136 private links
PlusDm's Pastebin
Debian Xfce Conky
In 2003, Eileen Gunn's pioneering online sf magazine shut down, and so did @bruces' early seminal blog, the Schism Matrix.
But thankfully, that wasn't the end of Bruce Sterling's blogging career: Wired gave him an (unpaid) online home for a new blog, every bit as cranky, esoteric, gnomic and darkly comic as Bruce himself: Beyond the Beyond.
Now, Beyond the Beyond is done. Wired publisher Conde Nast is in such deep financial trouble that they're realizing minuscule savings like those to be gleaned from shutting down an unpaid blog.
This is a project, deticated to creating custom voice packs for roborock s50 and s55
Feel free to add more voices
Pricing constraints brought further limitations. The ZX Spectrum had no dedicated sprite generation ICs. This was in contrast to other emerging micro-computers of the period, such as the Commodore 64. The Spectrum’s Z80 CPU and ULA would do all the graphical heavy lifting. The ULA or Un-committed Logic Array is similar in function, but not in implementation to today’s CPLD’s where the work of many TTL logic chips is combined into one IC. The Spectrum’s minimal graphics processing hardware and constrained 16k of RAM led to Altwasser’s’ invention of an extremely efficient and somewhat esoteric display system.
The conceived design was unique, allowing Sinclair Research and Richard Altwasser to patent the implementation. The Spectrum set aside 6912 Bytes of RAM to be used for a display file and an attribute array. The display file holds 256×192 pixel data in 32×24 characters blocks, taking 6144 bytes of RAM, leaving 768 bytes for the attribute array. The attribute array stores colour information for each character block. One byte per block holds foreground and background colours, plus a blink value for on or off. This is an excellent space saving solution for displaying coloured text, though slightly limiting in advanced graphics usage.
The speaker you will create is equipped with everything you can imagine. It has six speaker drivers, a charging indicator, a battery indicator, a bass boost, a treble boost, and an easy handle to help you carry it wherever you go.
Using an old VFD serial communication display for use with Arduino based microcontrollers.
In vielen österreichischen Unternehmen undenkbar. Da zieht noch immer der geistige Mief der 1970er Jahre durch die neu eingerichteten Großraumbüros mit den vorgeschriebenen 2 m²/MA: "wer nicht kontrolliert wird, arbeitet nicht".
The Big List of Naughty Strings is an evolving list of strings which have a high probability of causing issues when used as user-input data. This is intended for use in helping both automated and manual QA testing; useful for whenever your QA engineer walks into a bar.
Why Test Naughty Strings?
Even multi-billion dollar companies with huge amounts of automated testing can't find every bad input. For example, look at what happens when you try to Tweet a zero-width space (U+200B) on Twitter:
The TURN Server is a VoIP media traffic NAT traversal server and gateway. It can be used as a general-purpose network traffic TURN server and gateway, too.
On-line management interface (over telnet or over HTTPS) for the TURN server is available.
The implementation also includes some extra experimental features.
Jitsi Meet: Server-Einstellungen für einen datenschutzfreundlichen Betrieb ⋆ Kuketz IT-Security Blog
Das STUN-Protokoll erkennt Clients, die sich bspw. hinter einem Router oder einer Firewall befinden und eine NAT-Adresse haben. Mit Hilfe des STUN-Servers können NAT-Clients ihre öffentliche IP-Adresse erfahren und sind anschließend in der Lage eine direkte Kommunikationsverbindung zwischen (zwei) Teilnehmern herzustellen. Um die Übermittlung der IP-Adresse an externe Anbieter zu vermeiden, könnt ihr einen eigenen STUN- / TURN-Server betreiben. Alternativ könnt ihr natürlich auch einfach bestehende STUN-Server wählen, die öffentlich zur Verfügung gestellt werden.
I am a cynical skeptic system administrator, or as we are sometimes called nowadays a “DevOps” engineer. I started with Vax\Vms, Dos, NT 3.51 and Novell net ware. Nowadays I work as a DevOps consultant for Polar Squad in Berlin Germany. Polar Squad is the best DevOps company (according to us). In the following series of blog posts, I will try and guide an old sysadmin on how to work with Kubernetes.
Why?
When I started learning about all the new tools and methodologies that are used today, I felt a bit overwhelmed. I worked with containers in the past (good old LXC and Proxmox), so my first notion of it was: Why should I learn Docker now? Why should I care about Kubernetes? What is it good for?
When I started studying it, I found out it’s bloody hard to actually make sense of it. I mean, I am not a genius (my mom says I am, but not sure how valid her view is), but I was able to learn many things in my life. I mean I could learn Martin Heidegger’s “Being and Time” at University, I could also learn many concepts in computer science and networking for many years. So I asked myself: Why is Kubernetes giving me so much trouble? How can I try and fix that?
What’s the purpose of this blog post series?
I found out that there is a huge gap in the documentation about Kubernetes that is available online. If you want to start something easy and just see a simple deployment, you have a lot of options. You can use Minikube or Google Cloud and have something running very fast.
If you want to create your own cluster on any infra, may it be VMs on AWS or KVM server running on bare metal, it’s almost impossible to find good documentation for that. I am not new to hypervisors nor to namespace or cgroups in Linux, (I was also Solaris guy, so I worked with Solaris Zones a long time ago) but still, some of those new tools I checked really got me frustrated. The purpose of these blog posts is to guide old school sysadmins to understand and use Kubernetes without making them bash their heads on the wall and curse horrible words.
7 a.m. Wake up and check Twitter, which feels a bit like walking into the lobby of a Las Vegas casino at 6 a.m. to head to the airport and seeing all the people, dead-eyed, playing the slots: They’ve either been there all night or they woke up and started playing slots first thing in the morning.
Shuf is a Linux and Unix command-line utility that puts its input text in random order to generate output consisting of random permutations of the input. In simple terms, it just shuffles the input of either text file or standard input passed through the command line.
I used to roam the streets of Ibiza as I normally roam streets of
any strange city, toting an efficient global-nomad shoulder-bag,
crammed with electronics and travel-survival knickknacks. This year
I just carry a floppy canvas grocery bag.
Admittedly, it's a tote-bag from the distant "Bangalore Literary
Festival," but nobody cares about branding. If you carry groceries
around in a bag, nobody sees you. Because obviously you must be local.
It's the foreigners and tourists who have those ergonomic,
airplane-centric, efficient bags. They don't slop around with cheap canvas bags meant for onions.
So what I'm sporting in Ibiza in MMXX is camouflage for our new
era of ethnonationalism and "overtourism," a term recently invented in nearby Barcelona.
As part of EFF’s response to the COVID-19 crisis, we’ve edited and compiled our critical thoughts on digital rights and the pandemic into an ebook: EFF’s Guide to Digital Rights and the Pandemic.
So why is the blockchain so revolutionary?
The BUS DRIVERS are refusing to work for the police state, while software engineers, with the most leveraged profession of our time, still can't get their employers to stop working for ICE. Cowards. Disorganized and cowards. All of us. I'm ashamed
Politicians and Business Leaders: What Should You Do and When?
How institutions, trust and truth are annihilated by monopoly and corruption. The pandemic isn't the only disease that's annihilating our society: alongside of it, there is an epidemic of mistrust in institutions and a growth in conspiricism, a panic to save yourself and let everyone else fend on their own. Blaming Big Tech for the collapse in trust and commonly held truth is backwards: Big Tech's bigness is en effect, not a cause, of the corruption that made our institutions so untrustworthy.