

I suspect you may have meant to respond to the speed comment rather than root?
I suspect you may have meant to respond to the speed comment rather than root?
“The only difference between science and [messing] around is writing stuff down”
From memory I can only answer one of those: The way I understand it (and I could be wrong), your programs theoretically should only need modifications if they have a concurrency related bug. The global interlock is designed to take a sledgehammer at “fixing” a concurrency data race. If you have a bug that the GIL fixed, you’ll need to solve that data race using a different control structure once free threading is enabled.
I know it’s kind of a vague answer, but every program that supports true concurrency will do it slightly differently. Your average script with just a few libraries may not benefit, unless a library itself uses threads. Some libraries that use native compiled components may already be able to utilize the full power of you computer even on standard Python builds because threads spawned directly in the native code are less beholden to the GIL (depending on how often they’d need to communicate with native python code)
TIL that exists, I thought you were talking about an actual flippy disk (lower case) until I got here.
The could be using .js and .py files directly as config files and letting the language interpreter so the heavy lifting. Just like ye olde config.php.
And yes this absolutely will allow code injection by a config admin.
Found the FF14 fan lol
The release names are hilarious
Does that still happen if you use the merge unrelated histories option? (Been a minute since I last had to use that option in git)
Out of curiosity why would you call Ceph a fake HCI? As far as I’ve seen, it behaves akin to any of the other HCI systems I’ve used.
Not all of them. Ceph on Proxmox and (iirc) VMware vSAN run bare metal. That statement was a call-out post for Nutanix, which runs their storage inside a VM cluster. Both of these have been doing so for years.
Reddit is large enough that this would usually have ended up on one of the anime subs or technology joke subs rather than the general comics community.
Remember us… Remember that we once lived
Depending on the corruption/compression, or some combination thereof, yes. Usually it’s supposed to correct that issue with a key frame every few seconds, but if the source data were corrupted (or poorly generated/enhanced) it could happen.
Based on your other picture’s aspect ratio, it looks like you zoom enhanced a highly compressed frame. Image enhancement doesn’t work like it does in the movies.
The Netgear M4300 I got works like that, it’s a feature not a bug. There’s no link lights on the bottom, so the top row does the ports in alternate left/right patterns matching the label on the case right above the light.
Edit: a word
I work in IT. If someone came to ask me if they could install this on their system I’d tell them no, based only on this trailer. You’ve got to give us more info.
I’m all for open source and open systems that can be built up as needed, but people like me would need information to make decisions. Unlike your typical corporate executive or manager, technical people aren’t as easily conned by hype videos. I’ve seen more information published from a game company that’s trying to hide spoilers. The only technical information I could spot was that neofetch like screen, so I know you’ve got something Unix-like.
Also, if you’re going to be coy and post publicly but then send people on a treasure hunt, pick a less generic name or else you’re going to get lost on page 3 of Google. You list “Open Systems OS 1.0” on one slide, and that search for me returns OSF/1 (1990s), OpenKylin (a Chinese Linux), and classic Mac OS as the top results.
I get that software development takes time, and good software development takes even longer, but if you don’t have the info it’s too young in the development cycle for a hype video. It also tells me that if you’re using semantic versioning you’re using it wrong, because v1.0 of semver implies to be your first stable API, which you either have and are hiding or don’t have so you shouldn’t be at 1.0.
Even just one sentence “I am building a Unix-like operating system using a [custom|Linux|BSD] kernel which is designed to [fly model airplanes]” would be better than a void. That kind of sentence will get the right people interested in you project and asking the right questions. For example, if you’re about model airplanes or server hosting, I might be interested. But if you’re building an OS around someone who wants to use their computer like a VN, that’s not my cup of tea personally. You haven’t dis-proven the latter yet, though I assume it’s an unlikely occurrence.
^ this
As an example of scale, my company has an entire IT team of a handful of people for managing such an environment for a thousand or so devs and engineers.
