open either of them up and hack in them without spending a decent amount of time figuring out how they work. Drupal takes the take everything out, make it all work via hooks method, whereas Wordpress takes the We don't care about the readability or usability of the code: just make it work tack. Neither of them work that well for creating easy-to-hack code, imho. -- Christopher Schmidt Web Developer ___ gnhlug-discuss mailing list gnhlug-discuss@mail.gnhlug.org http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss
Re: Verizon (FiOS) (Off Topic?) I have it!
On 1/24/06, Travis Roy [EMAIL PROTECTED] wrote: You'll notice that Speakeasy, etc will *never* be over that Fios line. It's not subject to the telecom law that the telephone network is.So they don't have to share it.Just like the cable companies.That's why they did it.But the cable companies allow Earthlink over cable (that's what I havefor service).Yes they do. But I bet you're subject to all of Comcast's restrictions and terms. Verizon DSL offers subscribers Yahoo!. Not the free stuff, but the paid stuff. I assume it's to transition out of the email/newsgroup/etc business.It's very different from DSL via Speakeasy, mv.com, etc where you have different terms and restrictions from Verizon DSL. So just because they're not forced to, doesn't mean they won't.-- A strong conviction that something must be done is the parent of many bad measures.- Daniel Webster
Re: Open Source vs. Closed Source
On Saturday 14 January 2006 16:33, Christopher Schmidt wrote: On Sat, Jan 14, 2006 at 03:39:41PM -0500, Bruce Dawson wrote: ... A lot of software for PDA's is a pain to build and download to the device. I'm willing to pay for a service/product that gives me that convenience (and the original source). Not an option in this case, since the source code can be shipped over to the phone and run just as easily: if you have a .py (which is the heart of this code), you can send it to the phone, and opening the message in which its recieved automatically installs it as a program choice in the Python interpreter (where all the Python apps run). So, although that would be a good idea, it's not one that I can follow up on in this situation. The other languages that run on the phone -- Java and C++ -- would allow this to be an option, but both make coding much more difficult, and it's way out of my realm of possibilities for this reason :) I don't know either Java or C++, and the idea of doing bluetooth socket programming in either scares me. I know Java, C++, and Python (and a score of other languages to boot), but I would prefer using only one language and API that would work across *all* PDAs. Python is very appealing, but is there a consistent API to work on Palm, Blackberry, and (ugh) Windows CE-based PDAs? And while we are on the subject -- some PDA smart phones come equipped with their own GPS chip, but it seems this is never made use of by mapping software, forcing one to buy a separate GPS device anyway. Is there a way to access the built-in GPS chip for application use? Or are the manufactures deliberately closing off or restricting access to it? Yes, I would prefer not to have to drop another $500 or so for a separate GPS device and the associated software. Besides, kinda bulky to have to carry all that mess around everywhere, and defeats my push to have *one* device do everything. Still loving my Treo 650. -Fred ___ gnhlug-discuss mailing list gnhlug-discuss@mail.gnhlug.org http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss
Re: Verizon (FiOS) (Off Topic?) I have it!
On 1/24/06, Fred [EMAIL PROTECTED] wrote: Just got set up with Fios ... First, thank you for posting that. The technical details were very interesting, and the commentary on what Verizon said, and the on-site service they delivered, were equally so. I'm frankly amazed to hear Verizon delivering such good service. Next, I'm going to respond to a few of your statements that all ultimately fall under the category heading of Information Assurance -- what most people mean when they say security. There may be some mildly harsh words ahead. Don't take it too personally; I'm trying to offer an honest critique. The person at Verizon Fios emphasized that what they meant is installing and running a server class computer at your home. I grilled her specifically about running a website off of a *workstation*, and she indicated to me that that would be perfectly OK, along with FTP, P2P, or anything else us geeks hold so dear. I've been told all sorts of things by all manner of sales reps over the years. I'm sure you have, too. Then when push comes to shove, they say, I'm sorry, sir, the representative you were speaking to was mistaken. Verbal assurances are not worth the paper they're written on. You repeatedly state your Internet feed is of a critical nature. If you really mean that, I suggest obtaining a written SLA (Service Level Agreement) guaranteeing what you need. I'd be willing to bet Verizon will refuse to provide such. Point being: Big nasty evil ugly companies like Verizon are notorious for pulling the rug out from under people. If you're willing to take their word for it when their written documents say otherwise, you may well end up deserving what you get. Comcast gave me hell recently about having port 80 open on my line (I was running a test web server and left it open) as well as spooking me out about knowing I was running multiple ssh connections *on a different port other than 22* and some other things as well. What, they were monitoring my connection and sniffing my packets? More then likely, after they discovered an open listener for a well-known service they explicitly forbid. ISPs run sniffers all the time. This should not be a surprise. I am *so glad* my email goes out encrypted across an ssl connection between my workstations and my dedicated servers. Ummm yah. Email. Using encryption on the Internet is the equivalent of arranging an armored car to deliver credit card information from someone living in a cardboard box to someone living on a park bench. -- Gene spaf Spafford http://en.wikipedia.org/wiki/Security_theatre Besides I can download them with BitTorrent if I must. Given the current legal climate with the media cartel suing everyone they can find, you might want to think twice before posting about downloading pirated content in a public forum such as this one. (But hey, at least the connection to your mail relay was encrypted before you broadcasted it to the entire world.) There's paranoia, and then there is risk management. Paranoia is thinking everyone is out to get you, and responding erratically in ways that don't really help.Risk management is thinking everyone is out to get you, and taking appropriate countermeasures to defend against identified threats. It appears you are doing more of the former then the latter. -- Ben Yah, I'm an asshole Scott ___ gnhlug-discuss mailing list gnhlug-discuss@mail.gnhlug.org http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss
Re: Verizon (FiOS) (Off Topic?) I have it!
