POPULARITY
Categories
The episode discusses the concept of Minimum Viable Continuous Delivery (Minimum CD), which represents a counter-movement to heavyweight frameworks like SAFe. The hosts explore how Minimum CD provides a set of essential practices for successfully building software-based products without unnecessary complexity. The approach focuses on core principles rather than rigid frameworks, making it particularly relevant for embedded systems development.The discussion covers the fundamental requirements for continuous delivery, including automated testing, pipeline-driven deployments, and trunk-based development. The hosts emphasize that while these practices may seem challenging for embedded systems, they become increasingly important as devices become more sophisticated and connected.A key theme throughout the episode is the importance of building trust in the development process through automation, consistent practices, and cultural commitment. The hosts stress that while some practices may seem difficult to implement in embedded systems, the more challenging they are, the more valuable they become when successfully implemented.Timestamps and Topics:00:00:00 - Introduction and overview of Minimum CD00:02:00 - Discussion of Minimum CD as counter-movement to complex frameworks00:03:45 - Continuous Integration fundamentals00:15:35 - Pipeline as the only way to deploy00:27:00 - Production-like test environments00:29:45 - Rollback capabilities for connected devices00:32:25 - Configuration deployment with artifacts00:34:50 - Trunk-based development principles00:39:30 - Automated testing requirements00:41:10 - Maintaining delivered work integrity00:45:55 - Wrap-up and closing thoughtsShownotes:Link to minimumcd.org: https://minimumcd.org/ Reference to Brian Finster as instigator of Minimum CD Reference to Raymond Chen's blog about Windows backward compatibility Reference to previous episode on trunk-based development Reference to interviews with Philip Johnston from Embedded Artistry Reference to interview with Francois from Mend Fault Link to Agile Embedded Slack group You can find Jeff at https://jeffgable.com.You can find Luca at https://luca.engineer.Want to join the agile Embedded Slack? Click here
News includes Phoenix 1.8.0-rc release with DaisyUI styled Tailwind components and magic link authentication, a new design pattern called "scopes", a new privacy-focused feature in Ecto for schema redaction, the Elixir Secure Coding Training project finding a new home at TvLabs, a helpful iex shell tip for multiline commands, and more! We interview Krzysztof Nalepa, the primary creator of LiveDebugger, discussing how this powerful tool helps debug LiveView states and structures, how the project originated, upcoming features, and more. Show Notes online - http://podcast.thinkingelixir.com/249 (http://podcast.thinkingelixir.com/249) Elixir Community News https://paraxial.io/ (https://paraxial.io/?utm_source=thinkingelixir&utm_medium=shownotes) – Paraxial.io is sponsoring today's show! Sign up for a free trial of Paraxial.io today and mention Thinking Elixir when you schedule a demo for a limited time offer. https://phoenixframework.org/blog/phoenix-1-8-released (https://phoenixframework.org/blog/phoenix-1-8-released?utm_source=thinkingelixir&utm_medium=shownotes) – Phoenix 1.8.0-rc released with DaisyUI styled Tailwind components, magic link authentication, revised layouts, and new scopes pattern for data access and authorization. https://elixirforum.com/t/phoenix-1-8-0-rc-0-released/70256 (https://elixirforum.com/t/phoenix-1-8-0-rc-0-released/70256?utm_source=thinkingelixir&utm_medium=shownotes) – Discussion forum post about the Phoenix 1.8.0-rc.0 release. https://github.com/phoenixframework/phoenix/blob/b1c459943b3279f97725787b9150ff4950958d12/CHANGELOG.md (https://github.com/phoenixframework/phoenix/blob/b1c459943b3279f97725787b9150ff4950958d12/CHANGELOG.md?utm_source=thinkingelixir&utm_medium=shownotes) – Changelog detailing the few deprecations in Phoenix 1.8. https://hexdocs.pm/phoenix/1.8.0-rc.0/scopes.html (https://hexdocs.pm/phoenix/1.8.0-rc.0/scopes.html?utm_source=thinkingelixir&utm_medium=shownotes) – New scopes guide in Phoenix 1.8, designed to make secure data access the default. https://github.com/elixir-ecto/ecto/pull/4599 (https://github.com/elixir-ecto/ecto/pull/4599?utm_source=thinkingelixir&utm_medium=shownotes) – Privacy/security focused PR merged into Ecto adding a @schema_redact module attribute to make redacting fields easier. https://bsky.app/profile/nezteb.net/post/3lm6nbpgelk2b (https://bsky.app/profile/nezteb.net/post/3lm6nbpgelk2b?utm_source=thinkingelixir&utm_medium=shownotes) – Bluesky post about the new Ecto schema redaction feature. https://github.com/erlef/elixir-secure-coding (https://github.com/erlef/elixir-secure-coding?utm_source=thinkingelixir&utm_medium=shownotes) – Elixir Secure Coding Training (ESCT) project, an interactive cybersecurity curriculum for Elixir teams, has found a new maintainer in TvLabs. https://bsky.app/profile/davelucia.com/post/3llwjpgsrgs2u (https://bsky.app/profile/davelucia.com/post/3llwjpgsrgs2u?utm_source=thinkingelixir&utm_medium=shownotes) – Announcement about the ESCT project maintainership transition, with plans to eventually move it to the EEF. https://bsky.app/profile/bobbby.online/post/3llwpqtwwf22r (https://bsky.app/profile/bobbby.online/post/3llwpqtwwf22r?utm_source=thinkingelixir&utm_medium=shownotes) – Tip for Elixir users - setting export VISUAL=youreditorof_choice allows entering multiline commands in iex shell by pressing ESCAPE+o. https://dep-mcp.9elements.com/ (https://dep-mcp.9elements.com/?utm_source=thinkingelixir&utm_medium=shownotes) – Daniel Hoelzgen created a new MCP Server that brings package repository awareness for Hex.pm and other package managers to code editors supporting Model Context Protocol. https://x.com/brainlid/status/1909600607935381553 (https://x.com/brainlid/status/1909600607935381553?utm_source=thinkingelixir&utm_medium=shownotes) – Configuration instructions for using the dep-mcp server in Cursor. https://elixirconf.com/ (https://elixirconf.com/?utm_source=thinkingelixir&utm_medium=shownotes) – ElixirConf US 2025 in Orlando is open for submitting talks (deadline Apr 29) and workshops (deadline Apr 15). https://x.com/elixirconf/status/1907843035544826137 (https://x.com/elixirconf/status/1907843035544826137?utm_source=thinkingelixir&utm_medium=shownotes) – Announcement about ElixirConf US 2025 with information about joining the waitlist for pre-sale tickets. Do you have some Elixir news to share? Tell us at @ThinkingElixir (https://twitter.com/ThinkingElixir) or email at show@thinkingelixir.com (mailto:show@thinkingelixir.com) Discussion Resources https://github.com/software-mansion/live-debugger (https://github.com/software-mansion/live-debugger?utm_source=thinkingelixir&utm_medium=shownotes) https://elixirforum.com/t/livedebugger-tool-for-debugging-liveview-apps/69668 (https://elixirforum.com/t/livedebugger-tool-for-debugging-liveview-apps/69668?utm_source=thinkingelixir&utm_medium=shownotes) https://blog.swmansion.com/introduction-to-livedebugger-a-tool-for-debugging-phoenix-liveview-apps-bf7e56ab00fb (https://blog.swmansion.com/introduction-to-livedebugger-a-tool-for-debugging-phoenix-liveview-apps-bf7e56ab00fb?utm_source=thinkingelixir&utm_medium=shownotes) https://github.com/esl/MongooseIM (https://github.com/esl/MongooseIM?utm_source=thinkingelixir&utm_medium=shownotes) https://swmansion.com/ (https://swmansion.com/?utm_source=thinkingelixir&utm_medium=shownotes) https://membrane.stream/ (https://membrane.stream/?utm_source=thinkingelixir&utm_medium=shownotes) https://react.dev/learn/react-developer-tools (https://react.dev/learn/react-developer-tools?utm_source=thinkingelixir&utm_medium=shownotes) https://github.com/JohnnyCurran/TimeTravel (https://github.com/JohnnyCurran/TimeTravel?utm_source=thinkingelixir&utm_medium=shownotes) https://github.com/ash-project/igniter/ (https://github.com/ash-project/igniter/?utm_source=thinkingelixir&utm_medium=shownotes) Guest Information - https://x.com/swmansion (https://x.com/swmansion?utm_source=thinkingelixir&utm_medium=shownotes) – Software Mansion on Twitter/X - https://bsky.app/profile/swmansion.com (https://bsky.app/profile/swmansion.com?utm_source=thinkingelixir&utm_medium=shownotes) – Software Mansion on Bluesky - https://github.com/software-mansion/live-debugger (https://github.com/software-mansion/live-debugger?utm_source=thinkingelixir&utm_medium=shownotes) – LiveDebugger on Github - https://blog.swmansion.com/ (https://blog.swmansion.com/?utm_source=thinkingelixir&utm_medium=shownotes) – Software Mansion Site - https://x.com/kraleppa (https://x.com/kraleppa?utm_source=thinkingelixir&utm_medium=shownotes) – Krzysztof on Twitter/X - https://bsky.app/profile/kraleppa.bsky.social (https://bsky.app/profile/kraleppa.bsky.social?utm_source=thinkingelixir&utm_medium=shownotes) – Krzysztof on Bluesky - https://github.com/kraleppa (https://github.com/kraleppa?utm_source=thinkingelixir&utm_medium=shownotes) – Krzysztof on Github Find us online - Message the show - Bluesky (https://bsky.app/profile/thinkingelixir.com) - Message the show - X (https://x.com/ThinkingElixir) - Message the show on Fediverse - @ThinkingElixir@genserver.social (https://genserver.social/ThinkingElixir) - Email the show - show@thinkingelixir.com (mailto:show@thinkingelixir.com) - Mark Ericksen on X - @brainlid (https://x.com/brainlid) - Mark Ericksen on Bluesky - @brainlid.bsky.social (https://bsky.app/profile/brainlid.bsky.social) - Mark Ericksen on Fediverse - @brainlid@genserver.social (https://genserver.social/brainlid) - David Bernheisel on Bluesky - @david.bernheisel.com (https://bsky.app/profile/david.bernheisel.com) - David Bernheisel on Fediverse - @dbern@genserver.social (https://genserver.social/dbern)
