• 0 Posts
  • 112 Comments
Joined 2 years ago
cake
Cake day: June 22nd, 2023

help-circle

  • turmacar@lemmy.worldtoSelfhosted@lemmy.worldWhat is Docker?
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 month ago

    Building from source is always going to come with complications. That’s why most people don’t do it. A docker compose file that ‘just’ downloads the stable release from a repo and starts running is dramatically more simple than cross-referencing all your services to make sure there are no dependency conflicts.

    There’s an added layer of complexity under the hood to simplify the common use case.






  • What are you talking about?

    This is not about streaming to a laptop or Internet access. This is about a long range, low power, low bandwidth network using 2.4GHz. It’s using 2.4GHz, like everyone else likes to, because it’s the “free” signal band that you don’t have to pay to license. It’s for sending the message “Sprinkler head 1039A is leaking” from a solar panel powered transmitter without having to run a data cable or network repeaters.

    It’s competition for Zigbee/Z-Wave/Matter. Not the herald of the ISP crackdown Armageddon.





  • That feels like a very… hopeful interpretation. Instead of “In my expert opinion there is no non-malicious use of this component, and SysadminX was the only one with possible access.”

    Intent is not always necessary, it depends on the charges.

    Computer Forensics isn’t a new discipline at this point. People have literally gone to jail for putting in kill switches. It’s possible SysadminX is actually smarter than teams of people that are dissecting what happened after they were fired and is a real life Keyser Soze, but it’s extremely unlikely.