search for: concious

Displaying 20 results from an estimated 42 matches for "concious".

Did you mean: conscious
2007 Apr 23
0
Open source community help-desks
...fter while extending one's resulting strength, vigour and > survival to the benefit of others. And I think this may be a good > analogy of the way the Open Source community works. Ayn Rand claimed to base her philosophical system on three ``axioms'': (1) Existence exists. (2) Conciousness is concious. (3) [I can't --- thank God --- remember.] When I was in graduate school, lo these many years ago, I had a friend who was a very right-wing person from the South of the U. S. and who might have been expected to have some sympathy with Ayn Rand's views. This friend ha...
2009 Mar 16
1
ATA react to phone but unresponsive to fax modem
Hi, I'm rather new to this domain so I may be doing stupid things without being concious of that. I've got a Patton MATA I'm trying to setup as T.38 fax adapter. Whenever I connect a fax machine (Dell MFP1815dn) or a phone to it, I can successfully send a fax or talk to the other end. Whenever I connect a fax modem (Dell Inspiron 6400 laptop), I keep getting "No signal....
2016 Jan 12
2
[v3,11/41] mips: reuse asm-generic/barrier.h
On Tue, Jan 12, 2016 at 10:27:11AM +0100, Peter Zijlstra wrote: > 2) the changelog _completely_ fails to explain the sync 0x11 and sync > 0x12 semantics nor does it provide a publicly accessible link to > documentation that does. Ralf pointed me at: https://imgtec.com/mips/architectures/mips64/ > 3) it really should have explained what you did with >
2016 Jan 12
2
[v3,11/41] mips: reuse asm-generic/barrier.h
On Tue, Jan 12, 2016 at 10:27:11AM +0100, Peter Zijlstra wrote: > 2) the changelog _completely_ fails to explain the sync 0x11 and sync > 0x12 semantics nor does it provide a publicly accessible link to > documentation that does. Ralf pointed me at: https://imgtec.com/mips/architectures/mips64/ > 3) it really should have explained what you did with >
2008 Dec 17
11
zpool detach on non-mirrored drive
I''m using zfs not to have access to a fail-safe backed up system, but to easily manage my file system. I would like to be able to, as I buy new harddrives, just to be able to replace the old ones. I''m very environmentally concious, so I don''t want to leave old drives in there to consume power as they''ve already been replaced by larger ones. However, ZFS doesn''t currently let me detach a non-mirrored device. Is this planned for the future at all? I would imagine something like this: zpool detach -...
2016 Jan 12
3
[v3,11/41] mips: reuse asm-generic/barrier.h
...the write by P0. > That is, currently all architectures -- with exception of PPC -- have > RCsc locks, but using these non-transitive things will get you RCpc > locks. > > So yes, MIPS can go RCpc for its locks and share the burden of pain with > PPC, but that needs to be a very concious decision. I think it's much worse than RCpc, given my interpretation of the wording. Will
2016 Jan 12
3
[v3,11/41] mips: reuse asm-generic/barrier.h
...the write by P0. > That is, currently all architectures -- with exception of PPC -- have > RCsc locks, but using these non-transitive things will get you RCpc > locks. > > So yes, MIPS can go RCpc for its locks and share the burden of pain with > PPC, but that needs to be a very concious decision. I think it's much worse than RCpc, given my interpretation of the wording. Will
2020 Jul 22
3
New x86-64 micro-architecture levels
* Dongsheng Song: > I fully agree these names (100/101, A/B/C/D) are not very intuitive, I > recommend using isa tags by year (e.g. x64_2010, x64_2014) like the > python's platform tags (e.g. manylinux2010, manylinux2014). I started out with a year number, but that was before the was Level A. Too many new CPUs only fall under level A unfortunately because they do not even have AVX.
2020 Jul 22
2
New x86-64 micro-architecture levels
...CPUs. >> >> If you think my worry is unfounded, then a year-based approach sounds >> compelling. > > I think the main question is whether those levels are supposed to be > an implementation detail hidden from most software developer or > if people are expected to make concious decisions between > -march=x86-100 and -march=x86-101. Implementation detail > for system integrators, that is. Anyone who wants to optimize their software something that's more current than what was available in 2003 has to think about this in some form. With these levels, I hope to p...
2016 Jan 12
3
[v3,11/41] mips: reuse asm-generic/barrier.h
...e above, point 2. > That is, currently all architectures -- with exception of PPC -- have > RCsc locks, but using these non-transitive things will get you RCpc > locks. > > So yes, MIPS can go RCpc for its locks and share the burden of pain with > PPC, but that needs to be a very concious decision. I don't understand that - I tried hard but I can't find any word like "RCsc", "RCpc" in Documents/ directory. Web search goes nowhere, of course. In Will Deacon mail: > The issue I have with the SYNC description in the text above is that it > describ...
2016 Jan 12
0
[v3,11/41] mips: reuse asm-generic/barrier.h
...ocks as was recently suggested by David Daney. That is, currently all architectures -- with exception of PPC -- have RCsc locks, but using these non-transitive things will get you RCpc locks. So yes, MIPS can go RCpc for its locks and share the burden of pain with PPC, but that needs to be a very concious decision.
