DEAR DEVELOP DEBIAN.ORG GIUSEPPE PETAZZONI INFORM DEBIAN.ORG OF BUGS IN TEMPLATE AMD64 AND i386 RELEASE 6.0.0 WHEN I RECONSTRUCT ISO DVD 6.0.0 AMD64 OR i386 IF POSSIBLE YOU SEND MAIL TO ME WHEN YOU RESOLVED THE BUG OF DEBIAN.ORG RELEASE 6.0.0 SINCERELYGIUSEPPE PETAZZONI
1
2
COMPANY
COMPANY
NATIONAL INTERNATIONAL
NATIONAL INTERNATIONAL
OPERATING SYSTEMS SOFTWARE
SYSTEMS DATA STORAGE
www.ldpmit.net
www.petazzonidata.net
www.ldpcaz.com
www.petazzonidata.com
www.ldpmit.it
3
4
COMPANY
COMPANY
NATIONAL INTERNATIONAL
NATIONAL INTERNATIONAL
SYSTEMS MEDIA SOFTWARE
SYSTEMS COMPANY SOFTWARE
www.mediamit.net
www.companyeaz.com
www.factorymit.net
www.aziendaeaz.it
www.mediamit.it
www.fabbricamit.it
Informations for Investors
The difficulties are the Oilmen to find Gas or Oil in
2000 or 10,000 meters below the ground have the Software Systems Constructors
for the large amount of variables that affect the processes of construction of
Software Systems or Oil exploration, require personnel highly trained after
they have been constructed to support the Users, every software system has
millions of variables and makes such operations Media, if we do Finance,
Insurance Bank Operations must use another software system with other variables
and written with another language .
Dear Ladies and Gentlemen Good morning, the Technology
Industryman and Businessman Giuseppe Petazzoni as Inventor , Applicant ,
Proprietary of 300 Software Systems wants to present to potential Investors
such as International Investment Funds, Business, Companies Multinational
Banks, National Governments, the Systems in 36 languages tested for National
Operations and International use of Compiuters, Phones Internet Tablet
Internet, Internet Servers, Clouds, Integrated Systems compiuters,
Supercompiuters Storage of data, Big data.
Over the last 50 years were born a few software systems
that have developed around the world to make more than 50% of the Corporate
Operations for use and / or Business in different segments Cheap described
above, the software systems are two: 1) Windows with SQL Server | 2) Linux
Petazzonidata SQL, The No. 1) is Proprietary Software Systems which have the
closed source code owned by Microsoft, the No. 2) are Software Systems that
have the source code open for part of Applications, the first application it
was written by Linus Torvalds the Kernel start in 1992 with the collaboration
in more years to other programmers who developed the drivers of Systems with
Public License GPL v2. Other programmers have developed graphical interfaces
and the basic functionality of compiuters taking care of the translations into
various languages, testing the quality of written applications under the GPL v2
license.
Premise, the Computers are like cars are complex
machines, which require years of experimentation research development to be
built for the cars to go from Rome to Milan serves Diesel or Gasoline otherwise
the car will not start, and the same goes for the compiuters that with the
software start and make Bank transactions, Insurance, Chemicals, Construction,
Energy, Hospitals, Institutions, Processes Machines, Media, Person, Services,
every day month year, individually or in Groups.
In 1993 Giuseppe Petazzoni start to experiment and test
the quality of Linux based applications written under GPL v1. GPL v2. , Making
the first experiment of its applications with Linux kernel.
Page 1
The experiment was done in the laboratory in the
evening hours including Saturdays and Sundays from 20 pm to 24 for long 15
years to try to test the code licensed under GPL v1 GPL v2 written by
programmers Europeans, Americans, Asians with transfers in the United States to
Linux World in the periods of events, Intel, IBM, Compaq, HP, Siemens, NEC,
Toshiba, Fujitsu, Hitachi, Cisco, sponsors events.
D) Companies, Systems D.1) Servers Desktop Internet
Companies 1 Billion Fixed Software Systems, D.2) Phones Internet Tablet
furniture 1 Billion Software Systems. I want to point out that from the Market
research carried out by Nielsen average Person changes Phones Internet Tablet
furniture every six months and the new versions of Internet Phones Tablet
furniture require new Software Systems.
Another report published by the UN on average about
every billion people using compiuter and mobile, 100 million use it to Hacking,
committing the crimes Cibercrime damaging the software systems and stealing
information from Compiuter Phones Internet Tablet Internet furniture or Secure
Internet Servers of People, Companies, Institutions, Organizations, and
consequently the staff that supports Software Systems installed on compiuter
furniture and Secure Internet Servers must monitor Server hour by hour, to
intervene to repair damaged Software Systems, accordingly staff must be
prepared at the highest level to minimize the damage caused by Cibercrime.
After experiencing tested for long 15 years the
applications under Linux kernel and basic Applications, I started the day and a
few days in 2008 also at night to write critical applications Create Software
Systems Sets for Selling under Commercial License for Operations in the
Petroleum Sector that are under Development of Advanced.
In 2012 using parts of applications written in previous
years and writing new applications under license Commercial I created 300
Software Systems of which 100 Software Systems are under development and Tests ;
Other 200 Software Systems make the following
operations: A) Operating Systems Software, A.1) compiuter Furniture 3.5 Billion
Systems Software, A.2) Phones Tablet Internet Furniture 7 Billion Software
Systems, A. 3) Secure Internet Servers 2 Billion Software Systems | B) of Data
Storage Systems, B.1) Servers Internet Data Set 1 Billion Software Systems,
B.2) Servers Internet Storage Set 1 Billion Software Systems | C) Systems
Media, C.1) Servers Desktop Internet Media Secure 350 Million Systems Software,
C.2) Phones Tablet Internet Furniture 3.5 Billion Software Systems |
.
Page 2
The reasons are manifold, unfair competition between
Companies, Institutions, Organizations, Psicology of Person who use the
Software Systems for espionage counterespionage misdirection, psicology of
Persons who use the Software Systems for: financial traffic, weapons, Illegal
or expired products , of rugs, of corruptions, human rights, marine hijacking,
illegal traffics of cars or trucks.
In the World that use or using furniture and Secure
Software Systems Mobile or Fix in 2015 are 7.2 billion people and 2 billions of
Companies Organizations Institutions, with the prediction that in 2050 the
Persons will come to 9 Billion UN data, in the media or come to have 1 Internet
Phone Tablet Mobile, 1 Computer Mobile, 1 Fixed Computer , consequently the
Sold and supported Software Systems are or come to be over the next five years
23.6 billion, of which only 700 million are or will be in the hands of hackers
and they are or will be supported rather discouraged.
Ferrara Italy 21 Mar 2016
Page 3