In Episode 51 of the Nextflow podcast, Phil Ewels and Ben Sherman discuss Nextflow's upcoming strict syntax - a significant evolution bringing clearer error messages and a more consistent language framework. They explore key changes including the separation of code from declarations, removal of for/while loops in favour of operators, and changes to type annotations. Learn how these improvements lay the groundwork for better developer experiences with features like static type checking and auto-formatting. The episode covers migration timelines, practical steps to prepare, and how these changes will ultimately lead to more robust, maintainable pipeline code. Check out the Nextflow docs for the "Updating Nextflow Syntax" guide to start preparing today.00:00 Podcast Ep51: Strict Syntax00:07 Welcome and introduction01:20 Language server background04:18 Syntax sugar is just empty calories06:50 Bespoke language syntax08:20 To DSL3 or not 2 DSL10:59 Nextflow versioning15:13 Diving into specifics16:08 Mixing statements with script declarations19:19 Better inspect command21:08 Custom Classes23:32 For loops, while and switch26:02 Standard library26:56 Type annotations28:49 addParams32:26 Process script section34:20 Moving into lib/36:36 Configuration syntax41:14 Relieving pressure from the config43:38 Timelines44:55 The gain for the pain47:54 Next steps48:43 Conclusion
This show has been flagged as Clean by the host. Intro Hello, this is your host, Archer72, for Hacker Public Radio. In this episode, this is my third show involving my record player. I am using a Zoom H1essential Stereo Handy Recorder microphone, recording into Audacity for this show. Why visit the record shop? Picking up a record at the record shop expands my music choices. I get a chance to talk to the owner on the weekend when searching for new music. He is an archaeologist and a teacher at a local college during the week, and is knowledgeable on all the music in the store. One Year With the Institute - Archive.org I wanted a way to listen to the records while on my laptop, preferably with headphones, as to not disturb the household. How is this accomplished? This is done using a combination of Darkice to capture the stream, and Icecast to stream it to the local network. What is Icecast? Icecast is a streaming media (audio/video) server which currently supports Ogg (Vorbis and Theora), Opus, WebM and MP3 streams. It can be used to create an Internet radio station or a privately running jukebox and many things in between. It is very versatile in that new formats can be added relatively easily and supports open standards for communication and interaction. Icecast is distributed under the GNU GPL, version 2. The default config file is located in /usr/share/doc/icecast2/icecast.xml.dist.gz icecast.xml.dist if the default config gets mangled or corrupted by myself. Several other types of configs are also in /usr/share/doc/icecast2/ that include a bare bones config and the installed icecast2 config is located in /etc/icecast2/icecast.xml Configuration needed to be personalized Cynthiana,KY ricemark20.nospam@nospam.gmail.com Change the passwords from hackme to a more secure password hackme hackme admin hackme 192.168.x.x mountPoint = live # mount point of this stream on the IceCast2 server name = DarkIce Vinyl Stream # name of the stream description = This is my Vinyl stream # description of the stream url = http://localhost # URL related to the stream genre = Podcast # genre of the stream public = yes # advertise this stream? localDumpFile = recording.ogg # Record also to a file metadata = yes # enable metadata What is Darkice? DarkIce is a live audio streamer designed to record audio from an audio interface, such as a sound card, encode it, and send it to a streaming server. It supports various streaming servers including IceCast 1 and 2, ShoutCast, and Darwin Streaming Server. DarkIce can encode audio in formats like MP3 and Ogg Vorbis. To use DarkIce, you configure it with settings such as the audio input device, sample rate, and streaming server details, including the server's address, port, and authentication information. This description of Darkice is a result of using the Brave Search LLM, or Large Language Model. The default config file is located in /usr/share/doc/darkice/examples/darkice.cfg.gz and is copied to the /etc directory. From there, use the gunzip command, for example gunzip darkice.cfg.gz I used the config file from a blog by Steffen Müller on stmllr.net August 10, 2012 as a template for my configuration darkice.cfg This is the configuration I used in the end. darkice-pi.cfg Changes to the template The audio device is configured in the [input] section, defined by arecord dash lowercase ‘L' to list the capture device, which in my case is the Behringer UMC202HD USB Audio Interface [general] duration = 0 # duration of encoding, in seconds. 0 means forever The section of the config file for audio input looks like this. [input] device = plughw:0,0 # This refers to card 0, device 0 Start Darkice darkice & Update Metadata I was looking for a way to update the Currently Playing metadata, but my coding skills are not too good. For this, I used Claude.ai to generate code from the prompt: BASH script to send HTTP request to change metadata on icecast stream update-metadata.sh Default values HOST="localhost" # 192.168.x.x PORT="8000" # Default Icecast port MOUNT="/stream" USER="admin" PASSWORD="hackme" # Icecast admin password SONG="Unknown" Usage update-metadata.sh -s "HPR Test" If there are any suggestions for improvements, please leave a comment or upload a show. I look forward to hearing about if an how other people are using a personal streaming server. Also, I am looking forward to the show from the Reserve Queue, 2024-10-13 Fred Black What LP records do I have Other References Radiostreaming for Beginners Provide feedback on this episode.
#circuitpythonparsec Here's a demo of Feather RP2040 USB Host running a USB gamepad to read data and remap button presses inside of CircuitPython. https://learn.adafruit.com/adafruit-feather-rp2040-with-usb-type-a-host/usb-host-read-data https://github.com/jedgarpark/parsec/blob/main/2025-03-25/ https://www.adafruit.com/product/5723 Learn about CircuitPython: https://circuitpython.org Visit the Adafruit shop online - http://www.adafruit.com ----------------------------------------- LIVE CHAT IS HERE! http://adafru.it/discord Subscribe to Adafruit on YouTube: http://adafru.it/subscribe New tutorials on the Adafruit Learning System: http://learn.adafruit.com/ -----------------------------------------
May The Farce Be With You continues on as we discuss the three Family Guy Star Wars episodes; Blue Harvest, Something, Something, Something, Dark Side, and It's A Trap. Do these episodes not work for the uninitiated Family Guy viewers, or do they stand alone in the annals of Star Wars parody-dom? To find the answer you better prepare flowers for Alderaan and fix your bent dong action heroes or Darth Maul will get dat ass. Turn up your headphones, dial back your sensibilities, and join the wretched hive of scum and villainy as we take the low road to resistance on Season Five, Episode Forty of Force Insensitive!Send Email/Voicemail: mailto:forceinsensitive@gmail.comDirect Voice Message: https://www.speakpipe.com/ForceInsensitiveStart your own podcast: https://www.buzzsprout.com/?referrer_id=386Use our Amazon link: http://amzn.to/2CTdZzKFB Group: https://www.facebook.com/groups/ForceInsensitive/Twitter: http://twitter.com/ForceNSensitiveFacebook: http://facebook.com/ForceInsensitiveInstagram: http://instagram.com/ForceInsensitive
Temporal Execution Framework: Unix AT Utility for AWS Resource OrchestrationCore MechanismsUnix at Utility ArchitectureKernel-level task scheduler implementing non-interactive execution semanticsPersistence layer: /var/spool/at/ with priority queue implementationDifferentiation from cron: single-execution vs. recurring execution patternsSyntax paradigm: echo 'command' | at HH:MMImplementation DomainsEFS Rate-Limit CircumventionAPI cooling period evasion methodology via scheduled executionUse case: Throughput mode transitions (bursting→elastic→provisioned)Constraints mitigation: Circumvention of AWS-imposed API rate-limitingImplementation syntax: echo 'aws efs update-file-system --file-system-id fs-ID --throughput-mode elastic' | at 19:06 UTCSpot Instance Lifecycle ManagementTermination handling: Pre-interrupt cleanup processes Resource reclamation: Scheduled snapshot/EBS preservation pre-reclamationCost optimization: Temporal spot requests during historical low-demand windowsUser data mechanism: Integration of termination scheduling at instance initializationCross-Service OrchestrationLambda-triggered operations: Scheduled resource modificationsEventBridge patterns: Timed event triggers for API invocationState Manager associations: Configuration enforcement with temporal boundariesPractical ApplicationsWorker Node IntegrationDeployment contexts: EC2/ECS instances for orchestration centralizationCascading operation scheduling throughout distributed ecosystemCommand simplicity: echo 'command' | at TIMEResource ReferenceAdditional educational resources: pragmatic.ai/labs or PIML.comCurriculum scope: REST, generative AI, cloud computing (equivalent to 3+ master's degrees)
Outages connected to configuration mishaps were a common theme last year, and we've continued to see incidents like these in 2025. Configuration changes triggered two consecutive Asana outages in early February, and configuration or update-related issues may also have contributed to recent disruptions at Barclays, ChatGPT, Jira, and Discord.Tune in to hear The Internet Report's Mike Hicks unpack these incidents and discuss ways ITOps teams can guard against similar issues.———CHAPTERS:00:00 Intro01:06 Asana Outages11:40 ChatGPT Disruption19:34 Barclays Outage21:57 Jira Outage22:59 Discord Outage24:31 By the Numbers30:15 Get in Touch———For additional insights, check out The Internet Report's latest blog: https://www.thousandeyes.com/blog/internet-report-configuration-mishaps-asana-outages?utm_source=transistor&utm_medium=referral&utm_campaign=fy25q3_internetreport_q3fy25ep2_podcastAnd to learn more about how to deliver seamless digital experiences in a distributed IT landscape, read this eBook: https://www.thousandeyes.com/resources/guide-to-next-generation-assurance-ebook?utm_source=transistor&utm_medium=referral&utm_campaign=fy25q3_internetreport_q3fy25ep2_podcast ———Want to get in touch?If you have questions, feedback, or guests you would like to see featured on the show, send us a note at InternetReport@thousandeyes.com. Or follow us on LinkedIn or X at @thousandeyes.
