Data Science
Or complete clients, doesn’t even need to be great but incorporating all features would be nice.
There seems to be mixed reactions to this suggestion. I don’t know enough to understand why.
Enjoy your Friday
Nice article.
why bother? Why I self host
Most of this article is not purely about that question, but I dislike clickbait, so I’ll actually answer the question from the title: Two reasons.
First of all, I like to be independent - or at least, as much as I can. Same reason we have backup power, why I know how to bake bread, preserve food, and generally LARP as a grandmother desperate to feed her 12 grandchildren until they are no longer capable of self propelled movement. It makes me reasonably independent of whatever evil scheme your local $MEGA_CORP is up to these days (hint: it’s probably a subscription).
It’s basically the Linux and Firefox argument - competition is good, and freedom is too.
If that’s too abstract for you, and what this article is really about, is the fact that it teaches you a lot and that is a truth I hold to be self-evident: Learning things is good & useful.
Turns out, forcing yourself to either do something you don’t do every day, or to get better at something you do occasionally, or to simply learn something that sounds fun makes you better at it. Wild concept, I know.
Contents
Introduction
My Services
Why I self host
Reasoning about complex systems
Things that broke in the last 6 months
Things I learned (or recalled) in the last 6 months
- You can self host VS Code
- UPS batteries die silently and quicker than you think
- Redundant DNS is good DNS
- Raspberry PIs run ARN, Proxmox does not
- zfs + Proxmox eat memmory and will OOM kill your VMS
- The mystery of random crashes (Is it hardware? It’s always hardware.)
- SNMP(v3) is still cool
- Don’t trust your VPS vendor
- Gotta go fast
- CIFS is still not fast
- Blob storage, blob fish, and file systems: It’s all “meh”
- CrowdSec
Conclusion
He made up hypothetical scenarios that nobody asked about, and then denigrated Rust by attacking the scenarios he came up with.
This seems to be the textbook description of a strawman argument.
It’s also a microkernel and intentional not POSIX compliant (but it’s close to compliant). I like the project, but it’s very experimental on purpose, so we should set our expectations accordingly. I’d love to see it become a success, but it may not be or it may only be successful in a smaller niche than the current Linux ecosystem.
That said, it seems very open to new contributors. I hope more people can help it along.
What self-hosted services did you set up passkeys on? How did setting it up go?
Is there a passkey setup that’s easy to self host? I think passkeys with a backup would be best.
I’ve been using Podverse but I’m not sure if it meets your requirements. I just use it in the browser when I’m on Windows. The Android app doesn’t seem like a web wrapper. Its source code is available under the AGPL. I’ve been paying $18 per year for the hosted service, but they provide instructions on self hosting.
I’m expecting that everything that the statistical models reveal or make convincing results about which benefit the owners of the models will be exploited. Anything that threatens power or the model owners will be largely ignored and dismissed.
The few laws that govern this type of activity will be strictly adhered to, right?
You should be aware that this is classified and marketed as a microcontroller, so it’s just a bootloader to some code with no OS or a RTOS.
Something like the RPi Zero is a SBC that’s relatively close in size.
I don’t understand their business model, is it just to get acquired to become salaried?
The two rooms linked above are mirrored, so you can use either XMPP or Matrix, from any client you prefer, on pretty much any platform under the sun!
There’s no XMPP link in the README above the quoted statement.
Awesome! Best of luck to the new team!
A couple of months ago I wrote up some instructions for someone that was trying to make the switch to neovim. They reported back that it was helpful.
Check it out:
https://lemmyverse.link/programming.dev/comment/9552694
I’m on the Neovim train and I’m not getting off at this junction.
But more high quality choices is a good thing.
How would that provide additional security in the particular circumstance of someone having access to the Signal encryption keys on someone’s phone?
A secure enclave can already be accessed by the time someone can access the Signal encryption keys , so there’s no extra security in putting the encryption keys in the secure enclave.