2009 Mar 17
0
ATA react to phone but unresponsive to fax modem [SOLVED]
2009/3/17 Olivier <oza-4h07 at myamail.com> > > > 2009/3/16 Olivier <oza-4h07 at myamail.com> > > Hi, >> >> I'm rather new to this domain so I may be doing stupid things without >> being concious of that. >> >> I've got a Patton MATA I'm trying to setup as T.38 fax adapter. >> Whenever I connect a fax machine (Dell MFP1815dn) or a phone to it, I can >> successfully send a fax or talk to the other end. >> >> Whenever I connect a fax modem (Dell Ins...
2007 Jul 02
1
Is BIND In CentOS 5.0 Broken?
Hi, I've just isntalled CentOS 5.0 in my machine; selected DNS server during the selection process. After the completing the installation, I wanted to configure my DNS server but it seemed that /etc/named.conf and other stuffs in /var/named/chroot/var/named directory are not there (i.e., *.zone, *.local, etc). Can anyone give me idea? This is the first time that I've tried CentOS; used
2004 Feb 14
1
OGG logos ?
Sounds really interesting. An pool on some official Xiph website would be great. Check out this page: http://www.marevalo.net/OggLogos/ <p>>>Forward Agency In progress we (always) trust. <p><p> -- Email.it, the professional e-mail, gratis per te: http://www.email.it/f Sponsor: Stai cercando prodotti erboristici di qualità a prezzi competitivi? Prova subito
2011 Jul 23
0
[LLVMdev] git
...tion > may be doing wild cross branch merging and long dependency chains > between branches like done in the Linux kernel -- but I don't think > that's a sane development model and I certainly don't see that > agreeing with the development policy of LLVM. I'm sure that, conciously or not, the development policy of LLVM was conditioned by the limitations imposed by the VC tools the project used so far: CVS and svn (which is CVS refurbished). I can't believe that anyone thinks it is a good thing to scatter the commits that implements a feature all over the VC history, in...
1997 Aug 02
0
SPAM: Get Rich NOW!!
...ot@inet.hkg.com, It looks like someone, at your end, is leaking SPAM into the Samba list. The apparent source of this SPAM is <inet.hkg.com> which, unbelieveably, is a real address. They are then relay-raping the Singapore Network to get it into this list. After careful deliberation, I have conciously decided to forward this one message into the samba lists. All future SPAM reactions will henceforth occur in e-mail. I apologize to my fellow list members for this. However, I feel that a notice of action needs to be made, as well as an example. The origin of SPAM is dubious and the e-mail may no...
2016 Jan 12
0
[v3,11/41] mips: reuse asm-generic/barrier.h
...gt;That is, currently all architectures -- with exception of PPC -- have > >RCsc locks, but using these non-transitive things will get you RCpc > >locks. > > > >So yes, MIPS can go RCpc for its locks and share the burden of pain with > >PPC, but that needs to be a very concious decision. > > I don't understand that - I tried hard but I can't find any word like > "RCsc", "RCpc" in Documents/ directory. Web search goes nowhere, of course. From: lkml.kernel.org/r/20150828153921.GF19282 at twins.programming.kicks-ass.net Yes, the differ...
2015 Nov 07
1
idmap & migration to rfc2307
...erogenious environment (which may not be too bad), but it is also not trivial to implement. Because of these fundamental problems, I repeat my pov: - don't use the rfc attrs on the dc (at least not by default) - don't use the DC as a file server In a small domain, with a single admin who conciously creates all users and groups, ideally always on the same DC, all these problems can be avoided. But when we proved such mechanisms in Samba, the should be rock solid, also in a big multi-DC multi-Admin environment. So I think what we could do is this: - make "idmap_ldb:use rfc2307"...
2019 Apr 09
2
[PATCH v2] drm/nouveau/i2c: Disable i2c bus access after ->fini()
...c: aux 000d: begin idle timeout ffffffff Since the GPU is in runtime suspend, the MMIO region that the i2c bus is on isn't accessible. On x86, the standard behavior for accessing an unavailable MMIO region is to just return ~0. Except, that turned out to be a lie. While computers with a clean concious will return ~0 in this scenario, some machines will actually completely hang a CPU on certian bad MMIO accesses. This was witnessed with someone's Lenovo ThinkPad P50, where sensors-detect attempting to access the i2c bus while the GPU was suspended would result in a CPU hang: CPU: 5 PID: 12...
1998 May 23
7
Re: Re: Re: Bind Overrun Bug and Linux (fwd)
...them -compile your kernel to not support on-demand loadable modules -do nightly diff''s between crucial system files, eg: /etc/passwd There are many other measures to be taken, and many software packages out there to help. But it all boils down to the whole fact that if you are security concious, rootsh3ll hackers will not be able to comprimise your network integrity as they only use publically available exploits. And if the person that is hacking you does not use rootsh3ll warez, expect to never get rid of him without rm -rf /''ing your whole system. On a side note, LRK has mu...