Τι προβλέπει το σχέδιο για την εθελοντική στράτευση γυναικών


Πιο συγκεκριμένα, προβλέπεται ότι οι εθελόντριες ηλικίας 20 έως 26 ετών θα αποκτούν στρατιωτική ιδιότητα όμοια με εκείνη των αντρών που κατατάσσονται για την εκπλήρωση της κύριας στρατιωτικής τους υποχρέωσης και θα υπάγονται στους ίδιους στρατιωτικούς νόμους και κανονισμούς.

Η διάρκεια της εθελοντικής θητείας θα είναι 12 μήνες και οι εθελόντριες θα μπορούν να ανακατατάσσονται ή να επανακατατάσσονται ως Οπλίτες Βραχείας Ανακατάταξης (ΟΒΑ) σύμφωνα με τις υφιστάμενες διατάξεις. Μετά τη συμπλήρωση του 40ου έτους, οι εθελόντριες θα εντάσσονται στην εφεδρεία και σε περίπτωση επιστράτευσης θα καλούνται σύμφωνα με τις υπηρεσιακές ανάγκες της αρμόδιας διεύθυνσης του Γενικού Επιτελείου Στρατού.

Για να δηλώσουν την πρόθεση τους να καταταγούν, οι εθελόντριες θα πρέπει να απευθύνονται στη Διεύθυνση Στρατολογικού του ΓΕΣ από την 1η Ιανουαρίου έως την 31η Μαρτίου κάθε έτους, υποβάλλοντας τα απαραίτητα έγγραφα. Ο αριθμός, ωστόσο, των γυναικών που μπορούν να καταταγούν στον στρατό θα κυμαίνεται και θα καθορίζεται σε ετήσια βάση.

Αλλαγές στην εφεδρεία
Σύμφωνα με τις διατάξεις, η πρόσκληση εφέδρων των ενεργών μονάδων θα γίνεται τουλάχιστον μία φορά ανά τριετία και των εφέδρων των επιστρατευόμενων μονάδων μία φορά στα πέντε χρόνια. Ορίζεται ακόμη, ότι η εκπαίδευση θα διαρκεί τουλάχιστον τρεις ημέρες.

how can i make use of the free space in a bootable usb drive?


i have a 32 gigs usb drive and, given that most isos are around 2-5 gigs, it's such a shame to see nearly 30 gigs of perfectly good free space go to waste whenever i need to use it as a bootable drive. is there any way i can burn an iso image to the usb drive while still being able to use its free space?

What are the best reasons people have given you for not wanting to try Linux?


Heyho, recently someone asked for the silliest reasons, but as someone who has suggested linux to many people, I often encounter people having valid reasons for staying with Windows or switching back.

The most boring but valid one is "I have to use Windows for work. It is a requirement (of some software I have to use)". But there are also other answers that fit. My sister for example tried Linux, but while installing software constantly encountered issues that I helped her solve and eventually switched back because she felt like she had less control than over windows. While I am aware that this is fundamentally wrong, it is valid that some amateur users do not want to invest enough time to get over the initial hurdles of relearning how to install software.

What are the best reasons people have given you for not wanting to try Linux?

This entry was edited (3 hours ago)
in reply to VoxAliorum

I did an update or something and it corrupted the bootloading for Fedora Silverblue. Had to just reinstall everything. Also was a time when the update url or something was broken and I couldn't update. That remains the biggest issue. But it might not be an issue for a professionally maintained distro like Ubuntu that has a company backing it. I feel like it's safe to recommend Ubuntu but not any other distros.

And it's definitely true that the average user has more control on Windows. You can download installers and random zip files with executables and they'll just work. Linux has such a messed up model for executables and libraries that they usually have to be recompiled for every Linux distro unless you use flatpak.

But I think it's mostly the learning curve of getting used to how linux desktops work and their idiosyncrasies that makes it hard for people. And tons of bad advice online telling you to run commands.

Linux actually has lots of GUI apps that can help fix issues and do things in Linux but people keep offering outdated advice about using command line tools and editing brittle config files.

And some things are distro-specific.

This entry was edited (3 hours ago)

Switching from Windows, but slightly convoluted


I've been meaning to switch to Linux, it at least dual boot for a couple years now but have a dumb roadblock that has gotten in the way.

I rebuilt my desktop a few years ago, adding a fast new SSD as well as pretty much all new guts (mb, processor, graphics) carrying over an ancient HDD that was home to my win 10 installation and a tiny 60gb ssd.

When I rebuilt, I figured I would migrate Windows from the old HDD to the shiny new SSD, but was never successful in doing that.

My next step was to install another copy of win10 onto the new SSD, thinking I could just drag and drop my various program folders from the old install into the new. Dumb, I know.

Long story short, I'm still booting off of the old HDD and have two copys of Windows that I have to choose from when booting (the one on the new SSD is empty and doesn't see any of my old programs).

I've been avoiding it, but do I have to do a complete wipe at this point were I to attempt a dual Windows/Linux boot? I'd really rather not have to reinstall all of my junk on a fresh build.

I've run Linux before, so I'm not a complete noob, but it's been a few years. I'd switch over completely if I wasn't dependent on the Adobe CS (another problem I plan to fix in time, I know there are alternatives).

Sorry if this isn't the right place to post this, but I was hoping a veteran in this community that may have solved a similar situation.

Linux Hardening Guide / Linux is Insecure


Writeup from 2022 that I assume is mostly still valid. TLDR:

  1. Mainstream Linux is less secure than macOS, Windows, and ChromeOS. (Elsewhere: "[iOS/Android] were designed with security as a foundational component. They were built with sandboxing, verified boot, modern exploit mitigations and more from the start. As such, they are far more locked down than other platforms and significantly more resistant to attacks.")
  2. Move as much activity outside the core maximum privilege OS as possible.
  3. OP doesn't mention immutable OS, but I assume they help a lot.
  4. Create a threat model and use it to guide your time and money investments in secure computing.


Once you have hardened the system as much as you can, you should follow good privacy and security practices:
  1. Disable or remove things you don't need to minimise attack surface.
  2. Stay updated. Configure a cron job or init script to update your system daily.
  3. Don't leak any information about you or your system, no matter how minor it may seem.
  4. Follow general security and privacy advice.
in reply to BigHeadMode

I’ve had a hot take for a while now that Linux isn’t “more secure” than other operating systems like a lot of evangelists will claim. I think people get this impression because the user base for desktop Linux has been small enough that no one was writing malware targeted at us.

Unix’s security model was developed in a world where the primary concern was protecting the system from users and protecting users from each other. It wasn’t really designed for single-user systems where the main concern is protecting the user from their own applications.

in reply to verdare

no one was writing malware targeted at us


Probably not true now. It took some digging but I found e.g. BPFdoor attack.mitre.org/software/S116… which "does not need root to run" sandflysecurity.com/blog/bpfdo…

The silver lining is that a lot of these backdoors are nation-state level so you might not be targeted by them. If I had data on my computer worth a dang, I'd be more concerned.

Nvidia finally focuses on Linux, EU caves to Big Tech - Linux Weekly News


Head to squarespace.com/thelinuxexperi… to save 10% off your first purchase of a website or domain using code thelinuxexperiment

Grab a brand new laptop or desktop running Linux: tuxedocomputers.com/en#

👏 SUPPORT THE CHANNEL:
Get access to:
- a Daily Linux News show
- a weekly patroncast for more thoughts
- your name in the credits

YouTube: youtube.com/@thelinuxexp/join
Patreon: patreon.com/thelinuxexperiment

Or, you can donate whatever you want:
paypal.me/thelinuxexp
Liberapay: liberapay.com/TheLinuxExperime…

👕 GET TLE MERCH
Support the channel AND get cool new gear: the-linux-experiment.creator-s…

Timestamps
00:00 Intro
00:44 Sponsor: SquareSpace
02:00 Nvidia contributes to Nova driver
03:36 Nvidia wants to improve DRM and screencasting
06:19 NVK makes good progress
08:40 EU proposes to strip back privacy protections
11:51 New Online Accounts for KDE
14:28 Zorin OS 18 reaches 1 million downloads in a month
16:16 Mozilla's API to automate AI browsing and scraping
18:50 Mastodon's founder steps down, big funding secured
21:02 Valve updates Steam Linux runtime
22:23 VKD3D Proton gets massive update
23:57 Sponsor: Tuxedo Computers

Links:

Nvidia contributes to Nova driver
phoronix.com/news/NVIDIA-Turin…

Nvidia wants to improve DRM and screencasting
phoronix.com/news/NVIDIA-Less-…
phoronix.com/news/NVIDIA-Short…

NVK makes good progress
phoronix.com/news/NVK-Status-U…

EU proposes to strip back privacy protections
theverge.com/news/823788/europ…
edri.org/our-work/commissions-…

New Online Accounts for KDE
nicolasfella.de/posts/a-new-on…

Zorin OS 18 reaches 1 million downloads in a month
linuxiac.com/zorin-os-18-hits-…

Mozilla's API to automate AI browsing and scraping
tabstack.ai/

Mastodon's founder steps down, big funding secured
blog.joinmastodon.org/2025/11/…
techcrunch.com/2025/11/18/mast…

VKD3D Proton gets massive update
github.com/HansKristian-Work/v…

Valve updates Steam Linux runtime
gamingonlinux.com/2025/11/valv…

This entry was edited (17 minutes ago)

Broad support for lethal control of wild deer among nature organisation subscribers


There is broad support for regulated lethal control of wild deer to reduce their numbers and impacts among subscribers of nature organisations in England and Wales, a new study has found.

According to research led by Bangor University and published in People and Nature, it was the most supported and widely used deer management practice.

The authors of the study believe that the findings might help nature organisations and decision makers feel more confident about recommending its use.

in reply to murph

It might help to post the website: olfconference.org/

I've never been to it before but was planning on it this year. Just my luck that I made commitments already which I can't cancel.

Agencia de Marketing Digital: Intelligenta Studio, Innovación al Servicio de tu Empresa


Intelligenta Studio es una respetada Agencia de Marrketing Digital en Quito que se dedica a fortalecer la presencia en línea de pequeñas y medianas empresas. Su enfoque distintivo combina creatividad y analítica para generar estrategias que realmente resuenen con el público objetivo.

Los servicios de esta agencia de marketing digital abarcan desde el diseño de páginas web hasta la gestión de campaña en redes sociales y la optimización para motores de búsqueda. A través de un enfoque integral, Intelligenta Studio se asegura de que cada interacción digital con los clientes sea significativa y efectiva.

Lo que distingue a Intelligenta Studio es su compromiso de entender las particularidades de cada negocio. Al trabajar en colaboración con sus clientes, crean soluciones a medida que abordan las necesidades específicas y ayudan a alcanzar los objetivos comerciales. Su filosofía se centra en establecer relaciones duraderas, impulsando el crecimiento sostenible.

Si buscas una agencia de marketing digital que combine estrategia, experiencia y pasión, Intelligenta Studio está lista para llevar tu proyecto hacia nuevos horizontes y convertir tus ideas en éxitos tangibles.

Stubsack: weekly thread for sneers not worth an entire post, week ending 23rd November 2025 - awful.systems


Want to wade into the sandy surf of the abyss? Have a sneer percolating in your system but not enough time/energy to make a whole post about it? Go forth and be mid: Welcome to the Stubsack, your first port of call for learning fresh Awful you’ll near-instantly regret.

Any awful.systems sub may be subsneered in this subthread, techtakes or no.

If your sneer seems higher quality than you thought, feel free to cut’n’paste it into its own post — there’s no quota for posting and the bar really isn’t that high.

The post Xitter web has spawned soo many “esoteric” right wing freaks, but there’s no appropriate sneer-space for them. I’m talking redscare-ish, reality challenged “culture critics” who write about everything but understand nothing. I’m talking about reply-guys who make the same 6 tweets about the same 3 subjects. They’re inescapable at this point, yet I don’t see them mocked (as much as they should be)

Like, there was one dude a while back who insisted that women couldn’t be surgeons because they didn’t believe in the moon or in stars? I think each and every one of these guys is uniquely fucked up and if I can’t escape them, I would love to sneer at them.


(Credit and/or blame to David Gerard for starting this.)

Miranda Arquitectura: Creación de Espacios Excepcionales en Quito


Miranda Arquitectura se ha establecido como un pionero en el diseño arquitectónico en Quito, Ecuador, destacándose por su enfoque innovador y su compromiso con la calidad. Esta firma proporciona servicios de arquitectura que abarcan tanto proyectos residenciales como comerciales, adaptándose a las demandas específicas de cada cliente.

Con un portfolio que incluye obras icónicas como la Residencia DB en Puembo y el elegante Cuboid House en Tumbaco, Miranda Arquitectura demuestra su habilidad para combinar estética y funcionalidad. Cada proyecto está diseñado meticulosamente para crear espacios que no solo son visualmente impactantes, sino que también satisfacen las necesidades diarias de sus habitantes.

La oferta de la firma se extiende a proyectos en venta, como las casas del desarrollo Santa Ana, donde los propietarios pueden disfrutar de un entorno moderno y seguro, con comodidades diseñadas para mejorar la calidad de vida. Este enfoque hacia el bienestar de los residentes resalta la misión de Miranda Arquitectura de crear hogares que sean verdaderos refugios.

Para aquellos que están interesados en redefinir su espacio vital, visitar la web de Miranda Arquitectura proporciona una oportunidad para explorar sus servicios y descubrir cómo pueden convertir cualquier visión arquitectónica en realidad. Con un equipo experimentado y apasionado, están listos para guiar a sus clientes en cada paso del camino.

in reply to JillyB

A typical uprising isn’t suppressed with tanks and fighter jets…


Okay sure, give me an example of a modern uprising where the protesters used weapons to achieve their goals.

Eastern bloc collapse, arab spring, sudan, burkina faso… succeeded because the military refused to side with the state against the uprisings, not because civilians had weapons.

And you're straight up wrong (or uninformed?), modern uprisings are suppressed with tanks and jets. It took days for the Syrian military to flatten armed protesters and the entire urban areas in which they attempted their revolution. Same thing in Libya, it was a slaughter, weapons and guerrilla tactics were losing to the military, it took a NATO intervention to turn the tide. For an even more recent example, the Myanmar uprisings were met with artillery, airstrikes, scorched earth tactics on their own land, no fucks given mass executions, etc.

It’s suppressed with police…


Well it's a good thing that we haven't been militarizing the police in every country these past decades then.

The US lost in Vietnam and Afghanistan…


Vietnam and Afghanistan weren't attempts to fight against the tyranny of a state. I know imperialist media likes to portray them as proletarian resistance fighters in jungles/mountains, but both were actually an organized military fighting guerrilla warfare in perfect terrain using their own military grade weapons and equipment, with heavy logistical support from outside allies.

TL;DR: Remind me what happened to the civilians who tried to fire at the turkish police in 2016?

This entry was edited (1 day ago)
in reply to Bad

give me an example of a modern uprising where the protesters used weapons to achieve their goals.


Uprising was maybe the wrong word. But off the top of my head, the Black Panthers and the IRA both used lots of weapons to achieve their goals. The Black Panthers were considered by the FBI to be the biggest threat to the US government in the 60s. They were eventually stopped with counter-intelligence, infiltration, criminalizing, and disarmament rather than military action.

You bring up good examples of uprisings that didn't use weapons and times that uprisings were suppressed with military force. I guess I would slightly walk my original claim back. However, I still think that the people having guns is better than not. I can't find an article, but during the 2020 BLM protests, there were plenty of armed counter protesters. The police were harassing the protesters and leaving the counter protesters alone. Lots of ink was spilled about how this showed which side the police were on. That's probably true. But there was also some Texas BLM protests where the protesters showed up armed and the police didn't fuck with them. They didn't need enough firepower to win a battle. They just needed enough to deter aggression.

LinuxFest Northwest 2026: Call for Speakers open through 12/31


cross-posted from: discuss.online/post/30887652

They are a warm and welcoming community. You can attend or present at no cost. LinuxFest Northwest (est. 2000) is an annual, free-to-attend F/LOSS conference co-produced by Bellingham Linux Users Group, Information Technology department at BTC, Jupiter Broadcasting, and Cascade STEAM.

LFNW features presentations and exhibits on free/libre and open source topics, as well as Linux distributions & applications, licensing, InfoSec, DevOps, AI/ML, creative software, hardware, and privacy; something for everyone from the novice to the professional!

Glorb - Trendsetter


YT Mirror

Glorb - The Bottom 2


YT Mirror

The Path to a Perfect Smile: Everything You Need to Know About Dental Implants


Dental implants offer a durable and natural-feeling solution to fill that gap. However, they are not the right choice for everyone. This article explores the details of dental implants, who they are best suited for, and how to weigh the benefits and drawb

Tooth loss can have a profound impact on your life, affecting your ability to speak, eat, and smile confidently. The gap left by a missing tooth can be a constant reminder of what's missing. Dental implants offer a durable and natural-feeling solution to fill that gap. However, they are not the right choice for everyone. This article explores the details of dental implants, who they are best suited for, and how to weigh the benefits and drawbacks.

Understanding Dental Implants


A dental implant is a small titanium post that serves as a replacement for the root of a missing tooth. It is surgically inserted into the jawbone, where it gradually bonds with the bone over time. Once the implant is stable, a crown—the visible part of the tooth—is attached to it. The result is a tooth that closely resembles a natural one in both appearance and function. Unlike removable dentures, implants help preserve the jawbone structure, preventing the bone loss that often follows tooth loss.

Why Choose Dental Implants?


There are several compelling reasons why people choose dental implants. Firstly, they are long-lasting. With proper care, implants can endure for decades. Secondly, they restore significant chewing strength, allowing you to bite and eat with confidence. Lastly, they prevent bone loss, which is crucial for maintaining the health and appearance of your surrounding teeth.

The Implant Procedure: A Step-by-Step Guide


The process of getting dental implants is systematic and predictable, though it requires patience. Here's a simplified timeline:

  • Assessment: Your dentist will conduct X-rays or a 3D scan to evaluate your gums and jawbone.
  • Planning: If your jawbone is too thin, a bone graft may be recommended to provide a stable base for the implant.
  • Surgery: The implant is placed under local anesthesia. Most patients report minimal discomfort afterward.
  • Healing: The implant needs time to integrate with the bone, a process that typically takes several months.
  • Restoration: Once fully integrated, your dentist will attach an abutment and a crown to complete the restoration.

Some dental practices handle both the surgical placement and the crown fitting in-house, while others collaborate with specialists. Understanding the roles and timelines involved is crucial for a smooth experience.

Bone Grafts and Sinus Lifts: What You Need to Know


If your jawbone has lost volume, a bone graft can replace or augment the missing bone. This procedure adds time to the overall treatment but is essential for ensuring the stability of the implant. For upper back teeth, a sinus lift may be necessary to create space for bone grafting. These procedures, though technical, are common and contribute to the success of dental implants.

Ideal Candidates for Implants


Good candidates for dental implants typically have healthy gums and sufficient jawbone density. Non-smokers tend to fare better, as smoking can reduce blood flow and increase the risk of implant failure. Well-managed medical conditions, such as diabetes, do not necessarily disqualify you, but they require careful monitoring. Age is not a barrier; older adults with good oral health can also benefit from implants.

Implants may not be suitable if you have active gum disease or untreated dental decay. They also require a commitment to oral hygiene and regular dental check-ups. If you prefer a quicker, less expensive option or are uncomfortable with surgery, alternatives like bridges or removable partial dentures might be more appropriate.

Potential Risks and Complications


Like any medical procedure, dental implants come with risks. The primary concerns include infection, failure of the implant to integrate with the bone, and rare cases of nerve irritation. Upper implants can sometimes affect the sinuses. Thorough planning, imaging, and follow-up care can mitigate these risks. It's reasonable to inquire about a clinician's complication rate and their approach to handling issues.

Recovery and Daily Life


After the implant placement, you may experience swelling and mild discomfort for a few days. Pain can usually be managed with over-the-counter painkillers and ice. Your dentist will provide guidelines on eating and oral care during the healing period. Avoid hard foods initially and follow the advice given. Once the crown is in place, you can return to normal daily activities. Many patients find that their new tooth feels natural within a few weeks.

Financial Considerations


Dental implants often come with a higher upfront cost compared to bridges or partial dentures. However, they can be more cost-effective in the long run due to their durability and minimal impact on neighboring teeth. If cost is a concern, many clinics offer payment plans or staged treatment options. It's important to ask for a detailed breakdown of costs, including scans, surgery, crown placement, grafting, and follow-up visits, to avoid any surprises.

Long-Term Maintenance


Maintaining a dental implant is similar to caring for a natural tooth. Brush twice daily, floss or use interdental brushes around the implant, and attend regular dental cleanings. If you grind your teeth, a night guard may be recommended. Consistent routine maintenance is key to the long-term success of your implant.

Choosing the Right Provider


When selecting a dental provider, clear communication is more important than fancy equipment. However, 3D imaging and meticulous planning are indicators of thorough care. Ask about the clinician's experience with implant cases, who will perform the surgery, and request to see before-and-after photos from real patients.

If you are in or near Clementi, consider searching for a dentist at Clementi or a dentist near Clementi with implant experience. Read reviews, but prioritize how comfortable you feel after a consultation. A clear plan, honest answers, and an explanation of alternatives are crucial.

Questions to Ask During Your Consultation


Prepare a list of questions for your appointment, such as:
- Am I a suitable candidate, and why or why not?
- Will I need a bone graft or sinus lift?
- Who will perform each part of the treatment?
- What is your success rate and follow-up plan?
- Can you show me examples of similar cases?

Clear, straightforward answers are preferable to vague reassurances.

Alternatives to Consider


A bridge replaces a missing tooth by anchoring to adjacent teeth. While less invasive, it may affect those teeth over time. Removable partial dentures are a less expensive, non-surgical option suitable for temporary or budget-conscious needs. Each alternative has its own trade-offs in terms of durability, maintenance, and impact on surrounding teeth.

Making the Decision


Choosing dental implants involves balancing your oral health, tolerance for surgery, budget, and long-term goals. If you desire a durable, natural-feeling solution and have a healthy mouth, implants are worth considering. If you need a quicker, lower-cost option or have health concerns, other reliable alternatives exist.

If you reside near Clementi and are exploring your options, look for a dentist at Clementi or a dentist near Clementi with implant experience. A consultation will provide a tailored plan and clear next steps. From there, you can weigh the practical details and make a decision that fits your life—and your smile.

The ChromeOS of Linux: Basic use cases, impossible to break, ~1,000 happy(?) users, Nix based. Nixbook OS.


This is extremely encouraging to me. I am not affiliated with the project but here is what I've gathered. Run by Mike.

  • Nix (with the functional declarative design)
  • Cinnamon (DE mostly used by Linux Mint, Mike and I think Cinnamon doesn't get enough respect)
  • Two versions, main and "lite".
  • zero config auto update is a huge selling point imo
  • flatpak is a nice touch

Main:
- "4 core and 4GB of ram" target
- Flatpak integrated and auto-updates
- Zoom flatpak
- Chrome flatpak and Firefox
- Libreoffice flatpak

environment.systemPackages = with pkgs; [
    git
    firefox
    libnotify
    gawk
    gnugrep
    sudo
    dconf
    gnome-software
    gnome-calculator
    gnome-calendar
    gnome-screenshot
    flatpak
    xdg-desktop-portal
    xdg-desktop-portal-gtk
    xdg-desktop-portal-gnome
    system-config-printer

Lite:
- "2 core and 2 GB of RAM" target
- no flatpak
- firefox
  zramSwap.memoryPercent = 100;
MemoryHigh = "500M";
environment.systemPackages = with pkgs; [
    git
    firefox
    libnotify
    gawk
    sudo
    gnome-calculator
    gnome-calendar
    gnome-screenshot
    system-config-printer
  ];

Github

Installing


boot the special ISO and connect to wifi via the system settings via the start menu (rough edges here). install.

secure boot is not first-class supported in nix but it 'can' be done.

Does the market need this?


It feels like yes. See what do you install on other people's computers?. A zero-support OS that isn't tied into ChromeOS is a tall order. There are a lot of distros that are "semi" friendly but which are strong enough to give to a stranger and never hear from them again?

The pitch is compelling enough that I put it on my small laptop. I used it for about 20 minutes. That laptop is not a project laptop, and if I could just browse and do basic linux stuff and never think about maintaining it again I'd be happy. I can report back (and contribute to nixbook) if it serves my needs. If it passes my tests I may transition the family Win10 PC to nixbook. I'm getting spooked at how many more threats target Windows than Linux.

tweaking


I'm an ultra noob with nix but you should be able to edit this and have it work. Mike has a post about which config file to edit but I can't find it. nixos.wiki/wiki/Nixos-rebuild

$ # Edit your configuration
$ sudo nano /etc/nixos/configuration.nix
$ # Rebuild your system
$ sudo nixos-rebuild switch

I added silversearcher tldr tilde and seemed to work.