The person at Verizon Fios emphasized that what they meant is installing and running a server class computer at your home. I grilled her specifically about running a website off of a *workstation*, and she indicated to me that that would be perfectly OK, along with FTP, P2P, or anything else us geeks hold so dear. I have a friend with FIOS, he runs a webserver on his box at home, he had to move it to port 8080 because port 80 was blocked. This wasn't much of a problem, but just an FYI. He was told the business class had no such blocking. Also, Verizon Fios will be costing me considerably less than Comcast. Comcast forces you to also have cable service which I have no interest in -- bloody nothing worth watching anymore, and the few times I do see something worth watching does not justify the cost. Besides I can download them with BitTorrent if I must. Fios will be much cheaper, is much faster, and much more permissive in how you use the service despite the boiler plate language in their service contract. Comcast does not -force- you to get cable server. I can get Comcast internet without TV service, but they charge you a little extra. It actually works out cheaper to get the very basic local only stations and internet, then to get internet alone. That is far from forcing you however. And remember, Comcast (back in the cays of MediaOne) was much more permissive, nearly everybody I knew ran a full blown web/mail/ftp server on their box via their cable internet connection. Since they also say that they won't block anything on the business class line, expect stuff to be blocked on the consumer lines very soon. ___ gnhlug-discuss mailing list gnhlug-discuss@mail.gnhlug.org http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss
Cell phone built in GPS - not (Was: Open Source vs. Closed Source)
Fred writes: And while we are on the subject -- some PDA smart phones come equipped with their own GPS chip, but it seems this is never made use of by mapping software, forcing one to buy a separate GPS device anyway. Is there a way to access the built-in GPS chip for application use? Or are the manufactures deliberately closing off or restricting access to it? Just one data point from a conversation with a Verizon tech: Some of what gets called GPS isn't. This is all because of the E-911 stuff where the cell providers must pass along you location. Most carriers don't actually use GPS for this, but do clever triangulation (not really that either) from multiple cell towers. It seems that the phone has to do a couple of extra tricks for this to work well, so some older phones don't have the capability. These carriers (at least Verizon the last time that I replaced a phone) calls this feature GPS in their marketing literature, rather than come up with a new name that they'd have to explain to the average customer. Bill ___ gnhlug-discuss mailing list gnhlug-discuss@mail.gnhlug.org http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss
Re: Open Source vs. Closed Source
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Fred wrote: | |And while we are on the subject -- some PDA smart phones come equipped with |their own GPS chip, but it seems this is never made use of by mapping |software, forcing one to buy a separate GPS device anyway. Is there a way to |access the built-in GPS chip for application use? Or are the manufactures |deliberately closing off or restricting access to it? Its more like your wireless provider is blocking access to it. The information comes from the cell tower antennas, and is not really available to the phone. Plus the phone needs a lot of processing power, and most phones don't have a sufficiently accurate clock either. For those phones/PDAs that have a true GPS chip (instead of a WAIS differentiator(?)) then you can use it as a GPS, but I have found those phone seriously lacking in other ways (starting with programmability and ending with power consumption). - --Bruce -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.1 (GNU/Linux) Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org iD8DBQFD1kGh/TBScWXa5IgRAnevAKCQ1lIrZUWI+SMNV+NlYAujcRu6bwCfR93z lvNMhNGqWu/63OvFOAtnps8= =LBJg -END PGP SIGNATURE- ___ gnhlug-discuss mailing list gnhlug-discuss@mail.gnhlug.org http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss
Re: Open Source vs. Closed Source
On Tue, Jan 24, 2006 at 09:19:38AM -0500, Fred wrote: On Saturday 14 January 2006 16:33, Christopher Schmidt wrote: The other languages that run on the phone -- Java and C++ -- would allow this to be an option, but both make coding much more difficult, and it's way out of my realm of possibilities for this reason :) I don't know either Java or C++, and the idea of doing bluetooth socket programming in either scares me. I know Java, C++, and Python (and a score of other languages to boot), but I would prefer using only one language and API that would work across *all* PDAs. Python is very appealing, but is there a consistent API to work on Palm, Blackberry, and (ugh) Windows CE-based PDAs? There doesn't exist any existing language, API, or anything similar. However, Symbian's APIs will work across all the Symbian platform phones, and those are all the ones I care about. Java (MIDP?) is probably the closest you'll get to what you want, but what you want is nowhere near what