Outages connected to configuration mishaps were a common theme last year, and we've continued to see incidents like these in 2025. Configuration changes triggered two consecutive Asana outages in early February, and configuration or update-related issues may also have contributed to recent disruptions at Barclays, ChatGPT, Jira, and Discord. Tune in to hear The Internet Report's Mike Hicks unpack these incidents and discuss ways ITOps teams can guard against similar issues. ——— CHAPTERS: 00:00 Intro 01:06 Asana Outages 11:40 ChatGPT Disruption 19:34 Barclays Outage 21:57 Jira Outage 22:59 Discord Outage 24:31 By the Numbers 30:15 Get in Touch ——— For additional insights, check out The Internet Report's latest blog: https://www.thousandeyes.com/blog/internet-report-configuration-mishaps-asana-outages?utm_source=soundcloud&utm_medium=referral&utm_campaign=fy25q3_internetreport_q3fy25ep2_podcast And to learn more about how to deliver seamless digital experiences in a distributed IT landscape, read this eBook: https://www.thousandeyes.com/resources/guide-to-next-generation-assurance-ebook?utm_source=soundcloud&utm_medium=referral&utm_campaign=fy25q3_internetreport_q3fy25ep2_podcast ——— Want to get in touch? If you have questions, feedback, or guests you would like to see featured on the show, send us a note at InternetReport@thousandeyes.com. Or follow us on LinkedIn or X. ——— ABOUT THE INTERNET REPORT This is The Internet Report, a podcast uncovering what's working and what's breaking on the Internet—and why. Tune in to hear ThousandEyes' Internet experts dig into some of the most interesting outage events from the past couple weeks, discussing what went awry—was it the Internet, or an application issue? Plus, learn about the latest trends in ISP outages, cloud network outages, collaboration network outages, and more. Catch all the episodes on YouTube or your favorite podcast platform: - Apple Podcasts: https://podcasts.apple.com/us/podcast/the-internet-report/id1506984526 - Spotify: https://open.spotify.com/show/5ADFvqAtgsbYwk4JiZFqHQ?si=00e9c4b53aff4d08&nd=1&dlsi=eab65c9ea39d4773 - SoundCloud: https://soundcloud.com/ciscopodcastnetwork/sets/the-internet-report
Two years later, interest in CPQ and AI remains strong. While AI is now widely used daily for various tasks, CPQ adoption of AI is less clear. Although many vendors have announced AI capabilities (or rebranded existing machine learning as AI, which is technically accurate), it's still unclear what AI features customers truly need in CPQ solutions. Therefore, I explored what different language models suggest by asking them some basic questions. I encourage you to listen to their responses and use these tools for your own research, both before selecting a CPQ solution and after it's installed.
Welcome to Episode 395 of the Microsoft Cloud IT Pro Podcast. In this episode, we dive into Azure Virtual Desktop (AVD) and how it enables organizations to deliver secure, scalable Virtual Desktop Infrastructure (VDI) in the cloud. Whether you're looking to modernize remote work, enhance security, or optimize IT costs, AVD provides a flexible solution for accessing virtualized Windows desktops and applications from anywhere.Topics covered include: What is Azure Virtual Desktop? A breakdown of AVD's features, benefits, and common use cases. Deployment essentials – Setting up host pools, session hosts, and assigning users. Configuration best practices – Managing user profiles with FSLogix and securing AVD with Microsoft Intune. Cost estimation – Key factors affecting pricing and how to optimize expenses. Getting started – Steps to connect via the Remote Desktop client on multiple platforms. Whether you're an IT admin or just exploring VDI in Azure, this episode is packed with insights to help you get started. Tune in and take your remote desktop strategy to the next level! Your support makes this show possible! Please consider becoming a premium member for access to live shows and more. Check out our membership options. Show Notes Azure Virtual Desktop documentation Understand and estimate costs for Azure Virtual Desktop Azure Virtual Desktop Azure Virtual Desktop documentation for users Get started with the Remote Desktop client FSLogix for user profiles Managing with Intune Manage the operation system of sessions hosts (with Intune) About the sponsors Would you like to become the irreplaceable Microsoft 365 resource for your organization? Let us know!