Cool tweet


fosstodon.org/@codemonkeymike/…

in reply to Anivia

It's controlled by a major corporation that tightens up all the time (e.g. the manifest v3 changes conveniently hurting ublock origin, the weird app interests thing that only Google supports, the conflicts of interest between Chrome, Google, and Chrome users [webP vs JPEG-XL]). Stock Chrome/ChromeOS is a massive data harvesting operation that gets more insistent with each update. Once Google stops supporting them they can become paperweights if you don't have alternate OS support (not every model does). Goes against the libre philosophy of mainline linux. ChromeOS running Linux is an implementation detail, for how much use it provides the average user.
This entry was edited (31 minutes ago)

Decoding the Demand for Concrete Crushers: Core Factors Shaping the Industry


The concrete crusher is having a moment. No longer just a brute-force machine relegated to remote quarries, it has been recast as a central protagonist in the narrative of modern development. Its rising demand isn't a random market fluctuation; it's the direct output of a powerful confluence of global trends reshaping our built environment. The industry's trajectory is being dictated by a fundamental recalibration of how we build, what we build with, and the economic and environmental calculus that underpins it all. To understand the concrete crusher's burgeoning role is to decode the core forces—from urban regeneration and sustainability mandates to colossal infrastructure ambitions and a new operational ethos—that are fundamentally restructuring the construction ecosystem. This is a deep dive into the engine of this demand.

mobile track type impact crushing plant for construction waste recycling in the Philippines

## The Urban Rebirth: Demolition and the Circular Construction Mandate
The skyline of the modern city is a dynamic entity, constantly shedding its old skin to make way for the new. This cycle of urban densification and renewal is a primary engine for concrete crusher demand. As aging commercial structures and outdated residential blocks are decommissioned, they present a monumental logistical and environmental challenge: what to do with the resulting mountain of rubble? The traditional model of "demolish, haul, and landfill" is no longer tenable. It's economically draining and ecologically indefensible. Enter the mobile concrete crusher, the linchpin of the circular construction economy. Deployed directly on the demolition site, these units perform a kind of industrial alchemy, transforming waste concrete into valuable, certified recycled aggregate. This material is no longer a mere subgrade fill; it's a specified component in new construction, closing the loop and turning a massive cost liability—haulage and tipping fees—into a revenue-generating asset. This paradigm shift, driven by stringent landfill regulations and the pursuit of green building certifications, has made the crusher an indispensable tool for any contractor operating in the urban fabric.
## The Infrastructure Surge: Mega-Projects and Aggregate Appetite
Simultaneously, on a macro scale, governments worldwide are unleashing historic waves of investment into public infrastructure. We're talking high-speed rail networks, new highway systems, port expansions, and energy projects of a scale that demands staggering volumes of aggregate. These are not single-site projects but linear, sprawling endeavors that stretch across dozens or even hundreds of kilometers. The economics of transporting virgin aggregate from a fixed, distant quarry to various points along this corridor are prohibitively expensive. The strategic response has been the decentralization of aggregate production. Mobile and semi-[mobile crushing plants](aimixgroup.com/stone-crusher-p…) are deployed to established or temporary quarries along the project's path, producing material exactly where and when it is needed. This approach slashes the carbon footprint and financial burden of long-haul trucking. The crusher, in this context, becomes a force multiplier for mega-projects, enabling the efficient, localized sourcing of foundational materials and keeping these colossal undertakings on schedule and within budget.
![crawler impact crusher machine](287710)
## The Tech-Driven Shift: Agility Over Monolithic Presence
Underpinning these macro trends is a fundamental technological and philosophical shift in equipment strategy. The industry is moving away from the monolithic, fixed-plant mentality toward a new ethos of agility and operational fluidity. Modern [mobile impact crushers](aimixgroup.com/stone-crusher-p…), especially track-mounted units, are marvels of mobility and rapid deployment. They can be set up and crushing in a fraction of the time it takes to commission a fixed plant, and they can navigate rough, confined sites with ease. This agility unlocks new business models. A contractor is no longer tethered to a single quarry but can pursue multiple, smaller-scale projects, from processing a stockpile at an existing quarry to setting up a temporary operation for a specific contract. Furthermore, technological integration—like advanced telematics for monitoring production and wear parts, and remote-control operation for enhanced safety—is making these machines smarter, more efficient, and more productive. This evolution from a static capital asset to a nimble, tech-enabled production pod is the final core factor. It’s not just about having crushing power; it’s about having the right kind of power, in the right place, at the right time, with the right data to maximize its potential. The demand for crushers is, therefore, a demand for strategic flexibility itself.

Enhancing Investment Firm Efficiency with Specialist Corporate Secretaries


In the dynamic and high-stakes world of investment firms and venture capital (VC) funds, where deals are often closed within tight deadlines and structures are constantly evolving, the role of a specialist corporate secretary is becoming increasingly vital. These professionals bring a level of specialized expertise that generalists simply cannot match, ensuring that the intricate web of governance, compliance, and administrative tasks runs smoothly and efficiently.

Mastering the Complexity of Investment Structures


Investment firms and VCs operate in an environment characterized by complex investment structures. They utilize specialized vehicles such as special purpose vehicles (SPVs), side letters, and carry structures to manage their investments. Limited partners demand transparency, while portfolio companies require meticulous handling of cap table changes, director appointments, and shareholder rights. A single oversight, like a missed filing or a poorly drafted resolution, can lead to significant delays, financial losses, or even disputes.

A specialist corporate secretary is well-versed in these complexities. They understand how an investor's right to information should be documented and how convertible notes or SAFE agreements impact future allotments. This expertise is crucial when transitioning from term sheets to signed documents within tight deadlines.

Streamlining Administrative Tasks


Every deal generates a multitude of administrative tasks, including board approvals, director consents, share allotment returns, and updates to the register of members. A corporate secretary with specialized knowledge can handle these tasks efficiently, ensuring that they do not impede the deal's progress. By drafting the right resolutions, preparing the correct forms, and lodging filings in the correct sequence, they can significantly shorten timelines and minimize last-minute surprises.

Protecting Governance and Investor Rights


Investment agreements often include intricate protections such as anti-dilution clauses, pre-emption rights, tag-along and drag-along mechanics, information covenants, and reserved matters. A specialist corporate secretary ensures that these rights are accurately reflected in company registers and meeting records. This diligence safeguards both the investor and the company, ensuring that major actions are voted on correctly.

Managing Complex Cap Tables


Cap tables in investment firms can become convoluted quickly, with multiple rounds of funding, convertible instruments, option pools, and transfers across SPVs. A specialist corporate secretary maintains a tidy ledger by applying consistent conventions for share classes, option exercises, and conversion events. This ensures that when a fund reports to limited partners, the numbers are reliable and the legal position is accurately represented.

Reducing Regulatory and Tax Risks


Investment firms and their portfolio companies face a labyrinth of regulatory obligations, including filings, anti-money laundering (AML) checks, beneficial ownership reporting, and tax notifications. Mistakes in these areas can lead to fines or adverse tax consequences. A specialist corporate secretary monitors these touchpoints, coordinates with tax advisers and legal counsel, and handles sensitive filings to ensure compliance across all jurisdictions.

Scaling Governance


As investment firms grow, managing multiple portfolio companies becomes increasingly complex. A specialist designs repeatable processes, such as templates for director appointments, standard minute formats, and consistent procedures for share allotments and transfers. This repeatability reduces the need for firefighting as the fund scales and simplifies audits and due diligence when potential buyers or co-investors conduct thorough reviews.

Enhancing Investor Reporting and Trust


Limited partners expect timely and accurate reporting. A corporate secretary with specialized knowledge maintains clean records and an orderly cap table, making reporting straightforward. They can extract the necessary data without extensive ad hoc work, building trust with investors. Over time, this trust enhances the fund's reputation and its ability to raise new funds.

Serving as a Neutral Governance Referee


In times of tension, such as disputes between founders and investors or contested votes, the corporate secretary acts as a neutral custodian. They provide the factual record, not opinions, which often helps resolve issues before they escalate.

Long-Term Cost and Time Savings


While hiring a specialist corporate secretary may seem like an additional upfront cost, it prevents the need for repeated legal fix-ups, rushed filings, and correcting avoidable errors. These mistakes are expensive in terms of legal fees and lost time. A specialist company secretarial services streamlines operations, allowing lawyers to focus on substantive matters rather than administrative tasks.

Collaboration with Legal and Tax Advisers


A specialist corporate secretary complements rather than replaces legal and tax advisers. They prepare clean drafts for counsel, gather documents for tax reviews, and implement counsel's instructions accurately. This collaborative relationship reduces billable hours from lawyers and the time they need to spend on administrative tasks.

When to Hire a Specialist Corporate Secretary


If you manage a fund, handle SPVs, or regularly close funding rounds, consider specialist support. If your cap tables include multiple share classes, convertible instruments, or non-standard financial instruments, specialist oversight is essential. If you are preparing to raise a new fund or scale your portfolio operations, bringing in a specialist early can prevent rework later.

Choosing the Right Service Provider


When selecting a corporate secretary, look for experience with investment structures rather than generic company experience. Ask about their sample processes for managing share allotments, transfers, director appointments, meetings, and filings. Ensure they can integrate with your accountants and legal counsel. The best providers offer solid process control and predictable outcomes, not just glossy marketing.

Conclusion


Investment firms and VCs thrive in a fast-paced, legalistic environment where their value lies in identifying and backing great opportunities. The administrative side should not hinder their progress. A specialist corporate secretary provides the safe, reliable backbone that investment firms need. They keep records pristine, protect investor rights, and ensure that every deal closes smoothly. In essence, great investing requires great secretarial discipline, and that usually means specialist secretarial services.

Help with wayland/sway


So I finally switched my desktop from windows to EOS after years of running headless linux servers.

I'm having a good time of it but I want to be one of the cool kids and use a tiling windows manager. And ive been loving that too. Except I can't get links to open from discord and steam can't open the file browser. I could just boot into KDE or GNOME to add non-steam games to my library but I don't want to goddamnit. What can I do to start fixing this issue? Haven't found any solutions online.

Edit: looks like I found the solution, portal was installed but never ran at startup. A quick exec inside the sway config has solved my issues. Thank you everybody!

This entry was edited (21 hours ago)

I first switched to ZorinOs then to Linux Mint. I ditched windows forever.


ZorinOS was using 3.2 GB of ram while Linux Mint cinnamon uses only 1.8 plus my computer doesn't sound like an airplane taking off anymore (it did on zorin and windows)..

I set up something called zapren to bypass government bans on several websites and apps already and I am loving it.

Ranking Linux Desktop Environments for 2023


Get 100$ credit for your own Linux and gaming server: linode.com/linuxexperiment

Grab a brand new laptop or desktop running Linux:tuxedocomputers.com/en#

👏 SUPPORT THE CHANNEL:
Get access to a weekly podcast, vote on the next topics I cover, and get your name in the credits:

YouTube: youtube.com/channel/UC5UAwBUum…
Patreon: patreon.com/thelinuxexperiment

Or, you can donate whatever you want: paypal.me/thelinuxexp?locale.x…

🏆 FOLLOW ME ELSEWHERE:
Twitter : twitter.com/thelinuxEXP
Instagram: instagram.com/nick_thelinuxexp…
Mastodon: mastodon.social/web/@thelinuxE…
Pixelfed: pixelfed.social/TLENick
I'm also on ODYSEE: https://odysee.com/$/invite/@TheLinuxExperiment:e
And on PEERTUBE: tilvids.com/c/thelinuxexperime…

This video is distributed under the Creative Commons Share Alike license.

#linux #desktop #tierlist

00:00 Intro
00:33 Sponsor: 100$ Free Credit for your Linux or Gaming server
01:33 GNOME
03:25 KDE
05:07 BUDGIE
06:27 XFCE
07:14 MATE
08:19 CINNAMON
09:50 DEEPIN
10:56 PANTHEON
13:13 UNITY
14:26 CUTEFISH
15:24 Others I didn't try as much
16:00 Sponsor: Get a device that runs Linux perfectly
16:53 Support the channel

GNOME is the one the most. It's extendable with extensions, it's customizable, and it's also themable. Now GNOME as a desktop, I find really nice to use, but there are things that bug me, like the rigidity and lack of basic options, and that means it will be in Good, not in Great.

KDE has simple defaults, powerful options, plenty of customization and a large ecosystem of applications. I used KDE a TON, I always have a laptop with it installed, and it was my main DE for more than a year of running this youtube channel. It used to have a lot of bugs and stability issues, but in my experience, that's not the case anymore. I'm going to put KDE in the Great category.

Budgie, I used for a while on Manjaro, as my main desktop environment. At the time, I would have put it in Good. Nowadays? It's a No, Thanks for me. Budgie is basically GNOME + some interesting addons. You can replicate it in seconds on GNOME and have a better underlying platform.

XFCE, on the surface, looks very old and ugly, it doesn't really support most of the new Linux stack, like Wayland, it's not a complete experience, without its own app center for example, and it seems stuck in the past. On the other hand, it's extremely fast and responsive, it's customizable with themes, layouts, panel applets, and it can use most other DEs apps to fill in the gaps. I'm going to put it in Decent.

Mate is another hard one. I loved GNOME 2 back in the day, and MATE is exactly that. That layout was wonderful, but nowadays, it suffers from the same problems as XFCE: no real wayland support, no 1:1 touchpad gestures, not a complete experience, without its own app store, or design philosophy or guidelines. MATE is going in the Decent category.

Cinnamon is what Linux Mint uses, and it's pretty damn complete. It has applications for basically everything out of the box, you can do everything graphically without needing to turn to a third party app, whether it's managing software sources, installing applications, installing packages, changing every setting, you name it.
So, Cinnamon goes in the GOOD category. It's a really nice choice, but compared to KDE? I can't place them on the same level.

Deepin Desktop is one that looks phenomenal on the surface, but that I could never use day to day. Sure, it's beautiful, and it has a design flair and fluidity that is quite remarkable. But the default apps are way too simple and can do in most cases even less than GNOME's, which are already pretty barebones, their appstore is completely useless, and even translations are quite hesitant

I just can't see why you'd pick Deepin. It's a No Thanks for me.

Pantheon, elementary OS's desktop had the edge over any other GTK based desktop, 2 or 3 years ago, but it has lost every advantage it had during this time period. The team just doesn't feel like it's big enough to tackle a whole distro + desktop + suite of apps anymore, and GNOME has caught up to everything. It's a No, thanks.

Unity is only Decent for me, because it looks pretty dated. The panel and its applets are straight from the GNOME 2 era, there isn't much customization to be had either, the dash isn't as useful as it once was, because using filters at the bottom isn't super intuitive or ergonomic with a mouse, and while it's a fun trip down memory lane for me, it doesn't really appeal to me all that much.

And now there's Cutefish, the it was dead but apparently it's not dead, sort of desktop. And it's another one that looks great on screenshots, but it's still going to be a No Way.

This entry was edited (1 day ago)

The simple test that blew up the FTC's case against Meta


In December 2020, when the FTC filed its case, I predicted that the government would lose due to its shoddy market definition. At that time, TikTok already had 800 million users, and the entire consumer internet was remaking itself around the company’s innovations. Citing internal company documents that Platformer had obtained, I noted that after TikTok was banned in India, Instagram use surged — clear evidence that the companies were and remain close rivals.

A year later, US District Court Judge James E. Boasberg dismissed the FTC’s lawsuit for failing to provide sufficient evidence to back up its assertion that Meta held a monopoly in personal social networking. But he let the FTC try again, and allowed the case to move forward in 2022. Even then, he warned the FTC that it was on shaky ground. (“Although the agency may well face a tall task down the road in proving its allegations, the court believes that it has now cleared the pleading bar and may proceed to discovery,” Boasberg wrote at the time.)

The trial finally began this April. From the start, the government struggled to get Meta executives to offer evidence that would bolster their case. When the government pressed CEO Mark Zuckerberg on the idea that Meta’s core value proposition is to connect friends and family, Zuckerberg pointed out — accurately — that over the past few years usage has gradually shifted to watching Reels and other content made by creators.

In the end, it was a simple experiment that undid the FTC’s case. To determine whether Meta held a monopoly, Meta hired an expert to pay people to stop using its products — and then to observe where they went to fill the time.

in reply to alyaza [they/she]

John List, a professor at the University of Chicago, recruited 6,000 participants for a study. With permission, he installed tracking software on their phones. And then he made them an offer: for every hour that the participant did not use Facebook or Instagram, he would pay them $4. (Participants only had to give up one app; the Facebook holdout group was allowed to use Instagram and vice versa.)


Initial results:

~~Facebook~~ → YouTube, Instagram, TikTok
~~Instagram~~ → YouTube, Facebook, TikTok

Corrected for time spent on platforms:

~~Facebook~~ → Instagram, TikTok, YouTube, Snapchat
~~Instagram~~ → TikTok, YouTube, Facebook, Snapchat

This entry was edited (2 days ago)

Microsoft's New Windows AI Feature Comes With Warnings About Malware and Data Theft


cross-posted from: feddit.org/post/21879234

"If you ask me, Microsoft has been one of the biggest driving forces behind Linux adoption in recent years. The way they've been handling Windows, with its forced updates, aggressive telemetry, and questionable AI features, has sent more people to Linux than any marketing campaign ever could. And they are at it again with a new AI feature that could be tricked into installing malware on your system.
...
Microsoft admits that features like Copilot Actions introduce "novel security risks." They warn about cross-prompt injection (XPIA), where malicious content in documents or UI elements can override the AI's instructions. ..."

source: itsfoss.com/news/new-windows-a… (Sourav Rudra)

in reply to TypicalOvenBoat899

MS board meeting a few years ago:

X: Well, as predicted, smartphones are becoming the primary device and we tried to get into that market but failed.

Y: But what if we brought back the W8 format? Surely people will be ready for the tile system.

X: It’s too late for that, it’s not new anymore.

Y: You don’t suggest…

X: eyes glow red Living tissue over endoskelleton.

Google's Android Sideloading: More Friction Than Freedom


Many are calling this a win, but Google's new developer verification program still threatens to lock down the Android ecosystem like iOS. Here's why sideloading remains practically hostile, why it's still unclear how this impacts 3rd-party app stores like F-Droid, and what this means for custom ROMs, alternative app stores, and your digital freedom. The fight for real Android openness isn't over, here's what you need to do about it.

Techlore empowers individuals with practical digital privacy knowledge, security tools, and advocacy resources to protect your data and reclaim your digital identity.

📱 RESOURCES IN VIDEO:
• Take Action: keepandroidopen.org/
• F-Droid: f-droid.org/
• AA: androidauthority.com/android-p…

🔎 RELATED VIDEOS:
youtu.be/hh5n3IqocPQ
youtu.be/cuLdd07P1II

⏱️ TIMESTAMPS:
00:00 A Small Win, But Not Enough
01:00 The Update & Google's 'Compromise'
05:28 The Broader Android Crackdown
06:11 What You Can Still Do!
06:48 Final Takeaways

🔐 TECHLORE RESOURCES:
• Homepage: techlore.tech
• Go Incognito Course: techlore.tech/goincognito
• Forum: discuss.techlore.tech
• Privacy Tools: techlore.tech/resources

🧡 SUPPORT TECHLORE:
Made possible by our Techlorians: discuss.techlore.tech/s
• All Methods: techlore.tech/support
• Patreon: patreon.com/techlore
• YouTube Memberships: youtube.com/channel/UCs6KfncB4…

📺 MORE TECHLORE:
• Surveillance Report: youtube.com/@surveillancerepor…
• Techlore Clips: youtube.com/@techloreclips

🌐 FOLLOW ELSEWHERE:
• PeerTube: techlore.tv
• Mastodon: social.lol/@techlore
• Bluesky: bsky.app/profile/techlore.tech
• Twitter: twitter.com/TechloreInc
• Telegram: https://t.me/techlorefeed
#android #opensource #google

This entry was edited (2 days ago)

Poland Repurposed a Nazi Factory Site to Make TNT to Drop on Gaza


Since October 2023, the Israeli Air Force (IAF) unleashed tens of thousands of bombs likely containing payloads of Polish-made TNT, resulting in the destruction of as much as 80 percent of Gaza’s buildings, including civilian infrastructure such as hospitals, schools, and refugee camps. “Based on information provided by the bomb’s U.S. manufacturer, General Dynamics Ordnance and Tactical Systems, the Polish company Nitro-Chem, and U.S. government databases, we can conclude that there is a high probability that a significant proportion of [Mk 84s] that Israel dropped on the Gaza Strip since October 2023 are filled with Polish-made TNT,” the report found.

Off-duty pilot who tried to cut a flight’s engines midair won't serve prison time, judge rules


cross-posted from: lemmy.today/post/41959933

A federal judge on Monday ruled there would be no prison time for a former Alaska Airlines pilot who had taken psychedelic mushrooms days before he tried to cut the engines of a passenger flight in 2023 while riding off-duty in the cockpit.


【Doctor Who】离开的,留下的


两次博士遇见了帕西,其中一次他们素不相识。有些微的二进制暗示。这是四年前一战结束百年纪念时写的,现在我不会再写这样的东西,但是已经写了的也不能再改。这其实是两篇,我把它们强行拼在一起了。拼接顺序不一定按事情发生顺序。

博士拉开TARDIS门的时候,看到复制人站在街边,穿带弹力拉绳和拉链的黑色连帽风衣,胸口上别了朵塑料虞美人,正在拉扯脖子上的红白条纹围巾[^1]。

“去看球了?”博士沉吟了一下,没说球队名字。

“你来了就不去了。”复制人理好围巾,想想补了一句,“也不用看,再说,已经赶不上了。”

博士一反常态地没有就时间机器的功效做出什么提议,他们往河边走,偶尔让一让轮椅和婴儿车。一枚细细的月亮已经升起来了,蓝色天空下的建筑,要么是黑黢黢的影子,要么灯火通明,和近地平面的光污染融为一体。博士和复制人走到伦敦塔时,发现自己没入了排队去看纪念烛火的人流。时间领主左顾右盼,不安地摩挲自己的大衣衣领。

复制人递给他一朵塑料虞美人:“我帮你买了。”夜幕降下来了,让别人上别针不如自己摸索。博士戴上花的时候,就着路灯低头皱眉看了看:“红色和紫色不太搭配。”

“我知道。”复制人说,撩开从路边围栏里伸出的一枝灌木。石塔在暖色系灯光下显得格外宁静,父亲们把孩子架在自己脖子上,好让小人儿们的视线越过树篱和内圈的人群。到了灯光大亮处,他们已经越过了整座塔,但去河岸的路被封上了,排队的人群一直绕过前面那座铜绿尖顶的教堂。穿荧光黄雨衣的警察们劝说对长队相向而来的路人:“先生,要走这个方向的话请您过马路去对面走……” 他们正站在红绿灯边上,博士回头望了一眼石塔,搓搓手。复制人转头过来看他:“还排吗?”

“不排了。”博士摇摇头。他们道着歉转身去过马路。密集的人群过得缓慢,到了马路中间,行人灯已经变红。在他们身后,年轻的警察挥舞着手持交通灯安抚一众焦灼的发动机,大喊:“HOLD THE ROAD! HOLD THE ROAD!” 复制人的动作僵了一僵,博士想起这是差点被炸平的东区。

马路对面还是挤,他们慢慢往西走。在废墟上修起来的写字楼灭着灯,建筑平淡,人群渐疏了,能迈大一点的步子,深深地吸气。“我在那儿。”复制人系上之前在人群里松开的围巾,用一种告解的语气说着过去时。博士停下来,用一种锐利的眼神——像看向镜子一样看那张脸。复制人扯出一个微笑:“别紧张,监护人。是红十字会,红十字会还凑合,是吧?”但博士没回答他,复制人急急地补上:“你知道那个时空脆弱得还不如纸。我只有也只用些奎宁鸦片甘汞哥罗仿阿司匹林……”一长串学名说得他不得不停下来喘口气:“好吧我撒谎了,我试过一次用点别的,在伊普尔[^2],然后就是时空悖论的老戏码。”他说不下去了,靠住路边的大理石墙,从口袋里拿出一个铁盒,掏出根纸卷,博士的眼神转移到了复制人的手指上。“我只想叼住它一下。”复制人辩白道。

博士叹口气,从大衣口袋摸出火柴,划燃一根递过去:“我今天不介意。”

但复制人没有凑过来接火,他们静静站在因为周日而空旷的金融城小路上,看火柴在黑夜里慢慢燃尽。复制时间领主把毫发无伤的纸卷从嘴里取出来,重新放回铁盒。他们继续走,博士以怀疑的眼神瞅着路边长着赛博脸的烟火缸,圣保罗教堂美丽的穹顶出现了,还有零散的几个人在门口安检准备参加免费的纪念仪式,博士抬头往台阶上望了一眼。

“不行。”复制人斩钉截铁地说,“宗教仪式让我头痛。你知道的,我们又不能吃阿司匹林。”

“嗯哼。”博士手插口袋,东张西望,周日晚上街上不少点心店关着门,这点无疑让他丧气。河风吹得和缓,他们路过关着灯的皇家法院,在街心的小教堂停住,那儿摆了一个小小的塑料虞美人花圈,天黑以后没有鸽子。教堂敲钟了,博士抬起手腕看看表:六点一刻。“这个教堂的钟常常不按准点来。”复制人过分规矩地按下等红绿灯的按钮。

滑铁卢桥底下支着好几个帐篷,有股大麻味,伦敦从来不缺露宿街头的人。帐篷红色的塑料布在风里抖动,肥皂盒、爽肤水、锅碗瓢盆整整齐齐站在桥墩上,守护生活的尊严。没有孩子的哭声,于是他们只是沿河岸而行,带着忧伤的眼神。南岸的冬日乐园没有因为纪念日关闭,五颜六色的霓虹灯打在河水上。再往前走,会有挡板围住一小段河岸,为了修多雨城市的排水沟。接下来是空军纪念碑,老的,新的,写满了各国名字,上面也许还有几个他们的老熟人。游客面对着纪念碑,拍与大摩天轮的自拍。他们望着浑黄河水上彩色的光影,思忖今夜伦敦的外星人是否只有两个。

博士看向彩灯背景里西敏桥过分朴素的黑影:“我能不能留下来陪你吃早餐?”

