saint

joined 2 years ago
MODERATOR OF
7
Composite SLO (blog.alexewerlof.com)
 

How to calculate SLO

6
RAW restricted (rawsemantics.home.blog)
 

RAW and thoughts about censorship

 

cross-posted from: https://feddit.it/post/7752642

A week of downtime and all the servers were recovered only because the customer had a proper disaster recovery protocol and held backups somewhere else, otherwise Google deleted the backups too

Google cloud ceo says "it won't happen anymore", it's insane that there's the possibility of "instant delete everything"

 

Notes from the podcast:

The president has sole authority to initiate a nuclear war without needing approval from anyone else, emphasizing the speed of decision-making in such scenarios.

Post-nuclear war scenarios lack population protection planning, requiring individuals to rely on their own resources for survival.

Building trust with primary sources for reporting involves navigating conflicts between personal and professional information, especially in high-stakes environments like national security.

The revelation of the Roswell crash being a hoax orchestrated by Stalin highlights the intricate world of government intrigue and secrecy.

Title 50 allows for covert operations like the assassination of Bin Laden in Pakistan, showcasing the blurred lines between military and intelligence operations.

CIA covert operations raise ethical dilemmas, with discussions around the role of assassination in geopolitics and military operations.

Obtaining unbiased insights from different intelligence agencies requires extensive research and multiple sources, emphasizing the importance of transparency in investigative journalism.

Surveillance techniques have evolved to include mass biometric data collection, raising concerns about privacy and the implications of widespread surveillance in modern society.

 

cross-posted from: https://group.lt/post/1868553

The Long Seventies Podcast episode on The Illuminatus! Trilogy

Some topics touched:

Exploration of Authoritarianism, Skepticism, and Anti-authoritarian Stance: The discussed band in the book represents authoritarianism, while the author advocates for thorough skepticism and an anti-authoritarian stance.

Exploring Convictions, Rationality, and Cult Dynamics: Convictions can limit openness to new ideas and cult dynamics can restrict followers' intellectual options.

Exploring the Thought Exercise of 'The Illuminatus! Trilogy' and its Discordian Roots: The book serves as a thought exercise synthesizing eccentric ideas influenced by the Discordian movement.

Exploring E Prime and its Connection to Neuro Linguistic Programming: E Prime as a tool to alter thinking and neuro linguistic programming techniques for behavioral conditioning are discussed.

Exploring the Origins of Social Media Platforms and Conspiracy Theories: Origins of social media platforms, their names, and potential conspiracy theories are explored.

Exploring Mythological References and Time Travel in the Book: The incorporation of mythological references and time-traveling storylines blur fiction and non-fiction in the book.

Exploring Mental Habits, Deep Programming, and Brainwashing: The challenge of eliminating mental habits, deep programming, and brainwashing as a real phenomenon are discussed.

Exploring Conspiracy Theories and Alternative Views: The podcast delves into conspiracy theories like the Bavarian Illuminati theory and the conditioning effects of exposure to such theories.

Decentralized Incentives and Societal Problems: Incentives drive behavior in society, with societal issues often stemming from a decentralized web of incentives rather than intentional conspiracies.

Evolution of News Media and Pressure for Immediate Content: The evolution of news media to the 24-hour news cycle has led to a focus on publishing content quickly, sometimes sacrificing accuracy for speed.

 

The Long Seventies Podcast episode on The Illuminatus! Trilogy

Some topics touched:

Exploration of Authoritarianism, Skepticism, and Anti-authoritarian Stance: The discussed band in the book represents authoritarianism, while the author advocates for thorough skepticism and an anti-authoritarian stance.

Exploring Convictions, Rationality, and Cult Dynamics: Convictions can limit openness to new ideas and cult dynamics can restrict followers' intellectual options.

Exploring the Thought Exercise of 'The Illuminatus! Trilogy' and its Discordian Roots: The book serves as a thought exercise synthesizing eccentric ideas influenced by the Discordian movement.

Exploring E Prime and its Connection to Neuro Linguistic Programming: E Prime as a tool to alter thinking and neuro linguistic programming techniques for behavioral conditioning are discussed.

Exploring the Origins of Social Media Platforms and Conspiracy Theories: Origins of social media platforms, their names, and potential conspiracy theories are explored.

Exploring Mythological References and Time Travel in the Book: The incorporation of mythological references and time-traveling storylines blur fiction and non-fiction in the book.

Exploring Mental Habits, Deep Programming, and Brainwashing: The challenge of eliminating mental habits, deep programming, and brainwashing as a real phenomenon are discussed.

Exploring Conspiracy Theories and Alternative Views: The podcast delves into conspiracy theories like the Bavarian Illuminati theory and the conditioning effects of exposure to such theories.

