RD labrats producing `high-value IP' ...
Yah, right. Like any of those types are going to leave that stuff
behind.
Sure, the rules say they have to leave them behind. The rules are
ignored. Just like the rules about not bringing cell phones into
hospitals, or turning them off
On 03/22/2010 10:12 PM, Benjamin Scott wrote:
Excellent review, thanks, even if Linux is hardly mentioned ;)
OTOH, since we usually never power
off our printers, this is rarely an issue for us.
Any idea of the power consumption when on, printing, or in standby?
--
Ted Roche
Ted Roche
Bill Freeman wrote:
Way back when I was at Digital (as it then was) and before, we used to have
a tool called 'xon'. It took as an argument the DNS name or IP address of
a server on the net, connected to it, started a shell or optionally specified
command, with the DISPLAY environment
On 23-Mar-2010, Benjamin Scott dragonh...@gmail.com sent:
So any thoughts on the iPad?
I think it's overpriced for what it does. For the same cost as
the base model iPad you can buy a Lenovo IdeaPad S10-3t, a
convertible touchscreen netbook/tablet. It may not be as shiny as
the Apple
On Tue, Mar 23, 2010 at 10:51 AM, Chip Marshall c...@2bithacker.net wrote:
On 23-Mar-2010, Benjamin Scott dragonh...@gmail.com sent:
So any thoughts on the iPad?
I think it's overpriced for what it does. For the same cost as
the base model iPad you can buy a Lenovo IdeaPad S10-3t, a
On Tue, Mar 23, 2010 at 8:23 AM, Ted Roche tedro...@tedroche.com wrote:
Any idea of the power consumption when on, printing, or in standby?
Advertised spec is:
Operating: 450 W
Standby: 70 W
Power save: 4.3 W
(Not tested by me.)
On 03/22/2010 04:13 PM, Bill Freeman wrote:
It seems like ssh is overkill for talking
to a VM on your own box.
You're running two operating systems on one piece of hardware.
-Bill
--
Bill McGonigle, Owner
BFC Computing, LLC
http://bfccomputing.com/
Telephone: +1.603.448.4440
Email, IM, VOIP:
You're running two operating systems on one piece of hardware.
Substitute programs for operating systems and it *sounds* a lot
different, and perfectly ordinary and yet it really isn't that
different. Bitsness is bitsness. ;-)
The difference between hardware and software is even getting
On 03/23/2010 12:03 PM, Bill McGonigle wrote:
On 03/22/2010 04:13 PM, Bill Freeman wrote:
It seems like ssh is overkill for talking
to a VM on your own box.
You're running two operating systems on one piece of hardware.
-Bill
In a way I agree with Freeman. But, a VM can be
On 03/22/2010 04:13 PM, Bill Freeman wrote:
It seems like ssh is overkill for talking
to a VM on your own box.
You're running two operating systems on one piece of hardware.
-Bill
It's still overkill to force X11 through the encrypted pipe.
Bill
On 03/23/2010 12:03 PM, Bill McGonigle wrote:
On 03/22/2010 04:13 PM, Bill Freeman wrote:
It seems like ssh is overkill for talking
to a VM on your own box.
You're running two operating systems on one piece of hardware.
-Bill
In a way I agree with Freeman. But, a VM
On Tue, Mar 23, 2010 at 2:40 PM, Bill Freeman f...@ke1g.mv.com wrote:
It's still overkill to force X11 through the encrypted pipe.
You running out of electrons or something? ;-)
Is it a problem? If not, don't fix it. :)
-- Ben
___
It's still overkill to force X11 through the encrypted pipe.
My understanding of X leads me to believe that as long as your clients
can authenticate themselves to the server (and you've rigged your server
such that it's willing to talk to anybody, local or remote, who can open
a socket to it)
It's still overkill to force X11 through the encrypted pipe.
My understanding of X leads me to believe that as long as your clients
can authenticate themselves to the server (and you've rigged your server
such that it's willing to talk to anybody, local or remote, who can open
a socket
On Tue, Mar 23, 2010 at 2:40 PM, Bill Freeman f...@ke1g.mv.com wrote:
It's still overkill to force X11 through the encrypted pipe.
You running out of electrons or something? ;-)
Is it a problem? If not, don't fix it. :)
-- Ben
I didn't ask you to fix it Ben. But I'll fix it if
And, no, it's unnecessary to open the server to everyone. There are
a number of host or cookie based means to limit who can connect.
Right, I didn't mean that you needed to operate without authentication,
just that if you leave the server's default 'nolisten tcp' behavior in
effect you'll
On 03/23/2010 03:42 PM, Bill Freeman wrote:
I didn't ask you to fix it Ben. But I'll fix it if I want to.
:)
Googling for X without ssh or X Forwarding without ssh brings up
thousands of helpful tutorials on X Forwarding using SSH :)
Here's an alternative suggestion, not as good as xon,
It's that week again. The week with the fourth Thursday in it.
PySIG week!
Yes, there will be a PySIG. Cookies are on order. Ted has kindly
offered to bring the milk. (Thanks, Ted!)
Likely topics:
o Teaching Python to co-workers
o PyCon report
o Lyndeborough evacuation (?)
7:00 PM
On 03/23/2010 03:39 PM, Bill Freeman wrote:
No. When you take the easy way out and run ssh f...@bar -Y, the established
X connection runs through an encrypted tunnel, incurring a performance
penalty.
Oh. I think I understand the question now, it's not the resource
overhead per-se that's
Alan Johnson wrote:
This appears to be made from a review template for all Apple products.
You just filled in the blanks with iPad and Lenovo IdeaPad S10-3t, a
convertible touchscreen netbook/tablet, didn't you?
I think it's in Apple's design specs.
Take nifty tech only geeks know about.
Bill McGonigle writes:
2a) possibly run ssh with the null cipher, so you just get session
setup. Then you're only talking about stream
encapsulation/multiplexing time as a resource drag, and that can be
incredibly efficient code (OS's do this all day long, layer upon
layer).
This is not
Benjamin Scott dragonh...@gmail.com writes:
On Mon, Mar 22, 2010 at 8:31 PM, Joshua Judson Rosen
roz...@geekspace.com wrote:
... people working in government or industry where
there is a concern about espionage, accountability, privacy, or fodder
for blackmail or public criticism (so:
On 03/23/2010 06:13 PM, Kevin D. Clark wrote:
This is not possible with any SSH implementation that I am familiar
with.
Ah, found it:
http://www.psc.edu/networking/projects/hpn-ssh/
For some reason I thought it was available as a compile-time option to
OpenSSH, but that must've been old
Bill McGonigle b...@bfccomputing.com writes:
On 03/23/2010 06:13 PM, Kevin D. Clark wrote:
This is not possible with any SSH implementation that I am familiar
with.
Ah, found it:
http://www.psc.edu/networking/projects/hpn-ssh/
Oh, that. Yes, now I remember that. I experimented
24 matches
Mail list logo