I want: I want hacks that work on *my* phone, that I can share with other people. And while we are on the subject -- some PDA smart phones come equipped with their own GPS chip, but it seems this is never made use of by mapping software, forcing one to buy a separate GPS device anyway. Is there a way to access the built-in GPS chip for application use? Or are the manufactures deliberately closing off or restricting access to it? You've already got some responses on this, the basic summary of which is: There's no chip. Yes, I would prefer not to have to drop another $500 or so for a separate GPS device and the associated software. Besides, kinda bulky to have to carry all that mess around everywhere, and defeats my push to have *one* device do everything. Part of the reason I wrote this program is to kill the $500 myth: There are quite nice bluetooth GPSes available for sub-$100 (In the $70-$80 range at the moment) which is much more affordable. With a display hooked up to my cell phone (wirelessly, naturally) I don't need another display, and it also gives me the ability to hack in whatever I want to as far as a display goes, something that most GPS devices wouldn't let me do. I don't believe in one device doing everything, or even nearly everything: I don't leave the house without a backpack, which typically has: * 60GB iPod -- this is music, but also (one of) my remote backup(s) of my laptop. (This was a Christmas gift from my employer. Gotta love Silicon Valley.) * Canon Digital Rebel XT * Nokia 6600 * GPS Device * Sometimes my laptop All in all, if someone were to mug me, I'd be out about 3 grand in hardware if I was fully loaded. Makes carrying around cash seem like chump change. -- Christopher Schmidt Web Developer ___ gnhlug-discuss mailing list gnhlug-discuss@mail.gnhlug.org http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss
Re: Database question
However, I want to restrict the member column by restricting the data in it to also exist *either* in machines.id *OR* in classes.id. The reason for this is that a class member can either be a machine or another class (think netgroups here). Does anyone know how to do this, or if it's even possible? Triggers. The design is not relational so you cannot do this with foreign keys. Foreign keys enforce a column-to-column relationship. You can do this with a trigger that looks in the two places. Whenever you run into situations like this, it is always good to step-back, consider the overall design to see how you ended up in this situation, and see if a fully-relational design can be implemented. However, when you really need it this way, triggers are the way to go. --Ray -- Raymond Cote Appropriate Solutions, Inc. PO Box 458 ~ Peterborough, NH 03458-0458 Phone: 603.924.6079 ~ Fax: 603.924.8668 rgacote(at)AppropriateSolutions.com www.AppropriateSolutions.com ___ gnhlug-discuss mailing list gnhlug-discuss@mail.gnhlug.org http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss
Re: Verizon (FiOS) (Off Topic?) I have it!
On Tuesday, Jan 24th 2006 at 07:12 -0500, quoth Fred: =On Wednesday 18 January 2006 10:33, Jon maddog Hall wrote: =... = So if you want to download music, etc. you can get the lower-cost DSL = service. = = But if you want to run a business and have a web server...you pay. = = Just a guess, but an educated one. = = md = =Just got set up with Fios, and I did call and grill them on the very point of =the prohibition of running any server. = The idea that Verizon would allow you to run a low-volume server is highly intruiging to me. I am running with RCN and I really can't complain in the slightest. I get 11Mb/s plus they don't block me from anything. The catch is that the won't block outgoing port 25 and incoming port 80 unless you pay them an extra $20/month for static address service. Their static address is still allocated via DHCP but it gets tied to your MACADDR. But the address they give you is still from a DHCP pool so a number of larger providers require that you create a mailertable entry to route it through RCN's server. But it is intruiging. -- Time flies like the wind. Fruit flies like a banana. Stranger things have .0. happened but none stranger than this. Does your driver's license say Organ ..0 Donor?Black holes are where God divided by zero. Listen to me! We are all- 000 individuals! What if this weren't a hypothetical question? steveo at syslang.net ___ gnhlug-discuss mailing list gnhlug-discuss@mail.gnhlug.org http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss
Re: Blogging software
On Jan 24, 2006, at 09:13, Christopher Schmidt wrote: Neither of them work that well for creating easy-to-hack code, imho. I concur. I have Wordpress running now, but I have Typo installed (but not yet live), for the purposes of hacking (and it supports PostgreSQL natively). It's short on features compared with Wordpress but that's what hacking's for, after all. -Bill - Bill McGonigle, Owner Work: 603.448.4440 BFC Computing, LLC Home: 603.448.1668 [EMAIL PROTECTED] Cell: 603.252.2606 http://www.bfccomputing.com/Page: 603.442.1833 Blog: http://blog.bfccomputing.com/ VCard: http://bfccomputing.com/vcard/bill.vcf ___ gnhlug-discuss mailing list gnhlug-discuss@mail.gnhlug.org http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss
Re: Verizon (FiOS) (Off Topic?) I have it!
