

When I return from the library instead of the bookstore it is with the deepest shame.
When I return from the library instead of the bookstore it is with the deepest shame.
I’m the last of the original developers of a particular system and now it’s my turn for management to move me on. There’s a new person and they are being instructed to use AI to work on it. It’s like moving the system to hospice care, looked after by the janitor with an Alexa until the lights go out.
slow & happy > fast & furious
I’ve gone the other way. I used to run a Proxmox cluster, then someone gave me a Synology NAS. Now it’s rare that I spin up Proxmox and instead use a mix of VMs, containers and Synology/Synocommunity apps.
All my music is stored in a folder on my NAS, broken down by artist, release. It can be accessed via SMB, SFTP, Jellyfin and Plex. From there I stream to what ever device I’m using. Wireguard, Tailscale or Plex is required to stream outside my home. Navidrome sounds interesting.
Or even just use the tailnet domain you can generate.
Pro tip: don’t put too much meat in your compost.
But imagine if someone did want to use it, what would be your recommended approach? You seem quite knowledgeable in this area and I’m sure we could all learn something.
What would be your recommended way to run the Epic Launcher?
Install Heroic via Flatpak and use Flatseal so you decide what it gets access to.
Could you summarise for us please? It’s not clear.
I’m just a rat who got pied pipered AGAIN
Why not compromise on resolution? 27 inch is pretty small for a 4K display. I have a 27 inch 4K, a 27 inch 1440p and a 32 inch 4K. Out of all of them, the 27 inch 4K is overkill.
Glycemic Index Joe, reporting for duty
You can use this form to unblock Mastodon
Thanks Cloudflare for giving me a moment of reflection on why the fuck I am heading to Stack Overflow so I can close the tab before I get there.
With respect, you must be new here. The only accurate sentence for me is your first one. You need to do more research.
I don’t think DNS blocking is sufficient for untrusted devices. A Pi-hole won’t stop or report on a device that doesn’t use it. WAN blocking is good when you can use it, but also not sufficient on its own and can render devices non-functional (which maybe they should be…). Virtual or physical LAN segregation and a firewall is required to both stop your trusted devices being accessed maliciously, and to block/sniff what the untrusted devices are doing with WAN access.
No, I’m providing a counter-example and rejecting the argument that only lost media entitles you to consume media for free.