This show has been flagged as Clean by the host. What Is The Indie Archive? I'm Hairy Larry and you're listening to the Plain Text Programs podcast. The Indie Archive is a archival solution for indie producers. Since most indie producers run on a shoestring budget it's important that the Indie Archive is inexpensive to install and run. It's especially important that monthly expenses are minimal because a reasonable expense most months will sometimes be more than an indie producer can afford during some months. The first major constraint is cost. So I'll be talking about prices a lot in this podcast and get more technical in future podcasts about The Indie Archive. Indie Archive is an archival system which is different than a backup system. If you don't have a backup system do that first. My backup system uses the same tools as Indie Archive, rsync and rsnapshot. My brother uses the online backup service Carbonite. There are many other options. A good backup system runs automatically to back up everything frequently and preserve version history. It's also good to have backups offsite. An archival system, like Indie Archive, keeps multiple redundant copies across several hard drives on several systems in multiple locations. An archival system also checks file integrity as protection against file corruption or user error. When you have a project you really never want to lose, like a finished novel, a music album, a video, or any other major effort that involves significant work, that's when you need an archival system. So The Indie Archive does not automatically backup your projects every day. That's what your backup system should do. The Indie Archive is an archival system where the producer of the content decides what needs to be archived and when it needs to be archived and then manually moves a directory containing the files onto the Indie Archive carefully preserving the file's metadata during the transfer. Then these files are propagated over at least 7 hard drives on 4 different systems in three locations. File integrity checks are run daily comparing the files and reporting discrepancies. Two of the systems are kept in the studio where the content is produced. I call them the primary and secondary systems. They have a boot drive and two data drives each. One of the systems is kept offsite at a nearby location. I call it the remote system. It also has a boot drive and two data drives. If you have a more distant location where you can put a second remotes system you can have remotenear and remotefar systems. Otherwise ... The final system is somewhere in the cloud provided by a professional data storage provider. It has a single copy of the data and usually some additional data retention. The provider makes the backups of this data. This is the part that might involve a monthly bill. So, depending on the size of your file set, it could be free or it could cost so much a month. There are a lot of options for cloud storage providers. But first I'm going to discuss the three systems, primary, secondary, and remote, and how they function. As far as the hardware goes the systems are the same. Now, I"m a Linix guy and I do all my production work on Linux so I'm using Linux. I want to test the system on several versions of Linux and with BSD. I'm not a Mac guy or a Windows guy so I won't be going there. The software is open source and the required programs run on all three platforms so I'll let a Mac or Windows programmer test The Indie Archive for their systems. My guess is that the Mac fork will be easier than the Windows fork because of the file metadata. It might even be possible to add Mac folders to The Indie Archive running Linux but I'll let someone who actually has a Mac figure that out. I don't think the same is true for Windows. Windows file metadata is different and so if you want to preserve the metadata you will probably have to install The Indie Archive on Windows systems. So, I'm developing and deploying on Linux and I will also test on BSD. So far I have tested Debian, Ununtu, FreeBSD, Midnight BSD, and Xubuntu and The Indie Archive works fine all of these operating systems. So, back to the hardware. Pretty much any older system that will support at least three sata drives will work. I'm using older business class desktops, Dell and HP. I pulled mine out of storage but they are very inexpensive to buy if you're not like me with a shed full of old computer stuff. I just bought a Small Form Factor HP Desktop on ebay for $30 including tax and shipping. To clarify, it's best if the primary system supports 4 sata drives. The secondary and remote systems do not need an optical drive so they should support three sata drives but they can be run on two sata drives if you boot from the primaryfile drive. I am currently testing a remote system with two sata drives running Midnight BSD. The Dell desktops made a big deal about being green. I am open to suggestions on what would be the best energy efficient systems for The Indie Archive, because of both the cost of electricity and the impact on the environment. There are three drives on each system, a boot drive and two data drives. The boot drives can be SSD or spinning hard drives and need to be big enough to hold the OS comfortably. The data drives need to be large enough to hold the files you want to archive and they should be high quality spinning drives, I use the multi terrabyte HGST drives and I am also looking at some Dell drives made by HGST. There will be a data drive and a snapshot drive on each system. If they are not the same size the snapshot drives should be larger. I am testing with 3 terrabyte data drives and 4 terrabyte snapshot drives. Besides the main data set that is being archived the snapshot drives also hold the version history of files that have been deleted or changed. So, that's why they should be the larger drive. So my primary system has a primaryfiles directory with a 3 terrabyte drive mounted to it and a primarysnapshots directory with a 4 terrabyte drive mounted to it. Same for the secondary and remote systems. Now, so far I only had to buy one drive but generally speaking the six data drives will be the major expense in assembling the systems. So a good bargain on six 4 terrabyte drives could be $120 used or $270 new. And this is the most expensive part. I install used HGST drives all the time and rarely have problems with them. I have worked for clients who won't buy used, only new. Since the file integrity checks should give early warning on a drive failure and since there is a seven drive redundancy on the data files, if I were buying drives for The Indie Archive I'd go with six used 4 terrabyte HGST drives for $120. There is no reason not to use drives all the same size as long as the snapshot drives are large enough. The size of data drives you need depends on the size of your projects and the time it takes to do a project. Look at your hard drives on your working systems. Think about what directories you would like to see in archival storage. What is the total size of these directories? Check how many gigabytes these projects have consumed in the last year. Think forward a few years. Assume you will use more disc space in the future than you are now. Do some quick arithmetic and make a decision. Like I said I only had to buy one drive so far because I'm weird and I had a bunch of 3 terrabyte drives available. If I had to buy drives I probably would have tried to start larger. I am sure that at some point in the not to distant future, when I am running The Indie Archive and not developing it, I will have to upgrade my drives. The primary system is the console for The Indie Archive. When you copy a project onto The Indie Archive the directory goes into the primaryfiles directory. From there it is propagated out to the primarysnapshots directory, the secondary system, the cloud storage (if you are using it), and eventually to the remote systems. All of the data propagation is done with rsync using the archive setting that is desigend to preserve the file metadata like owner, permissions, and date last modified. So I have been using rsync with the archive setting to move the files from the work system to a usb drive and from the usb drive to the primaryfiles folder. At first I thought I would use an optical disc to move the files but optical discs do not preserve file metadata. Also I had some weird results with a usb flash drive because it was formatted fat32. fat32 does not support Linux metadata so if you're going to move projects over on a flash drive or a usb external drive be sure to format to ext4. Another way to move projects over to the primaryfiles directory is with tar compression. This preserves metadata when the files are extracted so this might be easier and it works with optical drives. If your directory will fit on an optical drive this also gives you another backup on another media. If you have any suggestions on how to transfer projects while preserving the file metadata let me know. I know that there are network options available but I am hesitant to recommend them because if I can transfer files from a system to the primary sytem over the LAN than anyone can do the same. Or delete files. Or accidentally delete directories. I kind of want to keep tight control over access to the primary system. It kind of ruins the archival quality of The Indie Archive if anyone on the LAN can accidentally mess with it. So, I am open to dialogue on these issues. I'm kind of where I want it to be easy to add projects to The Indie Archive but not too easy, if you know what I mean. I feel like having to sit down at the primary system and enter a password should be the minimum amount of security required to access the primary system. The primary system also runs file integrity checks daily from a cron job. All of the propagation and file integrity scripts have to be run as root to preserve the metadata since only root can write a file that it doesn't own. The secondary system is the ssh server for The Indie Archive. The primary system logs onto the secondary system as root using ssh. Security is managed with public and private keys so entering a password is not required. After the keys are set up for both the primary and remote systems, password authentication is disabled for the ssh server so only those two systems can ssh into the secondary system. When the propagation script is run on the primary system rsnapshot is used to create a current version of the primaryfiles directory in the primarysnapshots directory. Then the primary system uses rsync over ssh to make a copy of the primaryfiles directory to the secondaryfiles directory. Then the primary system logs onto the secondary system as root and rsnapshot is used to create a current version of the secondaryfiles directory on the secondarysnapshots directory. Finally, if cloud storage is being used, the primary system uses gcloud rsync to make a copy of the primaryfiles directory to a google cloud storage bucket archive. I have this bucket set to 90 days soft delete. If you are using another type of cloud storage on Google, AWS, Mega, or other storage providers this command will have to be adjusted. The reason I chose the gcloud archive bucket is because of the storage cost per gigabyte. They have the cheapest cost per gigabyte that I found. This will keep the monthly bill low. Once a day the primary system runs the file integrity check from a cron job using rsync to compare the primaryfiles directory to the current version, alpha.0, in the primarysnapshots directory logging any discrepancies. It then does the same comparing primaryfiles to secondaryfiles and to the current version in the secondarysnapshots directory, logging discrepancies and notifying the maintainer of any discrepancies. Notification is done by email using curl and an SMTP provider. The remote system runs on it's own schedule, logging into the secondary system daily to copy data from secondaryfiles to remotefiles and then using rsnapshot to make a copy of remotefiles to the remotesnapshots directory. Since it's run on a daily schedule it uses rsnapshot with the standard daily, weekly, monthly, and yearly backups. The remote system also runs a daily file integrity check comparing remotefiles to the current version on remotesnapshots and comparing remotefiles to both data directories on the secondary system, again logging the results and notifying the maintainer of any discrepancies. If there is an outward facing static IP at the location with the primary and secondary systems then the remote system can use that static IP to ssh into the secondary system. If there is not a static IP then the remote system uses a DuckDNS subdomain to log onto the secondary system. Any system using the same router as the secondary system can run a cron job to update DuckDNS with the current IP address. Since a static IP is a monthly expense it's important that there's an alternative that does not require paying another bill. So the secondary system has the ssh server but it doesn't really do much. Both of the other systems connect to it and use it as the junction for data propagation and file integrity checks. So, as you can tell, there's a lot going on to make The Indie Archive work. Future podcasts will get down into the details and discuss some of the choices I had to make and why I made them. The funny thing about this project is that the actual code was the least amount of work. Figuring out exactly how rsync and rsnapshot work together was quite a bit of work. Configuration for both rsnapshot and ssh took a bit of head scratching. Then there were a few user id tricks I had to work through to make The Indie Archive usable. But, by far the most work was writing The Indie Archive installation document detailing each step of installing the software on three systems. It's been fun so far. If you have input I always appreciate the help. I get quite a bit of help on Mastodon. If you go to home.gamerplus.org you will find the script for this podcast with the Mastodon comment thread embedded in the post. This podcast is being read from a document that is a work in progress. Current versions of the What Is The Indie Archive document will be posted at codeberg when I'm ready to upload the project. Thanks for listening. https://www.theindiearchive.com/ Provide feedback on this episode.
