@aard@kyu.de cover

This profile is from a federated server and may be incomplete. View on remote instance

[Thread, post or comment was deleted by the author]

  • Loading...
  • aard ,
    @aard@kyu.de avatar

    You still had a 4GB memory limit for processes, as well as a total memory limit of 64GB. Especially the first one was a problem for Java apps before AMD introduced 64bit extensions and a reason to use Sun servers for that.

    aard ,
    @aard@kyu.de avatar

    Did pretty much the same with a new server recently - spent ages debugging why it didn't find the SAS disks. Turns out, disks like to have power connected, and no amount of debugging on software level will help you.

    aard ,
    @aard@kyu.de avatar

    Everything is deployed via ansible - including nameservices. So I already have the description of my infra in ansible, and rest is just a matter of writing scripts to pull it in a more readable form, and maybe add a few comment labels that also get extracted for easily forgettable admin URLs.

    aard ,
    @aard@kyu.de avatar

    Unless you are gunning for a job in infrastructure you don’t need to go into kubernetes or terraform or anything like that,

    Even then knowing when not to use k8s or similar things is often more valuable than having deep knowledge of those - a lot of stuff where I see k8s or similar stuff used doesn't have the uptime requirements to warrant the complexity. If I have something that just should be up during working hours, and have reliable monitoring plus the ability to re-deploy it via ansible within 10 minutes if it goes poof maybe putting a few additional layers that can blow up in between isn't the best idea.

    aard ,
    @aard@kyu.de avatar

    I was referring to work setups with the overengineering - if I had a cent for every time I had to argue with somebody at work to not make things more complex than we actually need I'd have retired a long time ago.

    aard ,
    @aard@kyu.de avatar

    Shitty companies did it like that back then - and shitty companies still don't properly utilize what easy tools they have available for controlled deployment nowayads. So nothing really changed, just that the amount of people (and with that, amount of morons) skyrocketed.

    I had automated builds out of CVS with deployment to staging, and option to deploy to production after tests over 15 years ago.

    aard ,
    @aard@kyu.de avatar

    As a non-Windows-user I see that as a good thing. LLMs are not going away - but that kind of nonsense at least will make sure all PCs will eventually have cheap and reasonably fast AI acceleration. Which is required for killing off centrally hosted LLMs (plus nvidias cash grabbing)

    aard ,
    @aard@kyu.de avatar

    A lot of the Zen based APUs don't support ECC. The next thing is if it supports registered or unregistered modules - everything up to threadripper is unregistered (though I think some of the pro parts are registered), Epycs are registered.

    That makes a huge difference in how much RAM you can add, and how much you pay for it.

    aard ,
    @aard@kyu.de avatar

    Not just that - intel did dual core CPUs as a response to AMD doing just that, by gluing two cores together. Which is pretty funny when you look at intels 2017 campaign of discrediting ryzen by calling it a glued together CPU.

    AMDs Opteron was wiping the floor with intel stuff for years - but not every vendor offered systems as they got paid off by intel. I remember helping a friend with building a kernel for one of the first available Opteron setups - that thing was impressive.

    And then there's the whole 64bit thing which intel eventually had to license from AMD.

    Most of the big CPU innovations (at least in x86 space) of the last decade were by AMD - and the chiplet design of ryzen is just another one.

    aard ,
    @aard@kyu.de avatar

    Making an exception for one organisation, pressured by politicians, would be harmful. BBC has the following policy about neutral reporting:

    We don't use loaded words like "evil" or "cowardly". We don't talk about "terrorists". And we're not the only ones to follow this line. Some of the world's most respected news organisations have exactly the same policy

    aard ,
    @aard@kyu.de avatar

    One fascinating example is one owner that replaced the DC barrel jack with a USB-C port, so they could utilize USB-PD for external power.

    Oddly enough that's also an example for bad design in that notebook: The barrel jack is soldered in. With a module that is plugged into the board that'd be significantly easier to replace - and also provide strain relief for power jack abuse. All my old thinkpads were trivial to move to USB-C PD because they use a separate power jack with attached cable.

    The transparent bottom also isn't very functional - it is pretty annoying to remove and put back, due to the large amount of screws required. For a notebook designed for tinkering I'd have wanted some kind of quick release for that. Also annoying is the lack of USB ports on the board - there's enough space to integrate a USB hub, but just doing that on the board and providing extra ports would've been way more sensible.

    The CPU module also is a bit of a mixed bag - it pretty much is designed for the first module they developed, and later modules don't have full support for the existing ports. I was expecting that, though - many projects trying to offer that kind of modular upgrade path run into that sooner or later, and for that kind of small project with all its teething problems 'sooner' was to be expected. It still is very interesting for some prototyping needs - but that's mostly companies or very dedicated hackers, not the average linux user.

    aard ,
    @aard@kyu.de avatar

    Funny timing, I'm currently going through a stack of Sun hardware in my garage to decide what to keep, and for what I'll try to find a good home (or eventually dispose of it).

    aard ,
    @aard@kyu.de avatar

    RCS is just stupid. When I was still building phones a decade ago we had some operators ask for it - but after reading the standards decided to just ignore it and hope it passes. Pretty much everybody did that, until google got interested - presumably because they figured it'd be a good way to get control of messaging on a lower level. As that's exactly what RCS is: control of messaging, and ideally the option to charge for it, just like SMS and MMS before that.

    Discussion on 'Missing women on Lemmy and decentralised networks'

    I saw this post from !twoxchromosomes, and I wanted to share it here to get more discussion because it is important. I'm hoping that this post won't crowd out any voices, and while I've tried to keep this post productive and inclusive, please call out any concerns and use the post if you prefer :)...

    aard ,
    @aard@kyu.de avatar

    Make sure you're helping make Lemmy a welcoming place for non-males

    I'd phrase that as "make sure you're helping make Lemmy a welcoming place for everybody"

    Being active in a pretty friendly tech scene in the late 90s/early 00s I've seen things being ruined for quite a bunch of people who enjoyed being where nobody was judging them for who they were or wanted to be after a bunch of newly joined women decided to try force a bunch of "women only" policies.

    Just don't be dicks to each other, no matter who's on the other end. And don't try to force talking about who you are in places where nobody cares - there are specific groups for that.

    aard ,
    @aard@kyu.de avatar

    Even in this thread I'd rather phrase it explicitly to include everyone - I've seen statements like this interpreted by some individuals as "make it welcoming for women at all costs, which may include making it openly hostile for people not meeting my specific definition of woman", which didn't have a very pretty end result.

    aard ,
    @aard@kyu.de avatar

    WoL works as Ethernet¹ broadcast, while Wireguard routes IP, one level above that. So for the purpose of WoL the two ends of the Wireguard tunnel are in two different, not connected networks. In theory you might be able to make it work using subnet directed broadcasts - though creating some means to trigger the WoL packet on where you're terminating your Wireguard might be easier to manage.

    Simple option would be just logging in via SSH to trigger it (you could script that - define a host in your SSH client config that just executes a command on connection), or something like a simple web frontend which will then trigger the WoL event.

    ¹ it is probably fair to assume nowadays that you're using Ethernet, and not something like Token Ring. In case you do it still works the same, just the terminology is different.

    aard ,
    @aard@kyu.de avatar

    I'll murder anyone trying to talk to me before I had my 430ml of strong black tea in the morning. I have two cats and hate dogs. Never been to the UK.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • kbinchat
  • All magazines