Beta

×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Comments

top

KDE Developers Discuss Merging Libraries With Qt

Shulai Re:KDE4 = Windows Vista (196 comments)

Windows have its equivalent vfs thing. You can see My Computers Devices, Printers, Control Panel Applets, Windows Neighborhood, network shares and FTP sites and PocketPC filesystem in Explorer.

The main KDE 2 Desktop concepts (I mean Konqueror with kioslaves and kparts) was mostly embracing Win95/98 concepts, just doing them right, I mean, KDE devs did it because it could be cool and useful, not just because they were trying to steal Netscape's market share.

So, no, a number of features of KDE comes from Windows and KDE 4 is no exception, they just are there but most users don't notice about them.

Of course, KDE makes a better choice for me because their feature are usually better implemented, did at library level so the experience is more consistent, and of course there is the integration with the unix fundation.

more than 3 years ago
top

BSOD Issues On Deepwater Horizon

Shulai Interesting (383 comments)

Nobody is bashing Windows so far, yet it seems to be what the editor look for when he wrote the headline. Has Windows improved enough that nobody try to make fun of it anymore, or slashdotters are already older and more mature?

about 4 years ago
top

Lenovo Trying Face Recognition For Logins On New Laptops

Shulai Re:Fool it with a picture? (164 comments)

A regular burglar won't care abour your data. One up to the times would check if you are sloppy and kept home banking credentials on a file in your desktop, or something else he can make money of.

more than 4 years ago
top

Japan Plans Moon Base Built By Robots For Robots

Shulai Re:and why, exactly? (253 comments)

I guess you are anarchist, aren't you?

more than 4 years ago
top

Do Build Environments Give Companies an End Run Around the GPL?

Shulai Re:TIme to name names. (374 comments)

And while it can sound unfair, if you look on it on the right light, it isn't. A GPL'd project can be built on a platform where no free toolchain is available (hey, even GCC had to be compiled on a different compiler the first time!). Of course, the concept is about non-free but publicly available tools, as seems to be in this case.

more than 4 years ago
top

What Happens When IPv4 Address Space Is Gone

Shulai Re:Hmmm (520 comments)

Most consumer routers could support IPv6, just their firmwares don't.
The bad part? Most router vendors won't provide firmware upgrades, they will offer ISPs to buy new IPv6 capable ones instead.
The good part? A nice fraction of these devices run Linux, so theoretically ISPs could do bounties for third party IPv6 capable firmwares. I for one am available for such a task.

more than 4 years ago
top

KDE Founder Receives Highest German Honor

Shulai Re:Exact! (142 comments)

I doubt anybody would dare to work with Hans lately.

more than 4 years ago
top

KDE Founder Receives Highest German Honor

Shulai Re:Ha (142 comments)

However, back in 1996, basically the only available toolkit besides Qt was Tk. GTK+, Fltk and others are newer. wxWidgets (wxWindows back then) didn't have native widgets, Motif was fully closed, etc, so choice of Qt probably was reasonable.

more than 4 years ago
top

German Health Insurance Card CA Loses Secret Key

Shulai Best practices (174 comments)

Best practices about CA management says you should have your secret key in a (physical) safe. Better yet, divide it in two pieces and put it along the passphrase in three different safes (part1+pass,part2+pass,part1+part2), so you can't lose key access even if you lose one safe, and nobody can take the key by opening a single safe.

about 5 years ago
top

How the LSB Keeps Linux One Big Happy Family

Shulai Re:This should be interesting... (171 comments)

> So, the LSB is mainly aimed at attracting privative software like Oracle to Linux (who else need guaranteed ABI compatibility when you can recompile?),

At this time I'm convinced that having to rely on distributions (or worse, 3rd party distro specific packages) for software is stupid. I'll be happy when I'll be able to install any binary package, free or privative, with source available or not, not being constrained by using distribution X or using the version and tweaks distro X provides for that particular app. And then, software producers being able to provide binary packages themselves without caring about distro X or Y, just providing an easy to install package just as they do for Windows, including lots of FOSS apps available for Windows. Well, better than Windows I expect... zeroinstall is the most close to this, but neither zeroinstall, click, LSB or whatever else got any real traction...

more than 5 years ago

Submissions

top

Shulai Shulai writes  |  more than 7 years ago

Shulai (34423) writes "I'm providing support on Unix services and local networking for a small group of town phone cooperatives providing ISP services to their respective towns, but working together in the infrastructure and network service issues.
They got upstream bandwidth from the zone-dominating nationwide telco, but they are providing bandwidth distributed along several small links (at this time, four 2Mbps links, I know, its ridiculous but at this time there are little options in that zone) in different locations, each with its own assigned IP address block.
The towns are interconnected and share this links over bridged wireless links, but the current setup involves chosing IP addresses by hand from any of the upstream links on every DSLAM and dialup server in order to balance both bandwidth and IP availability, and the guy assigning addresses in one town must cooperate with their peers in the other towns in order to avoid IP collisions and keep the whole thing working.
This happened because they started with a single link, but then the upstream telco didn't provided larger capacity in that link but additional links in different towns. Obviously it became a burden for them (and for me, as I work with and give advice to them), but the available bandwith in each town doesn't match proportion of bandwidth required by the aggregate demand (one town has 2000 inhabitants and a 2Mbps link, while another has 5000 inhabitants and also a 2Mpbs link, a third one has 3000 people and no links, the fourth 5000 people and two 2Mbps link), so each town using exclusively its own link is not an optimal solution either. The upstream telco is unable to provide better connectivity maybe for a year, maybe more.
I asked for a multihomed setup, doing routing instead of bridging between the towns and hoping to be able to distibute the IP ranges sistematically among each town cooperatives, and get packages routed in and out using whatever link available. But the telco and the telco partner who manages the WAN routers refused.
I don't have WAN know-how beyond the basics (little more than "packages can be routed thru different paths in order to improve link utilization and connectivity downtime"), and I understand that there are technicalities that can difficult or impede implementation of multihoming. Yet I guess some Slashdot WAN folks can provide me some suggestion or alternative. Please forgive my painful English."

Journals

Shulai has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?
or Connect with...

Don't worry, we never post anything without your permission.

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>