![](/static/253f0d9b/assets/icons/icon-96x96.png)
![](https://lemmy.world/pictrs/image/8286e071-7449-4413-a084-1eb5242e2cf4.png)
There’s a little overlap with things like Terraform but it’s not as bad as if they bought the companies that owned Chef or Puppet.
There’s a little overlap with things like Terraform but it’s not as bad as if they bought the companies that owned Chef or Puppet.
Can’t believe that’s gone through. They took JBoss when they bought RedHat so now it doesn’t have to compete with Websphere and when they bought HashiCorp Openshift doesn’t have to compete with Nomad. At this rate they’ll buy CyberArk and then that’s no more competition with Vault.
Ngrok
Twingate (what I use)
Unless we go the way of Independence Day or Three-Body Problem. At this point though I’d also probably say…
Please conquer us.
We’re sooooo fucking stupid.
Who needs strength when you can just bite and outrun anyone?
Even in this scenario it’s feasible for standards to change. ISBN-15 becomes a thing and suddenly you have books that never get an ISBN-13 so your primary key constraints cause an error for trying to insert a null. Granted, you can see a lot of these changes coming but again, they come on a schedule you don’t control.
Got hands on experience with this. Wasn’t my design choice but I inherited an app with a database where one of the keys was tied to a completely separate database. I mean at the time it probably made sense but the most unlikely of scenarios actually happened: that other database, the one I had zero control over, was migrated to a new platform. All of those keys were synthetic so of course they were like, “Meh, why we gotta keep the old keys?” So post-migration my app becomes basically useless and I spent 6 hours writing migration code, some of it on off hours, to fix my data.
So it’s questionable whether a foreign key of a completely different system is a natural key, but at the very least never use a key YOU don’t control.
That’s odd. I can’t remember the last time I’ve installed USB drivers on Windows. It either works or it doesn’t (like a 75% chance of it working though).
This board also has soldered memory and uses MicroSD cards and eMMC for storage, both of which are limitations of the processor.
Ah, yeah, hard no from me dog. Can we get one of the new Snapdragons tho? Please?
I kind of hate how you can not only nope out of nearly every puzzle with lockpicking but rogues get like half a dozen bonuses during the skill check so why are you even rolling the damn dice?
Did something happen or is this just, “Waaaahhh, China baaaaddd!”? It sounds like they actually had better reason to ban TikTok.
If OP has a thrift store nearby it’s pretty likely they can get both for under $30.
It was either questioned by morons or they used a modified version of the tool. Ask it how it feels today and it will tell you it’s just a program!
Not sure if you want to label it as a “captcha alternative”. In most cases I’m sure the captcha is used because they want a real person looking at the page (and the ads on the page). In this case it seems more like a way to keep either bots or people from doing nothing but consuming content (or hacking) without giving back something of value. Either way I really like the idea.
Other ways, in theory, I think you could do this kind of thing are torrent ratios (e.g. hosting one or moreLinux ISOs), general archiving (e.g. you get asked to return a random range of bytes from a file you’re supposed to be backing up), you run a weather station that reports temperature to the National Weather Service. You might think about a more general framework for just verifying if user X has been contributing something of value.
I’d be amazed if most of the Pi components weren’t from China but feel free to correct me.
Guess the community for some of these is about to get much bigger. I’m not in the market for an SBC but this is a big negative against the Pi.
Big pharma companies jack up the prices of life saving medicine that’s been affordable for decades and don’t lose a bit of sleep. You bet your ass a hobby electronics company will jack up prices as far as they think they can.
Nah, my company still uses Java but an open source version (Eclipse Temurin). We haven’t used Oracle Java in like 4 years.
One of the hardest issues to troubleshoot is a bad assumption. Be glad you only spent 2 hours on this.
Other than the low chance of you being targeted I would say only expose your services through something like Wireguard. Other than the port being open attackers won’t know what it’s for. Wireguard doesn’t respond if you don’t immediately authenticate.