why would you store cars, televisions and handbags for a bittorrent tracker?
and maybe most importantly, why would you use PHP?
Honestly "lol" completely lost its original meaning years ago
now that's a server. mine is like that too. its not the hardware but the purpose that makes a machine a server
didn't really rocket but yeah, it had a notable increase
that's not a server machine
hmm I see. and why do you want that? balancing storage usage between backup sites? one of them is too little for the whole pool?
for now I don't have a better idea, sorry. maybe this is the second best time to think up a structure for the datasets, and move everything into it.
but if the reason is the latter, one backup site cant hold the whole pool, you may need to reorganize it again in the future. and that's not an easy thing, because now you'll have the same data (files of the same category) scattered around the FS tree even locally. maybe you could ease that with something like mergerfs, and having it write each file to the dataset with lower storage usage.
if you are ready to reorganize, think about what kinds (and subkinds) of files will you be likely to store in a larger amount, like media/video, media/image, and don't forget to take advantage of per-dataset storage settings, like for compression, recordsize, maybe caching. not everything needs its own custom recordsize, but for contiguously read files a higher value might be better, also if its not too often accessed and want better compression ratio as compression (and checksumming!) happens per records. video is sometimes compressible, or rather some larger data blob inside the container
I don't like that question because a dismissive but valid argument is "to contain the smells after taking a shit".
For 99% of drivers, the on-disc ones
op will wipe the disk
as long as you have an Internet connection you can download any that aren't on-disc
if windows update can guess correctly what kind of device you have
The remaining 1% can be obtained directly from the OEM
I did not have that experience last time with an acer laptop
what is your goal with this?
do you still want to keep all the data in a single pool?
if so, you could make datasets in the pool, and move the top directories into the datasets. datasets are basically dirs that can have special settings on how they are handled
ninja edit: now that I think about it, moving across datasets probably makes that data to be resent.
it would be easier to give advice by knowing why do you want to do this
there are. for one because of the license key, but also because it's not rare that its hard to find all the drivers that make all of the laptop work
It's possible because block devices can be read just like files (except often the permission differences)
you can use the sha256sum command to do this. there are a few siblings of it with different algs. gui tools also existof course
then make it default off and switchable with a kernel param, or if its a lot of code then make its compilation optional and default off
I didn't even notice it, though I was using mail multiple times in the past 12+ hours
well codeberg's CI system is almost a copy of github actions, so there's that
the actual problem is not that you need an additional account, but as OP said, the terms. with an account they can tie all your searches, what repos have you visited and how often, and other non-public activities to you. basically the same data mining that youtube, facebook and others do, just in an earlier stage
Pretty sure roku ones don't allow to be used until you accept their terms online
well only if that becomes possible at all
A refreshed New Tab layout is being rolled out to users in the US and Canada, featuring a repositioned logo and weather widget to prioritize Web Search, Shortcuts, and Recommended Stories at the top.
before anyone starts complaining, yes I know several people in close proximity that use the news&weather windows taskbar thing, so this probably has a reason to exist
finally release notes have been uploaded!
probably only OP will see this though..
Recently there was a post where the OP pitched an idea for a service related to this community. I don't want to go into details but the post's text has shown that maybe there's some misunderstanding around the technology, and a considerable amount of us also thought that it's not a good idea. The post was removed (noticed because I couldn't reply to someone) probably because the OP felt shame for their "failed" idea, but I think we shouldn't delete posts for reasons like this.
The post created an interesting discussion around the idea with useful info. It's useful to have things like these for future reference, for similar discussions in the future. This is an anonymous forum, so there's no shame in recommending things, when you do that politely like it was done in that case.
Matrix, the open protocol for secure decentralised communications
Introduction of the first Managing Director
I have just installed the tmuxinator 3.0.5 ruby gem with gem 3.2.5 and the --user-install
parameter, and to my surprise the gem was installed to ~/.gem/ruby/2.7.0/bin/
.
Is this a misconfiguration? Will it bite me in the future? I had a quick look at the environment and haven't found a variable that could have done this. Or did I just misunderstand something? I assume that the version of gem goes in tandem with the version of ruby, at least regarding the major version number, but I might be wrong, as I'm not familiar with it.
I have checked the version of gem by running gem --version
.
This is on a Debian Bullseye based distribution.
"Trusted Computing" - ever heard of it? This motion graphic style documentary explains what the term "trust" has in common with "Trusted…
The video is a short documentary on Trusted Computing and what it means to us, the users.
If you like it and you are worried, please show it to others. If you are not the kind to post on forums, adding it to your Bio on Lemmy and other sites, in your messaging app, or in your email/forum signature may also be a way to raise awareness.
Computers and the internet gave you freedom. Trusted Computing would take your freedom. Learn why: https://vimeo.com/5168045