1 |
M. Edward (Ed) Borasky wrote: |
2 |
|
3 |
>As a side note, I do such things (Linux capacity planning) for a living |
4 |
>and am rather unlikely to deliver major quantities of valuable advice |
5 |
>for free. Perhaps there is someone in the original poster's part of the |
6 |
>world who would, though. |
7 |
> |
8 |
> |
9 |
> |
10 |
Thanks |
11 |
|
12 |
>Anthony Gorecki wrote: |
13 |
> |
14 |
> |
15 |
> |
16 |
>>(apologies if this is delivered twice) |
17 |
>> |
18 |
>>Geisel, |
19 |
>> |
20 |
>>It's unlikely that someone would take the time to analyze your new computer |
21 |
>>system and make blind suggestions. You'd have better luck asking a specific |
22 |
>>question, preferably after doing some research of your own. See |
23 |
>>http://www.catb.org/~esr/faqs/smart-questions.html |
24 |
>> |
25 |
>> |
26 |
>>Secondly, extracting some header information from your message: |
27 |
>> |
28 |
>>X-Filtering-Reason: No text/plain message body was present. |
29 |
>>X-Filtering-Reason: The message contained data that was of an illegal content |
30 |
>>type. |
31 |
>>X-Karma: -2 |
32 |
>> |
33 |
>> |
34 |
>>and after briefly scanning your message (in unrendered markup form), here are |
35 |
>>a few suggestions: |
36 |
>> |
37 |
>>- Send your mail in plain text format. Many of the Gentoo developers and users |
38 |
>>on this mailing list can read HTML text without having it rendered, but |
39 |
>>they're more likely to simply send your message on an instantaneous trip to |
40 |
>>the trash; many mail filters will do this automatically (mine included). |
41 |
>> |
42 |
>>- Don't waste message space by sending virtual business cards (the "illegal |
43 |
>>content type" mentioned in the second filtering header). If you need to |
44 |
>>provide information about yourself, add a web address to your signature; save |
45 |
>>us the trouble of looking at data that's of no interest. If someone wants |
46 |
>>more information, they'll search the web or visit the website that you've |
47 |
>>listed in your signature. |
48 |
>> |
49 |
>>- Be concise. Basic information about the computer is useful. A raw dump of |
50 |
>>data, spanning your entire device subsystem, is not. This is also, from a |
51 |
>>security standpoint, potentially unwise. |
52 |
>> |
53 |
>> |
54 |
>> |
55 |
>> |