“如果你是想等明天 Greggs [^3] 开店给我买小熊耳朵,我警告你……”

“不,我是想给你买小熊纸杯蛋糕。”博士认真地说,“熊耳朵我已经买好了。”他从口袋里掏出一副毛绒绒的黄色熊耳朵,“帕西。”
———————————————————————
那个穿长风衣的火柴人——帕西从许多年前开始意识到自己不自觉地给博士的每一次重生取不同的外号,好像他们是不同的人。一部分原因是他们时不时在他脑子里吵吵嚷嚷让他晕头转向,另一部分原因是,他离那种能重生的时间领主氛围越来越远了,首先他自己就不行,其次他已经故意躲了博士的标签好一阵。

那火柴人靠在一间商店满是涂鸦的卷帘门上——那么今天是某个星期天——插着口袋看枯叶卷地,独自一人。他检索记忆但翻不出来这是什么时候,这样的事发生太多回了,他继承来的图书馆已经被他自己的东西搅得乱七八糟,复制人不是人工智能,他不知道该庆幸还是觉得不幸。

火柴人伸手碰他的脸,当然没有电流,火花,或者其它什么能同时存在于比喻意义和现实意义上的东西。时间领主的手僵住了,帕西打定主意不做反应。他转着小指上的戒指,不错,是为了无名指买的尺寸,但他先是把它戴在中指,紧接着就是小指了。好几年他刻意拒绝做博士的影子——那同这戒指的关系没你想象的那么大。帕西听见时间领主叹了口气,把手收了回去:火柴人不该想得起来,他遇到的不是对的那一个,话说回来,那一个在法律意义上来说也不太对。他那会是不是写日记呢?那双手似乎还能画很好的钢笔速写,所以……

“对不起。”他手足无措的样子活像被人抱的苏格兰倔老头。

苏格兰倔老头——这是另一次重生的外号——委实负责,把他从柏林和达拉斯的地下生活拖回来,他去维多利亚时代晃了一阵,偷了五次约克郡姑娘的饼干,用涂改液在北方迪斯科的汗衫上写了《公园生活》[^4]的谱子。“打板球的”和“风吹来的一代”[^5]比赛的时候,他推着茶歇小车,把赛后吃的黄瓜三明治换成了鱼咖喱,还往里面放了太多的芹菜叶。然后呢,他发现自己在追着博士的足迹处理善后(前?)事宜,像是一种替代上瘾,多半是为了不被自己的事追赶。

能拿点什么来安慰火柴人呢?难道跟长风衣讲自己教罗丝除法,以社区服务名义给 多娜的孩子当保姆,一如既往去纽约的庞德家过圣诞——哦这个还不能讲,但是——他们最开始还问问他,以前带来的另一个小伙子呢?后来他们就不再问了,再后来他去帮忙料理葬礼和墓地,一个,又一个。他一直在跑,他自己的事如愿荒芜了,长满杂草。他看着火柴人盯着他,大眼睛透出好似想起来点什么的模糊哀愁和闪光。他想,那个人今年该四十五岁了。他又看看火柴人,心想,嗨,我们俩,一个记得清清楚楚,一个按科学来说什么都想不起来,我们想的还不是同一桩事。他几乎要大笑起来,这是和与生俱来直觉的战争,他终于赢了——如果哪次战争里真有胜利和意义的话。

他想了想,他觉得自己明白博士需要什么,或者博士想要什么,他在这点上帮不上忙,但他至少能做一件事。他踮起脚来搂住了长风衣。他感觉到时间领主的脊柱松下来,头靠在他肩膀上,有热的气流从他脖子穿过。帕西抚着对方的背,用哄孩子的语气说:“博士,你这个傻瓜蛋。”这一刻他有种错觉,也许是博士复制给他的记忆带来的,他觉得自己比眼前这个时间领主老得多。

“但是,你是谁?”

“谁也不是。”[^6]

“我受不了啦。”帕西想。就这样他就去了1914年,往红十字会交了一张申请表。

[^1] 北伦敦球队阿森纳(Arsenal)支持者常戴的围巾。2018年11月11日晚英超,阿森纳与中部的 Wolves 球队比赛,一比一平。

[^2] 一战中德军在比利时的伊普尔地区对英法联军使用了芥子气。

[^3] 英国三明治店,每年与BBC Children in Needs 合作推出帕西小熊周边点心和玩具。

[^4] 来自西伦敦的 Blur 乐队 1994 年单曲 Parklife,该乐队是曼彻斯特乐队 Oasis 当年死敌。

[^5] “风吹来的一代”,Windrush. 1960s 英国因为劳动力短缺,从前殖民地加勒比群岛等地招收劳工。英国许多城市现在仍有加勒比人板球俱乐部。Windrush 其实是以运送加勒比地区移民出名的一艘大船的名称。

[^6] 我希望帕西说的是 Not who. 因为这是他希望成为的。

评论音轨:2016 年的 BBC children in need 短片里12接起电话就说:“帕西?黏糊糊喜欢戴帽子和蛋奶糊吗?”从那以后我一直当11.5起了名字叫帕西。

阿森纳球队是一个搞笑梗,我补了一下口香糖剧615被良心谴责,然后11.5就和我们的箭手军火库(Arsenal)沉船了(不要问我怎么搞上这样神秘的拉郎)。

但是大噶不要担心,11.5还去了很多地方干了很多坏事(划掉),他已经是一个成熟的 ganger 了(?

in reply to PumpkinDrama

For Firefox you find the proxy settings within about:preferences
support.mozilla.org/en-US/kb/c…

in GNOME you can use the GUI by going to Settings -> Network -> Network Proxy and similarly in KDE you can go to System Settings -> Network -> Settings -> Proxy

You still need to have a proxy server somewhere to connect through though so I would probably just setup a VPS with Wireguard or OpenVPN and do a full tunnel forcing all traffic through the VPS for your download.

Does it make sense to use --show-error by itself in curl


I was trying to read up on it and just based off of the manual it seems not to make sense if I'm not using --silent alongside it, but I found this one article stating otherwise: nrogap.medium.com/show-error-r…

I can't figure out if it's just AI slop or badly researched since it doesn't even show a real URL to test the commands against.

::: spoiler Manual entry:

>

<br />       -S, --show-error
              When used with  -s,  --silent,  it
              makes  curl  show an error message
              if it fails.

              This option is global and does not
              need  to be specified for each use
              of -:, --next.

              Providing -S, --show-error  multi‐
              ple  times  has  no  extra effect.
              Disable it again  with  --no-show-
              error.

              Example:
               curl --show-error --silent https://
example.com

              See also --no-progress-meter.

:::
in reply to stupid_asshole69 [none/use name]

I couldn't find an endpoint to test this with, picking out a random inexistent domain I could just see that without parameters I get the errors, with silent I get none, with show-error I get the same output as no parameters, with both I get the same output as no parameters again.
This is as far as I can get without reading into the source code, I already searched on the internet with no luck because all others posts I could find assume it is paired with another parameter
This entry was edited (3 days ago)
in reply to stupid_asshole69 [none/use name]

Yes, it's usually more efficient for more niche topics.
Luckily many things still come up with searches, be it stackoverflow or other kinds of forums, the real problem are the SEO spam articles and AI generated stuff (and worse still when they coexist), so it's becoming harder to discern what is worthwhile and what isn't. When all else fails I also always try to find my answers by playing around myself

Fully waterproof sneakers that don't look like hiking shoes?


I live in a very rainy place (esp in the autumn and winter), and since i started cycling to work I ruined 2 pairs of shoes in the rain.

Do you guys have recommandations for sneakers which look like actual sneakers but are 100% waterproof (not just water resistant)?

Bonus points will be awarded for sustainable and traceable supply chains 😅

in reply to petsoi

I can think of nothing worse than having your pet project adopted by BigTech and being expected to fix bugs free of charge. I'm not even sure what the solution to that would be other than walking away from it. Thankfully, my biggest project (DF-SHOW) is niche enough to be just a personal project, but a common enough concept (a TUI file manager) that there are plenty of other, more well established, solutions available.

I wrote it for myself, but figured others can benefit from it.

Aggregate Yard Lubrication Systems And How To Choose Suitable Grease In Latin America


Efficient lubrication is one of the most critical yet often overlooked aspects of keeping an aggregate crusher plant, a pebble crusher, or a stone crusher for gravel running reliably in Latin America’s demanding mining and aggregates environments. High temperatures, high humidity, dusty conditions, and in many regions, significant altitude variations, can all accelerate equipment wear and cause premature failure if lubrication is not properly selected and applied. As aggregate yards across Latin America strive to improve uptime and reduce maintenance costs, understanding lubrication systems and choosing the right grease has become a strategic operational priority.

Before exploring the detailed technical considerations, it is important to emphasize that lubrication is not just a maintenance routine; it is a protective mechanism that directly affects production capacity, energy consumption, and component life. Poor lubrication practices can reduce equipment lifespan by more than 50% and cause costly shutdowns, especially in heavily loaded machinery like crushers.

Importance Of Effective Lubrication In Aggregate Operations


Crushing equipment operates under intense loads, continuous vibration, and exposure to abrasive dust. Bearings, bushings, gears, and shaft components rely on lubricant films to minimize friction and dissipate heat. In a typical aggregate crusher plant(planta de agregados), lubrication failures are responsible for a large percentage of unexpected breakdowns.

Latin American aggregate yards often face additional challenges:


  • Dust levels can be extremely high, especially in dry regions of Peru, northern Mexico, and northeastern Brazil
  • High humidity accelerates oxidation and corrosion, particularly in coastal environments
  • High altitudes in the Andes region cause lower air density, increasing heat retention in crusher components
  • Rainy seasons introduce water contamination risk, diluting lubrication effectiveness

These environmental factors make grease selection critical for crushers, screens, conveyors, and heavy-duty motors.

Types Of Lubrication Systems Used In Aggregate Yards


Lubrication systems vary depending on equipment type, operational demand, and plant design. The following systems are commonly found in aggregate operations:

Manual Lubrication Systems


Still widely used in small and medium-sized quarries, manual systems rely on technicians applying grease or oil on a scheduled routine. Though simple, this method risks inconsistent application, missed lubrication points, and contamination if grease guns are not maintained properly.

Centralized Automatic Grease Systems


These systems distribute measured amounts of grease to critical components through pump-driven lines. For large-scale operations or a modern stone crusher for gravel(trituradora de piedra para grava), centralized systems ensure stable lubrication, reduce labor requirements, and maintain cleaner working conditions.

Oil Circulation Systems


Used in high-capacity primary crushers and cone crushers, oil circulation systems cool and clean oil before returning it to the machine. These systems are essential for equipment such as a pebble crusher, where continuous high-load crushing generates extreme heat.

Dry Lubrication And Specialty Systems


In a few specific cases, dry lubricants or high-temperature specialty greases may be required, particularly in applications with intermittent exposure to extreme temperatures or abrasive conditions.

Key Factors For Selecting Lubricating Grease In Latin America


Choosing the right grease for aggregate operations requires evaluating environmental, operational, and equipment-specific conditions. Below are the most important considerations.

Viscosity And Temperature Resistance


Latin America’s climate varies drastically, from the cold highlands of Peru to the extremely hot lowlands of Brazil and Colombia. Grease must maintain stability across these temperature ranges. High-viscosity, high-temperature greases are recommended for the main shafts and bearings of an aggregate crusher plant because crushing generates substantial heat.

Water Resistance And Humidity Tolerance


Coastal and tropical environments introduce high moisture levels. Grease with strong water-washout resistance is essential to prevent lubricant dilution and metal corrosion. For equipment operating in rainy seasons, such as a stone crusher for gravel located near riverbeds, this factor becomes even more critical.

Load-Carrying Capacity


Crushers exert extreme pressure on bearings. Greases containing extreme pressure (EP) additives, such as molybdenum disulfide (MoS₂), are ideal for high-load environments typical of primary crushers and pebble crushers(trituradora de piedra de rio).

Dust And Contamination Control


Fine dust particles can mix with poor-quality grease and create abrasive slurry. High-quality greases with superior sealing and adhesion properties help prevent dust ingress, extending component life significantly.

Compatibility With Automatic Lubrication Systems


If a plant uses centralized lubrication, the grease must be pumpable at required temperatures and maintain consistent flow properties. Some EP greases are too thick for pumping systems and require specialized formulations.

Common Grease Types Used In Aggregate Yards


Understanding common grease classifications helps in selecting the correct formulation:


  • Lithium-complex grease: High-temperature resistance and excellent load performance; widely used for crushers
  • Calcium-sulfonate grease: Superior water resistance; ideal for humid or coastal conditions
  • Synthetic grease: Best for extreme temperatures and long intervals; higher initial cost but longer-lasting
  • Molybdenum-based grease: Excellent for heavy-load components such as main bearings and eccentric bushings

The choice depends on the equipment’s operational load and environmental exposure.

Best Practices For Lubrication Maintenance In Latin America


Even the best grease fails if not applied correctly. Aggregate yards can follow these practical guidelines:


  • Establish lubrication intervals based on equipment manuals and local conditions
  • Purge old grease when introducing new formulations to prevent incompatibility
  • Store grease in sealed containers to prevent contamination
  • Use color-coded systems to ensure the correct grease is used at each lubrication point
  • Monitor bearing temperature and vibration to detect lubrication issues early
  • Train maintenance teams to understand the specific lubrication needs of the aggregate crusher plant and related machinery

Preventive lubrication practices directly reduce operational costs by minimizing unplanned downtime.

Conclusion


Lubrication is a foundational element of crusher performance, and in Latin America’s challenging operating environments, selecting the right grease is essential for reliability. Whether running a pebble crusher, a complete aggregate crusher plant, or a stone crusher for gravel operation, choosing the correct grease can significantly extend equipment life, improve efficiency, and reduce maintenance expenses. As aggregate yards increasingly focus on sustainability, operational efficiency, and long-term asset protection, proper lubrication management is becoming a key competitive advantage.

Why Prices Vary for Concrete Batching Plants: A Look into Manufacturer Strategies


The journey to acquiring a concrete batching plant is an exciting venture, yet the landscape of pricing can appear bewildering at first glance. Why does one concrete plant command a price tag double that of another with seemingly similar specifications? The answer lies not in arbitrary numbers but in a deliberate and multifaceted strategy employed by concrete plant manufacturers. These strategies are a reflection of their target market, their engineering philosophy, and the long-term value proposition they offer. Unpacking these variables reveals a fascinating ecosystem where price is a direct function of component quality, design flexibility, and the invaluable peace of mind that comes from robust support. Let's dive into the core factors that create this dynamic pricing spectrum.

The Engineering Core: Component Hierarchy and Manufacturing Provenance


At the heart of every price variation is the fundamental build quality of the plant itself. This is the non-negotiable foundation, where manufacturers make critical decisions that dictate performance, longevity, and ultimately, cost.

The Powerplant and Structural Chassis: The Backbone of Investment


The choice of motors, drives, and the structural steel framework represents a primary cost differentiator. A plant built with industry-leading, high-efficiency electric motors and precision-engineered planetary gearboxes for the mixers will inherently cost more than one utilizing generic, less efficient components. The provenance of the steel and the quality of the welding and fabrication are equally critical. Manufacturers investing in robotic welding and rigorous non-destructive testing for their frames and mixer shells are building for a 20-year lifespan, not just a 5-year one. This superior metallurgy and construction methodology directly translates to a higher initial investment but offers unparalleled resistance to the relentless stresses of daily batching.

AJG-35 Dry Concrete Plant Application in Fiji

The Control System: From Manual Levers to Automated Batching Intelligence


The control system is the nerve center of the plant, and its sophistication creates a massive price chasm. On one end, you have simple relay-based systems with manual levers. On the other, you find fully integrated, computer-based systems with programmable logic controllers (PLCs). These advanced systems offer recipe management, production reporting, diagnostic alerts, and sometimes even remote monitoring capabilities. The software development, hardware quality, and system integration required for this level of automation represent a significant engineering investment for the manufacturer, which is reflected in the price of concrete batching plant. This isn't just a convenience; it's a tool for maximizing material accuracy and operational throughput.

The Configuration Spectrum: Customization Versus Standardization


Manufacturers often position themselves on a spectrum between offering fully bespoke solutions and producing highly standardized, catalogue-ready models. This strategic positioning is a major driver of cost structures.

Bespoke Engineering for Unique Operational Parameters


Some clients have highly specific requirements: unusual aggregate compositions, extreme environmental conditions, space constraints, or the need to integrate with existing legacy equipment. Catering to these needs requires a manufacturer to engage in custom engineering. This involves dedicated design hours, specialized component sourcing, non-standard fabrication, and unique software programming. The research, development, and one-off production costs associated with this bespoke approach are substantial, resulting in a premium price point for a plant tailored to an exact operational niche.

The Economics of Standardized, Catalogue Models


Conversely, many manufacturers achieve cost efficiency through high-volume production of standardized models. By designing a core set of plants and producing them in dedicated production runs, they can leverage economies of scale in material purchasing and assembly line processes. This strategy minimizes engineering overhead per unit and allows for the use of streamlined, pre-tested component kits. The result is a more accessible price point for a proven, reliable machine. The trade-off is less flexibility for customization, but the benefit is a lower entry cost and often faster delivery times.

The Intangible Premium: Brand Equity and After-Sales Ecosystem


Beyond the physical steel and circuitry, a significant portion of a mobile concrete batching plant's cost can be attributed to intangible assets that provide critical long-term security.

AJ60 ready mix concrete plant operation in Indonesia

The Value of a Proven Track Record and Global Support Network


An established manufacturer with a decades-long history of successful installations carries immense value. Their brand is a promise of reliability and performance, backed by a global or regional network of service centers and spare parts depots. Knowing that technical support and crucial components are readily available, no matter where your project is located, mitigates immense operational risk. This established ecosystem—built over years of investment—is a key component of the pricing strategy for premium manufacturers.

Warranty Structures and the True Cost of Downtime


Finally, the comprehensiveness of the warranty and the manufacturer's commitment to uptime are critical pricing factors. A company offering a single-year warranty on a key component like the mixer is operating on a different plane than one providing a comprehensive 5-year structural warranty and rapid-response service level agreements (SLAs). For a concrete producer, an hour of downtime can cost thousands in lost revenue and delayed projects. Manufacturers who invest in extensive warranty coverage and a responsive service fleet are essentially selling insurance against this downtime. This proactive support infrastructure costs money to maintain, and it is logically factored into the initial price of the plant, providing a safety net that pays for itself when it matters most.

Lety Does Reacting to “Peacemaker” Season 2, Episode 5: “Back to the Suture”


Sensitive content

This entry was edited (3 days ago)
in reply to Lety Does Stuff 🔕

Hihi! Lety here, auto-commenting from my main account (which doesn't have a 🔕 icon)!

This is how my PeerTube videos look on other Fediverse platforms!

Remotely interact with this video using an account on an ActivityPub-powered platform like Mastodon Social! Just click the “Add comment...” box under any PeerTube video and enter your Fedi handle in the pop-up. That’ll direct you to the federated post for that video on whatever platform you use.

Or, if you’re already logged in on Mastodon or wherever you're seeing this message, just look at the post I’m responding to!

Replies and favorites on that post show up as comments and likes on PeerTube, and following the account that posted it subscribes you to my videos.

Heads up, though! While some platforms might allow you to respond with custom emojis, gifs, images, polls, and reactions, most of that fancy stuff won’t show up correctly on PeerTube. The same goes for any edits you might want to make to your response unless you delete & re-draft.

If you already know all this or are tired of seeing this wall of text, you can hide these explanation posts by going to your account preferences and creating a new filter with the title and keyword “#LetyDoesPeerTubeExplainer” and all context boxes checked.

Thanks so much for watching! ⚡​⚡​⚡​

Matt, are you ok?


This entry was edited (1 month ago)

Stands para Ferias: Estrategias Efectivas para Atraer Clientes


En el sitio web de Kanika, encontrarás una amplia gama de stands para ferias que están diseñados para transformar la manera en que las empresas interactúan con su público en eventos. Estos stands son más que simples estructuras; son herramientas estratégicas que ayudan a las marcas a establecer conexiones significativas con los asistentes.

Cada stand para ferias está personalizado para reflejar la esencia de la marca, utilizando colores, gráficos y elementos de diseño que captan la atención. Kanika se especializa en crear espacios que invitan a la interacción, garantizando que cada visitante sienta curiosidad por explorar lo que se ofrece.

La durabilidad y la calidad son pilares fundamentales en la construcción de estos stands. Utilizando materiales de primera y técnicas de diseño innovadoras, Kanika asegura que cada estructura no solo luzca impresionante, sino que también resista el rigor de múltiples ferias y eventos. Esto significa que las marcas pueden invertir en un stand que brinde resultados a largo plazo, sin comprometer su presentación.

El proceso de diseño y creación es colaborativo, permitiendo que las empresas participen en cada etapa, desde las ideas iniciales hasta la instalación. Esto asegura que el producto final no solo cumpla, sino que supere las expectativas, alineándose perfectamente con los objetivos de marketing y comunicación.

Kanika también se encarga de la logística del montaje y desmontaje de los stands para ferias, eliminando complicaciones para sus clientes. Con su apoyo, las empresas pueden enfocarse completamente en generar relaciones con los asistentes y maximizar su visibilidad en cada evento.

【Doctor Who】里莫罗医生的浪漫史与其他


本文的故事背景是我看过的一些维多利亚时代小说的杂糅,并不严谨。有原创女角色出现但并不是真正的浪漫对象。这是十年前或八年前写的了,比较幼稚!

孩子,你准备好了吗?

是的,先生。

那么,开始吧。

我在这里说的这个故事,完全没有指责谁品行的意思,我们所有那些喝着茶抿着松饼传播秘密的太太小姐们也没有——“他们是太可爱的一对。”斯特里普太太曾经评价过,她说这句话时简·克莱尔小姐在弹钢琴唱“阳台上的玫瑰花”,里莫罗医生斜靠在钢琴上,手指轻轻打着拍子,微笑着看向一个花瓶,或者一幅画儿什么的。那是女人们聚在一起的午后,医生是得到特许而加入的——医生为他所有的病人保守秘密。

里莫罗医生来我们这的那天正好是赛丽斯节。这是从罗马时代传下来的风俗了。妇女们穿着白色长裙,手持柳枝和白色鲜花游行,然后年轻姑娘们会到草地上去,一边同女伴跳舞一边等一个舞伴来邀请。但即使在这个异教节日里,简·克莱尔不祥的红发也没有给她带来多少好运气。她一个人玩着手上的柳条和最后几个没伴的姑娘们跳着,这时候里莫罗医生从邮车上跳下来大声请车夫帮他把行李运到白象酒店去,然后走过来——很奇怪地,鞠了个十七世纪式样的躬,然后请她跳舞。

是的,先生。我是玛丽·克莱尔,您看我的头发。这里的细节都是我姐姐讲给我听的。

那么我继续了。

没过几天里莫罗医生租到了一位要开拔去东方的少校的房子,在本地报纸上登了广告,开起诊所来。渐渐地,年轻的太太们带着自己的孩子去他那里,因为孩子们在他那里从不哭闹,而且吃了他调的那些甜得出奇的药水就能恢复健康。而家有适龄女儿的太太们和她们的女儿们,也会犯些心悸、胃疼之类的毛病——一位能时时与人谈论关于孩子的话题的年轻单身汉总是在妇女中受欢迎的。不消说男人们最开始不太待见他,毕竟他从不参与他们谈论赌马、政治、战事的活动,然而在帮教区长破译了一块东方石刻,又因为治愈了从男爵的继承人而成为克劳利府的座上宾之后——他甚至在一次打猎活动里对一根树枝展示了一下箭法,是的,箭,先生。总之,在那之后,男人们也不再讥诮他了。

简那段时间也常说患了偏头痛去诊所。不久在所有的舞会、野餐会、义卖会上,他们常常跳舞,或坐在一起谈论天文学。然而我姐姐向我保证,并且所有其他人也相信,他们当时的交往并没有超出医生与其患者之间友谊的应有限度。所有的谈话都在大庭广众下十分得体地进行着,临别前他只吻一下简的手,然后扶她上马车。然而所有人,包括简也认为,这友谊将会发展到更深一步。

在无数次众目睽睽下的交流后,里莫罗医生渐渐在镇上的社交活动里消失了。他的诊所依然每天开诊,他询问病情的时候依然亲切,他骨节粗大的手做起检查来依然温柔,只是他开始礼貌地拒绝一切邀请,除了偏头痛的时候,简根本也见不到他。一天,简大着胆子抱着一本星图去诊所找里莫罗医生,请他一块出去散步。

当时诊所里没有病人,里莫罗医生只是在桌边画解剖图——他没事就画解剖图,一遍遍画,仿佛永不厌倦。医生听到简的邀请说话都结巴了:“您、您这样的年轻淑女,与我单独出行是不合适的。”

“这只是为了我们的友谊——我们虽然是在乡下,可礼法并没有那么严,医生!连我祖母都不反对我们出去散步!”简一不小心说得有点直白了,我想。

“可是我不能向您,向任何人做出任何承诺,克莱尔小姐,再也不会了。”里莫罗医生干巴巴地说着,走到门边打开门:“对不起,请您回去吧,趁着没人知道您一个人来。”

简哭着回家来了,她悲伤了几个月直到克劳利府的遗产问题给镇上带来了一位年轻的、反对迷信的律师助手——那是题外话。这一切看起来并没有什么不良影响,只是简不再去里莫罗医生的诊所(又几个月她就和新婚丈夫一起去了伦敦),而在那尴尬的谈话那天之后,里莫罗医生的左手小指上多了一枚戒指。人们猜想他有段伤心的往事,又因为简已经出嫁,渐渐不再有人提这事,里莫罗医生偶尔还出现在社交场合,但据说不再跳舞,只悄悄用鞋跟和手指打打拍子。

那天,作为家里的二姐,我不得不带我手腕脱臼的小妹妹去找里莫罗医生。正骨没费他多久时间,给丽兹固定了手腕后,她不再哭了,开始转着大眼睛四处看。

里莫罗医生手上的素面戒指看着很旧了,而且明显比小指大一圈。“您应该把戒指戴到无名指上,那样大小才对!”我眼尖的三岁的小妹妹说。我狠狠瞪了她一眼让她闭嘴——虽然我那时只有十二岁,但小说还是读过的。

里莫罗医生愣了愣,说:“他的名字曾是……他曾是我的病人。”果然如此,不过……“她。”我带点卖弄地纠正道。

“啊,是的,她。”里莫罗医生抿嘴笑笑,“对不起,是我老糊涂了。”