On Jan 24, 2006, at 09:23, Ben Scott wrote: Ummm yah. Email. Using encryption on the Internet is the equivalent of arranging an armored car to deliver credit card information from someone living in a cardboard box to someone living on a park bench. -- Gene spaf Spafford So, I routinely exchange mail with folks whose MTA's do opportunistic encryption (especially those who work for military contractors). Postfix makes this easy. So, if we both do IMAPS, and SMTPS, where's the cardboard box? And, great review, Fred! Wish it was in the cards for us. -Bill - Bill McGonigle, Owner Work: 603.448.4440 BFC Computing, LLC Home: 603.448.1668 [EMAIL PROTECTED] Cell: 603.252.2606 http://www.bfccomputing.com/Page: 603.442.1833 Blog: http://blog.bfccomputing.com/ VCard: http://bfccomputing.com/vcard/bill.vcf ___ gnhlug-discuss mailing list gnhlug-discuss@mail.gnhlug.org http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss
Re: Verizon (FiOS) (Off Topic?) I have it!
On Tue, Jan 24, 2006 at 10:51:54AM -0500, Bill McGonigle wrote: On Jan 24, 2006, at 09:23, Ben Scott wrote: Ummm yah. Email. Using encryption on the Internet is the equivalent of arranging an armored car to deliver credit card information from someone living in a cardboard box to someone living on a park bench. -- Gene spaf Spafford So, I routinely exchange mail with folks whose MTA's do opportunistic encryption (especially those who work for military contractors). Postfix makes this easy. So, if we both do IMAPS, and SMTPS, where's the cardboard box? Do they use Windows? Do they keep their systems up to date with the latest patches (Windows, Linux, or Mac?) There's a number of other points of entry once the data is on their hard drives. SMTPS and IMAPS are both still the armored car: the end destination is the cardboard box. -- Christopher Schmidt Web Developer ___ gnhlug-discuss mailing list gnhlug-discuss@mail.gnhlug.org http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss
Re: Database question
Dan Coutu [EMAIL PROTECTED] writes: hosts=# \d classes Table public.classes Column | Type | Modifiers --++- id| integer| not null class | text | not null Indexes: classes_pkey PRIMARY KEY, btree (id) Out of curiosity why don't you define the id column here the same way you did in the machines table with a default value. I *always* define primary keys like that, it saves so many headaches down the road. Because the table doesn't really exist yet and I edited too much from what I cut'n'pasted :) The intent is to have the id be defined similarly to that in the machines table. Let me ask this, why can't a machine be a special type of class? You could add a colum to the class table that indicates the class type and a class type of machine could then indicate a cross-reference into the machine table. If you do this then the class_members foreign key constraint becomes easy. You could then take this a bit further to allow a class to contain sub-classes, which might be useful too because you could then create groups of classes that could be manipulated all at once. If you go this route then it might become a good idea to break down the class table into two pieces, class and class_detail where class_detail might contain (but doesn't have to contain) a class id value, machine id value, or some other id value. If you structure the class_detail table such that individual column types are foreign keys to specific tables then you have full constraints checking enabled. The subclass idea sounds very interesting. I'm interested to see how this would work. So, I'd have instead of a single classes table, I'd have two tables, class and class_detail? I think I'm not following the logic here. Could you explain a little more, perhaps with some examples? Another possible approach might be to chuck the class_member table entirely and instead have multiple tables such as machine_class, class_class, etc. that map one table to the other (machine to class, class to class, and so forth.) This strikes me as more confusing and troublesome... -- Seeya, Paul ___ gnhlug-discuss mailing list gnhlug-discuss@mail.gnhlug.org http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss
Re: Database question
Ray Cote [EMAIL PROTECTED] writes: However, I want to restrict the member column by restricting the data in it to also exist *either* in machines.id *OR* in classes.id. The reason for this is that a class member can either be a machine or another class (think netgroups here). Does anyone know how to do this, or if it's even possible? Triggers. The design is not relational so you cannot do this with foreign keys. Foreign keys enforce a column-to-column relationship. You can do this with a trigger that looks in the two places. Whenever you run into situations like this, it is always good to step-back, consider the overall design to see how you ended up in this situation, and see if a fully-relational design can be implemented. However, when you really need it this way, triggers are the way to go. Heh, what got me here was trying to map the concept of netgroups, which is nested/hierarchical onto a relational construct :) Netgroups don't *have* to nested, so I could make this a purely relational, one-to-one design if I wanted to, simply by taking any current netgroup definition and fully expanding any nested group within it before dumping the data into the tables. That would surely solve the problem. However, when trying to re-generate the netgroup table from the database in the future, instead of having netgroup definitions like: bar (alpha,,) (beta,,) foo bar (baz,,) (bif,,) where netgroup foo includes netgroup bar and adds machines baz and bif, I'd have it explicitly defined as: bar (alpha,,) (beta,,) foo (alpha,,) (beta,,) (baz,,) (bif,,) In general, this is fine, but you lose the clarification that netgroup foo is a superset of bar. Sometimes this clarification is important, and I'd like to retain that if possible. Hmm, I think I'm getting what Dan was saying about splitting things up. I'll have think that idea through a little more carefully... Thanks, this is all very informative. -- Seeya, Paul ___ gnhlug-discuss mailing list gnhlug-discuss@mail.gnhlug.org http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss
Re: Verizon (FiOS) (Off Topic?) I have it!
