Introduction About Site Map

XML
RSS 2 Feed RSS 2 Feed
Navigation

Main Page | Blog Index

Archive for August, 2005

RPG Fantasy World

Laptop

Back when I was in school, some friends of mine were addicted to on-line role-playing games (RPG) such as Ultima (interview with its creator just Slashdotted). One of them would spend his entire life (not literally as he was in school too) playing D&D-themed games, attending his friends’ on-line weddings and grabbing screenshots. The Diablo extravaganza was heated up too at the time, but it goes back to the age of 14 or 15.

I have just stumbled upon an entertaining essay by one such addict. It gives an idea of the scale and growth of this phenomenon. I will not be surprised if in the next decade we see people who are entirely disconnected from reality, constantly ‘plugged-into’ their computer screen, spending their life (physical) in a virtual world, provided they can financially afford it. Computers allow many to enter a virtual world where gaps between reality and imagination simply collapse. Let us not forget that computers stride on quickly while the rest of the world does not. In a few decades, the two might intersect at some level.

You may have heard about a guy who recently was convicted of murdering a man during a dispute over a rare, valuable sword. That sword that was not made of metal or anything solid, but rather of 1′s and 0′s inside a computer hundreds of miles away. It was a sword he had won in the MMORPG Legend of Mir 3.

Related films: The Lawnmower Man (1992), The Matrix (1999)
(note: mentioning of these films does not imply that I like them)

Two Birds, One Stone

Tux of LinuxA heavily-discussed topic in this quiet August is Mac OS X piracy. Yet more sets of instructions flow in, which explain about (at least) 3 different ways of installing Mac OS X on non-Apple workstations. To give a snippet of one of them, “1 – Install Darwin 8.0.1…” and yet another: “3. Download Ubuntu Live CD…”. It becomes apparent that a Linux installation is usually, if not always, part of the installation process. It’s a pre-requisite.

OS X will supposedly require its own isolated hard-drive, which is a shame. OS X is good for many things, but not for everything so partitioning would have been a pro. Only 2 days ago I formatted one of my partitions. I would have loved to make it an OS X partition, but I ended up with 2 Linux partitions. Let us refer to it as “two birds with one stone (physical drive)” and needless to mention, penguins are the best birds.

Related items: Mac OS on Every Machine, Dual-Partition Linux

Blog Depression

Scare

I definitely enjoy running my Web log, but Dvorak points out a very intersting mock-up pamphlet that most bloggers would strongly relate to. That pamphlet talks, in a more or less sarcastic fashion, about notions like content anxiety (subconsciously wishing to post any piece of information read) and pressure (to add new content to the blog/s). If you ever feel like blogging has a negative effect on your life, be sure to follow the link.

Also see: Internet Anxiety Disorder Anyone?

Governments and Diversity

Governmental offices and agencies are expected, more than any other body, to cater for a large variety of cultures. This item is not a political one, but it refers to governments which unknowingnly support a commercial monopoly, which happens to be a majority. The benefit to governments taking this stance is scarce or inexistent. At the end of the day, cash only flows towards the folks at Washington state.

The city of Vienna has recently moved to an all-Linux infrastructure. Britain appears to be highly conscious of the diversity of browsers and operating systems out there (exception #1, exception #2) unlike many other countires I know. Some other governments have recently expressed willingness to follow suit and move to Open Source.

Whip Office

To spice up this write-up and give some fruit for thought, The Australian Tax Office adopted OSS and nonetheless, the Australian ‘e-tax’ system is Windows-only. If you talk the talk, you must also walk the walk.

Dual-Partition Linux

Early this morning I made a bold move; it was bold for me, at least. I decided to make both partitions on my hard-drive adhere to the Reiser filesystem (FS), overwriting an unused Windows 2000 (NTFS) partition, which was rarely ever accessed. At times it was exploited as a storage area, yet no more than once month, which made it a complete waste of space.

Before formatting the NTFS partition, I was able to transfer data to the Windows partition using special tools. Linux can read NTFS, but not write to it, whereas Windows only understands its own filesystems (FAT, FAT32 and so forth) so there is no reciprocity. Nevertheless, there are tools which enable Windows users to read a Reiser filesystem, which is a common Linux filesystem.

  • rfstool – read ReiserFS under Windows
  • YAReG – a .NET GUI for the above tool

They both require the user to boot into Windows, which is why I gave up on them and decided to stick to Linux partitions instead.

Format menu

The moment of truth: so long Windows partition (click to enlarge)

To cut a long story short, I now have two Linux partitions, which I am extremely happy with. This move would not have been simple if it weren’t for the kind help from Houghi.

At an earlier stage I thought about installing Mac OS X on the new partition. Unfortunately, the process seems time-consuming, complicated and unreliable at its end. Moreover, it turned out that this had never been possible as Mac OS X (specifically the hacked version which runs on any machine) will not function under a partition, i.e. it requires a separate physical drive. To the curious, there are full instructions on how to installed Mac OS X on any standard PC. Many pictures and screenshots are included.

Program Invocation Methods

There are at least 5 paradigms for opening applications in your operating system. These differ in terms of efficiency, versatility the the learning curve (experience) that is initially involved. If the average user invokes programs dozens of times a day, choosing the right invocation method is worthwhile.

