

I’m just excited for Lepton which will hopefully demonstrate the stupidity of kernel level anticheat when it will allow Linux users to play Fortnite for a couple of hours before Epic inevitably starts monkeypatching their android port lol.


I’m just excited for Lepton which will hopefully demonstrate the stupidity of kernel level anticheat when it will allow Linux users to play Fortnite for a couple of hours before Epic inevitably starts monkeypatching their android port lol.
Anything that you can shove hardware into (CPU, RAM, HDDs, maybe a PCI slot), so any used workstation is a great start, and don’t bother splurging initially, just follow the quality tool rule and only buy when something becomes inadequate. If you want to jump straight into loud and noisy severs, you can pick up used servers for cheap like R730s which there’s a ton of out there. Just avoid 2.5" drive bays because 3.5" HDDS are way cheaper per Gb.
Would recommend podman over docker as its matured to the point where it has a lot of better features like rootless, quadlets, etc that you might want to take advantage of in the future. OS is whatever linux you prefer, but I recommend you stay away from Ubuntu. If you want something RedHat but not as cutting edge as Fedora, I’ve heard OpenSUSE is pretty nice.
For apps, If you want to do HTTPS via GUI then npmplus is nice option, Otherwise caddy can do the same with text config. Rest is whatever you want to try out :)
EDIT: If you start making an *arr stack, I would recommend recyclarr to handle the quite expansive content filter settings for sonarr and radarr.


I hate to break the news but the issue with Bitwarden is that the client sucks total ass, and there are no drop in 3rd party replacements for the browser plugin.
Been running Vaultwarden for a while now and even though the sync implementation is nice and clean, it’s just not worth the end user experience.


This is really dumb when compared to literally every other password manager, open source and enterprise which does a much better job of actually being a password manager and not a glorified encrypted text file.
I’m eventually going to switch back to KeePassXC and just suggest setting a master password with Firefox’s builtin password manager for everyone else who just wants a painless user experience and not have to deal with syncing vaults.


How much does colocation end up costing?
I doubt it’d be worth it, but it would be funny to move my dated homelab servers next to some shiny new stuff and get SLA level internet.


NIMBY is usually more to do with perceived loss in value though no?
People don’t want AI datacenters because they are directly offloading energy costs to neighborhoods via substantially higher power bills. Which is happening because the demand is so high, they can’t compensate by building more power sources in the same time frame.
That and the poor reception to the AI market, which is wrecking jobs, the economy, etc.
Otherwise, datacenters were pretty well known for being built with very little resistance before this, especially since lots of providers, like Google, would fund geopower sources to power their datacenters which would add power to the grid with surplus.
Reminds me of some funny old posts on r/sysadmin of greybeards who had essentially automated their entire jobs and life in perl lol.
Best one was a script that would auto text message his wife he would be coming home late if he still had an active terminal session.
There was a recent post around here or reddit that was about management trying to gauge performance via AI use, and how they had caught on to the token spending tricks people were using, but honestly it doesn’t seem that hard to fake around it if it ever came up.
Just throw some agent work at it like codex and watch it burn tokens running grep lol.


I know people are reacting like its expected anyway because of the amount of espionage that goes on, but this is honestly more of a cold war era tactic.
Why would China risk souring relations right after a major diplomatic trip with some throw away gadgets that any competent military security would find immediately and proceed to document it?
China can just get that high level information via a million other ways including Trump himself. They probably have a truthsocial scrapper that automatically tells them exactly what Trump is gonna do next by deciphering his insane posts lol.


I’m pretty sure it’s akmod-nvidia-470xx, would have to try it to see if it works.
750ti actually fell under Maxwell, and RPMFusion just split it off into akmod-nvidia-580xx for GTX 750/800/900/10 cards.
I think I faintly remember running a 600 card on linux back in the day, so no reason it shouldn’t work.


750 specifically was special because it was Maxwell architecture that Nvidia used on an “old” GPU brand line.
Hence the CM 5.0 instead of 3.0.
Mine was on the 580 something driver with CUDA 13.2 when I removed it from my server a couple of weeks ago.