So since it's not guaranteed to be 100% secure, there's no reason to bother at all. That's silly. Secure the parts you *can* secure easily, then move on to the next item on the list, and continue securing. Are you 100% secure? No... are you better secured than someone who says it's impossible, forget trying ... I think so. --DTVZ
Re: Database question
Dan, Is this what you meant: class_types: id | integer | nextval name | text| not null primary key: id classes: id | integer | nextval name | text| not null type | integer | not null primary key: id foreign key: type references class_types(id) members: id| integer | not null class | integer | not null type | integer | not null primary key: name foreign key: class references class(id) foreign key: type references class_types(id) Then, based on the value of members.type, I could figure out which table to look up the member(id) in. If it were of type 'class', then the id would map into that table, if of type 'machines', the id would map into the machines table, etc./// Thanks! -- Seeya, Paul ___ gnhlug-discuss mailing list gnhlug-discuss@mail.gnhlug.org http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss
Re: Blogging software
Cole Tuininga wrote: Hi all, I'm looking for another software suggestion. I have a friend that's going on a several month trip through Central America and would like to have a fairly simple blog set up for them so they can keep us folks back home up to date with what's going on. Requirements: - Web based (no having to ssh in to update a blog entry or anything) - Simple to use - Lightweight (not looking for a *nuke type application) - Usable by low bandwidth connections Any suggestions? I've had good luck running Serendipity http://www.s9y.org/ I tried several before going with that one... they all have their issues when it comes to html editing and special formatting.. but overall I am pleased with the capability of this package.. and in the selection of plugins. My little blog is over at http://infinitusi.blogsite.org/ if you want to check it out. Jared ___ gnhlug-discuss mailing list gnhlug-discuss@mail.gnhlug.org http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss
Re: Verizon (FiOS) (Off Topic?) I have it!
On 1/24/06, Drew Van Zandt [EMAIL PROTECTED] wrote: So since it's not guaranteed to be 100% secure, there's no reason to bother at all. That's silly. That's not the argument. The issue is that if one is concerned about a communication being read by others, one should not use the technological equivalent of using post card to transmit it. Or, in the OP's case, hire an armored car to carry the post card from his house to the post office in the next town. In this case, we're talking about creating an encrypted tunnel to a machine that's owned by a third party ISP, under their physical control. Then we use that tunnel to relay email which immediately goes cleartext over the wire, on said third party's network. Keep in mind that the objection in the first place was that ISPs can read the email. So we're tunneling email to another server where a different ISP can then read the email there! Further, In at least one case in point, the email is not only cleartext, but sent to a public mailing list, which is repeated to hundreds of subscribers and several public, indexed, searchable mail archives. If securing email is the goal, then the email message should be encrypted at the start, and decrypted by a trusted recipient at the end. If creating the secure tunnel were actually a first step in a comprehensive security plan to secure the email message end-to-end, your argument would have some weight. But there is absolutely no indication that is ever going to happen. Once an end-to-end encrypted transport is established, then one can start to consider things like Can the guy at the other end be trusted to keep what I say confidential? or even Can the guy at the other end be trusted to use GPG correctly?. But we're nowhere near that. As an aside: Phrases like 100% secure are inherently bogus. As Schneier says, security is process. It is not a scalar quantity. -- Ben ___ gnhlug-discuss mailing list gnhlug-discuss@mail.gnhlug.org http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss
Re: Verizon (FiOS) (Off Topic?) I have it!