真奇怪,他看上去明明刚三十岁。但我明智地没有再问下去,道过谢就领着丽兹回家了。

后来好一阵我都没见到他。最后一次看见他的时候,他和一个苏格兰老先生——我想是的,因为那人口音很重——进行了一段奇怪的对话。

那天晚上我是出来找丽兹的——她为了不肯上床睡觉跑了出来,可我又迷路了。当我总算转到里莫罗医生诊所门口时,一个蓝色的盒子突然在空中现形,我赶紧躲到一棵大树后面。

那瘦削的老先生——比里莫罗医生更瘦,从蓝盒子里出来,这时房门打开,里莫罗医生站在门口,提着马灯——穿戴整齐得好像他从不睡觉。

两个男人沉默地对望了一会,直到年长的那个点燃了支烟卷递过去——我从不知道里莫罗医生抽烟。

“我在戒了——我以为你们都是反对的,呃?”里莫罗医生放下马灯,用右手夹住烟卷吸了一口,他平时站得笔挺这会却随意地靠在门上,轻轻发着抖——这是一个温暖的夏夜,而他穿着厚花呢套装。

“我从 Daluma 那里来,那里已经被我烧毁并由影子宣言接管。”那苏格兰人说——您知道,我母亲是苏格兰人,我听得懂北方口音,但我从没听说过 Daluma 是什么影子宣言又是什么,我只是按记忆转述——“这是所有的时间和空间中最后一支 Drogabo,要是你明白我的意思的话。”

里莫罗医生轻笑了一声:“您想得真周到。”他鞋跟并拢敬了个礼,但不如他过去和简跳完舞后所行的那么端正。然后他又吸了一口烟卷,眯着眼吐气。

“我是受够了你的飞船停在我这了,”灰发的苏格兰人从口袋里摸出一个小玩意——看上去是把钥匙吧,我不确定——塞进里莫罗医生的左手,摸了摸他的手心,“还戴着这个?”他一定是在说那枚戒指,我想——虽然他们说的话有点奇怪,但这老人,没准是过去那位姑娘的老父,或者某位慈爱的长辈。

里莫罗医生没回答戒指的事只是握紧了左手里的东西:“是啊,在一个地方不能隐居太久,是啊。”他右手上的烟卷燃着,但他只把它悬在空中任它落灰。

“你想怎样就怎样吧,你这一小团酸液。”老人叹口气说——一小团酸液!听起来发音就像这样,我真不明白。

“我不小了!”里莫罗医生无力地回了句,他的烟卷快烧到指头了,但老人只是盯着医生的右手看却手插兜不说话。医生又吸了口烟卷,他抖得更厉害了。

老人最后看了眼医生转身进蓝盒子。“我以为你要说些什么?!”医生喊道,他的烟卷在手指上燃烧而他仿佛没有感觉。

“我停在后山上了。”苏格兰人说了一句然后关上盒子,原地消失了。

医生的烟卷已烧尽,身上传出点奇怪的糊味。他站在那转动了一会戒指,然后提起马灯轻飘飘地往后山去了。

那是我最后一次见到里莫罗医生。我摸回家后告诉祖母这事,她却说从未听说过里莫罗,刚被父亲抓回家的丽兹也说她的手脱臼是米德医生接的——第二天一早那位我从未见过的、一把山羊胡的、胖墩墩的米德医生就安然地坐在诊所里,告诉我他已经坐在那里二十年,诊所里除了通俗小说就是医学杂志,没有星图,没有天文学书籍,没有成本成本的手描解剖图。全镇的人都仿佛没听说过里莫罗医生,本城也没有过少校居住,我写信给简请她作证,就被送来了您这。

—————————————————————
“好了,好了。”摩根医生在记录里写上“仍未见明显好转”,对玛丽·克莱尔说:“回你的房间去吧,孩子。”

红发的姑娘行个屈膝礼出门去了——好孩子,可惜治疗对她没效果。摩根医生靠在椅背上,听着新来的(其实也疯着的)洗衣工路过门外,用有点走调的声音唱着一首关于酒馆的瑞典小调。

该喝茶了,摩根医生揉揉额角,按了银铃。

喝完茶再去看看那个叫康斯坦丁的病人吧。

-Fin-

Concentradores de Oxígeno: Soluciones Efectivas para la Terapia Respiratoria


En la actualidad, los concentradores de oxígeno se han convertido en una herramienta esencial para quienes necesitan terapia de oxígeno de manera regular. La web de Elite Medical destaca dos modelos destacados que ofrecen comodidad y eficiencia en el tratamiento respiratorio.

El Concentrador de Oxígeno Philips EverFlo se presenta como la solución ideal para uso domiciliario. Con un flujo ajustable de hasta 5 litros por minuto y una concentración de oxígeno del 96%, este dispositivo garantiza una oxigenación precisa y constante. Su diseño silencioso (menos de 45 dBA) y su operación continua las 24 horas hacen que sea perfecto para el hogar. Además, cuenta con un sistema de monitoreo que asegura la pureza del oxígeno, lo que brinda tranquilidad a los usuarios y a sus familias.

Por otro lado, el Concentrador de Oxígeno Portátil Philips SimplyGo está diseñado para aquellos que llevan un estilo de vida activo. Su tecnología de pulso inteligente permite un suministro de oxígeno adaptado al ritmo respiratorio del usuario, mientras que su batería de alta duración proporciona entre 4 y 6 horas de autonomía, ideal para viajes y actividades diarias. Su diseño compacto y ligero asegura que sea fácil de transportar, lo que permite que los pacientes mantengan su independencia sin comprometer su acceso a la terapia.

Ambos modelos de concentradores de oxígeno disponibles en esta web ofrecen beneficios adicionales, como bajo consumo eléctrico, sistemas de alarma para máxima seguridad y un mantenimiento sencillo. Esto los convierte en opciones accesibles y efectivas para quienes dependen de la oxigenoterapia.

La página no solo informa, sino que también facilita la adquisición de estos dispositivos mediante la opción de pedidos a través de WhatsApp, asegurando que los interesados puedan encontrar la solución adecuada a sus necesidades respiratorias de manera rápida y eficiente.

Future Proofing Server


my home server needs to be reconstructed and i'm seeking ideas on how to future proof it. here's some ascii art in a screenshot to help describe how it's currently setup:

current server

description (left to right):
- laptops, smartphones, tables, etc connect to an access point configured on a windows 10 virtual machine (vm). the windows10 vm uses pci passthrough on the wireless adapter and this is done to get gigabit wifi speeds since intel's drivers won't allow linux to do this in ap mode; but will allow it just fine if you're using windows.
- requests from the wifi clients are passed via dns & ip masquerade to another virtual machine based on pfsense
- pfsense serves as the router, firewall, vpn, ad blocking & web hosting and it's also configured to use pci passthrough on the primary network interface to gap internet traffic from the server
- the center of the drawing shows how i perform data backups using a 3 gig wired connection with a hardware switch and i setup the host ubuntu server to manage dhcp on the secondary network interface & the devices that are connect to the switch. the data is stored using rsync and harddrives are setup to use an extremely large lvm made of several different types of hard drives.

i've rebuilt this server multiple times each time i encountered a "gotcha" or a surprise that i had not anticipated and it made some needful component stop working; so i'm seeking advice from Lemmy on how to redesign this to mitigate future surprises.

some of the surprises i've encountered so far are:
- the pfsense logs overfilled the root volume of the bsd based vm because logrotate was configured for linux. the image is hardcoded with a single volume so i will need to find a way to borrow some space from the backup volume using nfs and configure the logs to write there instead of locally.
- i have no key for the windows10 vm; so i'm forced to clone it's qcow image and manually configure the hotspot each time the 30 day free trial from microsoft expires. I intend to improve upon this creating an ansible job to rotate this virtual machine every 30 days automatically and include powershell based tasks to configure the hotspot in windows automatically
- intel limits the speed for linux native internet connection sharing to 100 megabits (already mentioned & fixed above)
- the local users home volume overfills when trying to take my google backups (already fixed)
- my cats & dogs LOVE the taste of cat6 capables and cat6 is required for 3 gigabit speeds (also fixed)

constraints:
- don't spend anymore $$$
- gigabit wifi speed is A MUST
- 3 gigabit backups speeds are a must too

This entry was edited (9 months ago)

Η Δίκη της Χρυσής Αυγής | 108η εβδομάδα


Δείτε όλη την κάλυψη της δίκης: omniatv.com/gdtrial

Το βιντεοχρονολόγιο για την 247η ημέρα της δίκης της ΧΑ ως εγκληματικής οργάνωσης.

Αναγνωστέα: οι επιλογές της υπεράσπισης από τα βίντεο που βρέθηκαν στον δίσκο του Ν. Μιχαλολιάκου.

This entry was edited (4 days ago)

Navigating the World of Start-Up Tax Exemptions and Incentives


For many entrepreneurs, the initial focus is on creating a product that works and gaining traction in the market. Taxes often take a backseat, sandwiched between updating the website and purchasing office furniture. However, ignoring tax incentives can mean missing out on valuable support that can ease financial strain during the early stages. Even a small exemption can extend a startup's runway, reduce fundraising pressure, and facilitate those crucial first hires.

The challenge lies in the fact that tax benefits vary significantly across different countries. Juggling product development, customer engagement, and paperwork can make it difficult to navigate these rules. This guide aims to simplify the process, explaining the essentials in plain language and highlighting how practical support, including reliable secretarial services, can help founders stay compliant without being overwhelmed by administrative tasks.

What Tax Exemptions and Incentives Really Mean


When discussing "tax breaks," two main concepts come into play. An exemption reduces or eliminates a tax for a specific period, while an incentive encourages certain activities, such as research and development (R&D) or hiring, by lowering tax obligations or allowing faster write-offs of certain expenses. Governments use these mechanisms to foster innovation, support emerging industries, and attract investment.

For founders, the goal isn't to become tax experts but to understand these categories well enough to recognize potential eligibility and avoid decisions that could inadvertently disqualify them. Maintaining clean, consistent records is crucial, and this is where secretarial services provide essential, albeit quiet, support.

How Governments Support New Businesses


The rationale behind startup incentives is consistent across most jurisdictions: to help young companies survive long enough to grow. Many countries offer reduced corporate tax rates for new businesses, particularly those in sectors the government wants to promote, such as tech, manufacturing, and clean energy.

R&D tax credits are another significant tool. If your work involves solving technical challenges, experimenting with prototypes, or developing software with genuine uncertainty, you may qualify. Well-prepared claims can significantly reduce taxes and, in some cases, even result in cash refunds when the company is still operating at a loss.

Capital expenditure rules also play a crucial role. Startups investing in equipment or machinery can sometimes write off these costs more quickly than usual, reducing taxable income during the early years when cash flow is tight.

Employment-related incentives are becoming more common as well. Some governments reduce payroll taxes or offer credits linked to local hiring. These small adjustments can make early hiring decisions easier, especially when a team is expanding from a few founders to its first real staff.

VAT or sales tax is another area where many countries allow new businesses to delay registration until revenue reaches a certain threshold, simplifying bookkeeping during the volatile early stages. Secretarial services often assist in managing these thresholds, renewals, and notifications to ensure founders remain compliant.

Who Usually Qualifies


Each jurisdiction sets its own rules, but certain patterns are consistent. Many exemptions apply only to companies within their first few years. Some require local ownership or a majority of employees to be residents. Others focus on the type of activity, such as software development, engineering, scientific research, or manufacturing.

Proper incorporation is vital because eligibility often depends on how a business is structured. Basic decisions, such as the company's legal form or share structure, can shape which incentives apply later. Startups that engage secretarial services from the outset usually avoid issues related to incomplete records or incorrect registrations.

The Practical Side: How to Approach Claiming Benefits


Good preparation is key to making the process smoother. Before investing in a potential R&D project or significant equipment, check the required documentation. R&D claims often need project notes, technical explanations, testing records, and time logs. Waiting until the end of the year to compile everything is risky; memories fade and evidence becomes harder to produce.

Most incentives also require some level of registration. Missing a pre-approval deadline is one of the most common reasons startups lose access to programs they clearly qualify for. A strong internal compliance routine, often supported by secretarial services, ensures that applications, forms, and statutory filings are correctly aligned.

Once claims begin, consistency is crucial. The story told in your tax filings should match the company's statutory records, board resolutions, and accounting entries. Any discrepancy, even accidental, can trigger questions from auditors. Founders typically rely on secretarial teams to keep these documents aligned and up to date.

Why Secretarial Services Matter More Than People Assume


Many founders view company secretarial services as mere paperwork support, but in reality, they play a crucial role in legal and tax compliance. They ensure the company is properly incorporated, maintain the registers that authorities may request during audits, and keep track of deadlines that directly affect tax status.

They also handle essential administrative tasks, such as maintaining meeting minutes, updating shareholder information, and monitoring changes in statutory requirements. All of these contribute to clean, defensible tax claims. When accountants, lawyers, and advisors need information, secretarial services keep everything organized so nothing gets lost or contradicted.

In a startup environment where decisions are made quickly, this steady, behind-the-scenes structure prevents compliance issues that could block access to incentives later on.

Common Mistakes Founders Make


One of the biggest mistakes is assuming that an incentive applies automatically. Many require formal applications or certification before a claim can be made. Poor documentation is another common issue. R&D claims often fail because teams kept vague notes or waited too long to record their work.

Some founders mix personal and business expenses, complicating bookkeeping and undermining eligibility for certain deductions. Others push overly aggressive interpretations of what qualifies, creating unnecessary audit risk.

Timing is another challenge. Making large investments without first checking eligibility often leads to missed opportunities. When secretarial services are involved early, these problems become far less common because someone is keeping track of the requirements long before tax season arrives.

When to Seek Professional Help


Not every startup needs a tax specialist right away, but certain situations call for expert guidance. If your business relies heavily on R&D credits, cross-border operations, or complex capital allowances, consulting a professional is wise. Investors also tend to prefer companies with clear, organized records and predictable compliance routines, something secretarial services help maintain.

A short consultation can prevent months of corrective work later. And when a company grows quickly, having a system already in place makes scaling much smoother.

Bringing It All Together


Tax exemptions and incentives won't build your product, but they can provide your startup with more breathing room. Understanding the basics, keeping clean records, and approaching claims with discipline can have a meaningful impact on cash flow. Reliable secretarial services make the process far less chaotic by managing filings, maintaining essential documents, and ensuring the company remains eligible for support programs as it grows.

Core Devices Keeps Stealing Our Work


I remember it being massive news when Pebble made moves to resurrect. Now they're trying to forcibly take away the grassroots dev community that kept Pebbles alive after they were abandoned by the original company.

Fool me once, shame on you. Fool me twice, shame on me.

rebble.io/2025/11/17/core-devi…

Lety Does Bathing With the Papel Picado Rosa, Verde, and Morado Soaps From LUSH


Sensitive content

This entry was edited (4 days ago)
in reply to Lety Does Stuff 🔕

Hihi! Lety here, auto-commenting from my main account (which doesn't have a 🔕 icon)!

This is how my PeerTube videos look on other Fediverse platforms!

Remotely interact with this video using an account on an ActivityPub-powered platform like Mastodon Social! Just click the “Add comment...” box under any PeerTube video and enter your Fedi handle in the pop-up. That’ll direct you to the federated post for that video on whatever platform you use.

Or, if you’re already logged in on Mastodon or wherever you're seeing this message, just look at the post I’m responding to!

Replies and favorites on that post show up as comments and likes on PeerTube, and following the account that posted it subscribes you to my videos.

Heads up, though! While some platforms might allow you to respond with custom emojis, gifs, images, polls, and reactions, most of that fancy stuff won’t show up correctly on PeerTube. The same goes for any edits you might want to make to your response unless you delete & re-draft.

If you already know all this or are tired of seeing this wall of text, you can hide these explanation posts by going to your account preferences and creating a new filter with the title and keyword “#LetyDoesPeerTubeExplainer” and all context boxes checked.

Thanks so much for watching! ⚡​⚡​⚡​

in reply to Lety Does Stuff 🔕

Hihi! Lety here, auto-commenting from my main account (which doesn't have a 🔕 icon)!

This is how my PeerTube videos look on other Fediverse platforms!

Remotely interact with this video using an account on an ActivityPub-powered platform like Mastodon Social! Just click the “Add comment...” box under any PeerTube video and enter your Fedi handle in the pop-up. That’ll direct you to the federated post for that video on whatever platform you use.

Or, if you’re already logged in on Mastodon or wherever you're seeing this message, just look at the post I’m responding to!

Replies and favorites on that post show up as comments and likes on PeerTube, and following the account that posted it subscribes you to my videos.

Heads up, though! While some platforms might allow you to respond with custom emojis, gifs, images, polls, and reactions, most of that fancy stuff won’t show up correctly on PeerTube. The same goes for any edits you might want to make to your response unless you delete & re-draft.

If you already know all this or are tired of seeing this wall of text, you can hide these explanation posts by going to your account preferences and creating a new filter with the title and keyword “#LetyDoesPeerTubeExplainer” and all context boxes checked.

Thanks so much for watching! ⚡​⚡​⚡​

Your old android phone is begging to be a cheap home server!


cross-posted from: lemmy.zip/post/53280903

This won't be a post for people that already have dedicated server hardware, unless they find something theyd like to run off an android phone specifically.

But anyways, more people than ever have and old spare, but relatively powerful, android phone laying about. I'm talking 2-4+ gb of ram and 32gb+ of storage. Usually these devices end up in a drawer, but in an age of dystopian tracking and company overreach, such a device can be an extremely useful and low power draw tool that can improve your security and experience on the web. And it also has its own battery to boot lol.

If you're wanting to do something like this you should definitely consider finding a custom android rom with more care for security and you will need to root your device. But with a rooted device you then get access to a range of tools. You will want to install magisk through the bootloader as well as termux and termux boot from within fdroid (its important you get the two of them from the same source).

USES/SERVICES
With all of these theres now a few options that I can confirm all work on android armv8 devices.

0: To set up most of these services to boot on launch you can either use magisk boot scripts in /data/adb/service.d/ iirc, or you can use termuxboot scripts placed in /data/data/com.termux/files/home/.termux/boot/

1: You can run an instance of Adguard Home on your network that will have enough resources to handle quite heavy lists. You will need to import ssl certificates to properly get it working but otherwise the armv8 binary works well. Adguard home can then be set as your network's dns address. Adguard home has lists for threat protection, to malware, to ads etc.

2: Adguard is good for security but you can experience even less tracking and control by pairing it with an instance of Unbound dnsrunning on the same device. Depending on storage you can store larger dns caches which will stop dns providers from tracking every dns lookup you do.

3: This one is more optional dependent on the person but i use and love it. Searxng is a privacy focused metasearch engine that can aggregate a bunch of data from tons of sources, depending on which sources you enable. It can be used to replace your current search engine such as duckduckgo and can gather anything from torrents and apks, to music, videos and pictures, and my favourite which is its equivalent to google scholar. All in one search engine. Its recommended to disabled certain sources for speed and I would recommend disabling brave search as a source for example because they're scummy. For Searxng it will be required to create a virtual environment with the correct python dependencies and I've had to run it through termux rather than the other two which can run even through an adb shell.

4: Memos is a nice note taking webapp and its my personal choice to use but other similar calender or note apps are a good option if you wanna self host something like that. Can be ran through an adb shell or magisk boot script.

5: Others things you wanna try!!!
An android phone is just a Linux computer and if theres services you've wanted a pi to run or a server in general then theres a pretty good chance you can get it running on your power efficient android phone thats just already laying around!!
Heres some more ideas ive planned to try but not gotten to yet/haven't finished:
-Samba drive to sync and back up your boot drive
-Aur build server to pre compile different large packages to be installed to my pc without building them on the computer itself
-openvpn proxy to run downloads through a protonvpn account for download managers that dont support password authentication (a surprising amount of them tbh)
-Invidious instance, a youtube frontend that doesn't count as actual page views. This allows you to boycott YouTube in regards to data they can show advertisers, while still allowing you to privately subscribe and watch creators you like. It also keeps you from being tracked by your YouTube account while giving you access to better/more consistent resolution tools as well as automatically removed ads. Youtube sponsorblock extensions can also be set up to work with invidious so you don't lose much at all switching.

System keeps freezing


Lately I've been getting an issue where out of nowhere the whole system just up and freezes, i can't click on anything or if I'm watching a video I can't pause it by pressing space bar. I checked the journalctl logs and it gave me this, but I have no idea what it means. My distro is Arch. Could anyone help me with this? I'd hate to switch to another distro or reinstall because of this, I already have everything set up just the way I like it and don't want to spend hours setting it all up again.
Nov 18 11:00:23 archrinaku rtkit-daemon[863]: Supervising 9 threads of 5 processes of 1 users.
Nov 18 11:00:23 archrinaku rtkit-daemon[863]: Supervising 9 threads of 5 processes of 1 users.
Nov 18 11:08:07 archrinaku kernel:  slab kmalloc-128 start ffff8a8cd0240a80 pointer offset 40 size 128
Nov 18 11:08:07 archrinaku kernel: ------------[ cut here ]------------
Nov 18 11:08:07 archrinaku kernel: list_del corruption. next->prev should be ffff8a8cd0240da8, but was dead000000000122. (next=ffff8a8cd0240aa8)
Nov 18 11:08:07 archrinaku kernel: WARNING: CPU: 5 PID: 699 at lib/list_debug.c:65 __list_del_entry_valid_or_report+0xd5/0x10a
Nov 18 11:08:07 archrinaku kernel: Modules linked in: snd_seq_dummy snd_hrtimer snd_seq snd_seq_device ccm snd_ctl_led uinput vfat fat iwlmvm snd_hda_codec_alc662 snd_hda_codec_nvhdmi snd_hda_codec_realtek_lib snd_hda_codec_generic snd_hda_codec_hdmi snd_hda_intel mac80211 nvidia_drm(OE) snd_hda_codec snd_hda_core intel_rapl_msr libarc4 amd_atl ptp snd_intel_dspcfg snd_intel_sdw_acpi intel_rapl_common pps_core snd_hwdep btusb nvidia_modeset(OE) snd_pcm iwlwifi btrtl polyval_clmulni btintel snd_timer sp5100_tco drm_ttm_helper ghash_clmulni_intel btbcm r8169 aesni_intel snd i2c_piix4 btmtk realtek ttm rapl gigabyte_wmi pcspkr wmi_bmof i2c_smbus acpi_cpufreq k10temp soundcore mdio_devres cfg80211 libphy bluetooth mdio_bus ccp rfkill mousedev joydev gpio_amdpt gpio_generic mac_hid nvidia_uvm(OE) nvidia(OE) dm_mod loop nfnetlink ip_tables x_tables nvme nvme_core nvme_keyring nvme_auth video wmi
Nov 18 11:08:07 archrinaku kernel: CPU: 5 UID: 1000 PID: 699 Comm: niri Tainted: G           OE       6.17.8-arch1-1 #1 PREEMPT(full)  b229cb54977b6624cce826e2cbd0d8e703fe3921
Nov 18 11:08:07 archrinaku kernel: Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE
Nov 18 11:08:07 archrinaku kernel: Hardware name: Gigabyte Technology Co., Ltd. B450M DS3H/B450M DS3H-CF, BIOS F52 01/05/2021
Nov 18 11:08:07 archrinaku kernel: RIP: 0010:__list_del_entry_valid_or_report+0xd5/0x10a
Nov 18 11:08:07 archrinaku kernel: Code: 0f 0b eb a4 b0 01 48 39 7d 08 74 4a 48 89 ef e8 41 2d 3d 00 48 8b 55 08 48 89 e9 48 89 de 48 c7 c7 30 3d 3b bb e8 9b 3e 10 00 <0f> 0b e9 77 ff ff ff 4c 89 e7 e8 1c 2d 3d 00 49 8b 14 24 4c 89 e1
Nov 18 11:08:07 archrinaku kernel: RSP: 0018:ffffce800118fab8 EFLAGS: 00010246
Nov 18 11:08:07 archrinaku kernel: RAX: 0000000000000000 RBX: ffff8a8cd0240da8 RCX: 0000000000000027
Nov 18 11:08:07 archrinaku kernel: RDX: ffff8a8fcf15cfc8 RSI: 0000000000000001 RDI: ffff8a8fcf15cfc0
Nov 18 11:08:07 archrinaku kernel: RBP: ffff8a8cd0240aa8 R08: 0000000000000000 R09: 00000000ffffefff
Nov 18 11:08:07 archrinaku kernel: R10: ffffffffbbc60c00 R11: ffffce800118f950 R12: ffff8a8cdefe1aa8
Nov 18 11:08:07 archrinaku kernel: R13: ffffffffba670b40 R14: ffff8a8cdb5fd400 R15: 00000000000000be
Nov 18 11:08:07 archrinaku kernel: FS:  00007f1a218360c0(0000) GS:ffff8a9012849000(0000) knlGS:0000000000000000
Nov 18 11:08:07 archrinaku kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Nov 18 11:08:07 archrinaku kernel: CR2: 00007f0572cab000 CR3: 000000012350d000 CR4: 00000000003506f0
Nov 18 11:08:07 archrinaku kernel: Call Trace:
Nov 18 11:08:07 archrinaku kernel:  <TASK>
Nov 18 11:08:07 archrinaku kernel:  drm_property_free_blob.cold+0x5/0xa
Nov 18 11:08:07 archrinaku kernel:  drm_mode_destroyblob_ioctl+0xf4/0x130
Nov 18 11:08:07 archrinaku kernel:  ? drm_dev_enter+0x1d/0x60
Nov 18 11:08:07 archrinaku kernel:  drm_ioctl_kernel+0xae/0x100
Nov 18 11:08:07 archrinaku kernel:  drm_ioctl+0x29b/0x550
Nov 18 11:08:07 archrinaku kernel:  ? __pfx_drm_mode_destroyblob_ioctl+0x10/0x10
Nov 18 11:08:07 archrinaku kernel:  __x64_sys_ioctl+0x97/0xe0
Nov 18 11:08:07 archrinaku kernel:  do_syscall_64+0x81/0x970
Nov 18 11:08:07 archrinaku kernel:  ? srso_return_thunk+0x5/0x5f
Nov 18 11:08:07 archrinaku kernel:  ? security_file_permission+0x48/0x130
Nov 18 11:08:07 archrinaku kernel:  ? srso_return_thunk+0x5/0x5f
Nov 18 11:08:07 archrinaku kernel:  ? rw_verify_area+0x56/0x180
Nov 18 11:08:07 archrinaku kernel:  ? srso_return_thunk+0x5/0x5f
Nov 18 11:08:07 archrinaku kernel:  ? vfs_read+0x268/0x390
Nov 18 11:08:07 archrinaku kernel:  ? srso_return_thunk+0x5/0x5f
Nov 18 11:08:07 archrinaku kernel:  ? ksys_read+0xcd/0xf0
Nov 18 11:08:07 archrinaku kernel:  ? srso_return_thunk+0x5/0x5f
Nov 18 11:08:07 archrinaku kernel:  ? do_syscall_64+0x81/0x970
Nov 18 11:08:07 archrinaku kernel:  ? __pfx_ep_autoremove_wake_function+0x10/0x10
Nov 18 11:08:07 archrinaku kernel:  ? srso_return_thunk+0x5/0x5f
Nov 18 11:08:07 archrinaku kernel:  ? __rseq_handle_notify_resume+0xa6/0x490
Nov 18 11:08:07 archrinaku kernel:  ? srso_return_thunk+0x5/0x5f
Nov 18 11:08:07 archrinaku kernel:  ? switch_fpu_return+0x4e/0xd0
Nov 18 11:08:07 archrinaku kernel:  ? srso_return_thunk+0x5/0x5f
Nov 18 11:08:07 archrinaku kernel:  ? do_syscall_64+0x229/0x970
Nov 18 11:08:07 archrinaku kernel:  ? srso_return_thunk+0x5/0x5f
Nov 18 11:08:07 archrinaku kernel:  ? do_syscall_64+0x81/0x970
Nov 18 11:08:07 archrinaku kernel:  ? srso_return_thunk+0x5/0x5f
Nov 18 11:08:07 archrinaku kernel:  entry_SYSCALL_64_after_hwframe+0x76/0x7e
Nov 18 11:08:07 archrinaku kernel: RIP: 0033:0x56060f884a0d
Nov 18 11:08:07 archrinaku kernel: Code: 8b 43 18 c6 43 10 0e 80 f9 06 75 1e 48 8b 4b 20 48 8b 49 10 8b 79 10 89 45 ec 48 8d 55 ec b8 10 00 00 00 be be 64 04 c0 0f 05 <48> 8b 43 20 f0 48 ff 08 75 0a 48 8d 7b 20 ff 15 07 67 a2 00 48 83
Nov 18 11:08:07 archrinaku kernel: RSP: 002b:00007fffd04f87e0 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
Nov 18 11:08:07 archrinaku kernel: RAX: ffffffffffffffda RBX: 000056064212eec0 RCX: 000056060f884a0d
Nov 18 11:08:07 archrinaku kernel: RDX: 00007fffd04f87ec RSI: 00000000c00464be RDI: 0000000000000025
Nov 18 11:08:07 archrinaku kernel: RBP: 00007fffd04f8800 R08: 00005606420b7b30 R09: 00007f1a22408ac0
Nov 18 11:08:07 archrinaku kernel: R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000000
Nov 18 11:08:07 archrinaku kernel: R13: 0000000002678250 R14: 00007fffd04f8978 R15: 0000000000000003
Nov 18 11:08:07 archrinaku kernel:  </TASK>
in reply to theselfhoster

looks like a bad Nvidia driver that isn't playing nice with Niri since it looks like Niri triggered it. Try installing temporarly another Wayland WM like say River or Hyprland and see if it still happens. Bet it's not going to happen on River, bet it will happen on Hyprland.

