[-] vk6flab@lemmy.radio 1 points 1 day ago

The mind boggles...

Where is this sign, and why is "fuck" not on it (among other words that come to mind)?

[-] vk6flab@lemmy.radio 3 points 1 day ago

“All the efforts on climate action hinge upon the availability of and access to data,” notes the UN office for Disaster Risk Reduction (UNDRR).

Yeah, no.

Data isn't the problem. Humans are the problem, specifically elected political humans of the climate denial variety and the media moguls enabling them. The ones who run counties based on just how much their votes can be turned into a personal bottom line.

I think if you figure out how to make politicians rich off actually implementing measures to counter the climate catastrophe, data will magically appear.

Cart + Horse + Carrot

[-] vk6flab@lemmy.radio 7 points 3 days ago

You could build Debian from scratch and use your preferred compiler settings.

https://github.com/scottwilliambeasley/debian-from-scratch

[-] vk6flab@lemmy.radio 5 points 6 days ago

The question is even more fraught than you might have considered.

What if you report them to your rideshare company and they do nothing?

As a passenger of a private vehicle where you observe or experience dangerous behaviour, are you required or obligated to report the behaviour to the police?

What if that driver came to collect your teenage child?

I don't envy your situation, but their income is not your responsibility, your personal safety is.

75
submitted 1 week ago by vk6flab@lemmy.radio to c/linux@lemmy.ml

This is a sobering post that revisits the notion that given a project, how many developers have to be hit by a bus before it stalls.

According to the methodology explained in the article, in 2015 it took 57 developers for the Linux kernel to fail, now it appears that it takes 8.

That's not good.

[-] vk6flab@lemmy.radio 210 points 1 month ago

The response from the owner just adds the missing ingredient.

10
submitted 1 month ago* (last edited 1 month ago) by vk6flab@lemmy.radio to c/sysadmin@lemmy.world

Anyone here have any experience with a Datto Backup Appliance?

I have just been told that they've never run a full restoration in the six years that it's been in service, deployed for the backup of four mission critical virtual Windows Servers, four Windows Workstation and a (physical?) Linux PABX server.

The actual appliance is apparently a "Datto S3-2000 BCDR"

Edit: The anal retentive in me is going WTF in a tight loop. The industry professional with 40 years experience in the field is going, different day, same old...

I realised that I didn't actually ask the pertinent question, the hamster wheel was running full tilt, but is this normal, or is this WTF, or somewhere in-between?

7
submitted 1 month ago by vk6flab@lemmy.radio to c/movies@hexbear.net

Just watched the movie Argylle

Can someone please explain the phone call in the bathroom scene that causes Elly to run away and make a collect call?

[-] vk6flab@lemmy.radio 158 points 2 months ago

In my opinion it's criminal just how often this happens. Big business making obscene profit off the back of volunteer work like yours and many others across the OSS community.

[-] vk6flab@lemmy.radio 171 points 3 months ago

Gotta love the use of quotes here:

it should be treated with "utmost importance."

In other words, ignore this message from our lawyers.

669
submitted 3 months ago by vk6flab@lemmy.radio to c/privacy@lemmy.ml

A cookie notice that seeks permission to share your details with "848 of our partners" and "actively scan device details for identification".

40
submitted 4 months ago by vk6flab@lemmy.radio to c/privacy@lemmy.ml

How are you storing passwords and 2FA keys that proliferate across every conceivable online service these days?

What made you choose that solution and have you considered what would happen in life altering situations like, hardware failure, theft, fire, divorce, death?

If you're using an online solution, has it been hacked and how did that impact you?

[-] vk6flab@lemmy.radio 132 points 4 months ago

Except that the humpback whale will reproduce long before that marine biologist loses his virginity.

19

My search has been without results.

My "new" model remote with a Siri button keeps needing to be reset to control my infrared amplifier. Press and hold the Volume Down and TV button works, but it's annoying when you want to change the volume whilst watching something and it doesn't respond.

Firmware version is 0x83.

Anyone got any ideas what might be causing this?

31
submitted 5 months ago by vk6flab@lemmy.radio to c/linux@programming.dev

I've been using VMware for about two decades. I'm moving elsewhere. KVM appears to be the solution for me.