On Tuesday 24 January 2006 09:23, Ben Scott wrote: On 1/24/06, Fred [EMAIL PROTECTED] wrote: Just got set up with Fios ... First, thank you for posting that. The technical details were very interesting, and the commentary on what Verizon said, and the on-site service they delivered, were equally so. I'm frankly amazed to hear Verizon delivering such good service. Next, I'm going to respond to a few of your statements that all ultimately fall under the category heading of Information Assurance -- what most people mean when they say security. There may be some mildly harsh words ahead. Don't take it too personally; I'm trying to offer an honest critique. Go for it Scott, you security czar! Besides, I have rather thick skin. ... I've been told all sorts of things by all manner of sales reps over the years. I'm sure you have, too. Then when push comes to shove, they say, I'm sorry, sir, the representative you were speaking to was mistaken. Verbal assurances are not worth the paper they're written on. I know. As I said, I don't trust them, but I'm willing to give then another chance for now. You repeatedly state your Internet feed is of a critical nature. If you really mean that, I suggest obtaining a written SLA (Service Level Agreement) guaranteeing what you need. I'd be willing to bet Verizon will refuse to provide such. Interesting idea, and you are probably correct. However, let me see. Point being: Big nasty evil ugly companies like Verizon are notorious for pulling the rug out from under people. If you're willing to take their word for it when their written documents say otherwise, you may well end up deserving what you get. If they do, I can always go back to Crumcast with tail tucked under... Comcast gave me hell recently about having port 80 open on my line (I was running a test web server and left it open) as well as spooking me out about knowing I was running multiple ssh connections *on a different port other than 22* and some other things as well. What, they were monitoring my connection and sniffing my packets? More then likely, after they discovered an open listener for a well-known service they explicitly forbid. ISPs run sniffers all the time. This should not be a surprise. That they do sniffing does not surprise me. That they singled me out in particular, especially since I had that port open for *years* does. I am *so glad* my email goes out encrypted across an ssl connection between my workstations and my dedicated servers. Ummm yah. Email. Using encryption on the Internet is the equivalent of arranging an armored car to deliver credit card information from someone living in a cardboard box to someone living on a park bench. -- Gene spaf Spafford Yes, I know, but at least I know no one at Verizon or Comcast will be able to see the packets. Why make it easy for them? If someone wants to see what I wrote they'll have to go out to California and intercept the packets there, or target the destination. They just won't be able to go to the local Verizon/Comcast office and grab them. There are no perfect secure solutions other than not connecting to the Internet at all. And even then... http://en.wikipedia.org/wiki/Security_theatre Besides I can download them with BitTorrent if I must. Given the current legal climate with the media cartel suing everyone they can find, you might want to think twice before posting about downloading pirated content in a public forum such as this one. (But hey, at least the connection to your mail relay was encrypted before you broadcasted it to the entire world.) Of course, I did not say it was illegal. For all you know I might be talking about something on NPR or the like. For shows, I usually go buy the DVD sets anyway, if available. Most of what I'm interested in is pretty obscure and eclectic and not always available in mainstream outlets. There's paranoia, and then there is risk management. Paranoia is thinking everyone is out to get you, and responding erratically in ways that don't really help. Well, in those days where I were NOT paranoid and they DID come out to get me, they caught me unawares and I did not handle those instances properly. This time, I'm prepared, but don't know where or when they'll strike next. Risk management is thinking everyone is out to get you, and taking appropriate countermeasures to defend against identified threats. It appears you are doing more of the former then the latter. Well, as always, I never tell the *whole* story in open forums except on rare occasions... -- Ben Yah, I'm an asshole Scott I appreciate your candor. -Fred ___ gnhlug-discuss mailing list gnhlug-discuss@mail.gnhlug.org http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss
Postfix/Cyrus/etc help
I'm looking for some book reviews I think. I'm trying to setup a Postfix/Cyrus mail server that will use SpamAssassin, Amavisd, virtual domains, LDAP, etc. I'm familiar with all the parts of this except Postfix and Cyrus already and I'm just wading through the documentation of Postfix and/or Cyrus trying to make sense of a lot of it. It could be that I'm a little dense sometimes, but it seems a lot of this documentation is very example-based, but if the example doesn't match your goal, it's not very helpful. I find myself jumping from one how-to to another in the documentation for each rather than finding a good single resource for reference information on each. I'm wondering if anyone else has particular experience with these tools and can recommend a good source for this information. For example, is the O'Reilly book on Postfix a good start? I know it doesn't really cover Cyrus, but I'm honestly having more trouble figuring out the Postfix half here since it has to incorporate all these other things. For some perspective, I've always been more of an Exim guy here since it just comes with Debian and has always satisfied my needs just fine, but I've been thinking that from all I've read, Postfix might be a better choice given all the distinct technologies I'm trying to tie together. Maybe I'm wrong and I'd love to hear that too should that be the case ;-) -Neil ___ gnhlug-discuss mailing list gnhlug-discuss@mail.gnhlug.org http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss
Re: Database question