KDE launcherMethod #1 – Application Menus (Launcher) – familiar to most under the heading “Start Menu”, which of course corresponds to Windows users. Therein lie all the applications, well-filed and catalogued depending on their nature. Many users retain everything directly under “Programs” (no extra level of hierarchy), but installations of Linux often subcategorise programs by type, e.g. “Internet”, “System”, “Graphics” etc. (see image on the left, click to enlarge). Large Windows installations, which have hundreds of programs incorporated, often do likewise.

Method #2 – Command-Line Interface (CLI) – simply put, it is the case of invocation using text — textual commands and a trigger (e.g. ENTER). Windows will soon have Monad, which is a command-line tool that addresses a serious deficiency. Linux and Mac OS X (UNIX-based) already contain advanced command-line facilities, which are well ahead of the long-forgotten MS-DOS in terms of power and expressiveness. Monad will not be included in Windows Vista due to security holes that have recently been unveiled.

Method #3 – Dock/(child-)Panel/Launch Bar – the assemblage of many application icons in a small space. That space is usually visible at all time, even when windows are maximised (see example below).

Child panels

Method #4 – The ‘Busy’ Desktop – a few people prefer to keep all their favourite programs in their desktop space. This can result in clutter and the major disadvantage is that icons are not always visible. Hence, icons (applications) are not accessible at ease. The notion of “Show Desktop” (START+"D" in Windows, CTRL+ALT+"D" by default in KDE) mitigates this inconvenience as one can minimise and then maximise all windows simultaneously.

Desktop with previews

PDF‘s, text files, HTML‘s and
directories in the KDE Desktop with previews
(click to enlarge)

Windows 98

My Windows 98 laptop (click to enlarge)

Method #5 – Keyboard Accelerators – there is support in most (if not all) operating systems for assignment (AKA binding) of keys to certain operations or invocation of programs. A previous item in this site explains how this can be achieved in Windows and Linux.

Method #6 – Mouse Gestures – interpretation of mouse movement as to understand the user’s desire. I have not come across mouse gestures in a typical desktop environment. However, Opera and Firefox (some details here) already support it very effectively.You can navigate by moving your hands in special, distinguishable ways. The idea is reminiscent of voice commands.

Energy Saving Modes

Wind mills

Have you ever wondered how to extend the lifetime of your battery? Or perhaps reduce the electricity consumption at your home? Shutting off the machine is not the only option, as the remainder of this item explains with particular emphasis on state-preserving energy-saving schemes.

Most idle computers enter the screen saver mode after a certain, pre-defined period of time (some readers will prefer “screensaver” as one word, like “screenshot”) . Screen savers are by large the default and most common scheme, but it does not preserve much energy. As a matter of fact, with some of today’s screen savers, even more power is consumed when they are run. Resource-hogging screen savers, which make use of hardware acceleration, are among the most poplar too. Call it office vanity if you like, but that is an issue for another day.

At the end of the previous decade we began to see monitors that were more energy-efficient and environmentally-friendly. They supported auto-shutoff schemes and consumed less electricity than predecessors even though their size grew. With today’s TFT screens, things continue to improve.

Battery lowLaptop sales in the States exceeded sales of desktop last year, so they are definitely here to stay (and expand). Due to the nature of laptops and their pricy batteries, energy saving in laptops is worth greater attention.

Stand-by mode is a popular energy saving scheme, which results in an idle system state, but the user would be killing off expensive batteries by opting for stand-by. The big pro is the quick wake-up time. You will frequently be advised not to use stand-by mode unless you leave your laptop connected to the socket or return shortly. With stand-by as standard, you will opt for data retention on RAM, which uses up power. Come back after a few days, and your battery might be flat. Sources I can recall claim that a battery in the body of the laptop never benefits, even if the laptop is bound to a source of electricity. Then fluctuation between 90% and 100% battery capacity also appears to be unhealthy.

As opposed to stand-by, another scheme exists which is called hibernation. Hibernation will mirror the memory and place it on non-volatile magnetic storage device — the hard drive. Maintenance of laptop batteries sums up as a whole ‘bible’ on its own and will not be discussed further for the time being. Overall, battery drainage depends on memory, laptop’s architecture, O/S and battery’s capacity (or type). The user can experiment to determine the battery’s lifetime. However, such a curious user often assumes that the battery meter shows depletion linearly, which is rare.

Also worth mentioning are mechanisms by which hard-drive rotation stops whenever operations involving the disk appear unnecessary. Moreover, there are schemes such as the lowering brightness (laptops and PDA‘s in particular), which is also a phase that is invoked automatically. When the user presses no key (or taps the screen) for some period of time, brightness (or backlight) is significantly lowered.

Lower consumption of power in desktop computer does not just cut the bill, but also has positive effects on our environment. This argument is boosted particularly today as we hear about global warming and its impact in Siberia. In terms of security, switching off of our computers has often been advised to Windows users, who are exposed to more attacking attempts (last critical patch two days ago). Likewise, in large computer clusters, switching off is an issue that extends beyond energy savings. It prevents accumulation of zombies across computer clusters worldwide.

Retrieval statistics: 18 queries taking a total of 0.131 seconds • Please report low bandwidth using the feedback form
Original styles created by Ian Main (all acknowledgements) • PHP scripts and styles later modified by Roy Schestowitz • Help yourself to a GPL'd copy
|— Proudly powered by W o r d P r e s s — based on a heavily-hacked version 1.2.1 (Mingus) installation —|