Switch was what made me realize golden era of gaming was over, but it took about a year to set in because of the disconnect between the NX presentation and the actual product.
Seriously, go take a look at the original NX Switch presentation and it would almost seem that Nintendo was selling a completely different product.
All of the Wii era inspired hardware went mostly unused because the Switch couldn’t play Wii games, and Nintendo didn’t bother to even port their own titles outside of recycled Wii U content that didn’t sell well on the original console.
The software similarly was a joke. I have more functionality on a Nintendo DS than a Switch, and that isn’t even including “unofficial” homebrew. You can’t even voice chat with your friends without using an external app, which is insane considering the DS, DSi, 3DS, Wii, and Wii U that preceded this.
Major features that gave Nintendo the edge were gone. DS Downlaod Play, Streetpass, included minigames & apps, themes, free online, eshop points, wifi events, etc.
On top of that, the library was just not interesting enough to warrant paying $60 a pop for single player games, and the multiplayer selection was sparse, despite the main feature of the console being joycon controllers.
I got bored of it after only a year, and ended up having to change the joycon c-sticks a couple years later because of the drift issues.
IMO it was a massive success just because of the portable format allowing you to play big name games on the go, but it absolutely fails as a handheld console when compared to the DS line, which did so much more for so much less.
Now that other handhelds like the Steam Deck, AYN stuff, Legion, etc exist, there’s really no need to buy a Switch (2) for third party titles, which makes it a complete Nintendo only buy in.
The kicker is that Nintendo made absolute bank which is now why the Switch 2 is going for $450 (soon to be $500) and bumped their game prices to a whopping $70-80 because they know people were fine with it.
If I had more time on my hands, I would legitimately go make a modern version of Streetpass and download play for modern handhelds because that stuff was so cool and useful.


Not to act smug but this is one area where I see akmod seem to work better than dkms which is weird considering they should both produce the same result.


This is funny because I recently retired my 750ti which I had been using for server work and it ran great with the latest Nvidia driver (although I heard they’re gonna drop support soon and move the driver into a legacy package on rpmfusion).
The poor thing couldn’t even do H.265, had 2 Gb of VRAM, and needed specially compiled libraries for pytorch/tensorflow stuff because CM 5.0 was over 10 years ago, but it chugged along just fine.
I’m personally still on a 1660ti because despite OpenCL’s best efforts, CUDA has everyone by the balls, but now that I have a beefier server setup, I’ll probably go with AMD on my next build.
Assuming I’ll actually want to make a new build with these insane prices lol.
I wanted to commit to the meme showing walls of text lol.