Paul Lussier wrote: Dan, Is this what you meant: class_types: id | integer | nextval name | text| not null primary key: id classes: id | integer | nextval name | text| not null type | integer | not null primary key: id foreign key: type references class_types(id) members: id| integer | not null class | integer | not null type | integer | not null primary key: name foreign key: class references class(id) foreign key: type references class_types(id) Then, based on the value of members.type, I could figure out which table to look up the member(id) in. If it were of type 'class', then the id would map into that table, if of type 'machines', the id would map into the machines table, etc./// Thanks! Yes, this would work. Because the members table is provided a many (members) to one (class) relationship you can build data structures of arbitrary depth. Further, by using the class type indicator you can later expand the logic to include things that you have not yet considered in the same way that you're including the machines table here. Dan ___ gnhlug-discuss mailing list gnhlug-discuss@mail.gnhlug.org http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss
Out of scan range
Hi, I have a server with a recent install of RHEL, which I received from a co-worker to use for testing some software. The issue I have, is that the monitor I have available here is older, and when RH boots, I get the msg. Out of Scan Range. I can access the scsi drive with a Knoppix Live disc. What would be the most sensible way to go about changing the monitor settings? (Aside from fetching the other monitor, which is out of the question at the moment.) Is it possible to boot into a safe mode in order to change the settings via the desktop? Any assistance would be appreciated. Thanks, Mike __ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com ___ gnhlug-discuss mailing list gnhlug-discuss@mail.gnhlug.org http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss
Re: Out of scan range
Thanks Ben! Mission accomplished! Mike --- Ben Scott [EMAIL PROTECTED] wrote: On 1/24/06, mike shlitz [EMAIL PROTECTED] wrote: The issue I have, is that the monitor I have available here is older, and when RH boots, I get the msg. Out of Scan Range. That typically means the vertical refresh rate (measured in Hz) of the signal being generated at the computer is too fast for the monitor. What would be the most sensible way to go about changing the monitor settings? ... Is it possible to boot into a safe mode in order to change the settings via the desktop? What you'll want to do is boot into runlevel 3. Runlevel 5 (the default on Red Hat, most of the time) goes directly into X and the GUI login. Runlevel 3 starts all the same services, but stays at the text-mode login on the console. To specify the boot runlevel, add it to kernel boot parameters. You're most likely using GRUB. When the system first boots (after BIOS init and POST), you should get a boot menu. (It may timeout after a few seconds, so be ready.) Hit the [A] key to append boot parameters. Type a space (to separate from the previous parameters) and then a 3 (a bare digit three). Hit [ENTER] to accept the parameters and boot into runlevel 3. Once you've got a usable console, you can run the X configuration utility, and specify that your monitor doesn't support the higher refresh rates. If needed, pick a generic monitor type and limit it to 60 Hz. The command you run to configure X can vary on different releases of Red Hat. What release of Red Hat Enterprise Linux are you running? -- Ben ___ gnhlug-discuss mailing list gnhlug-discuss@mail.gnhlug.org http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss __ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com ___ gnhlug-discuss mailing list gnhlug-discuss@mail.gnhlug.org http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss
Re: Database question
Dan Coutu [EMAIL PROTECTED] writes: Yes, this would work. Because the members table is provided a many (members) to one (class) relationship you can build data structures of arbitrary depth. Further, by using the class type indicator you can later expand the logic to include things that you have not yet considered in the same way that you're including the machines table here. Wonderful! Thanks for the insight! -- Seeya, Paul ___ gnhlug-discuss mailing list gnhlug-discuss@mail.gnhlug.org http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss
Re: Postfix/Cyrus/etc help
Neil Schelly [EMAIL PROTECTED] writes: I'm wondering if anyone else has particular experience with these tools and can recommend a good source for this information. For example, is the O'Reilly book on Postfix a good start? I know it doesn't really cover Cyrus, but I'm honestly having more trouble figuring out the Postfix half here since it has to incorporate all these other things. I read a few reviews of different books out there, and settled on The Book of Postfix (http://tinyurl.com/bp3y3) which I wholeheartedly recommend. It seemed to get slightly better reviews than the O'Reilly postfix book. Ironically, it's a No Starch Press book, which is not only the same press which the excellent Absolute *BSD books are published by, but also now owned by O'Reilly as well. Get this book, and I'm sure you won't be disappointed. -- Seeya, Paul ___ gnhlug-discuss mailing list gnhlug-discuss@mail.gnhlug.org http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss
Carn1v0re?
On Tue, 24 Jan 2006, Fred wrote: What I am really concerned about is some ganster agency using a blanket sniffing technology like Carn1v0re, for instance, to do a broad sweep of packet gathering so they can sift through it later. I just wanna know, why didn't you just say Carnivore? -- TARogue (Linux user number 234357) Are these morons getting dumber or just louder? -Mayor Joe Quimby ___ gnhlug-discuss mailing list gnhlug-discuss@mail.gnhlug.org http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss
RE: Carn1v0re?
Because $5M worth of software development can be easily fooled by number/vowel substitution? I hope the t3rr0r1sts d0n't f1nd 0ut! -Original Message- I just wanna know, why didn't you just say Carnivore? ___ gnhlug-discuss mailing list gnhlug-discuss@mail.gnhlug.org http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss
Re: Verizon (FiOS) (Off Topic?) I have it!
Well my service is scheduled to be installed Feb 3rd. Sean ___ gnhlug-discuss mailing list gnhlug-discuss@mail.gnhlug.org http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss
RE: Carn1v0re?