Daniel shares his unique career path and how his background informs his approach to business. He discusses how servicePath helps businesses manage complex product configurations, pricing, and deployments. In the interview, you'll learn about: How servicePath evolved from addressing the challenges of Managed Service Providers (MSPs) to a broader solution for various industries. The platform's unique features, including detailed financial analysis tools and the ability to handle complex pricing scenarios. How servicePath integrates with other systems and their commitment to continuous innovation. The potential and challenges of integrating AI into CPQ systems, including ensuring accuracy and a user-friendly experience. This episode is a must-listen for anyone interested in CPQ solutions, the future of AI in sales, and insights from a successful CEO. servicePath contact information: Email: daniel.kube@servicepath.co Website: https://servicepath.co/ LinkedIn: https://www.linkedin.com/in/danielkube/
Episode 58: This week we discuss the RTX 5080 (and how underwhelming it is), more implications for the GPU market, some current thoughts on the Arc B580 and Steve's lukewarm take on Radeon's future.CHAPTERS00:00 - Intro00:38 - Initial Thoughts on the RTX 508008:40 - The Configuration is Wrong15:25 - Nvidia's Strategy27:21 - Nvidia is Hurting Their Brand Now37:13 - RTX 40 Series vs RTX 50 Series45:44 - Difficulties in Achieving Gains vs Honest Marketing55:17 - Current State of Intel Arc B5801:03:07 - Steve's Take on RadeonSUBSCRIBE TO THE PODCASTAudio: https://shows.acast.com/the-hardware-unboxed-podcastVideo: https://www.youtube.com/channel/UCqT8Vb3jweH6_tj2SarErfwSUPPORT US DIRECTLYPatreon: https://www.patreon.com/hardwareunboxedLINKSYouTube: https://www.youtube.com/@Hardwareunboxed/Twitter: https://twitter.com/HardwareUnboxedBluesky: https://bsky.app/profile/hardwareunboxed.bsky.social Hosted on Acast. See acast.com/privacy for more information.
In this week's episode Bart discusses the importance of not out leveling yourself and giving your opponents too much credit. He does this through a hand history where it was very important to examine the details of a given configuration.
Skalierung und verteilte Berechnungen: Sind mehr CPUs wirklich immer schneller?Stell dir vor, du bist Softwareentwickler*in und jeder spricht von Skalierung und verteilten Systemen. Doch wie effizient sind diese eigentlich wirklich? Heißt mehr Rechenpower gleich schnellere Ergebnisse?In dieser Episode werfen wir einen Blick auf ein wissenschaftliches Paper, das behauptet, die wahre Leistung von verteilten Systemen kritisch zu hinterfragen. Wir diskutieren, ab wann es sich lohnt, mehr Ressourcen einzusetzen, und was es mit der mysteriösen Metrik COST (ausgesprochen Configuration that Outperforms a Single Thread) auf sich hat. Hör rein, wenn du wissen willst, ob Single-Threaded Algorithmen in vielen Fällen die bessere Wahl sind.Bonus: Ggf. machen nicht alle Wissenschaftler so wissenschaftliche Arbeit.Unsere aktuellen Werbepartner findest du auf https://engineeringkiosk.dev/partnersDas schnelle Feedback zur Episode:
An airhacks.fm conversation with Ladislav Thon (@ladicek) about: CDI history and evolution, transition from XML-based configuration to annotation-based dependency injection, introduction of CDI lite in version 4.0, differences between portable extensions and build-compatible extensions, Arc as Quarkus CDI implementation, challenges in implementing CDI at build time, new features in CDI 4.0 and 4.1 including lifecycle events and method invokers, comparison of CDI with other dependency injection frameworks, discussion on decorators, interceptors, and stereotypes in CDI, performance implications of CDI in Quarkus, Convention over Configuration in CDI, upcoming changes in CDI 5, removal of expression language dependency from CDI API, benefits of build-time oriented implementations like Quarkus, challenges in migrating portable extensions to build-compatible extensions, introduction of synthetic beans and observers, addition of priority support for stereotypes, improvements in invocation context API, ability to declare priority on producers in CDI 4.1, integration of CDI with application programming models, Convention over Configuration paired with dependency injection, performance considerations of CDI in Quarkus compared to manual dependency management Ladislav Thon on twitter: @ladicek
Configuration changes played an outsized role 2024 outages. Tune in to hear more about this and other outage trends—and learn how ITOps teams should plan accordingly in the year ahead.We'll also share insights from recent incidents at OpenAI and Google Cloud's Pub/Sub, and dive deeper into a degradation incident that Netflix experienced at the end of 2024.Read on to learn more, or use the chapters below to jump to the sections that most interest you.CHAPTERS00:00 Intro00:58 Cloud Service Provider (CSP) Outages Continue To Rise 01:52 Accidental Misconfigurations Trending for Clouds and Apps07:10 OpenAI Outage09:55 Google Cloud's Pub/Sub Disruption14:47 Lessons From a Netflix Incident18:57 Recent Outage Trends: By the Numbers21:01 Get in Touch———For additional insights, check out the links below:- The Internet Report blog: https://www.thousandeyes.com/blog/internet-report-configuration-change-outages?utm_source=transistor&utm_medium=referral&utm_campaign=fy25q2_internetreport_q2fy25ep5_podcast- 2024 Outage Trends Solidify; Plus OpenAI & Meta Outages: https://www.thousandeyes.com/blog/internet-report-2024-outage-trends-openai-meta-outages?utm_source=transistor&utm_medium=referral&utm_campaign=fy25q2_internetreport_q2fy25ep5_podcast- Netflix Broadcast Disruption: Lessons for Major Live Events: https://www.thousandeyes.com/blog/netflix-disruption-analysis-november-15-2024?utm_source=transistor&utm_medium=referral&utm_campaign=fy25q2_internetreport_q2fy25ep5_podcast- And join our upcoming webinar, “Top Outages of 2024, Explained: Lessons in Digital Resilience.” We'll unpack notable outages and performance degradations of 2024 and share lessons IT Operations teams can take away from these incidents to strengthen their digital resilience: https://www.thousandeyes.com/webinars/na-top-outages-2024-lessons-in-digital-resilience?utm_source=transistor&utm_medium=referral&utm_campaign=fy25q2_internetreport_q2fy25ep5_podcast ———Want to get in touch?If you have questions, feedback, or guests you would like to see featured on the show, send us a note at InternetReport@thousandeyes.com. Or follow us on LinkedIn or X at @thousandeyes
Configuration changes played an outsized role 2024 outages. Tune in to hear more about this and other outage trends—and learn how ITOps teams should plan accordingly in the year ahead. We'll also share insights from recent incidents at OpenAI and Google Cloud's Pub/Sub, and dive deeper into a degradation incident that Netflix experienced at the end of 2024. Read on to learn more, or use the chapters below to jump to the sections that most interest you. CHAPTERS 00:00 Intro 00:58 Cloud Service Provider (CSP) Outages Continue To Rise 01:52 Accidental Misconfigurations Trending for Clouds and Apps 07:10 OpenAI Outage 09:55 Google Cloud's Pub/Sub Disruption 14:47 Lessons From a Netflix Incident 18:57 Recent Outage Trends: By the Numbers 21:01 Get in Touch ——— For additional insights, check out the links below: - The Internet Report blog: https://www.thousandeyes.com/blog/internet-report-configuration-change-outages?utm_source=soundcloud&utm_medium=referral&utm_campaign=fy25q2_internetreport_q2fy25ep5_podcast - 2024 Outage Trends Solidify; Plus OpenAI & Meta Outages: https://www.thousandeyes.com/blog/internet-report-2024-outage-trends-openai-meta-outages?utm_source=soundcloud&utm_medium=referral&utm_campaign=fy25q2_internetreport_q2fy25ep5_podcast - Netflix Broadcast Disruption: Lessons for Major Live Events: https://www.thousandeyes.com/blog/netflix-disruption-analysis-november-15-2024?utm_source=soundcloud&utm_medium=referral&utm_campaign=fy25q2_internetreport_q2fy25ep5_podcast - And join our upcoming webinar, “Top Outages of 2024, Explained: Lessons in Digital Resilience.” We'll unpack notable outages and performance degradations of 2024 and share lessons IT Operations teams can take away from these incidents to strengthen their digital resilience: https://www.thousandeyes.com/webinars/na-top-outages-2024-lessons-in-digital-resilience?utm_source=soundcloud&utm_medium=referral&utm_campaign=fy25q2_internetreport_q2fy25ep5_podcast ——— Want to get in touch? If you have questions, feedback, or guests you would like to see featured on the show, send us a note at InternetReport@thousandeyes.com. Or follow us on LinkedIn or X at @thousandeyes ——— ABOUT THE INTERNET REPORT This is The Internet Report, a podcast uncovering what's working and what's breaking on the Internet—and why. Tune in to hear ThousandEyes' Internet experts dig into some of the most interesting outage events from the past couple weeks, discussing what went awry—was it the Internet, or an application issue? Plus, learn about the latest trends in ISP outages, cloud network outages, collaboration network outages, and more. Catch all the episodes on YouTube or your favorite podcast platform: - Apple Podcasts: https://podcasts.apple.com/us/podcast/the-internet-report/id1506984526 - Spotify: https://open.spotify.com/show/5ADFvqAtgsbYwk4JiZFqHQ?si=00e9c4b53aff4d08&nd=1&dlsi=eab65c9ea39d4773 - SoundCloud: https://soundcloud.com/ciscopodcastnetwork/sets/the-internet-report
Du lundi au jeudi, Stéphanie de Muru reçoit un invité au centre de l'actualité.