You very much gloss over the whole “distribution” part. That is one of the main three segments of an electric grid (generation, transmission, distribution). Practical Engineering has some great content about how the grid works and addresses some of the problems renewables face in certain aspects iirc. I recommend giving it a watch or at least a background listen. His first video that is a good place to start, and the “which power plant does my electricity come from” with the lake analogy is also a good intro.
https://youtube.com/playlist?list=PLTZM4MrZKfW-ftqKGSbO-DwDiOGqNmq53
Having a DER system is great and all because the transmission system doesn’t have to be as highly loaded (thus increasing the total load a system can withstand), but you still need to be pretty connected for something like this to work - and like others have pointed out, that’s going to mean building a parallel grid (which the energy regulators won’t like if you get too big) or hooking into the existing grid (which probably already has DER management baked into the system if you contact your local power company).
The grid works because it’s big. That’s a feature, not a bug. And because we have AC not DC on the wire, any energized and connected generator has to be in dead lockstep with the grid frequency or else your hardware is going to become a load, make expensive noises, emit magic smoke, or some combination thereof.
One major edge case you have is night charging of EVs. Let’s say I’m a 9-5 office worker with a standard parking lot at my workplace. I’m just a keyboard monkey doing whatever, so I’m not a decision maker as to what goes in the parking lot infrastructure wise, so I’m at the mercy of whatever Facilities is doing, and gods know what that is. But I have a nice brand new EV, and I want to charge it. When I drive home after DST ends, it’s dark outside. There’s no solar to charge my car. Some renewables (like wind and hydro) work at night, but solar doesn’t. I’d need to charge an auxillary power storage system during the day, and then transfer that to my EV battery at night. That’s more complexity.
Power storage of any kind of generation is a huge issue with many different solutions, and not all of them are batteries. And nothing is a perfect system, so there’s energy losses whenever we convert from type A to type B of whatever.
Or… I could just hook my EV up to the grid where the cost of my bill per kilowatt hour includes systems and people to manage keeping the system on voltage and on frequency, 24/7/365.25.
Any power produced during that day for a solar system that doesn’t get immediately used needs to be stored (because it HAS to get put somewhere or you literally break the grid or waste it). That energy storage - along with the voltage converters - is going to take up extra cubic footage in your system that won’t be small, and requires regular monitoring and maintenance to stay online. The system you’re proposing is going to create many fragments of the grid in the form of these pop up neighborhood charging stations entirely dependent on what resources are available in less than a mile radius.
Even if you assume that you don’t have to frequency synchronize with the main grid and you’re fully isolated, you run into another big problem: local generation isn’t always perfect. Solar especially is very susceptible to the giant orb in the sky being around, so your local energy storage needs to account for being able to hold enough power for a certain percentage above your worst case cloudy day while maintaining the necessary output to sustain the local EVs depending on it. If you get a 2- or 3- day storm, I hope you have enough energy storage to have low daytime charge rates for 4- to 5- days. In the playlist, there’s also a video talking about using hydroelectric generators in reverse to store energy as physical potential energy in a reservoir as one example of how a grid might store excess energy.
This is one thing the major grids are quite literally engineered and regulated to accomplish: because they are in fact so large, they can just import energy via the market system from somewhere with better weather or is slightly off-peak demand. And when one type of energy becomes less viable for a given weather condition (like solar on a cloudy day) they have a diversified generation portfolio of other sources: renewables like wind and hydro, nuclear energy for big orders, and even grid-scale energy storage system such as flywheels (fast stabilization), pumped water storage, and even giant batteries, and if all those fail, well yes we do still have dinosaurs to burn. (The world’s not perfect yet and we should by all means go for progress, but it will be a long road). And all these sources are already working together to keep the grids on voltage and on frequency, and have physical and managerial infrastructure to keep everything connected and synchronized such that supply and demand are balanced.
Adding to the other person - the auto thumbnail it adds makes it look like YouTube spam. That plus the wall of text makes it look like a low effort LLM post
Typically the same level of permissions needed to load drivers - which if they’re attacking the system using custom out of date drivers is relevant.
Having users and services at least privileges is one step of attack surface area reduction, but the “better” solution is to make sure that revocation check is enabled and that the compromised cert is revoked by its issuer. Or if it’s an old, unused root, you can ban that root at the machine level.