

Ok, this prompted me to root-cause the issue. A bad cable between laptop and USB dock seems most likely. Hardware issue, not Linux!


Ok, this prompted me to root-cause the issue. A bad cable between laptop and USB dock seems most likely. Hardware issue, not Linux!


Linux revoked my mic permissions in the middle of a call today, on Google Meet. Happened before on Zoom.
I have not root-caused it to see if there was flaky hardware or what.


The marketing mixes metaphors, talking about gardening, growing, curating… all part of sustainable process that includes plants dying.
It also uses words like forever and permanent.
Having content live forever is at odds with metaphors of the natural world, where things naturally die.


How does it handle helm features that are not valid compose features? Silent failure or loud warning?


Are they European?


To explain how HAproxy and competing tools solve this:
Two servers are prepared to be the single reverse proxy, but one is active. They constantly communicate with a “heartbeat”. When the active one fails to send a heartbeat, the secondary executes the steps to become the active primary. When the primary’s heart starts beating again, it becomes active again.
So there can be a few seconds of downtime, but the failover is automatic.


Yes, especially if people use the “latest” tag, trusting whatever the container might be updated to do in the future.
I am using Navidrome and if it has significant bugs, I haven’t run into them yet.
I am the sysadmin and I approve this message.


Part of the app resides on the GitHub infrastructure, where GitHub stores, processes and displays results. So their costs are not zero.
But GitHub could take a “tax the rich” approach to pricing by charging enterprise customers more for self-hostingand leave it free for others.
A lot of open source is funded like that— most funding for a project comes from a very few companies and everything else uses it free or for very low donations or costs.
Years ago I used a voicemail to text service that worked like that— It was powered by human transcribers.
You have never had some family member experience a broken website that they needed to work but you were not around to fix it on the server side?
Let me get this straight, you want to suspend AND resume?
I assumed this stage had already happened.
A floppy disk is fine, just like Photoshop uses terms like dodge and burn, references to obsolete dark room methods, like cutting and “pasting” were literally how some layout projects worked.
Referencing the last physical incarnation of saving a file seems fitting!
Imagine a beach of infinite length with one lemonade stand on it.
Where do you open a second lemonade stand to maximize sales if people will buy from the closet stand?
The answer: next to the first stand. Everyone to the left of your stand will find you are the best option and everyone to the right will choose the other.
This model explains why two political parties along a spectrum can end up not too different from each other in an attempt to capture the most votes.
Because less than 1% of users would use it and your trusting the security of not one bit partner but thousands of ever-changing small partners.
Also, email is already federated.
Xh is my favorite— a rewrite of httpie with some fixes.


I haven’t heard of that happening much outside of law enforcement raid.
Laptops, yeah. But stories of homes being broken into to steal servers?
Store the secrets on a Yubikey. They are unstealable then.
Yubico has their own GUI app or you can wrappers for their CLI tool to use something like dmenu, rofi or Fuzzel to pick one.