This is a re-recording of a show from 11/22/2024. I lost the original copy. Today on the Black Tech Building Show. I'm going to demonstrate at NAT Office with Troubleshooting pt.1 and The latest Tech News
Today on the Black Tech Building Show. I'm going to demonstrate at NAT Office with Troubleshooting pt.2 and The latest Tech News Recorded 11/26/2024
Today we are talking about being the CTO of the Drupal Association, How the job has changed, and How its impacted Drupal with guests Josh Mitchell & Tim Lehnen. We'll also cover Automatic Anchors as our module of the week. For show notes visit: https://www.talkingDrupal.com/477 Topics How long ago were you CTO Josh Tim when did you take over DA infrastructure Drupal Credit System Josh's proudest moment Tim's proudest moment Growth Josh if you could do one thing differently Tim if you could make one change Future of the CTO job Resources OOP Hook conversion Oregon State University Open Source Lab Whuffie: Cory doctorow Down and Out in the Magic Kingdom Rethink weighing of contrib projects and credits Guests Tim Lehnen - aspenthornpress.com hestenet Hosts Nic Laflin - nLighteneddevelopment.com nicxvan John Picozzi - epam.com johnpicozzi Joshua "Josh" Mitchell - joshuami.com joshuami MOTW Correspondent Martin Anderson-Clutz - mandclu.com mandclu Brief description: Have you ever wanted headings on your Drupal site to have unique id values, so links can be created to take users to specific parts of any page? There's a module for that. Module name/project name: Automatic Anchors Brief history How old: created in Jun 2020 by Chris Komlenic (komlenic) of Penn State Versions available: 2.1.1-beta1, which supports Drupal 8.8, 9, and 10 Maintainership Test coverage Number of open issues: x open issues, y of which are bugs against the current branch Usage stats: 137 sites Module features and usage By default, the module automatically generates ids on , , , , and elements within the page content Even if two headings have the same content, the module will make sure their ids are unique, as well as making sure they are i18n-friendly, use hyphens instead of spaces, and are short enough to be useful The module won't interfere with or change manually-added or already-existing HTML ids There's a permission to view helpful links on each heading that the ids obvious and easy to copy Configuration options include the root element it should look within (defaults to the body tag), which elements should get ids, what content to use for the displayed links, and whether or not generate ids on admin pages
Welcome to today's episode! I'm joined by Craig, and together we'll delve into a fascinating article from McKinsey.com titled “Go, teams: When teams get healthier, the whole organization benefits,” published on October 31, 2024. The piece was expertly crafted by Aaron De Smet, Gemma D'Auria, Liesje Meijknecht, Maithan Alaharna, Anais Fifer, and Maitham Albaharna, who explore the pivotal role of team dynamics in organizational success. What You'll Learn: Today, we're going to uncover why effective team management is more science than art. We'll discuss how cultivating trust, enhancing communication, and understanding the context within which teams operate can significantly boost their performance and, by extension, the entire organization's output. Insights From the Article: The critical role of team leaders as catalysts for performance, beyond merely being figureheads. The importance of aligning team efforts with organizational goals to maximize productivity and innovation. Strategies for fostering an environment where continuous improvement in team dynamics is prioritized. Key Points Discussed: The Myth of the Super Team: Contrary to popular belief, stacking a team with top talent doesn't guarantee success. Effective collaboration and the right mix of skills are what truly matter. Team Health Drivers: The article outlines 17 behaviors crucial for team performance, categorized into four areas: Configuration, Alignment, Execution, and Renewal. These drivers are instrumental in differentiating high-performing teams from underperformers. Blind Spots in Team Perceptions: Often teams do not accurately identify their weaknesses, which can lead to misplaced efforts. Realizing and addressing these blind spots can redirect focus to behaviors that genuinely enhance performance. Closing Thoughts: By understanding and implementing the insights shared today, teams can not only improve their internal dynamics but also contribute more effectively to their organizations' broader goals. Stay Connected: For a deeper dive into how teams can enhance their operational health and contribute to organizational success, check out the full article here. Hashtags: #TeamDynamics #OrganizationalHealth #Leadership #BusinessSuccess #McKinseyInsights #TeamPerformance Hosts Details: Kevin Britz Website:
JSON fields can be very useful, but when is a good time to include them in your database design? In today's episode of No Compromises, Aaron and Joel use a couple examples from recent projects to talk through reasons they would and would not use a JSON field.(00:00) - Debating JSON fields in database design (03:06) - Configuration options: JSON vs. relational tables (07:05) - Real-world example: label customization dilemma (11:30) - Silly bit Want a place to ask any question related to Laravel development? Check out the Mastering Laravel community.
App intents can be exposed in various ways beyond shortcuts, such as custom controls, focus filters, and spotlight actions. They enable users to perform specific actions without launching the app, making them more accessible and user-friendly. App intents can also be used to configure widgets, interact with hardware, and handle preferences, providing a seamless user experience across different platforms.(00:00) - Introduction (04:20) - App Intents (06:57) - Become a member (07:17) - Some examples (16:31) - Action Centered Design (17:52) - Get some Coffee (20:04) - Examples from Barc (21:39) - What makes a good App Intent (27:26) - Creating an App Intent (30:03) - Using Queries and Configuration (32:36) - Get SetApp (55:35) - Cocoatype.com (55:38) - Support the podcast Mentioned in this episodeThe way we interact with apps is changing, so should the way they are designedWWDC Developer video for getting started with App IntentsBecome a Patreon member and help this Podcast survivehttps://www.patreon.com/compileswiftFollow me on Mastodonhttps://iosdev.space/@Compileswift Thanks to our monthly supporters Tung Vo Adam Wulf bitSpectre Arclite ★ Support this podcast on Patreon ★
In this episode, Jason Kikta discusses the critical relationship between IT and security, emphasizing that great security begins with a solid IT foundation. He explores the importance of establishing a baseline for normalcy, the role of user safety in preventing security breaches, and the need to understand insider threats. Jason concludes with discussing the 'big three' of cybersecurity, which are: Network Inventory: Knowing what's on your network is crucial. This involves having a comprehensive inventory of all devices and systems connected to the network.Configuration and Patching: Keeping systems configured correctly and up-to-date with patches is essential to prevent vulnerabilities that could be exploited by malicious actors.Identity and Authentication Protection: Ensuring robust identity and authentication measures are in place to protect against unauthorized access and maintain the integrity of user accounts.
In this episode, Chadd and Sean (MJ was busy making money from her writing) take on the "largest" "ai writing" subreddit, the Rings of Power fandom, and the radioactive core of the streaming economy. It's to the people, it's going to have a speedrun.https://linktr.ee/onriting Link! Activate!
Hour 2--J&J Show Tuesday 10/1/24-- Rundown-Lion/Raiders/Adams NFL, Grizz, new CFB configuration, media stuff + Memphis/No PAC 12 --- Geoff's van full 3107 Tue, 01 Oct 2024 19:52:58 +0000 d8WXQbZeEhUkUWX2Ap3ubwiu4r248n2Z sports Jason & John sports Hour 2--J&J Show Tuesday 10/1/24-- Rundown-Lion/Raiders/Adams NFL, Grizz, new CFB configuration, media stuff + Memphis/No PAC 12 --- Geoff's van Local columnists and hoops insiders Jason Smith and John Martin appear daily 11am - 2pm on 929FM ESPN/680AM! 2024 © 2021 Audacy, Inc.
In this Emerson Automation Experts podcast, Emerson's John van Gorsel joins Jim Cahill to discuss these considerations in pressure and other measurements. Technology advancements have enabled new capabilities and simplified configuration, operation, and ongoing maintenance.
Un moment de doute ?
In this episode, follow an in-depth, step-by-step journey of transforming a surprisingly decent Ozark Trail mountain bike into the first Pedalshift e-bike (n=3 or 4 if you're counting). This mega-pod takes you from the initial setup to final tweaks, including component replacements, brake and pedal adjustments, and install of a mid drive motor. I'm hardly a bike mechanic, so will things to go sideways at least once like my typical bike adventures? eBike Project - The Build Hey I got an ebike! Where did I end up? Decided on build over buy - more flexibility Decided on new over used - couldn't find a good used one that wasn't $$$ Went with a Bafang middrive motor and a 52v 20Ah frame mounted battery - smaller than Brian's, but still pretty big. Watched a ton of YouTube videos and bought some tools! This took me several weeks because the bike lived at the cabin and I was back and forth a bit as I built it This was a journey… and the episode is a little long, but definitely brings you along tour journals style for how it went… 00:00 Introduction and Episode Overview 01:54 Choosing the Right Bike for the E-Bike Conversion 05:52 Initial Setup and Component Replacements 10:56 Challenges and Adjustments 18:05 Programming and Configuration 28:45 Battery Insights and Expectations 41:03 Assembly and Troubleshooting 48:11 Rear Brake Discovery 48:27 Chain Installation Challenges 48:30 Nighttime Reflections 49:27 Final Adjustments and Cable Management 50:51 Chain Sizing Tips 51:47 First Ride Impressions 52:32 Handlebar and Screen Setup 52:51 Rear Brake Issues 55:28 Pedal and Crank Problems 58:54 Cable and Sensor Installations 01:01:44 Tire Upgrade 01:04:14 Battery and Range Concerns 01:04:53 Shakedown Ride Plans 01:07:23 Final Preparations 01:16:47 Shakedown Ride Execution 01:25:48 E-Bike Confidence Boost 01:30:36 Closing Remarks and Future Plans
Hosted on Acast. See acast.com/privacy for more information.