I cannot discover how a guest display is supposed to work.

On VMware workstation/Fusion the application provides the display interface and puts it into a window on the host. This can be resized to full screen. It's how I've been running my Debian desktop and probably hundreds of other virtual machines (mostly Linux) inside a guest on my MacOS iMac.

If I install Linux or BSD onto the bare metal iMac, how do KVM guests show their screen?

I really don't want to run VNC or RDP inside the guest.

I've been looking for documentation on this but Google search is now so bad that technical documents are completely hidden behind marketing blurbs or LLM generated rubbish.

Anyone?

36
submitted 5 months ago by vk6flab@lemmy.radio to c/privacy@lemmy.ml

There is a growing trend where organisations are strictly limiting the amount of information that they disclose in relation to a data breach. Linked is an ongoing example of such a drip feed of PR friendly motherhood statements.

As an ICT professional with 40 years experience, I'm aware that there's a massive gap between disclosing how something was compromised, versus what data was exfiltrated.

For example, the fact that the linked organisation disclosed that their VoIP phone system was affected points to a significant breach, but there is no disclosure in relation to what personal information was affected.

For example, that particular organisation also has the global headquarters of a different organisation in their building, and has, at least in the past, had common office bearers. Was any data in that organisation affected?

My question is this:

What should be disclosed and what might come as a post mortem after systems have been secured restored?

[-] vk6flab@lemmy.radio 161 points 5 months ago

A better headline:

"Visitor to Taiwan attempts to break biosecurity law and is hit with a fine"

[-] vk6flab@lemmy.radio 121 points 6 months ago* (last edited 6 months ago)

Actually, in my opinion, Xitter is the worst social media app for society, not just LGBTQ+ people.

14
submitted 6 months ago by vk6flab@lemmy.radio to c/opensource@lemmy.ml

Anyone know of any scriptable asynchronous communication tools?

The closest so-far appears to be Kermit. It's been around since CP/M, but apparently there's still no centralised language reference and the syntax predates Perl.

[-] vk6flab@lemmy.radio 122 points 7 months ago

It's mind bending that there are actual humans on the planet, paid a shit tonne more than software developers, who not only believe the parody highlighted by @SwiftOnSecutity, but treat and share it as gospel, acting on it with nutjob metrics to "increase productivity" whilst salivating over the hyperbole around "AI" that is sweeping the globe, dreaming of a better world.

One without those pesky developers with their brains, thoughts and opinions.

But, what do I know, I've been in this profession for only 40 years..

25
submitted 7 months ago* (last edited 7 months ago) by vk6flab@lemmy.radio to c/privacy@lemmy.ml

U2F keys can be purchased online for the price of a cup of coffee. They're being touted as the next best thing in online security authentication.

How do you know that the key that arrives at your doorstep is unique and doesn't produce predictable or known output?

There's plenty of opportunities for this to occur with online repositories with source code and build instructions.

Price of manufacturing is so low that anyone can make a key for a couple of dollars. Sending out the same key to everyone seems like a viable attack vector for anyone who wants to spend some effort into getting access to places protected by a U2F key.

Why, or how, do you trust such a key?

The recent XZ experience shows us that the long game is clearly not an issue for some of this activity.

30
submitted 7 months ago by vk6flab@lemmy.radio to c/jokes@lemmy.world

Genie: There are 3 rules... no wishing for death, no falling in love, no bringing back dead people.

Me: I wish envelopes would moan when you lick them.

Genie: There are 4 rules...

[-] vk6flab@lemmy.radio 130 points 8 months ago

I love the notion. The marketing "better than DDG" is a little janky. Perhaps consider a positive statement, like "finally find what you're looking for".

This is a crowded landscape. I've been here since Gopher and seen plenty of services come and go. With that in mind, here are some questions you might want to consider:

How does it compare with products like SearXNG, specifically their ecosystem of plug-in search types?

How do you plan to pay for it?

How do you expect to protect the index against spam?

How will you scale it to a global audience?

How will you handle language?

Good luck!

view more: next ›

vk6flab

joined 8 months ago