Letters to the Editor

Readers sound off.

I think the first “corrupted terminal” answer on page 72 of the February 1998 issue needs some work:

  1. cat was NOT “designed to handle ASCII files.” cat conCATenates files to standard output (hence the name). It concatenates one or more files from argv, or if argv is empty, simply from stdin until EOF. There is nothing in cat or its documentation to suggest that it was designed for ASCII files, or could not handle binary files.

  2. cat does not “interpret a lot of the binary file as control sequences.” The terminal emulation supported by the console code (or an xterm) interprets any control sequences it is sent via any program that writes to it. These can come from any program. The terminal emulator is supposed to do this. It's why things like Pine and Emacs work, for example.

Here's a question for you: how many Linux seats are there, and how many new seats a month are there? Any idea?

—Ron Minnich rminnich@sarnoff.com

No idea. Vendors don't like to give their sales numbers to their competition, and those numbers would probably be the most accurate count. There is the Linux Counter, but not everyone knows about it or takes the time to register so its count is way low. If you haven't registered, go to http://counter.li.org/ and do so—now!


Red Hat CDE

I recently saw the review of Red Hat CDE by Don Kuenz in the January edition of LJ, and decided to buy the software. However, on filling in the order, I saw that the January price for CDE was 25% higher than the price advertised in LJ. I think it's unfortunate that the information in the published review was out of date before I even received the magazine. I am also disappointed that Red Hat, while obviously benefitting from the PR of this review, are not prepared to honour the advertised price.

—Dr. Steven Bird Steven.Bird@edinburgh.ac.uk


One Click, Universal Protection: Implementing Centralized Security Policies on Linux Systems

As Linux continues to play an ever increasing role in corporate data centers and institutions, ensuring the integrity and protection of these systems must be a priority. With 60% of the world's websites and an increasing share of organization's mission-critical workloads running on Linux, failing to stop malware and other advanced threats on Linux can increasingly impact an organization's reputation and bottom line.

Learn More

Sponsored by Bit9

Linux Backup and Recovery Webinar

Most companies incorporate backup procedures for critical data, which can be restored quickly if a loss occurs. However, fewer companies are prepared for catastrophic system failures, in which they lose all data, the entire operating system, applications, settings, patches and more, reducing their system(s) to “bare metal.” After all, before data can be restored to a system, there must be a system to restore it to.

In this one hour webinar, learn how to enhance your existing backup strategies for better disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible bare-metal recovery solution for UNIX and Linux systems.

Learn More

Sponsored by Storix