

With?
Anything and everything Amateur Radio and beyond. Heavily into Open Source and SDR, working on a multi band monitor and transmitter.
#geek #nerd #hamradio VK6FLAB #podcaster #australia #ITProfessional #voiceover #opentowork
With?
I run projects inside Docker on a VM away from important data. It allows me to test and restrict access to specific things of my choosing.
It works well for me.
Before you start consolidating, consider what might happen if the switch is in an unexpected state. For example, someone turned off the heater or pump and you were expecting it to be on.
In other words, you need to consider what a “safe state” is for each thing and how your code, when it fails, reverts to that state. This is an example of “failsafe”.
Note that I said “when it fails”. This is true for all software, even on mission critical systems.
Source: I write software for a living.
About that.
Just because I’ve done it this way and haven’t had issues, doesn’t mean it’s the best or only way.
You dared to ask a question and the tools to explore answers are readily available.
This is how we as a society make progress.
Please don’t feel like my experience is the final answer to your question … my experience tells me that this is rarely … if ever … the case.
So … please … explore!
If you genuinely attempting to quantify this, you can create a swap file of any size right there on your drive. You could iterate and test every setting for every scenario. You could even change settings dynamically if you wanted to.
That said, I leave it to the kernel to figure out and over the past 25 or so years that’s been fine.
I’m guessing in the same way as Bit Torrent and others before it … with big flaming headlines, politicians foaming at the mouth, lawyers rubbing their hands with glee and the world for the general public becoming a little bit more shit whilst the actual miscreants carry on with impunity on some other platform or get funded by venture capitalists who make everything legal but no less palatable.
Source: I’ve been here for a while.
Only downside is that the 1080p monitor that’s currently got a full screen digital clock on it, facilitated by a recently dying Chromecast, will still be dying and the analogue clock attached to the hole in the Apple TV won’t allow me to see the time from the other side of the room in the dark.
I suppose I could strategically drill the hole and do both, but my hands aren’t that stable and my eyesight is fading, so other suggestions welcome.
As an aside, I just went hunting for the old Apple TV and haven’t yet found it, so there’s plenty of time before I have to commit either way.
You just reminded me that I have one. I’m going to see if I can repurpose it into a clock.
I miss Galeon …
Why do you care about votes?
What makes you think that a defederated instance votes are still captured?
Why do you care about what happens on another instance?
This is the second post with Unix and socks on my feed in the past few minutes.
There was a post about software and socks a few weeks or so ago where I replied about a company called functional software that made functional socks which I wore for years, which come to think about it also started a discussion about functional programming.
Anyway, here’s a community where the socks seem to be coming from.
Should I be worried that I know precisely what you’re referring to?
Also, report and block is all fine and well, but my client and the web client both automatically load the image, so the miscreants know precisely which account opened it.
Not to mention that I have to open the account to block it.
Is there a better way?
Can your detection method be automated and federated?
I’m asking because this is probably the thin end of the wedge and is likely to increase exponentially, especially since anyone can set up an instance and do whatever they like with it.
Google Lens says:
Which one of these commands is correct?
A sed -e 's/\b(\w+)\b/echo \1 | rev/g' file.txt
B: sed 's/b\w+\b/echo & | rev/ge' file.txt
Csed -e 's/(\w+)/$(echo \1 | rev)/g' file.txt
D: sed 's/([a-zA-Z]\+\)/\n&\n/g; s/\n\(\)\(.*\)\(\)\n/\3\2\1/g; s/\n//g' file.tx
It’s interesting that Google doesn’t even get all the text. I had to manually extend the selection and that still misses the “t” on the end of answer D, munches C and more alarmingly changes the case for “-E”.
It’s not just me being tempted … right?
I’ve never used the tool, but I’m guessing that your Oracle database can create an SQL dump of its schema which presumably is how this tool ingests a database to chart.
Depends entirely on what “Production” means. In a corporate environment it means something completely different from a homelab
If you’re doing this for real, you’d have two identical environments.
If it’s playing with Docker or Kubernetes, you don’t need anything more than a VM with Linux and Docker.
If you want to get serious, you can also set up a sandbox on EC2.
If that’s how you want to run your server that’s your choice, but if it were me, I’d think long and hard about the legal implications of doing this.
So far you’ve not said anything about what you’re trying to achieve and that’s not helping.
What specifically are you attempting to achieve, because right now, what little you have shared sends up red flags and rings the alarm bells … loudly.
A search engine?