Reinstall your Nvidia drivers, update your kernel, update Niri if it isn't already up to date.

My 6 WORST LINUX MISTAKES


Download the open source best practices report here: meet.tuxcare.com/idc-peerscape…

Grab a brand new laptop or desktop running Linux:tuxedocomputers.com/

👏 SUPPORT THE CHANNEL:
Get access to an exclusive weekly podcast, vote on the next topics I cover, and get your name in the credits:

YOUTUBE: youtube.com/channel/UC5UAwBUum…

Patreon: patreon.com/thelinuxexperiment

Or, you can donate whatever you want: paypal.me/thelinuxexp?locale.x…

🏆 FOLLOW ME ELSEWHERE:
Linux news in Youtube Shorts format: youtube.com/channel/UCtZp0mK9I…

Join us on our Discord server: discord.gg/xK7ukavWmQ

Twitter : twitter.com/thelinuxEXP

Mastodon: mastodon.social/web/@thelinuxE…

Pixelfed: pixelfed.social/TLENick

My Gaming on Linux Channel: youtube.com/channel/UCaw_Lz7oi…

📷 GEAR I USE:
Sony Alpha A6600 Mirrorless Camera: amzn.to/30zKyn7
Sigma 56mm Fixed Prime Lens: amzn.to/3aRvK5l
Logitech MX Master 3 Mouse: amzn.to/3BVI0Od
Bluetooth Space Grey Mac Keyboard: amzn.to/3jcJETZ
Logitech Brio 4K Webcam: amzn.to/3jgeTh9
LG Curved Ultrawide Monitor: amzn.to/3pcTVDH
Logitech White Speakers: amzn.to/3n6wSb0
Xbox Controller: amzn.to/3BWmIA3
Amazon Links are affiliate codes and generate small commissions to support the channel

This video is distributed under the Creative Commons Share Alike license.

#linux #mistake

00:00 Intro
00:42 Sponsor: Get a free study on the best open source practices
01:47 Using Linux without the internet
04:19 Not using a separate /home partition
05:57 Not distro hopping soon enough
07:49 Not getting out of my comfort zone
09:20 Dual booting for too long
11:18 Fearing the terminal
13:06 And a lot more!
14:07 Sponsor: Get a laptop or desktop running Linux from Tuxedo
15:13 Support the channel

So, when I started using Linux, it was on an old refurbished laptop that didn't have wifi or an ethernet port. I had to download packages from the repos. Manually. And copy them to a USB key, transfer them to the laptop, copy them there, install them, only for DPKG to tell me that dependencies were missing.

So, yeah, using Linux without access to the internet. Completely unusable unless you're already perfectly setup and you don't need anything else.

Second mistake I took way too long to correct was NOT setting up a separate /home partition. See, you can reinstall a whole other Linux distro and reuse that exact same /home partition to keep all your settings, files, configurations and more, and avoid losing hours setting everything up again.

Nowadays, distros generally also don't default to a separate /home partition, which is a mistake in my opinion.

Another mistake I made: I didn't distro hop enough when I started using Linux

This might seem weird, but the diversity of Linux distros and what they offer is undeniably the greatest strength of our ecosystem.

Distro hopping is how you learn about all the various things you can do on Linux. It's how you try other desktop environments, and it's how you learn what the differences are, what the advantages of each distro, each system are. Not distro hopping sooner meant that I just didn't learn anything new while using Linux, for a long time.

In the same vein, I also put off trying out new projects for a long time! Flatpak, Wayland, image based Operating systems like SIlverblue, GNOME extensions, I used to stay safe in my little comfort zone, and I judged everything else by the standards of what someone else had written online.

Not trying out these projects for myself also stunted my learning experience, and while I can absolutely agree that none of them are perfect, even today, they taught me so much about how things work, whether it's the older way, or the new ways these projects bring, I now know a lot more about the inner workings of my system and how to fix problems when I encounter them.

Another mistake, that will be more personal, is dual booting for too long. I kept a Windows system on my devices for a long, long while, up until I started this channel, actually, in 2018. I used Windows as a crutch: when something didn't work immediately on Linux, I just rebooted on Windows, did the thing, and then stuck to Windows for the day, because rebooting was annoying. And then the next day, I still used Windows, because I knew I had something to do that I already knew how to do on Windows.

And so, I didn't learn how to do a lot of things on Linux, even though it would have saved me time in the end.

Another big mistake I made back in the day, was avoiding the command line. It's a wonderfully powerful tool to get tings done. Updating your software repos and installing multiple apps at once is just more convenient from the command line. Fixing an error is also way faster this way, or transcoding a video using ffmpeg

This entry was edited (4 days ago)

Reinforcing Visitor Retention: Strategies to Elevate Repeat Engagement and Brand Loyalty


Enhancing visitor repurchase rates and cultivating brand loyalty require a structured, multi-dimensional framework that aligns operational excellence, emotional resonance, and long-term value perception. In the leisure and attractions industry, where experience is the primary currency, the mechanisms that drive return visitation differ significantly from those in conventional consumer markets. Guests evaluate not only the product itself but the totality of their emotional, operational, and environmental journey. A high-performing venue integrates design, service, and psychological reinforcement to build an ecosystem that continuously draws guests back. This article examines the strategic underpinnings of effective retention, supported by systemic analysis and experiential design principles.


Designing an Experience That Generates Emotional Adhesion


Emotional bonding is one of the strongest predictors of repeat visits. While physical assets such as a wild mouse ride or a drop tower ride for sale contribute to baseline excitement, emotional adhesion arises from the way these assets are integrated into a cohesive narrative.
drop tower ride for sale

Immersive Spatial Identity


A distinctive environmental identity influences how guests encode memories. Dynamic lighting, thematic coherence, multisensory cues, and perceptual transitions work collectively to establish a memorable atmosphere. Spaces that exhibit chromatic intentionality and textural depth leave deeper impressions, ultimately strengthening long-term recall.

Personalization as a Retention Catalyst


Personalization extends beyond basic customer service. It includes adaptive content, customized queue experiences, and variable ride narratives. Technologies such as RFID wristbands, adaptive audio zones, and responsive scenic elements enable fine-grained personalization. These customized moments increase perceived exclusivity, a powerful driver of loyalty.


Operational Reliability as a Foundation for Trust


Trust is an indispensable precursor to loyalty. Poor maintenance, long queues, inconsistent ride operation, or staff miscommunication erode trust rapidly and often irreversibly.

Precision Maintenance and Uptime Optimization


Every asset, from a compact wild mouse ride to a high-intensity vertical attraction, requires a rigorous technical maintenance regime. High uptime rates directly influence visitor sentiment. Predictive maintenance systems, vibration monitoring, and automated inspection workflows reduce operational interruptions and strengthen confidence in the venue’s reliability.
crazy mouse coaster

Service Efficiency and Throughput Management


Queue management is a defining component of perceived value. Throughput optimization using load-balancing techniques, virtual queue systems, or distributed attraction models reduces friction and enhances satisfaction. Shorter perceived wait times correlate strongly with increased willingness to return.


Value Enhancement Through Multi-Layered Offerings


A venue that depends solely on its major attractions risks stagnation. Value layering introduces additional incentives for guests to return.

Tiered Experience Structures


Offering diversified experiences—ranging from express access packages to seasonal programs—encourages guests to revisit for differentiated content. Limited-time events, nighttime exclusives, and modular attraction overlays provide periodic novelty that sustains long-term engagement.

Loyalty Programs With Tangible Incentives


A well-engineered loyalty program should integrate digital engagement, point accrual systems, exclusive content, and real-world benefits. Programs that offer tier progression, VIP access, or member-exclusive ride previews reinforce psychological commitment and reduce attrition.


Content Refresh and Experience Evolution


Experience fatigue is a major inhibitor of repeat visitation. Even the most iconic attraction eventually loses novelty if not periodically refreshed.

Dynamic Theming and Narrative Modularity


Narrative overlays, seasonal re-skins, and special-edition ride sequences introduce variability without requiring full hardware replacement. For example, a wild mouse ride can incorporate variable lighting patterns, thematic projection elements, or track-side animatronics to foster freshness.

Integrating New Products Strategically


Periodic introduction of new offerings—such as acquiring a drop tower ride for sale, installing a new interactive zone, or expanding themed districts—signals continuous investment. Guests perceive this evolution as a commitment to delivering enhanced value, which drives loyalty through expectation of future novelty.


Technological Amplification of Post-Visit Engagement


Retention extends far beyond the physical visit. Post-visit communication plays a critical role in sustaining loyalty.

Experience Replay Mechanisms


Ride photos, dynamic video captures, and personalized digital souvenirs re-activate emotional memory. When guests relive moments digitally, they strengthen the internal association that motivates repeat behavior.

Automated Engagement Journeys


CRM-driven communication—supported by segmented messaging, behavioral triggers, and personalized recommendations—keeps the venue present in the guest’s mental landscape. Messaging that references the attractions they enjoyed, highlights upcoming additions, or delivers tailored offers increases conversion probability for repeat visits.


Building a Culture of Human-Centric Service Excellence


Technology, theming, and hardware cannot compensate for poor interpersonal interactions. Human factors remain a decisive influence on return behavior.

Staff Micro-Interactions


Guests remember micro-moments. A positive interaction with a ride operator, a sincere gesture from a food attendant, or a well-timed piece of guidance can shape perception disproportionately. Training that emphasizes empathy, clarity, and situational awareness elevates these interactions and reinforces brand credibility.

Service Consistency Across Touchpoints


Consistency is the architecture of trust. Whether engaging with staff at ticketing, within queue lines, or at merchandise locations, guests should encounter cohesive service standards. Inconsistency creates cognitive dissonance that weakens loyalty.


Measuring Loyalty With Analytic Precision


Data-driven evaluation provides clarity. Visitor retention can be quantified through multiple indicators: return visitation frequency, membership renewal rates, per-capita spending, engagement with digital channels, and sentiment analysis. Advanced analytics platforms allow operators to model predictive retention patterns and identify high-value segments.

Applying behavioral analytics, such as heat mapping, path tracking, or guest sentiment clustering, enables strategic refinement grounded in empirical evidence rather than intuition.


Conclusion


Increasing visitor repurchase rates and building brand loyalty require a synchronized matrix of emotional design, operational precision, and strategic evolution. Each touchpoint—from the reliability of a ride’s operation to the nuance of environmental storytelling—exerts influence on retention outcomes. A venue that invests in experience differentiation, perceptual continuity, and sustained post-visit engagement establishes a durable competitive advantage. Loyalty is not a singular achievement but an ongoing process of delivering consistent value, cultivating emotional resonance, and reinforcing trust through operational excellence.

I just wanted to compare FOSS Linux budgeting software


Instead YouTube gives me literally nothing but AI spam. :/

I scrolled down a bit more and got this:
i.postimg.cc/fJcPhG45/Screensh…

Scrolled down some more and this:
i.postimg.cc/v1khnhRp/Screensh…

I kept scrolling until I ran out of relevant results. Not a single video was legit. I don't think I've ever seen so much AI slop in one search term and by the gods there is a lot of crap on YouTube.

Anyone have a good comparison video? I'm just wanting a decent comparison of Actual, Firefly III and possibly HomeBank. Feel free to also give me your 2 cents on whatever you use 😀

This entry was edited (4 days ago)
in reply to CanadaPlus

Guix is almost like nix but with scheme, right? Any other differences?

I do like scheme. Nix is quite impressive. But my unpopular opinion is I am not convinced it's philosophy is necessary. Nix feels like a workaround to legacy baggage in POSIX to allow for all its features of full reproducibility of packages and the overall system. Although Gentoo is not exactly reproducible, I feel like the level of control is sufficient to give me the benefits I want.

Nix works for maybe 95% of cases, but the 5% where its workarounds do not work sre annoying to deal with. Gentoo on the other hand doesn't break so much from the traditional unix way of doing things, but still grants the user a great load of freedom and choice.

Lety Does Reacting to “One Piece” Episodes 1143 & 1144


Luffy attempts to finish off Kizaru and Saturn, but things aren't going to be easy, as Saturn seems to reveal that he knows how to fight back against Nika's tricks. Meanwhile, the rest of the Five Elders arrive on Egghead, and one of them's not quite like the others.

Some Related Video(s?)

Featured in This Video

  • My doodle of the most unforgivable traitor
  • “One Piece” Episode 1143: “Vegapunk's Secret Plan – A Tense Worldwide Broadcast”


  • Oda's love for pizza
  • “One Piece” Episode 1144: “The Worst Nightmare - The Five Elders Come Together”


  • Four legendary figures from Japanese mythology
  • And that thing from the Timothée Chalamet movie

Alternate Titles

  • Lety Does Reacting to “One Piece” Episode 1143: “Vegapunk's Secret Plan – A Tense Worldwide Broadcast”
  • Lety Does Reacting to “One Piece” Episode 1144: “The Worst Nightmare - The Five Elders Come Together”

Chapters

0:00 Intro
1:37 Episode 1143 Reaction
5:26 Episode 1144 Reaction
11:19 Outro


Lety Does Reacting to “One Piece” Episodes 1141 & 1142


Death and despair are all over Egghead as everything comes crashing down. I was hoping Kizaru would find his goodness deep down inside, but you can't always get what you want. And it's nice that the giants showed up to help at all, but couldn't they have shown up a couple of minutes earlier???

Some Related Video(s?)

Featured in This Video

  • My doodle of what what I thought would be Vegapunk's brutal death but holy fuck no it gets so much worse
  • “One Piece” Episode 1141: “Reliable Reinforcements! Dorry and Brogy Arrive!”


  • The ultimate weapons being taken out by rocks from a tube
  • “One Piece” Episode 1142: “Come In, World - Vegapunk's Message”


  • Satan getting Satanier
  • Me forggeting the term “dead man's switch”

Alternate Titles

  • Lety Does Reacting to “One Piece” Episode 1141: “Reliable Reinforcements! Dorry and Brogy Arrive!”
  • Lety Does Reacting to “One Piece” Episode 1142: “Come In, World - Vegapunk's Message”

Chapters

0:00 Intro
1:45 Episode 1141 Reaction
5:36 Episode 1142 Reaction
9:13 Outro


This entry was edited (4 days ago)
in reply to Lety Does Stuff 🔕

Hihi! Lety here, auto-commenting from my main account (which doesn't have a 🔕 icon)!

This is how my PeerTube videos look on other Fediverse platforms!

Remotely interact with this video using an account on an ActivityPub-powered platform like Mastodon Social! Just click the “Add comment...” box under any PeerTube video and enter your Fedi handle in the pop-up. That’ll direct you to the federated post for that video on whatever platform you use.

Or, if you’re already logged in on Mastodon or wherever you're seeing this message, just look at the post I’m responding to!

Replies and favorites on that post show up as comments and likes on PeerTube, and following the account that posted it subscribes you to my videos.

Heads up, though! While some platforms might allow you to respond with custom emojis, gifs, images, polls, and reactions, most of that fancy stuff won’t show up correctly on PeerTube. The same goes for any edits you might want to make to your response unless you delete & re-draft.

If you already know all this or are tired of seeing this wall of text, you can hide these explanation posts by going to your account preferences and creating a new filter with the title and keyword “#LetyDoesPeerTubeExplainer” and all context boxes checked.

Thanks so much for watching! ⚡​⚡​⚡​

Shakira - Nada (Official Video)


Shakira - Nada (Official Video)

Official Music Video by Shakira performing Nada (Official Video).(C) 2018 Ace Entertainment S.ar.l., under exclusive license to Sony Music Entertainment US Latin LLC

#Shakira #Nada #ElDorado

This entry was edited (4 days ago)

Is NixOS at the advent of an implosion? | Community inquiry on recent drama


NixOS' influence and importance at pushing Linux forward into the (previously) unexplored landscape of configuring your complete system through a single config file is undeniable. It's been a wild ride, but it was well worth it.

And although it has only been relatively recently that it has lost its niche status, the recent influx of so-called 'immutable' distros springing up like mushrooms is undeniably linked to and inspired by NixOS.

However, unfortunately, while this should have been very exciting times for what's yet to come, the recent drama surrounding the project has definitely tarnished how the project is perceived.

NixOS' ideas will definitely live on regardless. But how do you envision NixOS' own future? Any ETA's for when this drama will end? Which lessons have we learned (so far) from this drama? Are there any winners as a result of this drama? Could something like this happen to any distro?


In case you're out of the loop. Though, there's a lot that has transpired since but which hasn't been rigorously documented at a single place; like how 4 out of 5 NixOS board members have quit over the last 2 months or so.

This entry was edited (1 year ago)

GNOME Desktop top bar - waste of space?


Hi,

I used to be a big fan of GNOME the way it got out of my way when I didn’t need it and no icons in the bottom to take up desktop space. But the top bar just seems so… useless. It holds a few useful icons in the right side (and you can get extensions to add more) but other than this, it’s just taking up space. After a trip past Xfce I’m now on KDE with the bar in the top.

Have I missed anything about the top bar in GNOME Desktop?

in reply to vandsjov

I just use the "Just perfection" extension to hide to top bar and only make it visible in overview. It may sound annoying to have to use overwiew each time you want to see or interact with the top bar, but honestly for me it's not that often to make that 1 or 2 extra keypresses annoying. When you get used to it it saves a lot of space.
This entry was edited (2 days ago)

Harmonie de IT Pharma: El Poder del Ácido Hialurónico para una Piel Hidratada y Rejuvenecida


IT Pharma presenta Harmonie, una línea de ácido hialurónico reticulado que ofrece múltiples beneficios para la piel y el rostro. Este compuesto es conocido por su increíble capacidad para retener hasta 1000 veces su peso en agua, garantizando una hidratación profunda y duradera que mejora la textura y firmeza cutánea.

Harmonie no solo hidrata, sino que también suaviza arrugas y líneas de expresión, proporcionando un efecto lifting visible. Además, estimula la producción natural de colágeno y elastina, fundamentales para mantener la elasticidad y juventud de la piel a largo plazo. Su aplicación permite restaurar volúmenes perdidos y redefinir contornos faciales, aportando un aspecto fresco y saludable.

Con su fórmula confiable y segura, Harmonie se posiciona como una opción ideal para quienes buscan resultados estéticos naturales, duraderos y en armonía con la evolución del rostro. Descubre cómo IT Pharma combina ciencia y belleza para cuidar tu piel con este relleno de ácido hialurónico reticulado premium.

Kind of tutorial, install postmarketos on Xiaomi Redmi S2


framapiaf.org/@millerebonds/11…

I tried to explain there in mastodon how to install postmarketos on a Xiaomi Redmi S2, step by step.

I intend to help beginners and democratise at maximum, because I mean linux phones are far better than custom aosp derivatives with uncertain future.

My kind of tutorial is unperfect and needs improvement, to make

in the future.

Kind of tutorial, install postmarketos on Xiaomi Redmi S2


cross-posted from: lemmy.ml/post/39101644

framapiaf.org/@millerebonds/11…

I tried to explain there in mastodon how to install postmarketos on a Xiaomi Redmi S2, step by step.

I intend to help beginners and democratise at maximum, because I mean linux phones are far better than custom aosp derivatives with uncertain future.

My kind of tutorial is unperfect and needs improvement, to make

in the future.

Episode 56 - A New Social - Anuj & Ryan - Livestream 2025-11-14


Welcome Fedi Friends to episode 56 of Fireside Fedi! I'm your host ozoned. Fireside Fedi is a show about folks within the Fediverse. If you're hearing this, you are a part of the Fediverse.

My guests today are a part of A New Social. You might know A New Social from their technology Bridgy Fed. Their mission is to liberate people's networks from their platforms, enabling The Last Network Effect and leveling the playing field across the open social web.

Anuj Ahooja

Anuj is an engineering leader and writer dedicated to building a viable open social web. He's worked with organizations like Flipboard, WeDistribute, and sub.club, and is focused on delivering The Last Network Effect to finally center the social web on people, not platforms.

Ryan Barrett

Ryan is an engineering leader who's spent over two decades building infrastructure, organizations, and open source social web projects like Bridgy Fed. He fell in love with the open web while writing HTML by hand in high school, then fell in love with tech as an intern at WebVan in 1999. (Ask him for stories!)

mastodon.social/@anewsocial
mastodon.social/@quillmatiq
fed.brid.gy/r/snarfed.org/abou…
fed.brid.gy/
blog.anew.social/bounce-a-cros…
@snarfed.org@snarfed.org

This entry was edited (5 days ago)
in reply to keppy186

I don't think I'd call him a lyrical genius but this song is basically an interlude off of quite an old album. Flower Boy represented a big shift for his music tonally and maturity-wise. Maybe check his music after that to get a better idea of why is current fans feel the way they do.

One of the main themes of this album was summer camp. Some of the album literally feels campy and other parts feel angsty or edgy. It's meant to put you in the mind of a teenage boy. IFHY or Answer would be a better representation of lyricism off this album.

Shakira - Don't Bother (Official HD Video)


🇬🇧 "Don't Bother" is a powerful pop rock anthem by Shakira, released on 11 October 2005 as the lead single from her album Oral Fixation, Vol. 2. The song showcases Shakira's emotional depth as she addresses a past relationship with a mix of sarcasm and strength. The music video, directed by Jaume de Laiguana, features Shakira taking a bold stand against her ex by destroying his car, symbolising her refusal to be hurt. At the time of release, Shakira was 28 years old. The song peaked at number 42 on the US Billboard Hot 100 and reached the top ten in several countries.

<><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><>

🇪🇸 "Don't Bother" es un poderoso himno de pop rock de Shakira, lanzado el 11 de octubre de 2005 como el sencillo principal de su álbum Oral Fixation, Vol. 2. La canción muestra la profundidad emocional de Shakira mientras aborda una relación pasada con una mezcla de sarcasmo y fuerza. El video musical, dirigido por Jaume de Laiguana, presenta a Shakira tomando una postura audaz contra su ex al destruir su coche, simbolizando su negativa a ser herida. En el momento de su lanzamiento, Shakira tenía 28 años. La canción alcanzó el puesto 42 en la lista Billboard Hot 100 de EE. UU. y llegó al top ten en varios países.