ABOUT THE GUESTRavi Maganti is the Director of Technical Services at Manhattan Associates, where he has played a pivotal role in developing and managing the Manhattan Active Metro platform. With over 20 years of experience at Manhattan Associates, Ravi has been instrumental in driving innovation in warehouse management systems (WMS) and cloud-based logistics solutions. His expertise lies in creating open and extensible platforms that empower customers to customize their logistics systems to meet unique business needs. Ravi's leadership and vision have been crucial in the development of cutting-edge AI tools that are transforming the logistics industry.HIGHLIGHTS[00:02:30] – Discussion on the shift from configurable to extensible systems in warehouse management.[00:06:17] – Overview of Maven and Assist: AI-driven tools for enhancing customer service and operational efficiency.[00:09:58] – The impact of AI on speeding up warehouse management system (WMS) configuration.[00:16:18] – Challenges in AI implementation, including dealing with AI hallucinations and ensuring security. QUOTES[00:09:58] – “The future of AI in logistics is about speed and efficiency—doing what we already do, but much faster.” - Ravi Maganti[00:11:25] – “Imagine your AI system creating configurations for you in seconds, saving hours of manual work.” - Ravi Maganti[00:17:15] – “Mitigating AI hallucinations is crucial to ensuring reliable outcomes in logistics operations.” - Ravi Maganti FIND MORE ABOUT THE GUESTLinkedIn: Ravi MagantiManhattan Associates Website: www.manh.com
Feature flagging tools have grown in popularity as a way to decouple releases and deployment, but they can introduce their own long-term problems and tech debt. Lekko is a startup democratizing the practice of dynamic configuration. Their motivating idea is to empower engineers to focus on software releases, and business teams and other stakeholders to The post Lekko and Dynamic Configuration with Konrad Niemiec appeared first on Software Engineering Daily.
In this episode, recorded live at Laracon US, we talk about the current moment we're seeing in the Laravel world, reflecting on Laravel's evolution and where it stands today. We also dedicate time to answering your questions from Laracon US, mainly about Laravel Cloud, bringing insights directly from the heart of the Laravel community.Taylor Otwell's Twitter Matt Stauffer's TwitterLaravel TwitterLaravel WebsiteTighten WebsitePodcast Suggestions Laravel Cloud-----Editing and transcription sponsored by Tighten.
Feature flagging tools have grown in popularity as a way to decouple releases and deployment, but they can introduce their own long-term problems and tech debt. Lekko is a startup democratizing the practice of dynamic configuration. Their motivating idea is to empower engineers to focus on software releases, and business teams and other stakeholders to The post Lekko and Dynamic Configuration with Konrad Niemiec appeared first on Software Engineering Daily.
Bret and Nirmal were joined by Emile Vauge, CTO of Traefik Labs to talk all about Traefik 3.0.We talk about what's new in Traefik 3, 2.x to 3.0 migrations, Kubernetes Gateway API, WebAssembly (Cloud Native Wasm), HTTP3, Tailscale, OpenTelemetry, and much more!Be sure to check out the live recording of the complete show from June 6, 2024 on YouTube (Stream 269). Includes demos.★Topics★Traefik WebsiteTraefik Labs Community ForumTraefik's YouTube ChannelGateway API helper CLIingress2gateway migration toolCreators & Guests Cristi Cotovan - Editor Beth Fisher - Producer Bret Fisher - Host Nirmal Mehta - Host Emile Vauge - Guest (00:00) - Intro (02:20) - Origins of Traefik (05:01) - The Road to 3.0 (06:20) - Balancing Stability and Innovation (08:25) - Migration to Traefik 3.0 (14:58) - WebAssembly and Plugins in Traefik (21:43) - Gateway API and gRPC Support (30:32) - Gateway API Components and Configuration (33:35) - Tools for Gateway API Management (40:08) - OpenTelemetry Integration (47:21) - Future Plans and Community Contributions You can also support my free material by subscribing to my YouTube channel and my weekly newsletter at bret.news!Grab the best coupons for my Docker and Kubernetes courses.Join my cloud native DevOps community on Discord.Grab some merch at Bret's Loot BoxHomepage bretfisher.com
In today's episode, we explore the critical challenges to AI adoption revealed by CISOs, including data privacy concerns, insufficient staff skills, and misaligned organizational priorities, as highlighted in a new survey by Tines. We also discuss how security leaders can address these blockers by leveraging automation, strategic alignment, and continuous training. Additionally, we delve into the rise of malware such as FakeBat, recent data breaches affecting FlightAware and National Public Data, and necessary steps for individuals to secure their personal information. Video Episode: https://youtu.be/HQt1nCHKgxI 00:00 - Intro 01:14 - NPD Hack Exposes Billions of User's Data 04:01 - FlightAware Configuration Error Exposed User Data 07:35 - FakeBat Malware Targets Brave, Zoom, Notion Users 09:45 - Top AI Adoption Challenges and CISO Solutions Articles referenced: https://www.cybersecuritydive.com/spons/the-biggest-blockers-to-ai-adoption-according-to-cisos-and-how-to-remove/723672/ https://thehackernews.com/2024/08/cybercriminals-exploit-popular-software.html https://www.bleepingcomputer.com/news/security/flightaware-configuration-error-leaked-user-data-for-years/ https://www.cbsnews.com/news/social-security-number-leak-npd-breach-what-to-know/ Sign up for digestible cyber news delivered to your inbox: https://news.thedailydecrypt.com Thanks to Jered Jones for providing the music for this episode. https://www.jeredjones.com/ Logo Design by https://www.zackgraber.com/ Tags: Tines, Generative AI, Security, CISOs, FakeBat, malvertising, MSIX, Mandiant, FlightAware, Configuration, Cybersecurity, Data Leak, Data breach, Cybercriminals, Social Security, National Public Data Search Phrases: What are today's top cybersecurity news stories?, Tines generative AI security risks, FakeBat malware protection, FlightAware data breach user impact, Cybersecurity measures for CISOs, Understanding malvertising threats, How to safeguard against data leaks, Mandiant findings on malware, Protecting personal information from breaches, Addressing skill shortages in cybersecurity -- Transcript: Aug20 You probably heard about the data breach that alleged the compromised, the personal information of nearly every American citizen exposing social security numbers addresses. And so much more to the dark web cybercriminals. And so today we're going to talk about how this happened, what data was impacted and what you can do to make sure you stay safe. With your social security number on the dark web. Thousands of flight aware, users are now urged to reset their passwords after a configuration error, exposed, sensitive, personal data. For over three years. How did this FlightAware configuration error managed to leak user data for such an extended period of time. Cyber criminals are exploiting popular software searches to spread the fake bat malware using malvertising campaigns and Trojan ISED M S I. X installers to infect unsuspecting users. And finally a recent survey by tines shows that 98% of large tech executives have halted their generative AI projects due to security risks. What strategic measures are CSOs employing to overcome the biggest blockers to AI implementation in their organization. You're listening to the daily decrypt.. Hackers have allegedly infiltrated, a company known as national public data or NPD to steal un-encrypted personal information of billions of people, including social security numbers addresses. And family member names. This breach attributed to the hacker group, U S D O D in April of 2024, puts almost everyone at risk of identity theft. If your data was a part of this breach, which it likely is. People can access it or bid on it on the dark web. So if they could open new financial accounts or take out loans in your name. Luckily, this type of fraud is very preventable. All you have to do is contact the three major credit bureaus and place freezes on your accounts. And even before this breach, this is something that I would recommend to everybody. Unless they're in the process of buying a new home. Or opening up a new credit card. You don't need your credit accounts to be unfrozen. And this is something that I actually didn't do until about a year ago during the, at T and T breach. Where my social security number was also linked to the dark web. And I was very shocked to see how quickly it could be done. They all have web based interfaces where you can go sign up for an account. And click a button to place a freeze on your credit. It's also important to know that once your information is out there, it's out there forever. There's no company that can go and scrub your data from the dark web. If any company is selling you that service? It's not a real service. It's a scam. Or if you purchase the services of a specific company, Uh, under the impression that they can do that. Maybe they're not actually selling that, but maybe that's what you're thinking they're going to do. They're not going to be able to do that. What they are going to be able to do is coach you through the process of placing these credit freezes and help inform you about what that will actually prevent. Alternatively, you can listen to this episode of the daily decrypt and continue to for these tips for free. But placing these freezes on your credit. Essentially just prevents people or entities from running soft or hard credit checks. Against your credit. Which is the barrier for most lines of credit, like new credit cards or home loans. And so by proxy, it prevents new home loans and new credit cards from being opened in your name, which is one of the biggest risks for having your social security number out there. Now if an attacker is really motivated to get you personally, they can use that information to do all kinds of damage, primarily in information gathering about you. To craft more effective phishing campaigns against you. Which is the secondary risk of this type of data breach. So besides placing these credit checks, just be extra vigilant when you're looking at and clicking links through texts or emails. Knowing that this information can help craft more effective phishing emails. Look at everything skeptically. And you should be good to go. Very similarly to that last story. There's an app called FlightAware, which is the world's largest flight tracking platform. That