Decentralized Incentives and Societal Problems: Incentives drive behavior in society, with societal issues often stemming from a decentralized web of incentives rather than intentional conspiracies.

Evolution of News Media and Pressure for Immediate Content: The evolution of news media to the 24-hour news cycle has led to a focus on publishing content quickly, sometimes sacrificing accuracy for speed.

 

Selection of quotes:

This is despite the fact that it has been well-established law for almost 60 years that U.S. people have a First Amendment right to receive foreign propaganda.

The law limits liability to intermediaries—entities that “provide services to distribute, maintain, or update” TikTok by means of a marketplace, or that provide internet hosting services to enable the app’s distribution, maintenance, or updating. The law also makes intermediaries responsible for its implementation.

The law explicitly denies to the Attorney General the authority to enforce it against an individual user of a foreign adversary controlled application, so users themselves cannot be held liable for continuing to use the application, if they can access it.

Enacting this legislation has undermined this long standing, democratic principle. It has also undermined the U.S. government’s moral authority to call out other nations for when they shut down internet access or ban social media apps and other online communications tools.

Our lawmakers should work to protect data privacy, but this was the wrong approach. They should prevent any company—regardless of where it is based—from collecting massive amounts of our detailed personal data, which is then made available to data brokers, U.S. government agencies, and even foreign adversaries.

Thoughts?

[–] [email protected] 1 points 1 year ago

Ages ago there was such a tool - Webalizer and everybody was using it :) not anymore..

[–] [email protected] 2 points 1 year ago

using mostly operator from percona for kubernetes, sometimes just a simple deployment. Running postgresql for Lemmy from docker-compose as a container.

[–] [email protected] 3 points 1 year ago (1 children)

I use https://www.talkwalker.com/alerts to setup notifications via RSS on keywords that are interesting to me.

[–] [email protected] 0 points 1 year ago (1 children)

Maybe this book would be of interest to you: https://en.wikipedia.org/wiki/The_Cathedral_and_the_Bazaar . It is a bit dated, but nevertheless great read about OpenSource movement.

[–] [email protected] 8 points 1 year ago (1 children)

hi,

i am using this

root@instance-20211112-2005:/opt/lemmy/lemmy/docker# cat Dockerfile.arm64
FROM rust:1.70.0 as builder
WORKDIR /app

COPY . .

# This can be set to release using --build-arg
ARG RUST_RELEASE_MODE="debug"

COPY . .

# Build the project

# Debug mode build
RUN --mount=type=cache,target=/app/target \
    if [ "$RUST_RELEASE_MODE" = "debug" ] ; then \
      echo "pub const VERSION: &str = \"$(git describe --tag)\";" > "crates/utils/src/version.rs" \
      && cargo build \
      && cp ./target/$RUST_RELEASE_MODE/lemmy_server /app/lemmy_server; \
    fi

# Release mode build
RUN \
    if [ "$RUST_RELEASE_MODE" = "release" ] ; then \
      echo "pub const VERSION: &str = \"$(git describe --tag)\";" > "crates/utils/src/version.rs" \
      && cargo build --release \
      && cp ./target/$RUST_RELEASE_MODE/lemmy_server /app/lemmy_server; \
    fi

FROM debian:bullseye-slim
RUN apt-get update && apt-get install -y libpq5 ca-certificates && rm -rf /var/lib/apt/lists/*

COPY --from=builder /app/lemmy_server /app/lemmy

CMD ["/app/lemmy"]

Also Lemmy developers are working on cross build - so it should be available in the future I hope :)

[–] [email protected] 1 points 1 year ago

maybe this one is interesting for you: [email protected]

[–] [email protected] 1 points 1 year ago

i have heard good things about https://github.com/pgrok/pgrok . also they have a link to huge list of various tunnels - maybe you will find something you need there.

[–] [email protected] 11 points 1 year ago (1 children)

yay! thank you all!

i have made a not-so-quick-but-dirty Dockerfile to build on arm64

FROM rust:1.70.0
WORKDIR /app

COPY . .

RUN echo "pub const VERSION: &str = \"$(git describe --tag)\";" > "crates/utils/src/version.rs"
RUN cargo build --release

RUN apt update
RUN apt -y install libpq5
RUN cp /app/target/release/lemmy_server /app/lemmy

CMD ["/app/lemmy"]

later I am planning to improve it a bit, to make the image smaller if i can

[–] [email protected] 1 points 1 year ago (1 children)

how does the ip start? 192.x or 10.x maybe?

[–] [email protected] 6 points 1 year ago (2 children)

any errors you could show us?

[–] [email protected] 4 points 1 year ago

Most likelye this budget was "calculated" for politics and for all parties involved it is known, except for the tax payers, who might block the project (read - be unhappy) if the real cost would have been known beforehand.

view more: ‹ prev next ›