Follow Shakira:
► Follow Shakira Isabel Mebarak Ripoll: @shakiramusic@tube.matrix.rocks tube.matrix.rocks/a/shakiramus…
► Watch more music videos by Shakira: tube.matrix.rocks/c/shakira_mu…
► Listen to Shakira: tube.matrix.rocks/a/shakiramus…
► Listen to Shakira's "Oral Fixation, Vol.2": tube.matrix.rocks/w/p/mmzEXMWZ…
► Subscribe to the official Shakira channel: tube.matrix.rocks/c/shakira_mu…

🎵 L Y R I C S / L E T R A S 🎵:
She's got the kind of look that defies gravity
She's the greatest cook
And she's fat-free

She's been to private school
And she speaks perfect French
She's got the perfect friends
Oh, isn't she cool?

She practices Tai Chi
She'd never lose her nerve
She's more than you deserve
She's just far better than me

Hey, hey!

So don't bother
I won't die of deception
I promise you won't ever see me cry
Don't feel sorry

And don't bother
I'll be fine, but she's waiting
And the ring you gave to her will lose its shine
So don't bother, be unkind

I'm sure she doesn't know
How to touch you like I would
I beat her at that one good
Don't you think so?

She's almost six feet tall
She must think I'm a flea
I'm really a cat, you see
And it's not my last life at all

Hey, hey!

So don't bother
I won't die of deception
I promise you won't ever see me cry
Don't feel sorry

Don't bother
I'll be fine, but she's waiting
And the ring you gave to her will lose its shine
So don't bother, be unkind

For you, I'd give up all I own
And move to a communist country
If you came with me, of course
And I'd file my nails, so they don't hurt you
And lose those pounds, and learn about football
If it made you stay, but you won't, but you won't

So don't bother
I'll be fine, I'll be fine, I'll be fine, I'll be fine
Promise you won't ever see me cry
And after all, I'm glad that I'm not your type
Promise you won't ever see me cry

Don't bother
I'll be fine, I'll be fine, I'll be fine, I'll be fine
Promise you won't ever see me cry
And after all, I'm glad that I'm not your type
Not your type, not your type, not your type
Promise you won't ever see me cry

<><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><>

Album Artist: Shakira
Album(s): Oral Fixation, Vol. 2 (Expanded Edition)
Written by: Graham Edwards, Scott Spock, Lauren Christy, Heather Reid, Shakira Isabel Mebarek Ripoll, Leisha G. Hailey
Music genre(s): Pop, Rock, Synth-rock
Released: 2005
Decade for first release: #2000sMusic

#Shakira #DontBother #OralFixationVol2 #pop #Rock #synthRock #2000sMusic #femaleMusicians #femaleSinger #loveSongs #googleFree #youtubeFree #Shakira #DontBother #OfficialHDVideo #HD #Remastered

This entry was edited (5 days ago)

A Practical Guide to Transitioning to Memory-Safe Languages - Turning off the spigot of vulnerabilities: a new strategy for memory safety


cross-posted from: feddit.org/post/21743329

Fortunately, data demonstrates that making a better choice does not require daunting multiyear rewrites of existing codebases. Security can be dramatically improved by incrementally shifting the development of just new code to memory-safe languages. If these vulnerabilities can be avoided with low impact on other development goals, then choosing to introduce new ones should increasingly be considered unacceptable, and our goal should be for vulnerabilities to become increasingly impossible to introduce.

[...]
This leads to a counterintuitive insight that defies some popular anecdotes: The most vulnerable code in your project is not some dusty legacy component, but the code being written today. This is because, like most bugs, vulnerabilities have a half life. The longer code exists and is exercised, the more likely its flaws are to be found and fixed, leaving the freshest code with the highest concentration of bugs.

[....]

Beyond stability, there have also been gains in development velocity. Change lead time, the time it takes for a code commit to be successfully deployed, is a critical measure of efficiency. One of the largest factors in this metric is often code-review latency. Our data shows a fascinating trend: As our developer community has gained experience with Rust, the time required for code reviews has decreased (see figure 4b). Rust changes tend to go through fewer revisions and spend less time in the review cycle, with an approximately two times faster median code review in 2024 compared with C++.


This entry was edited (5 days ago)
in reply to boredsquirrel

Zig isn't memory safe by default. Safety needs to be opted-in to, which isn't free.

And merely recompiling C projects with the (very good) Zig toolchain wouldn't add any form of memory safety whatsoever as far as I'm aware. You can get some safety checks that way, but you still have to fix the buggy C code manually, which is a nontrivial task in best-case scenarios.

This entry was edited (5 days ago)

Modular Crushing Plants Are Boosting Efficiency for Peruvian Mining Companies


In Peru’s rapidly expanding mining sector, companies are under increasing pressure to reduce construction timelines, optimize production capacity, and accelerate project profitability. Traditional stationary crushing systems, while reliable, often require long civil works, complex installation procedures, and higher upfront investments. These challenges have led many operators to shift toward modular crushing plants, which offer faster deployment, flexible configuration, and smoother integration into both greenfield and brownfield mining sites. As modular solutions become mainstream, they are also reshaping the market for complementary equipment such as the stone crusher in Peru(chancadoras de piedra en peru), stone crusher Chile, and various mobile stone crusher models used across Latin America.

Why Modular Crushing Plants Are Gaining Popularity in Peru


Modular crushing systems are pre-engineered, factory-built units designed for rapid transportation and installation. Instead of waiting months for concrete foundations, steel structures, and customized construction, mining companies can now assemble full crushing lines in a matter of weeks. This accelerated timeline is especially valuable in Peru, where mining projects face tight operational deadlines and rising pressure to achieve early production milestones.

Many Peruvian mining sites are located in geographically challenging regions such as the Andes, where extreme elevations and limited accessibility slow down traditional construction. Modular systems significantly reduce these difficulties by offering plug-and-play installation, standardized components, and higher adaptability.

Key Advantages Of Modular Crushing Plants For Mining Operators


Modular crushing plants deliver several operational and financial benefits that align with the priorities of Peruvian miners.

Faster Construction And Commissioning


Modular crushing plants minimize the time required for civil works and structural assembly. Most units come with pre-installed wiring, conveyors, chutes, and platforms, allowing teams to focus on quick assembly. Companies that previously spent months preparing a production site can now complete installation in one-third of the time.

This efficiency boost helps miners meet production quotas quickly and recover investment sooner. It also provides a competitive advantage in Peru’s increasingly time-sensitive mining environment.

Flexible Configuration For Different Ore Types


Mining operations in Peru often handle a variety of ores—copper, gold, iron, lead, and polymetallic deposits—each requiring specific crushing parameters. Modular plants can be reconfigured to adjust capacity, incorporate different crusher types, and integrate screening or washing units as needed.

Whether operators need a high-capacity primary jaw crusher or a precision-oriented secondary unit similar to those used for stone crusher Chile(trituradora de piedra Chile) operations, modular plants allow them to adapt rapidly to changing project requirements.

Easy Transport And Rapid Site Relocation


For mining contractors and semi-mobile operations, modular plants offer exceptional mobility. Unlike traditional fixed plants, they can be dismantled and relocated with far less effort. This is especially beneficial for multi-pit operations or contractors working across several Peruvian regions.

Companies already using mobile stone crusher units benefit from combining mobility with modularity—creating hybrid configurations that maximize production efficiency and flexibility.

How Modular Plants Fit Peru’s Mining Landscape


Modular crushing plants are particularly well-suited to the operational realities and strategic objectives of Peruvian mining.

Ideal For High-Altitude And Remote Operations


Many of Peru’s most valuable deposits are located above 3,000 meters, where weather conditions change rapidly and construction logistics become challenging. Modular plants reduce onsite work, streamline equipment delivery, and simplify installation even in high-altitude terrains. Their compact footprint ensures they can be deployed where large stationary plants are impractical.

Supporting The Growth Of Mid-Sized Mining Companies


Peru’s mining ecosystem includes a large number of medium-scale operators expanding production capacity. Modular systems offer a cost-effective solution without compromising performance, allowing smaller miners to benefit from industry-level technology.

Compatible With Environmental And Safety Regulations


Modern modular crushing plants incorporate dust suppression, noise reduction, and energy-efficient motors, which support compliance with Peru’s environmental and safety standards. These features are increasingly important as government oversight strengthens and communities demand more responsible mining activity.

Practical Recommendations For Mining Investors And Operators


To ensure modular installations deliver long-term value, investors and operators should follow practical planning and operational steps.

Choose The Right Capacity Based On Ore Characteristics


Before selecting a modular plant, operators should evaluate ore hardness, abrasion characteristics, and expected throughput. Proper sizing ensures minimal downtime and optimal crusher efficiency. Conducting pilot runs or sample crushing tests can significantly de-risk the equipment selection process.

Combine Modularity With Mobile Crushing For Maximum Flexibility


Many Peruvian projects benefit from using a modular primary plant combined with a mobile stone crusher(trituradora de piedra movil) for secondary or tertiary processing. This hybrid approach improves adaptability for phased mining operations and reduces the need for permanent infrastructure at early development stages.

Ensure Long-Term Availability Of Spare Parts


When purchasing equipment, especially international brands, operators should confirm local or regional support for quick replacement of wear parts. This is particularly important for crushers applied in stone crusher in Peru scenarios, where continuous operation is essential. Establishing local inventory or consignment agreements with manufacturers can prevent costly downtime.

Plan For Future Expansion


One of the major advantages of modular plants is scalability. Mining engineers should design layouts with future modules in mind, allowing easy expansion as production targets grow. Standardized interfaces for conveyors, power, and control systems simplify later upgrades.

Conclusion


Modular crushing plants are transforming how Peruvian mining companies design and execute their material processing lines. With shorter construction cycles, flexible configurations, and improved adaptability to Peru’s diverse mining environments, they are becoming the preferred choice for operators seeking to accelerate production and reduce project risk. As demand for advanced crushing solutions grows, the integration of modular systems with complementary equipment—such as the stone crusher in Peru, stone crusher Chile, and mobile stone crusher units—will continue to shape the future of efficient, modern mining operations across the region.

Keyring, SecretStorage Error, Android Linux Dev Environment


cross-posted from: slrpnk.net/post/30244810

ProtonVPN CLI, Android Linux Dev Terminal

Hello,

First, I'm not expecting any specific amount of support, or absolute resolution, as I'm fairly certain this falls under non-standard use. So, this is for testing and experimentation. Thanks ahead of time for any help or guidance you can think of!

Testing the recent CLI program in the Linux Development Environment on a Pixel 6a, GrapheneOS, I've had an error come up.

proton.keyring_linux.core.keyring_linux:120 | ERROR | Keyring keyring.backends.SecretService.Keyring (priority: 5) error
Traceback (most recent call last):
  File "/usr/lib/python3/dist-packages/secretstorage/util.py", line 48, in send_and_get_reply
    raise DBusErrorResponse(resp_msg)
jeepney.wrappers.DBusErrorResponse: [org.freedesktop.DBus.Error.UnknownMethod] ('Object does not exist at path “/org/freedesktop/secrets/collection/login”',)

The above exception was the direct cause of the following exception:

Traceback (most recent call last):
  File "/usr/lib/python3/dist-packages/secretstorage/collection.py", line 177, in get_default_collection
    return Collection(connection)
           ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  File "/usr/lib/python3/dist-packages/secretstorage/collection.py", line 45, in __init__
    self._collection.get_property('Label')
  File "/usr/lib/python3/dist-packages/secretstorage/util.py", line 67, in get_property
    (signature, value), = self.send_and_get_reply(msg)
                          ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  File "/usr/lib/python3/dist-packages/secretstorage/util.py", line 52, in send_and_get_reply
    raise ItemNotFoundException('Item does not exist!') from resp
secretstorage.exceptions.ItemNotFoundException: Item does not exist!

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "/usr/lib/python3/dist-packages/keyring/backends/SecretService.py", line 61, in get_preferred_collection
    collection = secretstorage.get_default_collection(bus)
                 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  File "/usr/lib/python3/dist-packages/secretstorage/collection.py", line 179, in get_default_collection
    return create_collection(connection, 'Default', 'default', session)
           ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  File "/usr/lib/python3/dist-packages/secretstorage/collection.py", line 159, in create_collection
    raise PromptDismissedException('Prompt dismissed.')
secretstorage.exceptions.PromptDismissedException: Prompt dismissed.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "/usr/lib/python3/dist-packages/proton/keyring_linux/core/keyring_linux.py", line 111, in _is_backend_working
    keyring_backend.get_password(
  File "/usr/lib/python3/dist-packages/keyring/backends/SecretService.py", line 78, in get_password
    collection = self.get_preferred_collection()
                 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  File "/usr/lib/python3/dist-packages/keyring/backends/SecretService.py", line 63, in get_preferred_collection
    raise InitError("Failed to create the collection: %s." % e)
keyring.errors.InitError: Failed to create the collection: Prompt dismissed..
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX | proton.keyring_linux.core.keyring_linux:120 | ERROR | Keyring keyring.backends.SecretService.Keyring (priority: 5) error
Traceback (most recent call last):
  File "/usr/lib/python3/dist-packages/secretstorage/util.py", line 48, in send_and_get_reply
    raise DBusErrorResponse(resp_msg)
jeepney.wrappers.DBusErrorResponse: [org.freedesktop.DBus.Error.UnknownMethod] ('Object does not exist at path “/org/freedesktop/secrets/collection/login”',)

The above exception was the direct cause of the following exception:

Traceback (most recent call last):
  File "/usr/lib/python3/dist-packages/secretstorage/collection.py", line 177, in get_default_collection
    return Collection(connection)
           ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  File "/usr/lib/python3/dist-packages/secretstorage/collection.py", line 45, in __init__
    self._collection.get_property('Label')
  File "/usr/lib/python3/dist-packages/secretstorage/util.py", line 67, in get_property
    (signature, value), = self.send_and_get_reply(msg)
                          ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  File "/usr/lib/python3/dist-packages/secretstorage/util.py", line 52, in send_and_get_reply
    raise ItemNotFoundException('Item does not exist!') from resp
secretstorage.exceptions.ItemNotFoundException: Item does not exist!

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "/usr/lib/python3/dist-packages/keyring/backends/SecretService.py", line 61, in get_preferred_collection
    collection = secretstorage.get_default_collection(bus)
                 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  File "/usr/lib/python3/dist-packages/secretstorage/collection.py", line 179, in get_default_collection
    return create_collection(connection, 'Default', 'default', session)
           ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  File "/usr/lib/python3/dist-packages/secretstorage/collection.py", line 159, in create_collection
    raise PromptDismissedException('Prompt dismissed.')
secretstorage.exceptions.PromptDismissedException: Prompt dismissed.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "/usr/lib/python3/dist-packages/proton/keyring_linux/core/keyring_linux.py", line 111, in _is_backend_working
    keyring_backend.get_password(
  File "/usr/lib/python3/dist-packages/keyring/backends/SecretService.py", line 78, in get_password
    collection = self.get_preferred_collection()
                 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  File "/usr/lib/python3/dist-packages/keyring/backends/SecretService.py", line 63, in get_preferred_collection
    raise InitError("Failed to create the collection: %s." % e)
keyring.errors.InitError: Failed to create the collection: Prompt dismissed..
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX | proton.keyring_linux.core.keyring_linux:120 | ERROR | Keyring keyring.backends.SecretService.Keyring (priority: 5) error
Traceback (most recent call last):
  File "/usr/lib/python3/dist-packages/secretstorage/util.py", line 48, in send_and_get_reply
    raise DBusErrorResponse(resp_msg)
jeepney.wrappers.DBusErrorResponse: [org.freedesktop.DBus.Error.UnknownMethod] ('Object does not exist at path “/org/freedesktop/secrets/collection/login”',)

The above exception was the direct cause of the following exception:

Traceback (most recent call last):
  File "/usr/lib/python3/dist-packages/secretstorage/collection.py", line 177, in get_default_collection
    return Collection(connection)
           ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  File "/usr/lib/python3/dist-packages/secretstorage/collection.py", line 45, in __init__
    self._collection.get_property('Label')
  File "/usr/lib/python3/dist-packages/secretstorage/util.py", line 67, in get_property
    (signature, value), = self.send_and_get_reply(msg)
                          ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  File "/usr/lib/python3/dist-packages/secretstorage/util.py", line 52, in send_and_get_reply
    raise ItemNotFoundException('Item does not exist!') from resp
secretstorage.exceptions.ItemNotFoundException: Item does not exist!

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "/usr/lib/python3/dist-packages/keyring/backends/SecretService.py", line 61, in get_preferred_collection
    collection = secretstorage.get_default_collection(bus)
                 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  File "/usr/lib/python3/dist-packages/secretstorage/collection.py", line 179, in get_default_collection
    return create_collection(connection, 'Default', 'default', session)
           ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  File "/usr/lib/python3/dist-packages/secretstorage/collection.py", line 159, in create_collection
    raise PromptDismissedException('Prompt dismissed.')
secretstorage.exceptions.PromptDismissedException: Prompt dismissed.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "/usr/lib/python3/dist-packages/proton/keyring_linux/core/keyring_linux.py", line 111, in _is_backend_working
    keyring_backend.get_password(
  File "/usr/lib/python3/dist-packages/keyring/backends/SecretService.py", line 78, in get_password
    collection = self.get_preferred_collection()
                 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  File "/usr/lib/python3/dist-packages/keyring/backends/SecretService.py", line 63, in get_preferred_collection
    raise InitError("Failed to create the collection: %s." % e)
keyring.errors.InitError: Failed to create the collection: Prompt dismissed.

Given what I've seen, it's trying to access keyring, can't find relevant files, and fails to do what it's wanting.

In a stimulated environment like this, similar to maybe docker/podman as I've noticed, a 'regular' boot/initialization doesn't occur and seemingly neither does a logon. So, keyring and other relevant files, services, or utilities just may not get initialized as a program might expect or need.

Though, a keyring program seems installed, and autocomplete even works to enter the name in the terminal, that doesn't mean it's operating as needed.

Given no regular desktop environment to utilize; as the 6a seems to not function with that aspect of the Linux Dev Environment, whether that would resolve this or not; there may not be a solution here.

In the past, with the same hardware and environment, I've gotten manual configuration of OpenVPN to work with config files, so, at least at the time of that experiment, it's seemingly feasible to use ProtonVPN through that method if needed.

Thanks again for any direction or advice. I hope you're having a good weekend.

SR-IOV passing of a NIC to a VM


I cant do PCI passthru of a NIC to a OPNsense. bare metal performance wasnt great either, so I switched to openWRT and bought a different NIC capable of SR-IOV. my motherboard groups things sloppily so PCI passthrough wont work, but SR-IOV will supposedly get me most of the way there. I am just not wrapping my head around making this work.

I just need toilet paper pass the ports on the i350 NIC into the VM. I dont want the host to use them, it has its own onboard NIC for rescue usage. I just need this stupid thing to pass create the VFs at boot, pass them to the VM, and let the VM use them.

I've resorted to using chatGPT to sort through this and obviously that is not going well.

Does anyone have a guide somewhere about this? everything I'm finding is for GPUs, not NICs.

The Fedi Files #14 - Special Guest Morghur the Inkgave


The Fedi Files continues with Morghur, artist and Warhammer extroidindare.

Topics include Warhammer, gypsies, writing, character design, and Morghur features some of his art progress over the last 5 years.

Original air date 7/12/2025

This entry was edited (3 months ago)

calico in Kubernetes is so helpful, I want it everywhere


i've been mucking about with calico on my #homelab #kubernetes cluster, and it took me far far too long to visit the whisker console: docs.tigera.io/calico/latest/o…

this is unbelievably helpful for debugging firewall rules

i'm very tempted to switch to calico on my non-k8s systems now (e.g. Linux gaming PC), so i can be back to only having 1 firewall abstraction in my brain

in reply to dukatos

yeah, when I say "far far too long" I think I'm on roughly the same window of time there 🫂
that said, still manage my nftables firewall on my other systems with firewalld and those concepts of zones has never really clicked in my brain

i did try cilium first, but it currently doesn't work on Raspberry Pi 4B nodes: github.com/cilium/proxy/issues…

and now that my understanding of calico has improved, i appreciate that it works outside of Kubernetes, too

How to bi-directionally sync KeePassXC DB between Android and Manjaro without propagating deletions?


I’m trying to sync a KeePassXC database between my Android phone and my Manjaro Linux system. I want full two-way sync of changes, but I don’t want deletions on one device to remove the file on the other. What’s the best way to configure this? Tools like Syncthing seem close, but I’m not sure which folder settings or ignore rules would prevent deletion sync while still keeping both sides updated. Any guidance or examples would help. Thanks!
in reply to erebion

Many Keepass clients have support for not actually deleting entries, and instead moving them to a "Trash" subgroup inside the kdb that is ignored when searching entries. Also they usually keep track of the history of changes to each entry, to make it non-destructive.

Coupled with Syncthing typically automatically creating backups whenever it encounters conflicting changes, I feel this should be enough, at least for me personally.

This entry was edited (4 days ago)

GNOME 47 is full of big, invisible changes. Still one of the best Linux desktops out there!


Head to squarespace.com/thelinuxexperi… to save 10% off your first purchase of a website or domain using code thelinuxexperiment

Grab a brand new laptop or desktop running Linux: tuxedocomputers.com/en#

👏 SUPPORT THE CHANNEL:
Get access to:
- a Daily Linux News show
- a weekly patroncast for more personal thoughts
- polls on the next topics I cover,
- your name in the credits

YouTube: youtube.com/@thelinuxexp/join
Patreon: patreon.com/thelinuxexperiment

Or, you can donate whatever you want:
paypal.me/thelinuxexp
Liberapay: liberapay.com/TheLinuxExperime…

👕 GET TLE MERCH
Support the channel AND get cool new gear: the-linux-experiment.creator-s…

🎙️ LINUX AND OPEN SOURCE NEWS PODCAST:
Listen to the latest Linux and open source news, with more in depth coverage, and ad-free! podcast.thelinuxexp.com

🏆 FOLLOW ME ELSEWHERE:
Website: thelinuxexp.com
Mastodon: mastodon.social/web/@thelinuxE…
Pixelfed: pixelfed.social/TLENick
PeerTube: tilvids.com/c/thelinuxexperime…
Discord: discord.gg/mdnHftjkja

#linuxdesktop #gnome #gnome47 #linuxdistro #linux

Timecodes:
00:00 Intro
00:38 Sponsor: SquareSpace
01:42 Accent Colors & Visuals
05:57 Under the hood
09:06 Application Changes
13:09 Settings
14:14 Conclusion
16:09 Sponsor: Tuxedo Computers
17:11 Support the channel

You can head over to the Appearance settings and select one out of 9 different colors for your GNOME. The color you picked is used for action buttons, toggles, radio buttons, and the like, some links colors, and in the GNOME shell for some buttons, quick settings, and selected items.

KDE apps didn't follow the color I set in GNOME. Apps made using GTK but not libadwaita, also didn't apply the color. GTK 2 applications didn't grab that color. GTK 3 applications also didn't. Most annoyingly, no libadwaita app installed through Flatpak followed that accent colour either.

Another visual change is for titlebars: apps using X11, or XWayland will now get a libadwaita themes titlebar, even if the app doesn't use client side decorations.

There are also changes to some modal dialogs, in the GNOME shell, like the restart and shut down dialog, and in various places in apps and settings, for example the new folder dialog, or the "delete file" dialog.

GNOME 47 also has a lot of under the hood changes. First, it improves support for HDR, bit it's still all completely experimental. The Window Manager and the Shell themselves are also now completely X11 independent. Wayland support improved as well, with experimental support for the session management protocol. Mutter, the compositor, will also now support the DRM lease protocol, which means VR headsets are now supported under Wayland in GNOME, and you can expect some performance improvements as well, notably for mouse cursor movements, which no longer require redrawing the portions of the screen where the cursor moves.

You'll also now have hardware accelerated screen recordings in GNOME.

The file manager gained a new sidebar. Nautilus also now has a "network" view, instead of having to navigate to "other locations" to find it. Nautilus will also now be used as the file picker / save dialog inside of other apps,.

GNOME Web, also called Epiphany, now lets you automatically fill in fields inside web pages, and it now has a privacy report. Web also now lets you import passwords and bookmarks from CSVs. The bookmarks interface also received some love, you get a clear button in the address bar now, and you can turn off touch navigation gestures, as in swiping left or right with 2 fingers to navigate back and forward.

GNOME Maps gained dark mode support in its tiles so the map is also dark now, and you can now see public transport icons on the map, for supported networks.

GNOME Calendar has seen a lot of work of this time around, with a reworked event details pop-up, read only calendars now can't be edited in the event editor dialog, and the add calendar dialog was also tweaked to be clearer. They also fixed 50 different bugs in there.

As per the settings, there's a new, modernized "user add" dialog, you also gained a new option in the Accessibility panel, to activate windows when hovering them, and it's now possible to preview keyboard layouts in the input sources dialog of the keyboard settings. A few dialogs were also turned into subpages, so there shouldn't be as many little windows popping up when navigating the settings.

On Online Accounts, there's now the ability to autocoinfigure email accounts for IMAP and SMTP, Microsoft 365 accounts now siupport mail, calendar, and contacts, webDav has better autoconfig, and the desktop will send you a notification when an accounts need your attention to fix something.

On Accessibility, the screen reader received a few improvements, notably paving the way for the better accessibility framework in Wayland.

This entry was edited (7 months ago)

GNOME 46 REVIEW: the shape of things to come!