TPM microslop magic.
What’s even funnier is that we already have TCG, ISE, and SE drives that hardware encrypt AES256 by design, so you still get at least an instant delete option if you never bother to set a key.
Windows wants to double screw you over by never telling you it added a key, and then leaving you dead in the water if your TPM breaks, and then also failing to maintain their own TPM requirements making it completely useless lol.
further restrictions on the recipients’ exercise of the rights granted herein. You are not responsible for enforcing compliance by third parties to this License.
If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply and the section as a whole is intended to apply in other circumstances.
It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system, which is implemented by public license practices. Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice.
This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License.
If the distribution and/or use of the Program is restricted in certain countries either by patents or by copyrighted interfaces, the original copyright holder who places the Program under this License may add an explicit geographical distribution limitation excluding those countries, so that distribution is permitted only in or among countries not thus excluded. In such case, this License incorporates the limitation as if written in the body of this License.
The Free Software Foundation may publish revised and/or new versions of the General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns.
Each version is given a distinguishing version number. If the Program specifies a version number of this License which applies to it and “any later version”, you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation. If the Program does not specify a version number of this License, you may choose any version ever published by the Free Software Foundation.
NO WARRANTY
BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. END OF TERMS AND CONDITIONS How to Apply These Terms to Your New Programs
If you develop a new program, and you want it to be of the greatest possible use to the public, the best way to achieve this is to make it free software which everyone can redistribute and change under these terms.
To do so, attach the following notices to the program. It is safest to attach them to the start of each source file to most effectively convey the exclusion of warranty; and each file should have at least the “copyright” line and a pointer to where the full notice is found.
one line to give the program’s name and an idea of what it does. Copyright © yyyy name of author
This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version.
This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.
You should have received a copy of the GNU General Public License along with this program; if not, see https://www.gnu.org/licenses/.
Also add information on how to contact you by electronic and paper mail.
If the program is interactive, make it output a short notice like this when it starts in an interactive mode:
Gnomovision version 69, Copyright © year name of author
Gnomovision comes with ABSOLUTELY NO WARRANTY; for details
type show w'. This is free software, and you are welcome
to redistribute it under certain conditions; type `show c’
for details.
The hypothetical commands show w' and show c' should show the appropriate parts of the General Public License. Of course, the commands you use may be called something other than show w' and show c'; they could even be mouse-clicks or menu items–whatever suits your program.
You should also get your employer (if you work as a programmer) or your school, if any, to sign a “copyright disclaimer” for the program, if necessary. Here is a sample; alter the names:
Yoyodyne, Inc., hereby disclaims all copyright
interest in the program Gnomovision'
(which makes passes at compilers) written
by James Hacker.
signature of Moe Ghoul, 1 April 1989 Moe Ghoul, President of Vice
This General Public License does not permit incorporating your program into proprietary programs. If your program is a subroutine library, you may consider it more useful to permit linking proprietary applications with the library. If this is what you want to do, use the GNU Lesser General Public License instead of this License.
GNU GENERAL PUBLIC LICENSE
Version 2, June 1991
Copyright © 1989, 1991 Free Software Foundation, Inc.
https://fsf.org/
Everyone is permitted to copy and distribute verbatim copies
of this license document, but changing it is not allowed.
Preamble
The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change free software–to make sure the software is free for all its users. This General Public License applies to most of the Free Software Foundation’s software and to any other program whose authors commit to using it. (Some other Free Software Foundation software is covered by the GNU Lesser General Public License instead.) You can apply it to your programs, too.
When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish), that you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free programs; and that you know you can do these things.
To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights. These restrictions translate to certain responsibilities for you if you distribute copies of the software, or if you modify it.
For example, if you distribute copies of such a program, whether gratis or for a fee, you must give the recipients all the rights that you have. You must make sure that they, too, receive or can get the source code. And you must show them these terms so they know their rights.
We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which gives you legal permission to copy, distribute and/or modify the software.
Also, for each author’s protection and ours, we want to make certain that everyone understands that there is no warranty for this free software. If the software is modified by someone else and passed on, we want its recipients to know that what they have is not the original, so that any problems introduced by others will not reflect on the original authors’ reputations.
Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that redistributors of a free program will individually obtain patent licenses, in effect making the program proprietary. To prevent this, we have made it clear that any patent must be licensed for everyone’s free use or not licensed at all.
The precise terms and conditions for copying, distribution and modification follow. TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION
Activities other than copying, distribution and modification are not covered by this License; they are outside its scope. The act of running the Program is not restricted, and the output from the Program is covered only if its contents constitute a work based on the Program (independent of having been made by running the Program). Whether that is true depends on what the Program does.
You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee.
You may modify your copy or copies of the Program or any portion of it, thus forming a work based on the Program, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions:
a) You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change. b) You must cause any work that you distribute or publish, that in whole or in part contains or is derived from the Program or any part thereof, to be licensed as a whole at no charge to all third parties under the terms of this License. c) If the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may redistribute the program under these conditions, and telling the user how to view a copy of this License. (Exception: if the Program itself is interactive but does not normally print such an announcement, your work based on the Program is not required to print an announcement.)
These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Program, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works. But when you distribute the same sections as part of a whole which is a work based on the Program, the distribution of the whole must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it.
Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Program.
In addition, mere aggregation of another work not based on the Program with the Program (or with a work based on the Program) on a volume of a storage or distribution medium does not bring the other work under the scope of this License.
You may copy and distribute the Program (or a work based on it, under Section 2) in object code or executable form under the terms of Sections 1 and 2 above provided that you also do one of the following:
a) Accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or, b) Accompany it with a written offer, valid for at least three years, to give any third party, for a charge no more than your cost of physically performing source distribution, a complete machine-readable copy of the corresponding source code, to be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or, c) Accompany it with the information you received as to the offer to distribute corresponding source code. (This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer, in accord with Subsection b above.)
The source code for a work means the preferred form of the work for making modifications to it. For an executable work, complete source code means all the source code for all modules it contains, plus any associated interface definition files, plus the scripts used to control compilation and installation of the executable. However, as a special exception, the source code distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable.
If distribution of executable or object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place counts as distribution of the source code, even though third parties are not compelled to copy the source along with the object code.
You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance.
You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the Program or its derivative works. These actions are prohibited by law if you do not accept this License. Therefore, by modifying or distributing the Program (or any work based on the Program), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Program or works based on it.
Each time you redistribute the Program (or any work based on the Program), the recipient automatically receives a license from the original licensor to copy, distribute or modify the Program subject to these terms and conditions. You may not impose any


Now all that high tech electronics jacking from the first Fast & Furious movie doesn’t look so dumb lol.


The real use case for redroid lol


Lenovo running the show is what makes it viable, otherwise I would have thought it was a Google backed conspiracy to drain GrapheneOS resources on a product that would never release.
Tbh the mobile industry is long overdue for some competitive upgrades anyway. A lot of their underlying functionality has fallen far behind desktop OSs.
Another day of vaguely pointing at Javascript when asked where the circus is.