IF you already have an email domain you control.
Calling “acquiring and setting up an email domain and configuring the mail server for wildcards” “basically no extra effort” is a bit disingenuous compared to “solve a captcha for a Gmail account”
IF you already have an email domain you control.
Calling “acquiring and setting up an email domain and configuring the mail server for wildcards” “basically no extra effort” is a bit disingenuous compared to “solve a captcha for a Gmail account”
Yeah, inductive charging is basically a must.
Especially because it eliminates the guesswork if the watch is correctly seated to charge
No actual technical solution here, but it smells slightly of XY-Problems.
From what you described it seems the main issues are
Maybe you could look into solutions like setting a custom ringtone for important callers or having the phone announce caller names so your mother can decide if she wants to make the effort to get her phone.
I’m speculating a bit here but I can imagine that getting up and answering the phone is exhausting for your mother. Also if her mindset is " a ringing phone means it’s important" that could make it even more stressful.
Maybe you could find a way to let her silence all calls except caregivers and ICE contacts. (On Android DND exceptions could work for that)
That way she doesn’t feel pressured to answer the phone every time it rings and stays reachable.
If it’s actually just the physical issue of reaching the phone in time, does she have a convenient way to carry the phone indoors like a lanyard?
Hope some of this helps you
There should be an external hard drive full of portable game installs in some drawer that fits the time period.
Should easily kill a week.
Currently:
Soon to be added:
They occupy a strange niche full of contradictions.
Entering the code on the device itself should increase security as opposed to entering it on a compromised computer.
But plugging it into a compromised computer means the data is compromised anyway.
Their security is way harder to audit than a software solution like PGP. The actual “encryption” varies from actual decent setups to “entering the code connects the data pins with no actual encryption on the storage chip”
Not having to instal/use software to use them means they are suitable for non-technical users which in turn means more support calls for “I forgot the pin, it wiped itself, can you restore my data”
They are kind of useful to check the “data is transported on encrypted media” box for compliance reasons without having to manage something bigger.
Wow, that sounds like a decent start for an architecture.
I’m tempted to spin up a few Jellyfin instances to see how it might work…
JellyFed(eration) would be awesome. It should use an anonymous overlay network so federation is not limited to people you trust in copyright-zealous jurisdictions.
It doesn’t. It carries you by having a module for absolutely everything even shooting yourself in the foot.
That’s the equivalent of leaving the door open and hanging a sign “Internet over there” pointing at a wall.
Programs don’t need to respect those registry keys. If you’re worried about internet access, set up a firewall.
Also, if you’re worried about malware, the damage is probably done before anything connects to the internet.
B stands for Billion (Parameters) IIRC
Well I doubt this can match the supersports acceleration ;) but I get what you mean.
It’s actually interesting from a design standpoint. How do you handle a lead vehicle that has much better acceleration. Do you artificially slow down the lead vehicle so it can’t abandon the “towed” trailer? What does the follower do when it loses the leader. This basically needs nearly fully autonomous driving.
Eh, even If it does, it shouldn’t be a problem. Relying on a wireless link that could fail due to interference or jamming for actual control would be Musk-level insane.
The hitchbot would need to be capable of visually following the lead vehicle, possibly using something like a big QR code for identification and tracking.
The wireless link could be for telemetry like range and non-critical controls like “stay here” and “start following”.
If the link fails, you get a big warning to stop ASAP but the bot keeps following.
The good thing is that you don’t need to know which ports to block. You just set your firewall up to deny by default and then start whitelisting the things you want to allow.
Even easier if you put your “smart” devices in a separate network, then it’s just:
Now you can surf the internet, control your devices and they can’t phone home
No, No, they don’t understand everything and nothing!
I’m hopeful that reencoding on the fly or even merging preencoded files into a single stream is too expensive because it needs a lot of compute power and invalidates caches .
IT changes usually affect management as well, while “cost saving” in production doesn’t.
Stopping AWS instances would be handy, but your idea to slag the drives is unnecessary.
Just set up full disk encryption for everything.
You die -> no key -> no data
I run a 2 node k3s cluster. There are a few small advantages over docker swarm, built-in network policies to lock down my VPN/Torrent pod being the main one.
Other than that writing kubernetes yaml files is a lot more verbose than docker-compose. Helm does make it bearable, though.
Due to real-life my migration to the cluster is real slow, but the goal is to move all my services over.
It’s not “better” than compose but I like it and it’s nice to have worked with it.
Depending on your level of caffeine tolerance/dependency actual coffee might be even better.
Alternatively: Decaf.