Head to squarespace.com/thelinuxexperi… to save 10% off your first purchase of a website or domain using code thelinuxexperiment

Grab a brand new laptop or desktop running Linux: tuxedocomputers.com/en#

👏 SUPPORT THE CHANNEL:
Get access to:
- a Daily Linux News show
- a weekly patroncast for more personal thoughts
- polls on the next topics I cover,
- your name in the credits

YouTube: youtube.com/@thelinuxexp/join
Patreon: patreon.com/thelinuxexperiment

Or, you can donate whatever you want:
paypal.me/thelinuxexp
Liberapay: liberapay.com/TheLinuxExperime…

👕 GET TLE MERCH
Support the channel AND get cool new gear: the-linux-experiment.creator-s…

🎙️ LINUX AND OPEN SOURCE NEWS PODCAST:
Listen to the latest Linux and open source news, with more in depth coverage, and ad-free! podcast.thelinuxexp.com

🏆 FOLLOW ME ELSEWHERE:
Website: thelinuxexp.com
Mastodon: mastodon.social/web/@thelinuxE…
Pixelfed: pixelfed.social/TLENick
PeerTube: tilvids.com/c/thelinuxexperime…
Discord: discord.gg/mdnHftjkja

#Linux #GNOME #GNOME46 #linuxdesktop #linuxdistro

Timecodes:
00:00 Intro
00:36 Sponsor: Squarespace
01:36 Desktop Improvements
04:59 Nautilus changes
06:47 New Settings
08:51 Apps changes
11:12 Parting Thoughts
13:33 Sponsor: Tuxedo
14:54 Support the channel

The main thing you'll enjoy here is some redesigned notifications. These will now show a header, to let you know which app spawned that notification, and they'll include a little symbolic icon as well.
On top of that, notifications that are pretty long, or have action buttons can also be expanded, or collapsed.

Experimental support for variable refresh rate is here, it's turned off by default, and you'll have to use dconf to turn it on. Once you do that, you'll get a switch for that feature in the Display settings, provided your display supports it, with a "preferred refresh rate" list.

(gsettings set org.gnome.mutter experimental-features "['variable-refresh-rate']")

Another change is in how fonts are rendered using fractional scaling: they're now less blurry, and will look more consistent.

Other, smaller changes include the ability to press control + super and a number to launch the associated app from your dock. You also get remote login using RDP.

The file manager, Nautilus, got way better in this release. First, you can now click the path bar to edit the location manually, instead of having to press control + L to do so.

Next is search: it now performs much faster than it used to, and the search button now does a global search directly. When transferring files, the progress bar has been moved to the bottom of the sidebar. Changing a folder icon is now much easier as well, you can just open its properties, and you have a little edit icon.

In the settings, there's a new "system" page. The mouse and touchpad settings now let you configure how you trigger the right click. You can also turn off the touchpad when typing, or disable that setting if you don't like it.

The GNOME Online accounts also received some love, notably for its backend: it now uses the default browser for authentication into accounts. You can also add a WebDAV account to get access to contacts, calendars and files, and you can add a Microsoft Personal Account as well.

GNOME Software, the app store, now shows the Verified badges on Flathub applications that have them.
GNOME Calendar gained performance improvements, which it sort of needed, and it now displays the current month a lot more visibly in the month view, so you always know where you are.

The image viewer, Loupe, now has a keyboard shortcut to permanently delete an image, it's shift + delete.

Epiphany, the web browser, now automatically retrieves app names and icons from websites using their progressive web apps manifests if they have one, so everything will already be nice and tidy when you create a web app from the browser. It also fixes some issues with how it syncs with your Firefox account, and it gained support for smart card authentication as well, meaning you can authenticate using USB devices while using Epiphany.

GNOME Maps moved their controls to the bottom of the application, and gained improvements to the vector map layer, although this one is still experimental. It also improved how favourite places work, with a default empty state explaining what favourites are.

Finally, GNOME Music has been ported to use the latest libadwaita widgets, and it removed support for Last.FM scrobbling, and the song list view. it also gained a preferences dialogue, which doesn't contain much, but still lets you set the repeat mode, enable replayGain, or inhibit suspend when playing music.

This entry was edited (7 months ago)

APPS & TOOLS to improve LINUX PRIVACY & SECURITY


Get 100$ credit for your own Linux and gaming server: linode.com/linuxexperiment

Grab a brand new laptop or desktop running Linux: tuxedocomputers.com/en#linux

👏 SUPPORT THE CHANNEL:
Get access to a weekly podcast, vote on the next topics I cover, and get your name in the credits:

YouTube: youtube.com/@thelinuxexp/join
Patreon: patreon.com/thelinuxexperiment
Liberapay: liberapay.com/TheLinuxExperime…

Or, you can donate whatever you want: paypal.me/thelinuxexp

👕 GET TLE MERCH
Support the channel AND get cool new gear: the-linux-experiment.creator-s…

🎙️ LINUX AND OPEN SOURCE NEWS PODCAST:
Listen to the latest Linux and open source news, with more in depth coverage, and ad-free! podcast.thelinuxexp.com

🏆 FOLLOW ME ELSEWHERE:
Website: thelinuxexp.com
Mastodon: mastodon.social/web/@thelinuxE…
Pixelfed: pixelfed.social/TLENick
Twitter : twitter.com/thelinuxEXP
PeerTube: tilvids.com/c/thelinuxexperime…

This video is distributed under the Creative Commons Share Alike license.

#linux #privacy #security

00:00 Intro
00:31 Sponsor: 100$ Free credit for your Linux or Gaming server
01:31 Encrypt your system or specific folders
03:36 Anti-virus
05:23 Sandboxing and application permissions
07:28 Web monitoring and blocking, & VPNs
10:08 Portable private Operating system
11:08 Web browsers & search engines
12:58 Other tools
14:40 Sponsor: Get a PC that runs Linux perfectly, from Tuxedo
15:37 Support the channel

A lot of Linux distributions will offer to encrypt your hard drive when you install them. Ubuntu, PopOS, elementary OS, and a lot more, they all have this option. If you didn't enable encryption when installing your system, you can encrypt your home folder or partition after the fact using ecrypt-utils, a command line utility.

ENCRYPTION TUTORIAL: jumpcloud.com/blog/how-to-encr…

KDE has something called Plasma Vaults, that lets you create encrypted folders with a nice graphical interface, with the ability to set different passwords for each folder.

You probably also have an anti virus, your best option will be ClamAV (and ClamTK, it's graphical interface). it detects trojans, viruses, malware and the like, it's open source, and it's completely free of charge.

But if you want to restrict permissions for Flatpak apps, then you need Flatseal. It's an application that will list all your flatpak apps and let you grant, or remove permissions to them.

If you want the benefits of a sandbox but without using Flatpak apps, you can also run any app installed from a regular package or an AppImage in a sandbox, using Firejail, and Firetools, its graphical interface.

If what you want is to make sure that the apps or services you run don't do anything weird with your internet connection, then there's Safing's Portmaster. It's open source, free of charge, and it lets you monitor every network request every part of your system makes, and restrict them as you see fit. Oh, and it also has a system wide ad and tracker blocker.

VPNs are a tool you can use to be more private online. I don't have any specific recommendations, but you can check the link I left in the description to TechLore's VPN chart to find one that is suitably private: techlore.tech/vpn.html

If you regularly use public computers, or someone else's, you might want to use TAILS, a live USB, but with persistent storage that is encrypted.

Your web browser will also be a big part of how private you are on the internet. If you prefer to stick to Chrome's rendering engine, then something like Brave will be way less intrusive and well configured by default, and if you don't want to encourage Google's monopoly on the internet, then Firefox is also very private, once you disable the opt-out telemetry in the Privacy and Security settings.

You also have LibreWolf, which is Firefox without the telemetry and with privacy focused search engines out of the box.

Speaking of which, your search engine is also something you should look at for privacy. Google or Bing are just NOT what you want for that. I personally use Ecosia as my default search engine. When Ecosia falls short, I use startpage, which is basically Google's results, but with complete anonymization of all queries, so Google doesn't know who or from where the query has been made.

VIDEO ON SEARCH ENGINES: youtube.com/watch?v=x9q3qPxrTq…

Bleachbit will let you delete cache files, cookies, internet history, temporary files, logs and more.

If you want to just completely delete any single file, then there's GNOME File Shredder.

If you need to share certain images but hide some information on it, blurring it with a gaussian blur isn't enough, as it's now relatively easy to deblur an image. Obfuscate is a simple tool that lets you hide information.

This entry was edited (5 days ago)

Confession: I don't know what passwords in Linux are for


I want to make Linux my main OS. I've used Windows for decades. Since Vista or 7, the Windows security model is this, from what I understand:

  1. unprivileged programs have limited/no ability to do scary things to your computer. they might be able to read some data, but it's not going to implant malware in the boot sequence for Windows.
  2. if a program wants escalation, it triggers a UAC popup and the user has to accept it. Remote programs cannot accept UAC on a physical person's behalf. Escalated programs have admin level control and can do the scary things.
  3. As with any OS, there may be privilege escalation vulnerabilities that escalate (1) into (2).

I've only had Windows malware a few times since Win7, and the entry point was fairly avoidable. (Running a sketchy EXE, and a possible drive-by malware install via an advertisement. I could never prove the latter.)

I have never run a password on my Windows machines.


On any system, physical access is game over.


On Linux, the password is paramount. I've tried to understand the security model and I keep failing. Synthesizing from arch wiki

SSH


Equivalent to local physical access as the user. If it's a sudoers or root account, it can do scary things. Not a threat if ssh is disabled or well secured (password or key pairs).

If a network has a well configured firewall (on the router), it should block ssh requests from outside the network unless the admin specifically wants SSH outside the network.

As with any OS, there may be bugs that allow remote access outside of SSH.

Local login / password prompts to physical users


Without a password, you can't escalate to root and install new software. Some software, often dealing with hardware (smartctl) requires sudo/root to run.

Encrypted drives


Passwords can decrypt drives if they are encrypted.

Keyrings


Some DEs (KDE) offer a 'keyring' that stores passwords. It's locked/encrypted with a password, usually the same as the login password.


So what am I missing? Is Windows + UAC + no password secure? What is Linux protecting us from by using passwords?

in reply to BigHeadMode

it sounds like a Linux password is a red herring, and a secure password even more so


Yes and no. A secure password is extremely important against some security threats, but completely useless against others. It's like vitamin C. If you don't get enough, that's a massive problem and opens you up to a ton of serious issues, same as if you don't have enough complexity in your password. But even if you do, it won't effectively protect you from, say, cancer or unprivileged malware respectively.

There's nothing stopping any program from attempting to bruteforce your Linux password, literally running through possibilities hoping to guess it. Modern password implementations usually have some form of bruteforce protection. If you've ever entered your password wrong in sudo or KDE's lock screen, it usually hangs for a few seconds before telling you your password is wrong, even though any modern computer will have determined it was wrong in literally an instant. This is to prevent a malicious program from endlessly trying random guesses until it gets it by making the time it would take to guess a sufficiently unique password too long to be practical. Your phone and optional software available for Linux go a step further, imposing longer and longer delays with each subsequent failed password attempt, and also prevents malicious programs from spawning many threads each independently calling sudo to bruteforce in parallel by completely disabling access until the time penalty elapses. Though you absolutely do need a sufficiently secure password, making it overly long has diminishing returns past a certain point, it doesn't matter how many millions of years it would take to bruteforce with a 1 second delay for wrong attempts, but the upgrade from millions of seconds with a simple password like "hunter2" to years is the important part.

Also, a password with no encryption is like a padlock on a wooden box. Even if they don't have the key, they can still just cut the box open. In computer terms this would be like if someone accessed the files in your SSD directly and injected malware with root privileges, since both completely bypass the check that's "normally" supposed to stop unauthorized users. Encryption can help but like you said, physical access is generally considered game over anyway unless they found your computer while it's off and it is never returned to you for you to enter your password. A computer with encrypted everything wouldn't be able to boot. Your EFI partition and especially your BIOS/firmware have to be unencrypted, and anything unencrypted can be tampered with by a sufficiently skilled attacker with physical access to add things like keyloggers and backdoors that sit dormant until you graciously decrypt everything for them.

Your password strength matters a lot more with encryption though. If you're going to the trouble of full disk encrypting your computer, make the password as long and random as you can practically remember. If someone is trying to decrypt your computer's drive, they've probably imaged it and are using a separate machine with no rate limiting whatsoever, and modern GPUs can do a ton of cryptographic operations in a short time. And don't use that password for your user account once decrypted.

If SSH is disabled the class of attacks to be prevented are users ‘voluntarily’ running malware pretending to be goodware.


More or less as far as I know, provided you don't have any other way of remote access (VNC, RDP, Anydesk/Teamviewer and similar, that weird Steam remote desktop app, a server running vulnerable software on an open port that can be hijacked, etc). In computing, the general rule to follow is if you don't need it, don't enable it, otherwise it's ripe for abuse. That being said, your router should be configured to block local port access from the internet anyway, but if you have another infected device on your network, that's a major threat. If you do want SSH, configure it to only accept the keys of your trusted devices and not just respond with a password prompt to any device that comes knocking.

True, but does anyone operate this way? At that point it becomes an iPad or a Chromebook.


"Trust" in computing is fickle and complicated, just like real life. At the end of the day, you have to make a decison on who and what you personally trust. An iPad or Chromebook would be the least trustworthy computers in my mind because they're locked down and administered by companies I absolutely do not trust, and though the locked down architecture does prevent other malware from infecting it, there's probably already malware by any other name on it with proper Google or Apple security signatures that came with the device from the factory.

This is the same as if your distro maintainer is untrustworthy. They could slip in malware into the official package manager or installer ISO and you'd never know. I personally trust a reputable Linux distro over the literal biggest tech corporations in the world, but I'm still putting my faith in an organization I do not control nor personally know the people in control.

Open source is more trustworthy than proprietary software because the source code is available, but even that isn't completely guaranteed to stop malicious code from making it in. The recent xz backdoor comes to mind. You're still trusting that the other people looking at the source code actually catch the malicious part, and that's not guaranteed even with the most trustworthy people when everyone working on it are overworked, stressed, and in the grip of tunnel vision to get their small part of it done like software developers tend to be, and even when that happens, it might be months or years down the line after the damage has already been done. There's a reason a full security audit of an app can cost anywhere from thousands to millions of dollars depending on how big the codebase is. Also, because the vast majority of software aren't compiled in a reproducible way, you don't really have a guarantee that the actual binary executable that's on your computer exactly matches the source code unless you go through the (usually difficult and frustrating) process of actually compiling it yourself. Sure, you can probably assume that the official binary released by the source code authors and signed with their cryptographic keys matches the source code since both come from the same place, but that's not guaranteed and you're still trusting a person or organization.

But wait, there's more! The compiler you use is itself a program that needed to be compiled by another compiler, and so on and so fourth until you literally reach the stage decades back when someone manually wrote the individual bits for the very first compiler in that chain. A malicious compiler can be made to obfuscate the fact that it's malicious, and only a manual review and reverse engineering of the raw binary (without reverse engineering software, mind you) can prove or disprove it's compromised.

Finally, there's hardware. Even if you audit every single literal bit of software, the processor itself has immense complexity that you can't audit without, 1, extremely expensive scientific equipment, and 2, destroying it in the process, and that's only one chip out of the tens of chips in a computer. Your processor could have secret instructions that bypass all security and your only real hope is to bruteforce every possible input to see what happens. And proving existence of a backdoor is intrinsically much easier than proving absence.

I'm not trying to scare you, but I do want to illustrate just how hard it is to have absolute trust in any computer. At the end of the day, you can never have a computer you completely trust unless you manually assembeled it from raw materials (not aided by any existing computer) and hand wrote every bit that goes into it. Like I said, we all need to make a decision to have faith in some person or organization we do not know. You can spend every waking minute auditing every last part of your computer, hardware and software, but then you wouldn't have time to actually use it for the things you want to do. There's no solution to this, there's only higher and lower degrees of trust and security, which only you can determine for yourself.

So no, no one operates that way, because it's impossible.

It does look like flatpaks or docker containers isolate behavior, so that’s a win.


Generally, yes, but remember there's always the possibility of a bug that allows containers to break out of containers. This is not unique to Docker, any sandbox or hypervisor can be breached if there's an exploit, just like any other software. Doesn't invalidate the value of containerization, but it must be kept in mind that nothing guaranteed to be completely safe and "malware proof."

This entry was edited (4 days ago)

Día de los Muertos Novenario Procession and Ceremony | Olvera Street, Los Angeles | 2024-11-02


Walking down Olvera Street as the Novenario procession passes by and then heading to the last nightly ceremony of the Día de los Muertos Festival for 2024⁾.
This entry was edited (1 month ago)

Lety Does Olvera Street


It was a long and busy last couple of weeks, but I made it back to Los Angeles in time for the last day of the Día de los Muretos festival on Olvera Street! There're a few hours before the Novenario procession though, so let's go hang out in some of the shops while I wait.

Some Related Video(s?)

Featured in This Video

Some Non-English Vocabulary

Alternate Titles

  • Lety Does Get Hungry
  • Lety Does Not Know How Everyone in the Shops Aren't Hungry All the Time, Right Across the Street From a Bunch of Restaurants
  • Lety Does Need to Come Back Some Day to Show Off All the Other Cool Stuff on Olvera Street
This entry was edited (1 month ago)

Lety Does the Día de los Muertos Festival at Olvera Street


So this video is kinda fucky cause I didn't super know how to show off the festival, and I also just could not get a good angle for la Danza de la Muerte, which was very unfortunate. That said, I did end up getting an excellent recording of the Novenario procession that I put on my Other Stuff channel cause I think it deserved to be its own thing, so I hope everyone goes to check that out!

And just to provide context, I just wanted to say that I not only got explicit permission to film all these ofrendas, but ofrendas and altars are a very public and shared thing in regions of Mexico that celebrate Día de los Muertos, so there's like, very little taboo in general for me to be recording all this. Especially for these specific ofrendas, as this is very much a popular tourist and community area where these are absolutely on display for educational purposes, among other reasons. So, not at all comparable to vlogging at a graveyard, just in case anyone gets weirded out.

Some Related Video(s?)

Featured in This Video

Some Non-English Vocabulary

Alternate Titles

  • Lety Does Día de los Muertos at Um, Olvera Street
  • Lety Does Not Understand Why There Were Fruits on the Ofrenda for All the Pets
  • Lety Does Assume Most People Know Dogs Don't Eat Oranges
  • Lety Does Think Someone Should've Stuck a Can of Blue Diamond on There
This entry was edited (2 weeks ago)

Lety Does Downtown Día de Los Muertos at Gloria Molina Grand Park


It's Día de Muertos season once again, and I'm commemorating the Mexican Day of the Dead by going to the grand community altar in downtown Los Angeles. Come join me on my afternoon of reflection while I talk a bit about the history of this special holiday.

Some Related Video(s?)

Featured in This Video

Some Non-English Vocabulary

Chapters

0:00 Intro
6:16 “Raíces y Resonancia”
6:56 “We Continue in Our Land”
7:32 “Through Shadows of Sacrifice, Women Carried by Hope”
8:12 “Corazón y Compasión”
8:29 “Dedicado A Nuestros Abuelos”
8:46 “THIS LAND, THESE PEOPLE, THESE SPIRITS”
9:11 “Our Spirit for Justice Never Dies”
9:52 “Esperando”
10:08 “Estamos Unido”
10:38 “Mis Abuelos”
10:52 “Immigrants Made America”
11:12 “Metamorphosis”
11:20 “My Heritage, People of Influence, honoring and remembering familia and friends who influenced our cultural pride and traditions.”
11:45 “Semillas en el Desierto: La Esperanza No Tiene Fronteras”
12:19 “El Viaje Eterno”
12:37 “Land and Spirit”
12:58 “Pets That Have Crossed Over The Rainbow Bridge”
13:21 “Death of the American Dream”
13:53 “Let Freedom Ring: Honoring Our Immigrant Ancestors”
16:22 Outro

in reply to Lety Does Stuff 🔕

Hihi! Lety here, auto-commenting from my main account (which doesn't have a 🔕 icon)!

This is how my PeerTube videos look on other Fediverse platforms!

Remotely interact with this video using an account on an ActivityPub-powered platform like Mastodon Social! Just click the “Add comment...” box under any PeerTube video and enter your Fedi handle in the pop-up. That’ll direct you to the federated post for that video on whatever platform you use.

Or, if you’re already logged in on Mastodon or wherever you're seeing this message, just look at the post I’m responding to!

Replies and favorites on that post show up as comments and likes on PeerTube, and following the account that posted it subscribes you to my videos.

Heads up, though! While some platforms might allow you to respond with custom emojis, gifs, images, polls, and reactions, most of that fancy stuff won’t show up correctly on PeerTube. The same goes for any edits you might want to make to your response unless you delete & re-draft.

If you already know all this or are tired of seeing this wall of text, you can hide these explanation posts by going to your account preferences and creating a new filter with the title and keyword “#LetyDoesPeerTubeExplainer” and all context boxes checked.

Thanks so much for watching! ⚡​⚡​⚡​

How to start as a not very tech savy person


with the recent windows news, I wanna switch to Linux. I tried mint a few years ago and was annoyed and frustrated with multiple things, like having to input the password all the time and the general ammunt of constant trouble shooting and needing a tutorial for the most basic things.

I want a distro that:
1. Is very user friendly, ideally not requiring a terminal
2. Is hard to accidentally fuck up
3. ideally doesn't require a password for every input

I basically just use my laptop to browse the web, draw in krita and use ms office apps (have been getting used to open office lately)

What do y'all suggest?

in reply to happyfullfridge

As everybody suggests, you should either try Mint again or go ZorinOS. If you have problems there are dedicated communities for asking general Linux questions so feel free to ask.

programming.dev/c/linux4noobs

lemmy.zip/c/linuxquestions

Also, LLMs are very handy for trivial questions like binding PDFs together (which can be done using pdfunite FYI). Just don't blindly execute what it says, let it explain the meaning of each part of the command.

This entry was edited (5 days ago)
in reply to happyfullfridge

I've personally started using KDE plasma shell version of fedora, its as close to being windows (in terms of technical functionality) without actually being windows. On top of this you have the fedora community, and in a time where access of information has gone to shit, you can be rest assured that someone will get to your question or you'll find an answer to a question you may have on fedora.

14 days after his birthday, my dad died last night


I guess he really wanted to make it to 84.

One silver lining is my mom and I flew to Tuscon at the start of the week, so we got to see him only a few hours before he gave up.

He was in a vegetative state already when I first saw him Tuesday night, in bed, mouth agape, getting water via sponges, unable to close his eyes anymore, having trouble breathing and certainly unable to speak.

That was only 11 days after speaking with him on the phone to wish him a happy birthday, utterly unaware that would be the last time we spoke.

I'm still in shock, being less than two hours into getting the news. My planned Saturday departure has been pushed to Tuesday so we can tie up loose ends (thankfully, most arrangements had already been made in advance).

I don't know how I'm feeling right now, and I have the luxury of still being in my hotel room while Mom contacts people ahead of meeting up and actually having to face reality.

I can say that it's a relief that he's no longer in pain -- hospice upped his morphine frequency to every two hours just yesterday as he became "more agitated," whatever that means when you can barely move your hands and nothing else.

Mom and the care staff said that he hadn't so much as blinked in days, but he did upon seeing me, and then tears welled up.

You can't really prepare for the death of a parent, no matter how steeled you think you are.

Hybrid GPU support fixed? Android sideloading is back, Valve's Linux push - Linux Weekly News


Try out Proton Mail, the secure email that protects your privacy: proton.me/mail/TheLinuxEXP

Grab a brand new laptop or desktop running Linux: tuxedocomputers.com/en#

👏 SUPPORT THE CHANNEL:
Get access to:
- a Daily Linux News show
- a weekly patroncast for more thoughts
- your name in the credits

YouTube: youtube.com/@thelinuxexp/join
Patreon: patreon.com/thelinuxexperiment

Or, you can donate whatever you want:
paypal.me/thelinuxexp
Liberapay: liberapay.com/TheLinuxExperime…

👕 GET TLE MERCH
Support the channel AND get cool new gear: the-linux-experiment.creator-s…

Timestamps:
00:00 Intro
00:38 Sponsor: Proton Mail
01:30 Red Hat and System76 working on multi GPU
04:02 Valve will change Linux gaming again
07:04 Android will still allow sideloading of unregistrered apps
08:54 Google releases device trees for recent Pixel phones
10:16 Python gets donations surge
12:12 Rust Core Utilities get closer to the GNU tools
13:42 GNOME parental controls making progress
15:18 Meta used scam ads money to fund AI and VR
18:04 Wikipedia asks AI companies to be responsible
20:08 Germany says OpenAI breached copyright for lyrics
22:23 Sponsor: Tuxedo Computers

Links:

Red Hat and System76 working on multi GPU
phoronix.com/news/Better-Linux…

Valve will change Linux gaming again
store.steampowered.com/sale/st…

Android will still allow sideloading of unregistrered apps
androidauthority.com/android-p…

Google releases device trees for recent Pixel phones
phoronix.com/news/Google-Pixel…

Python gets donations surge
thenewstack.io/psf-gets-a-dono…

Rust Core Utilities get closer to the GNU tools
linuxiac.com/rust-coreutils-0-…

GNOME parental controls making progress
blogs.gnome.org/ignapk/2025/11…

Meta used scam ads money to fund AI and VR
arstechnica.com/tech-policy/20…

Wikipedia asks AI companies to be responsible
techcrunch.com/2025/11/10/wiki…

Germany says OpenAI breached copyright for lyrics
reuters.com/world/german-court…

#linuxdesktop #linux #linuxdistro

This entry was edited (2 hours ago)

Simple Real-Time TTS on Manjaro Linux?


