• 0 Posts
  • 14 Comments
Joined 6 months ago
cake
Cake day: December 26th, 2023

help-circle
  • In addition to the raw compute power, the HP laptop comes with a:

    • monitor
    • keyboard/trackpad
    • charger
    • windows 11
    • active cooling system
    • enclosure

    I’ve been looking for a lapdock [0], and the absolute low-end of the market goes for over $200, which is already more expensive than the hp laptop despite spending no money on any actual compute components.

    Granted, this is because lapdocks are a fairly niche product that are almost always either a luxury purchase (individual users) or a rounding error (datacenter users)

    [0] Keyboard/monitor combo in a laptop form factor, but without a built in computer. It is intended to be used as an interface to an external computer (typically a smartphone or rackmounted server).




  • At a $188 price point. An additional 4GB of memory would probably add ~$10 to the cost, which is over a 5% increase. However, that is not the only component they cheaped out on. The linked unit also only has 64GB of storage, which they should probably increase to have a usable system …

    And soon you find that you just reinvented a mid-market device instead of the low-market device you were trying to sell.

    4GB of ram is still plenty to have a functioning computer. It will not be as capable of a more powerful computer, but that comes with the territory of buying the low cost version of a product.


  • Because the thing people refer to when they say “linux” is not actually an operating system. It is a family of operating systems built by different groups that are built mostly the same way from mostly the same components (which, themselves are built by separate groups).


  • Sudo is a setuid binary, which means it executes with root permissions as a child of of the calling process. This technically works, but gives the untrusted process a lot of ways to mess with sudo and potentially exploit it for unauthorized access.

    Run0 works by having a system service always running in the background as root. Running a command just sends a message to the already running seevice. This leaves a lot less room for exploits.


  • I’d just like to interject for a moment. What you’re referring to as Linux, is in fact, GNU/Linux, or as I’ve recently taken to calling it, GNU plus Linux. Linux is not an operating system unto itself, but rather another free component of a fully functioning GNU system made useful by the GNU corelibs, shell utilities and vital system components comprising a full OS as defined by POSIX.

    Many computer users run a modified version of the GNU system every day, without realizing it. Through a peculiar turn of events, the version of GNU which is widely used today is often called “Linux”, and many of its users are not aware that it is basically the GNU system, developed by the GNU Project.

    There really is a Linux, and these people are using it, but it is just a part of the system they use. Linux is the kernel: the program in the system that allocates the machine’s resources to the other programs that you run. The kernel is an essential part of an operating system, but useless by itself; it can only function in the context of a complete operating system. Linux is normally used in combination with the GNU operating system: the whole system is basically GNU with Linux added, or GNU/Linux. All the so-called “Linux” distributions are really distributions of GNU/Linux.




  • As a kid I attended a Jewish day school, and we had a year long class on European-Jewish history through the Holocaust.

    The post screenshotted (allegedly from the AGA) reads almost like it came right out of that era as a piece of anti-semetic propoganda.

    Seriously. Weather the post was actually from the AGA, or an anti-semetic propogandist, it is 100% blood libel, and should treated as such.



  • Not nessasarily, the protocol could be written so that an instance simply tells other federared instances “X of my users upvoted this, and Y downvoted this”.

    The tradeoff being that instance then have less tools to work with to moderate voting. Instead of being able to do global vote ring detection, the most they can do is look for abuse on their own server, and trust that every instance they vote-federate with does the same. Even then, with every instance trying to be vigilant, no one instance would have the info to detect a cross-instance abuse.