Skip Navigation
Split ZFS in two at two locations?
  • hmm I see. and why do you want that? balancing storage usage between backup sites? one of them is too little for the whole pool?

    for now I don't have a better idea, sorry. maybe this is the second best time to think up a structure for the datasets, and move everything into it.
    but if the reason is the latter, one backup site cant hold the whole pool, you may need to reorganize it again in the future. and that's not an easy thing, because now you'll have the same data (files of the same category) scattered around the FS tree even locally. maybe you could ease that with something like mergerfs, and having it write each file to the dataset with lower storage usage.

    if you are ready to reorganize, think about what kinds (and subkinds) of files will you be likely to store in a larger amount, like media/video, media/image, and don't forget to take advantage of per-dataset storage settings, like for compression, recordsize, maybe caching. not everything needs its own custom recordsize, but for contiguously read files a higher value might be better, also if its not too often accessed and want better compression ratio as compression (and checksumming!) happens per records. video is sometimes compressible, or rather some larger data blob inside the container

  • Create and restore an ssd image using dd in different filesystems
  • For 99% of drivers, the on-disc ones

    op will wipe the disk

    as long as you have an Internet connection you can download any that aren't on-disc

    if windows update can guess correctly what kind of device you have

    The remaining 1% can be obtained directly from the OEM

    I did not have that experience last time with an acer laptop

  • Split ZFS in two at two locations?
  • what is your goal with this?

    do you still want to keep all the data in a single pool?
    if so, you could make datasets in the pool, and move the top directories into the datasets. datasets are basically dirs that can have special settings on how they are handled

    ninja edit: now that I think about it, moving across datasets probably makes that data to be resent.
    it would be easier to give advice by knowing why do you want to do this

  • Create and restore an ssd image using dd in different filesystems
  • It's possible because block devices can be read just like files (except often the permission differences)

    you can use the sha256sum command to do this. there are a few siblings of it with different algs. gui tools also existof course

  • Rant: I wish more people stopped using Github
  • the actual problem is not that you need an additional account, but as OP said, the terms. with an account they can tie all your searches, what repos have you visited and how often, and other non-public activities to you. basically the same data mining that youtube, facebook and others do, just in an earlier stage

  • Firefox 134.0 released
  • A refreshed New Tab layout is being rolled out to users in the US and Canada, featuring a repositioned logo and weather widget to prioritize Web Search, Shortcuts, and Recommended Stories at the top.

    before anyone starts complaining, yes I know several people in close proximity that use the news&weather windows taskbar thing, so this probably has a reason to exist

  • Meta: please don't delete your posts if you later thought that the idea has "failed"

    Recently there was a post where the OP pitched an idea for a service related to this community. I don't want to go into details but the post's text has shown that maybe there's some misunderstanding around the technology, and a considerable amount of us also thought that it's not a good idea. The post was removed (noticed because I couldn't reply to someone) probably because the OP felt shame for their "failed" idea, but I think we shouldn't delete posts for reasons like this.

    The post created an interesting discussion around the idea with useful info. It's useful to have things like these for future reference, for similar discussions in the future. This is an anonymous forum, so there's no shame in recommending things, when you do that politely like it was done in that case.

    18
    Hello, world! You, me, and The Matrix.org Foundation
    matrix.org Hello, world! You, me, and The Matrix.org Foundation

    Matrix, the open protocol for secure decentralised communications

    Hello, world! You, me, and The Matrix.org Foundation

    Introduction of the first Managing Director

    1
    Why does Ruby Gem 3 install gems to Ruby 2 directories?

    I have just installed the tmuxinator 3.0.5 ruby gem with gem 3.2.5 and the --user-install parameter, and to my surprise the gem was installed to ~/.gem/ruby/2.7.0/bin/.

    Is this a misconfiguration? Will it bite me in the future? I had a quick look at the environment and haven't found a variable that could have done this. Or did I just misunderstand something? I assume that the version of gem goes in tandem with the version of ruby, at least regarding the major version number, but I might be wrong, as I'm not familiar with it.

    I have checked the version of gem by running gem --version. This is on a Debian Bullseye based distribution.

    1
    Google's Web Environment Integrity made me remember this video
    vimeo.com Trusted Computing

    "Trusted Computing" - ever heard of it? This motion graphic style documentary explains what the term "trust" has in common with "Trusted…

    Trusted Computing

    The video is a short documentary on Trusted Computing and what it means to us, the users.

    If you like it and you are worried, please show it to others. If you are not the kind to post on forums, adding it to your Bio on Lemmy and other sites, in your messaging app, or in your email/forum signature may also be a way to raise awareness.

    5
    InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)RE
    ReversalHatchery @beehaw.org

    Computers and the internet gave you freedom. Trusted Computing would take your freedom. Learn why: https://vimeo.com/5168045

    Posts 4
    Comments 1.8K