I'm looking for a straightforward way to get real-time text-to-speech (TTS) on Manjaro Linux. I'd like to be able to copy/paste a block of text and start listening to it right away. I've seen scripts that split text into sentences and feed them to models like the smallest Kokoro TTS. Does anyone have a simple-to-install solution or script for this on Manjaro?
This entry was edited (1 week ago)

【古罗马 AU】征兆 16


警告:含有未实施的自杀企图与性别认同焦虑。

什么事都没有发生。

埃皮卡里丝死了,阿斯佩尔死了,卢坎死了,小塞涅卡死了[^1]。

但是什么事都没有发生。

罗马的首席贞女触犯了守贞戒律。

但是什么事都没有发生。

可能因为我不算是真的。拉维尼亚站在桩桥[^2]上想着,抓紧灯芯草编的人偶——知道自己在怀念与更真实的血肉亲近。这是五月中旬的草人节,祭司团的代表们[^3]要向台伯河投下草编的人偶,祈祷过去一年的鬼魂被吸引附于草人上,随着那裹着泥沙的河水流向大海,如同下水道里的污物和处死的罪犯一样被河水带走,邪恶与不洁将如此从这城市中被驱除。

谁的鬼魂是邪恶与不洁的?拉维尼亚想。在那些过去一年的鬼魂里,埃皮卡里丝吗?鲁布里亚吗?在海伦娜之前的那个梳头女奴?首席贞女跟着其他人一起投下草人,随即抓住桥边的栏杆,在长袍底下抬起一只脚——如果把这具身体也当作邪物抛弃呢?这将近三十六年的诅咒会流去伊从未见过的海——尽管那仅仅在二十四里[^4]之外。“罗马的罪过太多了,奥斯提亚港都要堵上了,所以他们才要修新港口[^5]。”马提乌斯年轻时开过这样的玩笑。现在谁有最多的罪过?伊踮起另一只脚,如果往前倾一倾身子会怎样?

有人拉住了伊的袍子边。

拉维尼亚双手依然放在栏杆上,转头看到阿米莉亚拉着伊的长袍。

“嬷嬷,我累了。”她瘪着嘴。

拉维尼亚叹口气,双脚回到地面,蹲下来抱起小姑娘,背上的伤疤拉扯到了,但是这不算什么。“阿米莉亚,你已经七岁了。很快我就抱不动——哎哎哎别拽我的头巾!”

“再乱摸我就再也不抱你了!”一只小手讪讪从拉维尼亚的胸口缩回,伊是真的很快就不能抱她了。

埃涅阿斯坐在奈乌斯他们的营房里削着木头——他倒乐意待在自己单间里,但他今年点灯已经花了太多的油费,现在不得不想办法节约点。“哼,让我住单间,饷钱一分没涨……”他嘟嘟囔囔。

“你在削什么?”马克西姆问。

“我匕首的柄要换新的了。”他向半大小子解释,“自己做柄可以省一点钱。”

“这样省也不会发财。”阿勒斯懒洋洋地说。

“真正发财的机会来了!”马里奥鲁斯溜进了门。

“如果这又是你那些地下赌场的东西,我们才不会上当……”奈乌斯吹着嘴里的一根狗尾巴草。

“不是!维斯塔首席贞女月底办三十六岁生日宴,每个士兵发三十个银币!”
“我们辅助兵团也是每人三十个吗?”马克西姆张着嘴,这孩子还没有见过这么多钱。

埃涅阿斯试图忽略某种让人不适的东西,在快完工的木柄上雕划起来。不要说话,老家伙,这跟你没有关系。但是好似有一条无形的大蛇盘上了他,他必须要喊出声来:“没听说过!只有皇帝过生日才发钱。”

“但是大祭司和首席贞女是孪生兄妹,这钱大概也就转了一道手罢了。”当然,理论上现在是共和国了,但是这些名头对辅助兵团的奴隶士兵来说没什么区别。

“他怎么不直接自己过生日?”埃涅阿斯哼了一声。

“谁知道,反正有钱拿就行。”阿勒斯伸了个懒腰。

“当然——”奈乌斯拖腔拖调地说,“她到年龄但不退休,他就省下了婚礼和嫁妆的钱……”

“你是说贿赂来一个丈夫的钱。”马里奥鲁斯嬉笑道。

“不如拿这钱贿赂贿赂我们,免得谁又想着刺……”奈乌斯适时吞下了最后那个词。

埃涅阿斯咬住舌头让自己不要发出声音来,抓紧匕首和木头。他不知道自己在失望什么,那条盘上他的蛇在幻化成某种记忆,那记忆来自一具更温暖的身体,戴着紫红绳冠……他狠狠刻着木头。我会去赴宴,我会去看你被人困在金笼子里,而我会自由的,我还有……六年零十六天。

“请您把头巾拨开一点。”石匠说。

拉维尼亚用了全部力气抬起手,为塑像坐了太久没动就是这样,艰难地把头巾往脸侧拨了拨,检查脖子和胸部依然被布料的宽松褶皱遮掩。“没事的,他们只要雕你的头像,再安到制式的维斯塔贞女身像上去[^6]。”马提乌斯当时说。但被人如此打量,实在让首席贞女感到不安。伊想起贞女之家花园里陈列的历代首席贞女雕像,她们每一个都看起来如此自信。能不能把我的头——我真正的头安到制式的维斯塔贞女身体上去?

“我愿意出钱,马提乌斯。”哥哥提议这事时,拉维尼亚正在检查给科涅尼亚做的新长袍,小贞女们似乎全都长得飞快,“但是不要给我塑像。”

“哦,小妹妹,但是脸面就是一切。”

而你的脸面是我,拉维尼亚苦涩地想。刚逮捕处死了一批人,现在是时候展现一点怀柔手段了。“我们的生日还有几个月呢。”

“等哪个小团体去乡下的别墅密谋一个夏天再办吗?”马提乌斯摇摇头,“还是现在找理由喂军队一点东西的好。”自那天以后他再也没有提过凯旋宴会和首席贞女神圣性的可疑之处,事情似乎再次一切照常了。

“但是独裁官就要去东部行省巡游了,不是吗?”拉维尼亚剪掉一个线头。

“我留在罗马看家。”也许是因为伊的剪刀,他无意识地拨了拨额前的头发,露出了一点发际上的伤疤,“他说什么’帝国的疆域又不只是罗马‘,这时候如果我们都不在罗马还不知道谁会趁虚而入呢。”

拉维尼亚想起给他额头拆线的那天,伊剪刀冰冷的弧度贴着大祭司的额头,刀锋寻找挑开缝线的角度。他闭着双眼,轻松地抱怨是不是留疤了。拉维尼亚低头看着手里的剪刀和织物,如果那个时候自己一剪刀捅过去……但是伊突然感觉无法承受,如同哥哥几乎被刺杀那天,眼前发黑身体发冷,剪刀卡在手上勒得有些发痛。

“再说,再过几个月你也不会退休的,你知道。”孪生哥哥走近把双手放在伊肩膀上,“只要塑这一次以后全国都会从你雕像的样子记得你。”他说得好像这是什么好事。

在需要的时候石匠们可以照着那尊雕像雕出复制品来分发给各个城市,他们会以为我有制式的维斯塔首席贞女身体……拉维尼亚最后一次坐在石匠的工坊里时,依然在问自己,这是好事吗?

“好了。”石匠搓搓手上的碎屑——拉维尼亚不禁想起哥哥在农神节搓手的样子(“那就得给你找个丈夫……”),“您要看看吗?我还可以再做一些修改。”

首席贞女摇摇头,自奥古斯都以来官方造像都十分美化,无论那块大理石上雕着什么都与伊本人没有太大关系。伊扶着扶手站起身来,等着四肢再次醒转来,然后离开工坊。

“喂,你!”

埃涅阿斯在城门口被拦下,当然,这次他遇到的不是好脾气的阿斯佩尔了。

“你有带武器进城的许可证吗?”

好吧,看来刺杀事件以后他们突然想起来检查这玩意了。埃涅阿斯解下腰上的匕首,摸索新刀柄上的雕刻:“这个是……”他下定决心,“这是礼物。献给首席贞女大人的生日礼物。”那我是什么?一把自残用的匕首?某个过去的声音说。他几乎要笑出来了,这将是绝佳的讽刺。

“那你也不能带进去!”卫兵把矛在地上顿了顿,好像要强调他在此时此地的权威。

“哥们,算了。”另一个卫兵认出来匕首形状是军队的制式,“都是当兵的,想求个平安,嘿?你可以把它放到那个箱子里去,等会会把礼物一起拉进去的。”

在卫兵们密切的注视下,埃涅阿斯把他的木柄匕首放在那些精致的盒子和陶瓶之间。现在他得支钱从装备部门再买一把新匕首了,他愤愤然拉拉腰带更加确定地往城里走,今天他一定要吃回本。

宴会厅像农神节那次一样摆着一列列躺椅,仅仅是靠上去,埃涅阿斯就突然感觉有些不消化。“什么时候上菜啊!”马克西姆抱怨道。

“小子,你也该知道流程了,什么重要人物要讲话,还有一堆诸如此类的猴戏……”奈乌斯打着呵欠。

“……我们感谢她为国三十年的服务,也感谢她决定不退休,继续为罗马的社稷祈福……”大祭司的演讲还在继续。“我哥哥今天已经威胁过我,用你。”某个和大祭司很像的声音曾经说过。埃涅阿斯往那个方向看去,想首席贞女是否真能做主这个决定。

与农神节不同的是,拉维尼亚这次作全套祭司打扮,紫红镶边的白头巾在下巴上用饰针扣紧,没有在上菜而是靠在上首的一张躺椅上,看起来心思在别处——和他们上一次见面时一样。他觉得耳朵后面有些发热,在躺椅上扭了扭身子。首席贞女看过来,埃涅阿斯低头暗骂。这个春天他在工地上几乎把每件罩衫的肩膀都磨破了,今天他只好穿了最后一件好罩衫——那件他舍不得穿但终于送去洗衣坊漂洗过的蓝色衣服,跟他一块坐在末等席的同袍们多穿着未染色的罩衫,军队发的标准样式。“我在这当什么孔雀[^7] 呢?”他绝望地想,抬起头来看到拉维尼亚望来的眼睛透着喜悦,伊的脸突然活泛起来,全城绝没有这样的雕像——涂过色或没有涂过色的。

他在这里,也许他不再为上次生气了……拉维尼亚支起身来,放下脚去摸索地上的便鞋,又停住了。在这么多人的场合?伊问自己。

“我很久没见你这么高兴了。”马提乌斯说,“来见过韦斯巴芗将军,他刚从非洲回来。”

“您好。”拉维尼亚低头行礼。

“您太抬举我了。”他满脸笑纹,看起来已经过了费心掩饰秃头的年纪,“我的军旅生涯早就结束啦。”

马提乌斯回道:“我们都听说过,您在征服不列颠尼亚的时候……”

某个名词让拉维尼亚捏住长袍侧边。我们所做的一切都会给别人带来后果,伊默念。

“拙荆要我代她向您问候,她身体抱恙不能前来……”

“嘁。”过了一会,韦斯巴芗已经退回自己的座位,某位元老端着酒杯凑过来跟马提乌斯说:“那个卖骡子的乡巴佬[^8],现在正跟小安东尼亚的秘书女奴[^9]打得火热……”

现在元老院忙着用这类八卦说服大祭司他们缺乏野心。整场宴会上都是这样无足轻重的事情。

埃涅阿斯斜眼看看上首的座位,那些找首席贞女说话的男人们都穿着元老镶紫红边的白色托加袍,和伊紫红边的白头巾非常搭配。“如果她退休了,大祭司就要花婚礼和嫁妆的钱。”他出神地喃喃道。

“但是她没有,所以该我们吃点!”阿勒斯兴高采烈端着一个大盘子不知从哪冒出来,“我去元老们那边偷了剩下的烤孔雀!”装饰用的孔雀皮和尾羽还在盘子里,肉已经被吃了大半了——也许这就是为什么无人在意希腊佬的这次犯上之举,长满蓝色羽毛的皮里只有空空的胸骨狰狞地露出来。

埃涅阿斯低头看自己身上的蓝色,感觉更加不自在,尽管这蓝色比孔雀羽毛暗沉很多。他没有吃下多少东西,也喝不下赫克特搞来的好酒,认定是罗马躺椅让他消化不良。“等我退休了我绝不在我家放躺椅。”他暗自发誓,但眼下只好用别的方式消耗食物。“好小子,再多吃点。”他一直鼓励马克西姆。这十六岁的埃塞俄比亚少年手脚愈发细长,胃口惊人,末了他们鼓动他再抓一把杏干。“好了,别让他吐出来。”劳留斯紧张地说,“马克西姆,我带你回军营去。”

反正宴会已经基本结束了,他们于是都起身往外走。快到宫门口时,埃涅阿斯隔着门洞看了看——现在他能在这座城市辨别某些方向了,比如他能看到他们每天上工的朱庇特神庙,首席贞女曾经坐在那个台阶上说……他突然感觉到自己蓝色衣服下的胸腔饱满,还没有像那孔雀一样被掏空。

那匕首。一把自残用的匕首。他转头往回跑:“我忘了点东西,你们先走!”在宴会中卫兵们的确抬了些箱子进去,埃涅阿斯向他知道的每个神祈祷还来得及把匕首偷回来。

众神令他失望了——或者并没有。宴会厅已经没有其他人了,现在他看到首席贞女坐在箱子旁的地上,把玩着什么东西。他走近一点,拉维尼亚还低着头看着匕首的木柄,上面勉强有一张戴绳冠的脸,脸以下只有一些盘旋的线条。伊拉开刀鞘,把手指靠近刀尖——

“别!”他想扑上去抓伊的手,但是有什么让他定在原地。

首席贞女只是用手指比了一下刀锋,抬起头来微笑:“我想我的皮肤认得这把匕首。”

那刀尖曾经很轻地划过织物和粘连的皮肉,他咽了一下唾沫。

伊把匕首收回简单的皮制刀鞘,再次摩挲刀柄上毫不写实、绝非罗马风格的人形,模糊想起克劳狄乌斯皇帝从不列颠尼亚带回来的某面战利品盾牌:“你这雕的是谁?”

“你猜。”那个微笑给了他一点勇气。

拉维尼亚的手指摩挲过木雕的三层绳冠:“我好丑啊,又难搞。”

“真的。”他蹲下说。

“你……”首席贞女作势要打他的手,又低头去看手上的匕首,“真的可以送给我吗?”

“你要我的匕首做什么?”他想起农神节的时候伊拒绝了同一把匕首。

拉维尼亚把匕首捧在胸前好像伊在地母祭祀时抱住牛胎,语气变得有些哀求:“我想、我想至少有一样你的东西。这是我三十六岁生日,让我至少有这个吧。”因为我已经不能有很多东西了。拉维尼亚没说出来。埃涅阿斯想,如果伊要给他钱,他夺回匕首就走。但是伊没有。

“像你说的,这是你生日,你可以有这个。”他站起身来,掸掸农神节收到的蓝色罩衫,很满意地感到某种平衡,“你还可以和我一块走走——如果你想的话。”他忙不迭地补上。

埃涅阿斯站在新落成的公共澡堂门口。首席贞女为澡堂捐了钱,伊的雕像于是立在这,涂了彩色,但看起来不太对劲。

“在看什么呢?”拉维尼亚来了,绳冠已经取下,披着灰色头巾,穿着他们第二次见面时的那件粗布袍子——伊说在五月底披斗篷会太奇怪了,便回去换了衣服。他揶揄地打量雕像胸部的曲线,又转头去看拉维尼亚,暗自回忆粗布遮掩下的躯体。

伊脸红了:“只有头是我的,石匠一定美化过了。身体是批量生产的——别看了!”伊把手臂抱在胸前。

“美化吗?”埃涅阿斯看看雕像严厉的面孔,转头向身旁的人,“可是我已经看过更好的了。”

拉维尼亚拉了拉头巾来遮脸上的红晕,伊的嘴唇微微张开。公共澡堂门口人来人往,箭手预感在事情不可挽回之前必须有什么来打破这一刻——

“我是说我雕的比这个好。”

“滚。”首席贞女大人三十年来终于说出了一句粗话。

[^1] 都是上一章中在行刺未遂案(在历史上,是皮索案)中受牵连死去的人。

[^2] Pons Sublicius,罗马城最古老的桥。

[^3] 希腊历史学家Dionysius 的记载是说草人节扔草人的有祭司们、贞女们、执政官和罗马公民代表,普鲁塔克的记载提到朱庇特的祭司也在场,奥维德在 Festus 中仅提到维斯塔贞女进行这一仪式,此处模糊处理。

[^4] 此处指罗马里,一罗马里约为1479米。

[^5] 罗马附近的奥斯提亚海港因泥沙淤积堵塞,克劳狄乌斯时期于是兴修了新的港口。

[^6] 许多罗马雕像都是如此生产,头可替换。

[^7] 罗马孔雀来源印度。在竞技场的动物表演有时起当代动物园的作用,孔雀被认为是天后朱诺的代表动物,在朱诺神庙养了几只孔雀。罗马宴席也会以孔雀入菜,马赛克和壁画上也能看到孔雀装饰。

[^8] 韦斯巴芗在公元43年入侵不列颠尼亚的奥古斯塔第二军团中任副将(legate),立下许多战功。在公元51年任执政官,随后退休。公元63年,他被派往非洲行省任总督,此期间他财务状况严重,不得不将房产抵押与兄弟借债。为了解决债务问题,他开始投入骡子贸易,被当时人称为 mulio (赶骡的人)。公元 65 年,在历史上他陪尼禄巡游希腊,此处我篡改历史让他登场。他的原配妻子大多米提拉在他于公元69年登基之前去世,卒年不详。

[^9] 安东尼亚•卡尼丝(Antonia Caenis),曾是克劳狄乌斯的母亲小安东尼亚的女奴秘书。她与韦斯巴芗先是情人,后来作了他的妾。他们可能在公元65年就已经开始往来。韦斯巴芗在原配过世后没有再娶妻,在他登基后,卡尼丝除了称号以外一切与皇后尊仪无异。

Sawdust – Turning Wood Waste into Energy and Biochar


Sawdust, the fine particles left over from wood processing, is one of the most abundant industrial byproducts in timber and furniture industries. Traditionally considered waste, it has often been burned for heat, dumped in landfills, or left to accumulate, causing environmental and health concerns such as air pollution and greenhouse gas emissions. However, advances in pyrolysis technology have transformed sawdust into a valuable feedstock for biochar production and energy recovery. By converting sawdust into biochar and renewable fuels, industries can achieve waste reduction, energy efficiency, and environmental sustainability simultaneously.

The Nature of Sawdust as a Feedstock
Sawdust is primarily composed of cellulose, hemicellulose, and lignin, similar to larger wood pieces, but its fine particle size and high surface area make it uniquely suitable for thermal processing. Its low bulk density allows for easy transport and handling, while its high volatile content facilitates rapid decomposition under pyrolysis conditions.

Because sawdust is a secondary product of wood processing, it can come from a variety of wood types—hardwood, softwood, or even treated wood. The composition and moisture content vary depending on the source, affecting the yield and characteristics of both biochar and pyrolysis-derived fuels. Nevertheless, its availability and low cost make it an economically attractive feedstock for industrial-scale operations.

Pyrolysis and Biochar Production
Pyrolysis of sawdust involves heating the biomass in the absence of oxygen, typically at 400–600°C in a sawdust charcoal machine. Depending on process conditions, sawdust pyrolysis produces three main products: biochar, syngas, and bio-oil. Slow pyrolysis favors biochar formation, while fast pyrolysis enhances liquid and gaseous fuel production.

Sawdust’s small particle size enables faster heat transfer, which shortens pyrolysis time and allows for more uniform biochar formation. The resulting biochar is rich in stable carbon and often highly porous, making it suitable for soil amendment, water filtration, or as an industrial adsorbent. At the same time, the syngas and bio-oil generated can be captured and used as renewable energy, providing electricity or heat for factories, reducing reliance on fossil fuels.

Industrial Waste Management Benefits
Using sawdust for biochar production offers a practical solution to the environmental challenges posed by wood-processing waste. Open-air burning of sawdust produces smoke, particulate matter, and CO₂ emissions, contributing to air pollution and climate change. By diverting sawdust into pyrolysis systems, industries can reduce waste disposal issues while producing valuable products.

Moreover, converting sawdust into biochar allows companies to participate in circular economy models. Instead of a linear flow—cutting, processing, and discarding wood—they create a closed-loop system where byproducts are returned as functional materials for soil improvement, carbon sequestration, or industrial use.

Economic and Energy Recovery Opportunities
The economic potential of sawdust pyrolysis lies in its multi-product output. Biochar can be sold to farmers, gardeners, or environmental remediation projects, generating additional revenue. Meanwhile, the syngas and bio-oil can be used on-site to power machinery, heating systems, or small-scale electricity generation, effectively reducing energy costs for wood-processing plants.

This dual-value model—simultaneous waste management and energy recovery—enhances operational efficiency and profitability. For regions with abundant timber industries, sawdust-to-biochar systems can also create local employment opportunities, fostering green industry development.

Conclusion
Sawdust, once seen as a low-value byproduct, holds immense potential as a feedstock for pyrolysis and biochar production. By leveraging its unique properties, industries can turn wood waste into renewable energy and environmentally beneficial biochar. This approach not only addresses waste management challenges but also contributes to carbon reduction, soil enhancement, and economic efficiency, making sawdust a key player in sustainable industrial practices.

Short summary of my experience with NixOS: pain, admirations, concerns


It was a rainy weekend, and after brewing a mugfull of coffee I sat comfortably and opened my laptop that I powered off yesterday after running an sudo pacman -Syuu yesterday to keep my Arch up to date. I like keeping things nice and up-to-date you know. The first red flags came when my fingerprint recognition wasn’t working when I tried to log in – but that’s fine, I can fix that later, not a biggie. Then the bluetooth was not seeing any devices; after 20 minutes of twiggling, reinstalling, restarting services, it did ultimately find, but didn’t cast audio through that. That’s ok, we’ve been there before, right? Wait why does my dGPU not turn on? Ok, let’s try reinstalling the drivers and cleaning some of processes, restarting. Ok now my bluetooth doesn’t work again – odd. Wait dGPU also still doesn’t work, let me remove the drivers completely… oh wait you also want to remove HIP SDK? But I need that for work… I mean, sure, ok I’ll install it again.

Morning slowly drifted to late afternoon, while I realized I have not spent a minute of that time on what I originally intended to do – recreational coding (that’s what all the normal people do on weekends, right?). After ultimately fixing all my issues I sat silently staring at my laptop, realizing I’m now roughly where I left things yesterday evening, except I burnt through a good fraction of my weekend scrolling through the Arch wiki and oftentimes toxic forums, the recurring suggestion from which was “if you can’t handle it, maybe you shouldn’t have used Arch to begin with.”

Well… maybe I shouldn’t have.
...

in reply to hayk

To address some negatives:

The dot files could be generated from your nix configuration (given that they are, and usually just symlinked). This way you still keep one source of truth. Only catch is any hardcoded nix store paths from pkg stringification. Also not sure if there's an easy way to do this, besides maybe automating some way of grabbing them from your nix build. (alternatively, keep your dot files and just have nix yoink them)

The "patch for nix" is a serious downside, admittedly. VMs and containers can get you a lot of milage, but properly nixifying things can hurt and be a big time investment.

Dev shells and missing deps is the same. Updating deps is usually okay but "repackage everything" starts to feel bad. But you aren't limited to nixpkgs for deps; you can pull in other managers (conan, vc, etc) for the project. Issues may arise if packages need or expect FHS / system stuff, then you're back to patching and pain.

The benefit is that when it's done, it's done; other than maintenance / upgrades. Reproducibility is like automation: the time and effort you put in, and the tools you use, determine the quality of the result. Similarly, the costs can quickly outpace the benefits.. Requires careful allocation and wise judgement.

Nix is a silver bullet, but silver is expensive and not everyone is hunting werewolves.

This entry was edited (1 week ago)

Constructores Quito: Terrocal, innovación y compromiso en construcción


Con más de tres décadas de experiencia, Terrocal se ha consolidado como un referente clave entre los Constructores Quito, destacando por su enfoque en proyectos sostenibles, seguros y técnicamente precisos. Su trayectoria abarca la planificación, diseño arquitectónico y ejecución de infraestructuras relevantes que impulsan el desarrollo urbano y económico de la región. La empresa se caracteriza por aplicar prácticas responsables que minimizan el impacto ambiental y maximizan la eficiencia, cumpliendo con altos estándares de calidad.

Terrocal no solo construye estructuras, sino que genera valor mediante soluciones integrales que atienden desde la concepción del proyecto hasta su finalización, siempre con una gestión rigurosa y profesional. Su equipo altamente capacitado garantiza la seguridad y el bienestar de todas las partes involucradas, colaborando estrechamente para alcanzar objetivos comunes con ética, honestidad y transparencia. Esta dedicación convierte a Terrocal en un socio estratégico para cualquier iniciativa constructiva en Quito.

La sólida reputación de Terrocal se basa en su compromiso total con cada proyecto, entregando resultados que superan expectativas y contribuyen al progreso sostenible de las comunidades. Al elegir Terrocal, los clientes optan por una empresa que integra innovación tecnológica, responsabilidad social y excelencia técnica, reafirmando su liderazgo entre los constructores en Quito.

Is there a way to mount/unmount network drive as needed


I've 2 network drives on one subnet (nfs and samba). I would like to access them only if computer is connected to particular ssid (subnet).

I'm using gnome primarily. And files stops responding if mount points can't be accessed. There is no real way to recover from this apart from connecting to network, unmount and then change network.

I would like those drives to be accessed by system only if they are reachable.

in reply to rando

When using gnome you’re supposed to not have specific filesystems mounted if they’re not gonna be available.

The proscribed solution is to use systemd to figure out if those mount points are available and mount them, but that would have to be coming off networkd instead of fstab which it sounds like is what you’re using.

A script to figure out if the server you want is available before mounting the filesystem would be easy, but a bad idea because that should be handled by your init system (probably systemd as above).

You could also just abandon gnome and use something else.

in reply to rando

Man that makes me feel old, apparently konqueror was the kde web browser!

So if I access a smb network share in pcmanfm-qt then switch networks my cursor turns into the watch when I try to click stuff in the share but nothing is hung or stuck and I can just click off it and even unmount using the eject icon beside the share name.

This is using Debian 13 with lxqt.