Beefy Boxes and Bandwidth Generously Provided by pair Networks
No such thing as a small change
 
PerlMonks  

Re: Favorite Hacks in Emacs

by morgon (Curate)
on May 13, 2009 at 14:55 UTC ( #763782=note: print w/replies, xml ) Need Help??


in reply to Favorite Hacks in Emacs

Don't listen to these people.

They follow a dangerous cult.

I'll post "favourite hacks in vim" soon :-)

Replies are listed 'Best First'.
Re^2: Favorite Hacks in Emacs
by metaperl (Curate) on May 13, 2009 at 15:03 UTC
    :)

    Perl and Emacs are very similar - kitchen sink philosophy.

    VI falls in line with Unix toolbox philosophy.

    RDBMSes are a similar software prison to Perl and Emacs.

    Never forget: the car is in the cdr, not the cdr in the car

Re^2: Favorite Hacks in Emacs
by Bloodnok (Vicar) on May 13, 2009 at 15:03 UTC
    You beat me to it morgon :-D

    When a sysadmin on Solaris, my favourite emacs hack was to remove the damn thing - one of 2 scenarios kept recurring (both directly traceable to emacs):

    • filling /tmp ... causing kernel panic.
    • process table filling up - preventing any other operation - self-evidently a hard reset was always required as the fix

    A user level that continues to overstate my experience :-))

Log In?
Username:
Password:

What's my password?
Create A New User
Node Status?
node history
Node Type: note [id://763782]
help
Chatterbox?
[Corion]: :-D
[Corion]: I think that ITIL is mostly to prevent people from doing harm to a system that basically runs unattended :)
[Corion]: Maybe you could reduce ITIL to a computer network, a man and a dog. The network runs the computations. The man is there to feed the dog. The dog is there to prevent the man from accessing the computers.
[marto]: from experience of this side of the fence, it's all about proving to people that you are ITIL compliant, then the client ignores logical processes anyway :P
[marto]: when you work on the outside, for a client, you can make them aware of the stupids, but they don' t always listen :/
[Corion]: Yeah, you can lead them to water, but it's illegal to drown them...
[Discipulus]: Here my solution marto: create a win fake machine insied AD. do a micro fake partition foreach remote partition you wont to monit. put a web server that acept from data from remote systems and full fake partition as needed. fake partition are Mb. ;=)

How do I use this? | Other CB clients
Other Users?
Others contemplating the Monastery: (12)
As of 2017-01-24 10:35 GMT
Sections?
Information?
Find Nodes?
Leftovers?
    Voting Booth?
    Do you watch meteor showers?




    Results (203 votes). Check out past polls.