moonpiedumplings

joined 1 year ago
[–] moonpiedumplings@programming.dev 1 points 2 weeks ago* (last edited 5 days ago)

A new k8s cluster was created and planned to replace the current setup. Instead of ad-hoc scripts, conventions and associated documentation, it relies on a declarative description

Gitops!

It seems that they are using fluxcd, just like I am, to manage their kubernetes cluster.

I really like it as a solution, as you just edit configuration files, push then to git, and then your kubernetes cluster changes. Deploying an app is as simple as adding a file, and deleting an app involves deleting that file.

[–] moonpiedumplings@programming.dev 10 points 2 weeks ago* (last edited 2 weeks ago) (1 children)

I honestly don't know how this could turn out.

It could be an amazing change that results in much more progress for hardware acceleration on guests of various types (since that is what vmware is good at) in kvm...

Or it could mean that they are dropping that feature from vmware altogether.

Regardless, I like this change because it means I would be able to run vmware machines and libvirt kvm machines at the same time, at least when I am forced to use vmware workstation.

I also dislike proprietary software in general, so I think less proprietary software and more FOSS is a good thing.

[–] moonpiedumplings@programming.dev 4 points 2 weeks ago* (last edited 2 weeks ago) (1 children)

I found this: https://github.com/tenclass/mvisor-win-vgpu-driver

But it is for another foss kvm based hypervisor called mvisor.

[–] moonpiedumplings@programming.dev 18 points 2 weeks ago* (last edited 2 weeks ago)

I disagree, because they are not the same thing.

Immutable means read only root.

Atomic means that updates are done in a snapshotted manner somehow. It usually means that if an update fails, your system is not in a half working state, but instead will be reverted to the last working state, and that updates are all or nothing.

I create a btrfs snapshot before updates on my Arch Linux system. This is atomic, but not immutable.*

There is also "image based" which distros like ublue (immutable, atomic) are, but Nixos (also immutable and atomic) are not.

*only really before big updates tbh, but I know some people do configure snapshits before all updates.

[–] moonpiedumplings@programming.dev 0 points 2 weeks ago* (last edited 2 weeks ago) (1 children)

FYI, DeVault’s Stallman Report explicitly attacks the FSF as well as Stallman.

I read the report. You are free to show me exactly where it criticizes the FSF beyond their interactions with Stallman.

I took it mean that the report was such a deceitful and irrational work, presented in such a duplicitous manner as to constitute an attack on the senses of the community.

I'll just copy my older comment, and put it here

Begin quote:

Stallman doesn’t seem to get that pedophilia is wrong because of the hierarchy of power, and the power imbalances between older/younger people, not because of some inherent wrongness about being attracted to a prepubescent person. This is shown by how he condemns some pedophilia, but is accepting of 12+/past puberty. (I despise this logic, because it would also make gay sex and sodomy wrong, as well).

I find this deeply ironic, because his primary issue with proprietary software is the way that it gives developers levels of power over users. From his article Why Open Source Misses the Point

But software can be said to serve its users only if it respects their freedom. What if the software is designed to put chains on its users? Then powerfulness means the chains are more constricting, and reliability that they are harder to remove.

You would expect someone who is so in tune with the hierarchies that appear with software developers, publishers, and users, to also see those same hierarchies echoed in relationships between people of vastly different ages, but instead, we get this. I’m extremely disappointed.

These failures to understand hierarchy and power, are exactly why Stallman shouldn’t be in a position of power. Leaders should continually prove that they understand hierarchy and the effects of their actions on those below them. Someone who doesn’t understand how their power could affect another, shouldn’t be a leader.

End quote.

And I'll add onto this a little bit: Although Stallman seems to have redacted his earlier claim about pederasty, continuing to defend the legality of the possession of CSAM (beyond safe harbor/hospitality provisions), is very problematic, and clearly shows that he hasn't learned his lesson. CSAM ownership should be heavily disincentivized, to disincentivize the selling/buying of CSAM, as that's one of the most effective ways to stop more CSAM production.

I don't view pointing out that Stallman is not fit for a position of leadership to be an "attack" on the FSF or the free software community. And although the information gathering of the linked post is very, very impressive, it doesn't really invalidate what was said in the Stallman Report, or the Stallman Report's core points.

[–] moonpiedumplings@programming.dev 3 points 2 weeks ago (4 children)

the report was an attack on the FSF and the free software

Stallman is not the FSF. The FSF is not the free software community. The free software community is not free software.

I'm so tired to people presenting these things as if they are equivalent.

Yeah. this was in high school, in my math class, and we were playing a math game.

The way it worked, was that every table was a team, and each team had a "castle" drawn up onto the whiteboard. A random spinner was used to determine a team, who would then solve a problem the teacher assigned. If you successfully solved the problem, you could draw an X on another teams castle. 3 X's mean that you are out.

My team was out. But, since this was a class, we could still solve problems, and still draw X's. Our table got selected to solve a problem, and I did successfully. I looked at the board, and realized that only two teams had a single X, every other team had either two or three. In other words, I could choose who won the game, even though I could not win.

So, I started trying to get bids. I tried to get real money, but someone tried to scam me with some "draw the X first" nonsense. But, the other team offered to pay me four of the school's fake money, and I accepted that and allowed them to win.

I may not have won the game, but I certainly felt victorious that day.

[–] moonpiedumplings@programming.dev 4 points 3 weeks ago* (last edited 3 weeks ago) (1 children)

I don't really get how this question pertains to F-droid specifically.

But, in networks that are more locked down, they can use stuff like deep packet inspection to figure out what traffic is happening, and automatically block it. Socks is a protocol explicitly for proxying, and runs over TCP. Depending on the setup, deep packet inspection can catch it.

On the other hand, disguising traffic as HTTP/HTTPS makes it very, very hard to detect that someone is doing something other than visiting an innocuous website.

At the high school I went to, they had Deep Packet Inspection set up to such a level that they could automatically detect and block VPN connections. Wireguard and OpenVPN would be caught basically instantly, and then you would be kicked off of the internet for 10 minutes. Although very extreme, a "10 minutes no internet" punishment is nothing in comparison to prison time or any number of extreme punishments authoritarian countries can come up with.

To get around the school firewall, I set up a web proxy called Metallic: https://github.com/cognetwork-dev/Metallic/ . This is basically a website, that lets me access other websites from within that website, and it's very, very difficult to block because of that nature.

Maybe Whisper? This github repo: https://github.com/linto-ai/whisper-timestamped

Says thay whispher can do timestamps on speech segments. However, I don't know if that's what you want, since whispher might only be able to do that if it is transcribing the actual audio, rather than editing another text file.

It's not. Noncommercial limitatation makes it also not open source.

I also think they don't allow forking.

[–] moonpiedumplings@programming.dev 46 points 3 weeks ago (1 children)

https://isevenapi.xyz

For example: https://api.isevenapi.xyz/api/iseven/7

{
"ad": "FOR SALE - collection of old people call 253-555-7212", "iseven": false 
}

Not exactly like the title.

[–] moonpiedumplings@programming.dev 3 points 3 weeks ago (3 children)

Is there a way to do something like this on KDE? I'm considering streaming soon, and I want to be able to share some windows, but not all, or only share a workspace/virtual desktop with my stream.

view more: ‹ prev next ›