I think you can also register 10 years in advance, or maybe more depending on the registrar, which would cover all other potential snafus like expired card info.
I think you can also register 10 years in advance, or maybe more depending on the registrar, which would cover all other potential snafus like expired card info.
deleted by creator
Ah! Been there. Allocating lanes on small systems always seems to have more trial and error than I expect.
And here’s that x4 SFP+ card: https://www.trendnet.com/products/10g-sfp-pcie-adapter/10-gigabit-pcie-sfp-network-adapter-TEG-10GECSFP-v2
Maybe yeah. Also got the sense from the strong opinions that this is a preexisting debate, presumably in the context of continuous workloads or cached arrays with minimal spindown intervals. In that context it’s true that rotational disks still often win in energy efficiency and robustness (assuming we’re comparing them to consumer SSDs and not the latest enterprise u.2 stuff that’s rated for continuous work).
Not sure what everyone is arguing about here. Clearly SSD is better for intermittent r/w, whereas HDD can be more efficient at continuous r/w (especially in terms of watts/TB)
Just looking at specs should be enough to see that. SSDs can idle in ready state at close to 0 draw (~0.05w) whereas HDD requires continued rotation to remain ready. So consider an extreme case of writing for 1 minute then maintaining ready state for the rest of the day. For that the SSD will be far more efficient, obviously.
I don’t know, but I’d guess the buffered chipset controller has more stability during certain power state transitions.
deleted by creator
deleted by creator
As a human, honestly I too would have thought there was a CLI package for the HuggingFace API.
Edit: there is (now at least) https://huggingface.co/docs/huggingface_hub/main/en/guides/cli
So far this is the best automated account deletion and opt-out request software I’ve found: https://www.permissionslipcr.com/
For some companies it’s push-button. For others it can only initiate the requests. But so far it works as advertised.
In the end people/companies will pick the proprietary / closed option just because “it’s easier to use” or some other specific thing that will be good on the short term and very bad on the long term.
I agree with most of the above, just wanted to relay an explanation given to me years ago by my then eng director in an argument about this. He said the reasons we tend to use proprietary / closed platforms and deps in business settings is not necessarily because the software was better or easier to work with. Clearly it often isn’t.
It’s because of (1) built-in factoring and infrastructure, (2) built-in domain expertise that would otherwise require hiring or training, and (3) contractual guarantees that can be invoked when things go wrong. All of which attenuate risk and make development timelines and outcomes more predictable.
His line was “OSS is free like a puppy is free.” That is, most businesses aren’t old enough to handle the responsibility, and that’s why we still sometimes use shitty proprietary software.
I do not like them here or there.
I do not like them anywhere.
deleted by creator
Dammit, I came here hoping to see at least one “I have a very special set of skills.” Oh well.
Yeah I’d cut bait, rebuild from latest tapes. But also…
I’d put the corrupted backups in an eye-catching container, like a Lisa Frank backpack or Barbie lunchbox, to put on the wall in my office as a cautionary tale.
deleted by creator
Right, I suppose cybersecurity isn’t so different than physical security in that way. Someone who really wants to get to you always can (read: why there are so many burner phones at def con).
But for the average person, who uses consumer grade deadbolts in their home and doesn’t hire a private detail when they travel, does an iPhone fit within their acceptable risk threshold? Probably.
That’s possible too, and in general I’d think a foreground application currently in use alleviates most of the technical restrictions mentioned (read: why we never install FB).
But again we must assume some uncommon device privileges and we still haven’t solved the problem of background energy usage required to record and/or process a real time feed.
Yeah outside mobile devices I imagine there’s a lot more leeway technically speaking. I’d be far more inclined to suspect a smart TV or a home assistant appliance like Amazon Echo, for example. And certainly there are plenty of PCs out there that are 100% compromised.
But it’s the phone that people often think of as eavesdropping on their conversations. The idea is stickier perhaps because it’s a more personal violation. And I wouldn’t put it past data brokers by any means. They would if they could. I’ve just yet to hear a feasible explanation of how they can without being caught. Hence my doubt.
Apple used to straight up steal the idea of existing apps. Lately it seems they favor buyout, like with dark cloud becoming weather, but it used to be that Apple would randomly swoop in and crush developers by creating a first party version of their app.