• 0 Posts
  • 45 Comments
Joined 1 year ago
cake
Cake day: August 16th, 2023

help-circle
  • Nollij@sopuli.xyztoLinux@lemmy.mlThe Mozilla layoffs ... will get worse
    link
    fedilink
    English
    arrow-up
    14
    arrow-down
    3
    ·
    14 days ago

    I think you’re massively downplaying how much of a hit this will be.

    Let’s say you make $100k/year. Think about the lifestyle it allows. You’ve just been informed that it’s now going part time, and you’ll only be making $15k/year. How far does that get you?

    Now, you’re expecting someone else to pay for that advertising spot, so it won’t be that bad. But who is even eligible? Microsoft’s Bing is the obvious answer, and probably DDG. The rest of the default search engines aren’t even general web searches.

    Do you really think that either of them are going to pay any significant amount to be the default? Especially when most people are going to change it back to Google anyway, since these are automatically people willing to change to a different browser?

    Sure, they might be willing to pay something. But it won’t be anything close to what they had before.



  • Nollij@sopuli.xyztoPiracy@lemmy.mlAI for torrenting?
    link
    fedilink
    English
    arrow-up
    2
    ·
    24 days ago

    You are comparing it to a hash, following some extra rules on what the data could be. You have exactly the length of hash before you can reliably count on duplicates (and collisions happen much sooner). In torrent v1, this is SHA-1, which has a 160-bit (or 20 byte) hash. Which means for every single additional random bit, you have doubled the number of possible matches.

    If your torrent has an uncommonly small chunk size of 256KiB, that’s 261,144 bytes. Minus the 20 from above, and you have a likely 256^261124 chunks that match your hash. That’s a number so large that Google calls it infinity. It would take you forever just to generate these chunks by brute force, since each would need to be created, then hashed, then the results stored somewhere. Many years ago, I remember someone doing this on CRC32 (32 bits/4 bytes) and 6 byte files. It took all night, and produced dozens of hash-matching files. You’re talking many orders of magnitude bigger.

    But then what? You’d still need to apply the other rules on what the data could be. Rules that are probably more CPU-intensive than the hash algorithm.

    The one trick that AI might be able to use to save the day is that it may contain in its corpus the original file. In effect, that would make the AI an unlikely seeder.


  • Nollij@sopuli.xyztoGaming@lemmy.mlAre acer laptops unreliable?
    link
    fedilink
    English
    arrow-up
    11
    ·
    2 months ago

    All of the consumer lines are pretty bad these days. Acer has a reputation for being unreliable (backed by some data from SquareTrade ~10 years ago). HP is just as bad, in mostly the same ways, but has avoided the reputation.

    Reliable laptops are the enterprise lines - Dell Latitude/Precision, HP Elite Book, and Lenovo Thinkpad. But they are significantly more expensive when buying new.



  • How close are these surrounding towns? What’s the population, particularly for the demographics you would appeal to?

    Often, it’s not worthwhile to bring your favorite culture to your home. Just go to the culture where it already exists. Often, these quiet, boring places are populated by people that WANT to live in a place that’s quiet and boring. It doesn’t make much sense for anyone to move there if they don’t.



  • “Hackers” (rather, malicious actors) rarely look to take down IT resources as their goal. Instead, they want to access it for their own purposes. The closest example would be ransomware, where it gets taken down as part of the threat/punishment. But if the victim pays, their resources must be restored.

    Plus, I would be surprised if Crowd Strike doesn’t have any protections on its own files. I also expect there will be additional verification checks (hash/etc) on their updates going forward.




  • Nollij@sopuli.xyztoMemes@lemmy.mlMusic to my ears
    link
    fedilink
    English
    arrow-up
    25
    arrow-down
    73
    ·
    6 months ago

    Please be better than this. It’s the mirrored version of ‘owning the libs’, and it hurts us all in the end.

    That said, I am very pleased that justice has been served. We need to hold more politicians accountable, both at the polls and in the courts.


  • In the US, completely unpaid internships are rare. Most are paid, but fairly poorly. There are a few major reasons for this:

    You have to meet a lot of requirements for unpaid to be legal, and it all has to be documented.

    Internships are a “farm” program- many interns are offered and accept a full time position afterwards. If they were unpaid, they are unlikely to accept.

    Minimum wage is an absolute joke everywhere in the country. Why bother fighting it when you can pay as little as $7.25/hour? Even doubling or tripling that makes it appealing to poor college students and the farm program, and won’t cost much.

    (Your example would be illegal in the US, and possibly even enforced)



  • I’m only addressing that last line, but really think it through. Should you really expect, or even want, an OS that runs on a 386? It wasn’t that long ago that most Linux distros could. But they all moved away from it because that limited performance on anything more modern.

    The newer instruction sets are created for a reason, and that reason is typically higher performance. If the OS (or any code, really) can use them, it will work better. But if you can’t or don’t, the code will be more compatible.

    There also isn’t “any” computer; it’s simply not a thing. The question becomes how old (more technically, what minimum specs) do you want to support, and performance you want to be limited by?

    While I agree that Microsoft has leaned too heavily into newer hardware as an expectation, there’s definitely a line to be drawn.



  • Your description isn’t very clear on what exactly you have, or what you need.

    It sounds like you have wired NICs in both server and laptop, which will be physically close to each other, but your only connection to the Internet will be WiFi that you don’t control. How accurate is that?

    Next question is how do you want them to connect to each other? You can do a P2P wired connection, which is more complicated but fully isolates your traffic. It also means that, unless each device has a separate connection and an appropriate routing config, it won’t be online to the Internet (unless you set up some form of connection sharing). You can also connect them to a router that has no Internet. Simpler than the above, but the same limitations.

    You could easily and cheaply get a USB Wi-Fi NIC. The major downside is that all traffic will be going across the wireless connection, both ways. This makes it slow and unreliable.

    You can also connect them to a modified router configured as a wireless bridge. DD-WRT and others can be configured in a different way than usual. The wireless router will provide wired LAN ports to your local network, but then use the wireless connection to connect to an upstream WiFi.

    None of this has anything to do with Linux, BTW. Once you choose a path, you should be able to implement it in whatever OS (or multiple OSes) you would like. None of it is new or special. You might get more options if you post in the Homelab, Data Hoarder, or Self Hosted communities.


  • To anyone else reading this, there’s something you should know:

    Memory errors don’t always mean the memory itself (hardware RAM stick) is bad. It can also be a power issue (bad PSU, incorrect voltage set in the UEFI), compatibility, defective memory controller (CPU or motherboard), and more.

    OP almost certainly has a bad stick, but it’s worthwhile for anyone building a PC to run a slew of stress tests and diagnostics before using it for anything that matters.