The worst mistake is underestimating your opponent. How much would the upgrade to that $5mm software package cost to get the number/vowel substitution dictionary added on? Ok, I know, we need to define cost, whether it's cost to develop, cost to purchase in the commercial sector, or cost to purchase as a black-budget government agency - simplistically, just increase one order of magnitude for each, right? But hey, this is anti-terrorist so cost is no object, just hire Halliburton and they'll take care of it! :-) Original message Date: Tue, 24 Jan 2006 20:14:52 -0500 From: Brian [EMAIL PROTECTED] Subject: RE: Carn1v0re? To: gnhlug-discuss@mail.gnhlug.org Because $5M worth of software development can be easily fooled by number/vowel substitution? I hope the t3rr0r1sts d0n't f1nd 0ut! -Original Message- I just wanna know, why didn't you just say Carnivore? ___ gnhlug-discuss mailing list gnhlug-discuss@mail.gnhlug.org http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss ___ gnhlug-discuss mailing list gnhlug-discuss@mail.gnhlug.org http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss
Re: Postfix/Cyrus/etc help
On Jan 24, 2006, at 13:37, Neil Schelly wrote: It could be that I'm a little dense sometimes, but it seems a lot of this documentation is very example-based, but if the example doesn't match your goal, it's not very helpful. I find myself jumping from one how-to to another in the documentation for each rather than finding a good single resource for reference information on each. One of us might have setup what you want already. Substitute MailScanner for Amavisd and that's pretty much what the major installs I've done look like. I am going to try Dovecot on the next one though. The trick to make it easy is to use real unix users. Things are substantially easier I've found that way. Feel free to post some specs. -Bill - Bill McGonigle, Owner Work: 603.448.4440 BFC Computing, LLC Home: 603.448.1668 [EMAIL PROTECTED] Cell: 603.252.2606 http://www.bfccomputing.com/Page: 603.442.1833 Blog: http://blog.bfccomputing.com/ VCard: http://bfccomputing.com/vcard/bill.vcf ___ gnhlug-discuss mailing list gnhlug-discuss@mail.gnhlug.org http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss
Re: Postfix/Cyrus/etc help
On Tue, Jan 24, 2006 at 11:25:47PM -0500, Bill McGonigle wrote: On Jan 24, 2006, at 13:37, Neil Schelly wrote: It could be that I'm a little dense sometimes, but it seems a lot of this documentation is very example-based, but if the example doesn't match your goal, it's not very helpful. I find myself jumping from one how-to to another in the documentation for each rather than finding a good single resource for reference information on each. One of us might have setup what you want already. Substitute MailScanner for Amavisd and that's pretty much what the major installs I've done look like. I am going to try Dovecot on the next one though. http://workaround.org/articles/ispmail-sarge/ is what I use. Works extremely great, and I highly recommend it. -- Christopher Schmidt Web Developer signature.asc Description: Digital signature
Re: Verizon (FiOS) (Off Topic?) I have it!
On Jan 24, 2006, at 12:17, Fred wrote: That they do sniffing does not surprise me. That they singled me out in particular, especially since I had that port open for *years* does. Devil's Advocate: they may be using a QoS device that prioritizes traffic by type. You can't do that without packet inspection. If it also keeps logs to help with customer service issues they might know that you're running ssh traffic without targeting you. Attributing to malice and all that jazz, -Bill - Bill McGonigle, Owner Work: 603.448.4440 BFC Computing, LLC Home: 603.448.1668 [EMAIL PROTECTED] Cell: 603.252.2606 http://www.bfccomputing.com/Page: 603.442.1833 Blog: http://blog.bfccomputing.com/ VCard: http://bfccomputing.com/vcard/bill.vcf ___ gnhlug-discuss mailing list gnhlug-discuss@mail.gnhlug.org http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss
Today's Rough Notes
After driving about 150 miles today, combined with 1.5 hours of formal tech discussion, 1.5 hours of presentation, and 2 hours of high level geekery, I'm way too tired to do any of the things that I'm supposed to be doing. However, I was able to dump the notes that I took today from both the HB1197 meeting[1], and Tim Burke's presentation on productizing the FC community project into the RHEL product. Feel free to edit: When they're more cleaned up/readable (made that way by me or others) I'll dump them to the main GNHLUG wiki. Short short summaries: HB1197 had an additional amendment added at last executive council meeting. The amendment was declared non-germane and stricken. Additionally, it was determined that the 5 person committee does not have the resources to adequately evaluate open source on their own. As a result, the committee will be amending HB1197 in order to make it a mandate to the state IT department(s?) to provide information about using open source in the state infrastructure. This amendment will be voted upon by the full executive council, probably in the next 3-4 weeks. Tim Burke gave an excellent presentation, with about 40 in attendance, some being students required to be there by professors. A number of special prizes were given out, including fancy Red Fedoras. One of these was given to our wonderfully color coordinated Bill Sconce, which I'll upload a picture of to flickr later. Post Quarterly Meeting we gathered first at pappy's (11 people) and retreated to Dunkin Donuts 30 minutes after they closed (5 people). Now, sleep. [1] http://crschmidt.net/projects/gnhlug/HB1197 [2] http://crschmidt.net/projects/gnhlug/redhat -- Christopher Schmidt Web Developer ___ gnhlug-discuss mailing list gnhlug-discuss@mail.gnhlug.org http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss