I really like QuollWriter.
- 1 Post
- 203 Comments
People are using NAS for things they aren’t meant to do. They are a storage service and aren’t supposed to be anything else. In a typical data center model, NAS servers are intermediate storage. Meant for fast data transfers, massive storage capabilities and redundant disk fault tolerance. We are talking hundreds of hard drives and hundred gigabit connection speeds inside the data center. This is expensive to run, so they are also very energy efficient, meant to keep the least amount of required disks spinning at any given moment.
They are not for video rendering, data wrangling, calculations or hosting dozens of docker containers. That’s what servers are for.
Servers have the processing power and host the actual services. They then request data from a NAS as needed. For example, a web service with tons of images and video will only have the site logic and UI images on the server itself. The content, video and images, will be on the NAS. The server will have a temporary cache where it will copy the most frequently accessed content and new content on demand. Any format conversion, video encoding, etc. Will be done by the server, not the NAS.
Now, on self-hosting of course, anything goes and they are just computers at the end of the day. But if a machine was purpose made for being a NAS server, it won’t have the most powerful processor, and that’s by design. They will have, however, an insane amount of sata, PCI-e channels and drive bays. And a ton of sophisticated hardware for data redundancy, hotswap capacity and high speed networks that is less frequent in servers.
dustyData@lemmy.worldto Android@lemdro.id•Samsung eyes new battery tech to break free from its 45W charging prisonEnglish11·1 个月前You are wrong in all of your replies, but I have ran out of time to educate you. Good day.
dustyData@lemmy.worldto Android@lemdro.id•Samsung eyes new battery tech to break free from its 45W charging prisonEnglish4·1 个月前Phones have had pretty good battery management for many years now. My phone adaptive charge gets to 80% and stays there without charging until 20 minutes before my alarm when it activates charging again to get to 100% exactly as the alarm goes off. The default behavior is a basic care that makes it so the battery stops charging at 100%, waits to drop to 95% then goes back again to full in a cycle. The risk of overcharging from leaving a phone charger connected overnight has been null for about a decade. Fast charging, on the other hand will always degrade the battery. It is way too much tension over way too short of a time span.
Trickle charging has only ever meant keeping electrical voltage on a full battery for acid batteries (actually overcharging). It has never meant that for consumer electronics.
dustyData@lemmy.worldto Android@lemdro.id•Samsung eyes new battery tech to break free from its 45W charging prisonEnglish31·1 个月前Trickle charging does not harm batteries. On the contrary, the slower you charge a battery the safer it is. This is why all battery protection reduces charging wattage as the battery gets more and more full. Fast charging damages batteries, faster charging means faster degradation. There’s no way around that, it’s just physics, entropy comes for us all. Battery makers are just betting you’ll buy a new device before it becomes noticeable.
dustyData@lemmy.worldto techsupport@lemmy.world•vbs malware movemenoreg.vbs probably ruined our presentation clickers4·2 个月前That virus has been around since the 90s. Windows actually took a long time to block it. I have seen it in the wild for decades, with different iterations. Linux is indeed immune as it is a visual basic script which doesn’t run without permission on Linux. The USBs also have an autorun, but Linux won’t do anything with it.
You can actually check this on Linux, the VB script can be easily open on a text editor and its coding read plainly. The dongles are usually pretty generic if they’re BT, and paired to a single device if they’re 2.4Ghz WiFi. They should have flash memory, but how vulnerable they are to this type of malware is unknown to me. I do remember having read code that switched the read-only flag of USB filesystems. But I haven’t done IT in almost a decade, I’m probably out of date with the technicals. I do remember that antivirus couldn’t even detect this particular attack until late in the 2010s, and automated pendrive fixes were made mostly by the underground and Foss scene.
Beware, Gnucash is meant to be pro level accounting software. Is not a simple ledger or a tech/crypto gateway. I also use it for my personal life, but there’s like 30% of features I don’t use because they’re business accounting stuff I don’t need. It predates the cloud, it cares not for the latest trends, it crunches numbers and spits out reports. That’s part of what I like about it. It is not simple but it also isn’t bloated.
On the contrary. It relies on the premise of segregating binaries, config and data. But since it is only running one app, then it is a bare minimum version of it. Most containers systems include elements that also deduplicate common required binaries. So, the containers are usually very small and efficient. While a traditional system’s libraries could balloon to dozens of gigabytes, pieces of which are only used at a time by different software. Containers can be made headless and barebones very easily. Cutting the fat, and leaving only the most essential libraries. Fitting in very tiny and underpowered hardware applications without losing functionality or performance.
Don’t be afraid of it, it’s like Lego but for software.
As someone who has had neighbor’s children randomly walk into my house and demand things like food, water (I won’t say no to children, I’m not heartless), and use of my TV and internet. I’m sorry, but don’t let kids be pest is unironic in some areas. Some people haven’t socialized their kids properly and we were the ones who had to explain to these kids (4 to 6 year olds) that wandering without permission into other people’s houses was not only inappropriate but dangerous to them. We, the strangers, telling these kids that they should be wary of strangers. The parents just didn’t give a fuck and wouldn’t even talk to us, but they were apparently fine with their kids roaming into stranger’s homes. I’m glad we moved away.
In the Soviet Union, the Proletariat had taken control
Then why did they kill so many peasants and workers?
The outcome was quite positive for the Working Class.
Except for the ones who are dead.
[…] implementation of the dictatorship [of the proletariat] was clearly defined by Lenin as early as in 1906, when he argued it must involve “unlimited power based on force and not on law,” power that is “absolutely unrestricted by any rules whatever and based directly on violence.”
Leszek Kołakowski
Never idolize anyone. I think the lack of certainty in the number of deaths Lenin was responsible for adds more horror to his decisions. No matter how pretty his ideas were, or how cute he looked with a cat, an oligarch is an oligarch, and as soon as a revolutionary acquires power, they become the oppressor.
Fascism has no ideology. They will just take any varnish that makes them look acceptable in the short term. Just like fake tan, it’s just gold paint over a turd.
dustyData@lemmy.worldto Linux@lemmy.ml•A big part of learning Linux is screwing up computers and starting over.1·3 个月前I’ve never in 15 years of Linux use and tinker have ever screwed a kernel. And I compiled LFS once.
That’s because of active directory. It makes managing hundreds of users, across as many devices, in a centralized manner, easier. You make a user for the person with the intended access scheme, hand them a random laptop imaged from a master system OS, and off they go with access to all the software and tools tied to their user login. There’s no similar alternative with a robust support service for Linux clients. If there were, then changing a culture to Linux clients wouldn’t have so much friction.
Go atomic immutable. Is it different? Yes. But the system is always updated without any package hell. Makes managing a system for others extremely simple. Bazzite for gamers, aurora for workstations, bluefin if you like Gnome.
It gives you the right picture when you asked for a single straight track on the prompt. Now you have to spend 10 hours debugging code and fixing hallucinations of functions that don’t exist on libraries it doesn’t even neet to import.
dustyData@lemmy.worldto Linux@lemmy.ml•Apparently, 12% of Technology Workers Believe that MacOS is based on Linux2·4 个月前Just remember that they didn’t certify macOS for any practical reason, Apple was just weaseling out of a lawsuit and figured that paying the certification was cheaper than damages. I think they lost the certification some time later. Newer macOS is not Unix certified.
dustyData@lemmy.worldto Asklemmy@lemmy.ml•Are there any common household items or products that you think are designed incredibly poorly?5·4 个月前It’s usually the electronic drivers. They overoverheat and degrade. Most burned LED bulbs still have working LEDs and just need to replace some component of the driver board.
I’m “excited about buying a new vacuum cleaner” old. Because I already bought the rugs.