Jan Engelhardt wrote:
Now let us say I am creating sort of a virtual text file (code.js)
that is a live-concatenation of these files:
# concatenate tooltip.js banner.js foo.js code.js
Note I am not talking about the cat(1) utility. I am thinking of
code.js be always a live concatenated version
Peter Foldiak wrote:
correction:
Sorry, I now see on their site that:
Underground Desktop 022 ... the filesystem is now reiserfs v3 instead of
reiser4 - which seems not enough stable and fast - and the bootloader is grub
instead of lilo.
(It's funny, their April edition was already out of date
It is our intent to support inheritance and make that working code
someday. I encourage anyone who wants to to contribute to the effort.
I will not comment on the http optimization stuff in your email, not my
area
Cheers,
Hans
Pretty much any simple basic tool or extension can be lived without.
For them to say that you can do without it is to say nothing. There is
little one actually needs a computer to do, I remember professors
explaining to me that they felt essays written on a typewritter tended
to be better
Rik van Riel wrote:
On Sat, 25 Feb 2006, Peter Foldiak wrote:
sub-file corresponding to a key-range. Writing a chapter should change the
book that the chapter is part of. That is what would make it really valuable.
Of course it would have all sorts of implications (e.g. for metadata for each
On 2/27/06, Hans Reiser [EMAIL PROTECTED] wrote:
Pretty much any simple basic tool or extension can be lived without.
For them to say that you can do without it is to say nothing. There is
All I said was that I don't *think* it will be of much use, that's not
to say that it *won't* be.
As a
Hi all,
I have a question that didn't occur to me until a power failure (eh)...
When a journalized file system like reiserfs 3 runs on top on a
software raid volume, does the volume give enough (and correct)
feedback so that the file system can still guarantee that its metadata
will be
Hans,
you've said that these kinds of plugins should be something a weekend warrior
could tackle. Our group had a real stab and dumped hundreds of man hours into
the project with little effect. Admittedly, we were not experienced kernel
hackers, but we were all comfortable in low-level C and