[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

BUGS INFORMATIONS




DEAR DEVELOP DEBIAN.ORG 

GIUSEPPE PETAZZONI INFORM DEBIAN.ORG OF BUGS IN TEMPLATE AMD64 AND i386 RELEASE 6.0.0 WHEN I RECONSTRUCT ISO DVD 6.0.0 AMD64 OR i386 
IF POSSIBLE YOU SEND MAIL TO ME WHEN YOU RESOLVED THE BUG OF DEBIAN.ORG RELEASE 6.0.0

SINCERELY
GIUSEPPE PETAZZONI





















1

2









































COMPANY

COMPANY

NATIONAL INTERNATIONAL

NATIONAL INTERNATIONAL

OPERATING SYSTEMS SOFTWARE

SYSTEMS DATA STORAGE













www.ldpmit.net

www.petazzonidata.net







www.ldpcaz.com

www.petazzonidata.com







www.ldpmit.it




















































3

4













































COMPANY

COMPANY

NATIONAL INTERNATIONAL

NATIONAL INTERNATIONAL

SYSTEMS MEDIA SOFTWARE

SYSTEMS COMPANY SOFTWARE













www.mediamit.net

www.companyeaz.com







www.factorymit.net

www.aziendaeaz.it







www.mediamit.it










www.fabbricamit.it




































Informations for Investors






The difficulties are the Oilmen to find Gas or Oil in 2000 or 10,000 meters below the ground have the Software Systems Constructors for the large amount of variables that affect the processes of construction of Software Systems or Oil exploration, require personnel highly trained after they have been constructed to support the Users, every software system has millions of variables and makes such operations Media, if we do Finance, Insurance Bank Operations must use another software system with other variables and written with another language .






























































































Dear Ladies and Gentlemen Good morning, the Technology Industryman and Businessman Giuseppe Petazzoni as Inventor , Applicant , Proprietary of 300 Software Systems wants to present to potential Investors such as International Investment Funds, Business, Companies Multinational Banks, National Governments, the Systems in 36 languages tested for National Operations and International use of Compiuters, Phones Internet Tablet Internet, Internet Servers, Clouds, Integrated Systems compiuters, Supercompiuters Storage of data, Big data.
Over the last 50 years were born a few software systems that have developed around the world to make more than 50% of the Corporate Operations for use and / or Business in different segments Cheap described above, the software systems are two: 1) Windows with SQL Server | 2) Linux Petazzonidata SQL, The No. 1) is Proprietary Software Systems which have the closed source code owned by Microsoft, the No. 2) are Software Systems that have the source code open for part of Applications, the first application it was written by Linus Torvalds the Kernel start in 1992 with the collaboration in more years to other programmers who developed the drivers of Systems with Public License GPL v2. Other programmers have developed graphical interfaces and the basic functionality of compiuters taking care of the translations into various languages, testing the quality of written applications under the GPL v2 license.






























































































Premise, the Computers are like cars are complex machines, which require years of experimentation research development to be built for the cars to go from Rome to Milan serves Diesel or Gasoline otherwise the car will not start, and the same goes for the compiuters that with the software start and make Bank transactions, Insurance, Chemicals, Construction, Energy, Hospitals, Institutions, Processes Machines, Media, Person, Services, every day month year, individually or in Groups.



















































In 1993 Giuseppe Petazzoni start to experiment and test the quality of Linux based applications written under GPL v1. GPL v2. , Making the first experiment of its applications with Linux kernel.










































Page 1

















The experiment was done in the laboratory in the evening hours including Saturdays and Sundays from 20 pm to 24 for long 15 years to try to test the code licensed under GPL v1 GPL v2 written by programmers Europeans, Americans, Asians with transfers in the United States to Linux World in the periods of events, Intel, IBM, Compaq, HP, Siemens, NEC, Toshiba, Fujitsu, Hitachi, Cisco, sponsors events.
D) Companies, Systems D.1) Servers Desktop Internet Companies 1 Billion Fixed Software Systems, D.2) Phones Internet Tablet furniture 1 Billion Software Systems. I want to point out that from the Market research carried out by Nielsen average Person changes Phones Internet Tablet furniture every six months and the new versions of Internet Phones Tablet furniture require new Software Systems.







































































Another report published by the UN on average about every billion people using compiuter and mobile, 100 million use it to Hacking, committing the crimes Cibercrime damaging the software systems and stealing information from Compiuter Phones Internet Tablet Internet furniture or Secure Internet Servers of People, Companies, Institutions, Organizations, and consequently the staff that supports Software Systems installed on compiuter furniture and Secure Internet Servers must monitor Server hour by hour, to intervene to repair damaged Software Systems, accordingly staff must be prepared at the highest level to minimize the damage caused by Cibercrime.









After experiencing tested for long 15 years the applications under Linux kernel and basic Applications, I started the day and a few days in 2008 also at night to write critical applications Create Software Systems Sets for Selling under Commercial License for Operations in the Petroleum Sector that are under Development of Advanced.























































In 2012 using parts of applications written in previous years and writing new applications under license Commercial I created 300 Software Systems of which 100 Software Systems are under development and Tests ;













































Other 200 Software Systems make the following operations: A) Operating Systems Software, A.1) compiuter Furniture 3.5 Billion Systems Software, A.2) Phones Tablet Internet Furniture 7 Billion Software Systems, A. 3) Secure Internet Servers 2 Billion Software Systems | B) of Data Storage Systems, B.1) Servers Internet Data Set 1 Billion Software Systems, B.2) Servers Internet Storage Set 1 Billion Software Systems | C) Systems Media, C.1) Servers Desktop Internet Media Secure 350 Million Systems Software, C.2) Phones Tablet Internet Furniture 3.5 Billion Software Systems |
















































































.




















Page 2

















The reasons are manifold, unfair competition between Companies, Institutions, Organizations, Psicology of Person who use the Software Systems for espionage counterespionage misdirection, psicology of Persons who use the Software Systems for: financial traffic, weapons, Illegal or expired products , of rugs, of corruptions, human rights, marine hijacking, illegal traffics of cars or trucks.












































































In the World that use or using furniture and Secure Software Systems Mobile or Fix in 2015 are 7.2 billion people and 2 billions of Companies Organizations Institutions, with the prediction that in 2050 the Persons will come to 9 Billion UN data, in the media or come to have 1 Internet Phone Tablet Mobile, 1 Computer Mobile, 1 Fixed Computer , consequently the Sold and supported Software Systems are or come to be over the next five years 23.6 billion, of which only 700 million are or will be in the hands of hackers and they are or will be supported rather discouraged.






















































































































Ferrara Italy 21 Mar 2016

























































































































































































































Page 3








Reply to: