My first and third job had daily standup, my second and fourth job don’t have daily standup. I’m on my fourth job. I love not having standup.
My first and third job had daily standup, my second and fourth job don’t have daily standup. I’m on my fourth job. I love not having standup.
Obviously those claims are overblown lol, AIs literally cannot think. They are currently LLMs. They are impressive, sure, but anyone knows the technology knows that this is NOT AGI, and it is entirely possible we will never get AGI. It’s also possible we will get AGI, but this ain’t it. lol
Still impressive imo, I have friends who work in IT who don’t even self-host lol
I like to call myself a professional idiot. I love tinkering with my homelab setup.
As someone with a strong tech background, that’s just impressive to me. It’s cool to see non-technical people are interested in self-hosting too, and for good reason.
Technically there’s no substitute for testing in production lol
Although ideally you’d want to test it beforehand…
Thankfully that’s one thing that can be restored between BIOS versions for my motherboard lol
Depending on your BIOS and/or motherboard, you can’t restore them between versions. The point of clearing the BIOS settings after flashing a new version is to ensure that you only have values that are expected, which is why restoring backups can often be blocked between versions.
Yay, another BIOS update!
I am getting so sick of all these BIOS updates because of all these security vulnerabilities all the time. It is so tiring having to set up my settings all over again all of the time. Earlier this year, or maybe it was last year, it felt like every month or two there was a new BIOS update for a new security vulnerability.
Woohoo! We internal now! No more FQDN collisions!
I think you might be misunderstanding me.
According to the CVE Numbering Athorities, there can be vulnerabilities that result in service being denied, and they refer to them as a denial-of-service vulnerability. For example, there can be a bug in a program that causes it to crash if you perform a certain set of steps/actions, thus resulting in the service being denied. Whereas traditionally, a DoS/DDoS attack is simply flooding a target with more bandwidth than they have available downstream bandwidth. Sending massive amounts of data to overwhelm a service is not the same thing as finding a unique set of actions to cause the program to crash.
So in theory, yes, a memory leak could amount to and result in a security vulnerability, like if the memory leak is reproducible and so severe it causes a service to crash.
I don’t think memory leaks could ever amount to a security vulnerability
In theory it could, after all there are technically denial-of-service vulnerabilities (not DoS/DDoS attacks, that is something different) according to CVE Numbering Athorities.
Well yeah, they always want to squeeze more water from a stone. They need every last drop.
Oh yep that’s me lmao, though I have sometimes used the stuff I never planned on using. Data archiving is important!
Don’t use hardware RAID, use a nice software RAID like zfs. 2 HDDS and an OS SSD would be a great use case for zfs.
Make the fade only apply 25% (or maybe a percentage range) of the time at first, slowly increase how often and how intense the opacity is. lol
Timezones are kind of a necessary evil though, because without them then you’d have to check regions (or zones) to see if 1PM in China is the same thing as 1PM in Australia is the same thing as 1PM in Bolivia.
Great write-up! The biggest bugs always end up being the “simplest”/one-line things lol
Sure but it still requires trusting them when they pinky promise they won’t send any recall data. Fuck them tbh. It just makes me feel even more right about my decision to switch to Linux years ago.
My current company treats effort the same as time. I can appreciate that they’re at least honest about that lol