• 1 Post
  • 203 Comments
Joined 2 年前
cake
Cake day: 2023年6月11日

help-circle


  • People are using NAS for things they aren’t meant to do. They are a storage service and aren’t supposed to be anything else. In a typical data center model, NAS servers are intermediate storage. Meant for fast data transfers, massive storage capabilities and redundant disk fault tolerance. We are talking hundreds of hard drives and hundred gigabit connection speeds inside the data center. This is expensive to run, so they are also very energy efficient, meant to keep the least amount of required disks spinning at any given moment.

    They are not for video rendering, data wrangling, calculations or hosting dozens of docker containers. That’s what servers are for.

    Servers have the processing power and host the actual services. They then request data from a NAS as needed. For example, a web service with tons of images and video will only have the site logic and UI images on the server itself. The content, video and images, will be on the NAS. The server will have a temporary cache where it will copy the most frequently accessed content and new content on demand. Any format conversion, video encoding, etc. Will be done by the server, not the NAS.

    Now, on self-hosting of course, anything goes and they are just computers at the end of the day. But if a machine was purpose made for being a NAS server, it won’t have the most powerful processor, and that’s by design. They will have, however, an insane amount of sata, PCI-e channels and drive bays. And a ton of sophisticated hardware for data redundancy, hotswap capacity and high speed networks that is less frequent in servers.



  • Phones have had pretty good battery management for many years now. My phone adaptive charge gets to 80% and stays there without charging until 20 minutes before my alarm when it activates charging again to get to 100% exactly as the alarm goes off. The default behavior is a basic care that makes it so the battery stops charging at 100%, waits to drop to 95% then goes back again to full in a cycle. The risk of overcharging from leaving a phone charger connected overnight has been null for about a decade. Fast charging, on the other hand will always degrade the battery. It is way too much tension over way too short of a time span.

    Trickle charging has only ever meant keeping electrical voltage on a full battery for acid batteries (actually overcharging). It has never meant that for consumer electronics.



  • That virus has been around since the 90s. Windows actually took a long time to block it. I have seen it in the wild for decades, with different iterations. Linux is indeed immune as it is a visual basic script which doesn’t run without permission on Linux. The USBs also have an autorun, but Linux won’t do anything with it.

    You can actually check this on Linux, the VB script can be easily open on a text editor and its coding read plainly. The dongles are usually pretty generic if they’re BT, and paired to a single device if they’re 2.4Ghz WiFi. They should have flash memory, but how vulnerable they are to this type of malware is unknown to me. I do remember having read code that switched the read-only flag of USB filesystems. But I haven’t done IT in almost a decade, I’m probably out of date with the technicals. I do remember that antivirus couldn’t even detect this particular attack until late in the 2010s, and automated pendrive fixes were made mostly by the underground and Foss scene.


  • Beware, Gnucash is meant to be pro level accounting software. Is not a simple ledger or a tech/crypto gateway. I also use it for my personal life, but there’s like 30% of features I don’t use because they’re business accounting stuff I don’t need. It predates the cloud, it cares not for the latest trends, it crunches numbers and spits out reports. That’s part of what I like about it. It is not simple but it also isn’t bloated.


  • dustyData@lemmy.worldtoSelfhosted@lemmy.worldWhat is Docker?
    link
    fedilink
    English
    arrow-up
    17
    ·
    2 个月前

    On the contrary. It relies on the premise of segregating binaries, config and data. But since it is only running one app, then it is a bare minimum version of it. Most containers systems include elements that also deduplicate common required binaries. So, the containers are usually very small and efficient. While a traditional system’s libraries could balloon to dozens of gigabytes, pieces of which are only used at a time by different software. Containers can be made headless and barebones very easily. Cutting the fat, and leaving only the most essential libraries. Fitting in very tiny and underpowered hardware applications without losing functionality or performance.

    Don’t be afraid of it, it’s like Lego but for software.


  • dustyData@lemmy.worldtocats@lemmy.worldNo issues here
    link
    fedilink
    English
    arrow-up
    16
    ·
    edit-2
    2 个月前

    As someone who has had neighbor’s children randomly walk into my house and demand things like food, water (I won’t say no to children, I’m not heartless), and use of my TV and internet. I’m sorry, but don’t let kids be pest is unironic in some areas. Some people haven’t socialized their kids properly and we were the ones who had to explain to these kids (4 to 6 year olds) that wandering without permission into other people’s houses was not only inappropriate but dangerous to them. We, the strangers, telling these kids that they should be wary of strangers. The parents just didn’t give a fuck and wouldn’t even talk to us, but they were apparently fine with their kids roaming into stranger’s homes. I’m glad we moved away.



  • dustyData@lemmy.worldtoMemes@lemmy.mlHappy birthday, Lenin!
    link
    fedilink
    English
    arrow-up
    1
    arrow-down
    5
    ·
    2 个月前

    […] implementation of the dictatorship [of the proletariat] was clearly defined by Lenin as early as in 1906, when he argued it must involve “unlimited power based on force and not on law,” power that is “absolutely unrestricted by any rules whatever and based directly on violence.”

    Leszek Kołakowski





  • That’s because of active directory. It makes managing hundreds of users, across as many devices, in a centralized manner, easier. You make a user for the person with the intended access scheme, hand them a random laptop imaged from a master system OS, and off they go with access to all the software and tools tied to their user login. There’s no similar alternative with a robust support service for Linux clients. If there were, then changing a culture to Linux clients wouldn’t have so much friction.