has just revealed a major security data incident. FlightAware discovered a configuration error dating back to January of 2021, which exposed user data for over three years. This data that it exposed can include your user ID, password, email address. And possibly even more sensitive information like your full name, billing and shipping address, social media accounts, phone number, and even social security number. The error was fixed by flight aware on July 25th, 2024. So just a few weeks ago. But the breaches duration leaves significant room for potential misuse of your data. As we talked about in that last story. So if you have a FlightAware account, you'll need to reset your password immediately. If you log into the platform, it will prompt you to do so on your next login. But what they're not going to tell you is that you also need to change. The password to every account that uses the password to your FlightAware account. And that's because the username and combo that was leaked in the FlightAware data breach. We'll now be entered into every one of your accounts automatically. It's not a personal target. They're just going to. Try their luck and see if you may be reuse that username, Cabo password, if that's ringing any bells for you. PEI go change your password. To all of those accounts, and if it sounds too daunting to do that task manually. Or you're not even sure what accounts share passwords. It's time to start using a password manager. I personally use one password as do all of my friends. And I have almost a thousand accounts in there just for myself alone. Managing that amount of passwords is impossible, especially trying to maintain unique passwords. Across all of them. Nobody's memory can handle that. It will also create secure random passwords for you. So you don't have to use your creativity to come up with them or just changing the. The characters that follow the password. Which, by the way, if you use a password, even similar to the one. That was leaked in your FlightAware bridge. That too is considered compromised because attackers will do manipulations common manipulations to all passwords and just use those to try to log into your accounts as well. It's all automated. So, yeah, if you want more information about a password manager, Check out one password. There's also a blog on our website@thedailydecrypt.com that will outline. A simple three-step process to converting over to a password manager. It doesn't have to be as daunting as it may sound. FlightAware is also offering a free 24 month identity protection package through Equifax. So given these two stories back to back. Whoever is listening is likely impacted. Go take advantage of that. That will actually. Monitor for any credit inquiries to Equifax. In addition to you placing those freezes. Like I highly don't. I highly recommend against. Simply monitoring because by the time you get that alert, it's a little too late, right. Place the freeze, and then sign up for that free monitoring. And if you can't tell. Passwords are getting breached every day. I don't like talking about data breaches on this platform. I don't like hearing about them because they happen so frequently. I don't consider it cybersecurity news. The only reason this one made the cut is because they were so long standing. This one has been going on for three years. But if you're hearing this and you still don't use a password manager and you don't change your passwords, the implications are pretty bad. Go do that. Reach out to us on Instagram or YouTube, if you want any help or guidance along that process. It really is a lot simpler of a workflow as well. Like it's a quality of life improvement and a security improvement. I promise you it's worth it. Cyber criminals are using popular Google searches. To help them craft more effective info stealing campaigns. So, what does this mean? They're letting Google tell them what people are searching for specifically around business-related softwares. So for example, if you're going to Google and you're looking for a software that will help you manage personnel. Or manage your tasks or store your documents, et cetera. You're going to go to Google and you say, what are the best softwares? For this type of business task. Well, Google will happily give you the information. If you look for it about what is the most common things to search for around this space, right? So hackers are taking that information. And they're creating fake websites that will offer you services. Inline with what you're searching for. These websites might be carbon copies of actual services. That you could find on the web that would satisfy your search. Or they could be new services. After they've created these imitation websites, they purchase Google ads to get those websites at the top of the search results specifically. For what you're searching for. Then within those websites. You're going to click a link. That's going to download a malware called fake bat. This malware will live in the installer for the software. You're trying to find and download such as brave, like the browser. Key pass, which I'm assuming is a password manager notion, which is like a confluence style thing. Steam for games and zoom for business meetings online. It's important to know that even if you know the software you're searching for like, ah, I'm looking for notion, someone recommended it, you Google the words, notion. That first link. If it's an ad, can still be malicious. So not everyone is searching for what's a business software I can use to hold all my documents. Some of them are just searching for, Hey, where do I go to download notion? That download link. You click from Google. If it's a paid advertisement, could be malicious. And we always say it on this podcast. Just don't click ads. If you don't have to. That's one of the best ways you can avoid this type of thing. And finally 98% of large tech executives have paused AI initiatives due to security risks. This was discovered by an automation from tines during a recent survey and reveals the top barriers to AI adoption. 66% of CSOs, worry about losing control over this sensitive information. This can be anything from customer data, employee data. All the way down to proprietary code, you're feeding into AI to have it help you fix. 60% of the CSOs report lacking AI expertise. 51% find friction between departments from cross-functional teams to align on AI priorities and risks. 49% face issues without dated systems. So choose AI tools to integrate seamlessly with your existing tech stacks. This survey by times can be very valuable, especially if you're someone who's trying to get your CSO to allow you to use AI. AI. Has a lot of potential for automating a lot of work. And freeing up capacity for more impactful work. But. If you have a good CSO. They're going to try to push back on the security risks. Check out the article linked in the show notes below for more information on how and what statistics you can use to help combat your CSOs fears. And start using AI in your workplace. This has been the Daily Decrypt. If you found your key to unlocking the digital domain, show your support with a rating on Spotify or Apple Podcasts. It truly helps us stand at the frontier of cyber news. Don't forget to connect on Instagram or catch our episodes on YouTube. Until next time, keep your data safe and your curiosity alive.
‘Only' 1.3 million affected by National Public Data Breach Flaws in Microsoft macOS Apps allowing secret recording Configuration issue exposes flight tracking site Thanks to today's episode sponsor, Nudge Security Do you know who's using genAI tools in your org? Find out today with Nudge Security. Their patented approach to SaaS discovery gives you a full inventory of all apps ever introduced by anyone in your org, in minutes, including genAI apps. And, automated workflows help you scale security and governance without breaking a sweat. Start a free trial today at nudgesecurity.com/genai
The COSMIC desktop is just around the corner. We get the inside scoop from System76 and go hands-on with an early press build.Sponsored By:Core Contributor Membership: Take $1 a month of your membership for a lifetime!Tailscale: Tailscale is a programmable networking software that is private and secure by default - get it free on up to 100 devices! 1Password Extended Access Management: 1Password Extended Access Management is a device trust solution for companies with Okta, and they ensure that if a device isn't trusted and secure, it can't log into your cloud apps. Support LINUX UnpluggedLinks:
Are you a network provider looking to save time? Of course you are! This session will introduce you to the Meraki Terraform Provider, a tool that enables teams and individuals to automate their workflows and manage Cisco Meraki network infrastructure using Terraform. With this provider, you can now define and manage Meraki organizations, networks, devices, and other resources as code, providing simplicity, scalability, and repeatability in your automation strategy. In this session, you'll learn how to use Terraform to automate the: -Configuration of Meraki switches to reduce the risk of human error. -Deployment of Meraki access points to easily scale a wireless network. -Configuration of Meraki firewalls to ensure consistent security policies across a network. The official Terraform provider for Meraki allows you to provision, manage, and automate your network, offering: Simplicity: A simple and unified interface to manage Meraki networks, making it easier for administrators to integrate Meraki network management into their existing infrastructure automation workflow. Consistency: Administrators can ensure that their network resources are managed in a consistent and reproducible manner, reducing the likelihood of configuration errors. Flexibility: That allows administrators to manage their Meraki networks in a programmatic manner, providing greater flexibility in network management and enabling more complex network topologies to be managed more easily. Resources: Cisco DevNet Documentation (https://developer.cisco.com/codeexchange/github/repo/core-infra-svcs/terraform-provider-meraki/) Cisco Meraki Community post (https://community.meraki.com/t5/Developers-APIs/Now-in-beta-the-official-Terraform-provider-for-Meraki/td-p/230663) Meraki Terraform Registry (https://registry.terraform.io/providers/cisco-open/meraki/latest) Cisco guests Oren Brigg, Product Manager, Developer Platform and Ecosystem, Cisco Meraki Champions hosts Liam Keegan (https://www.linkedin.com/in/liamjkeegan/), Advisor Micheline Murphy (https://www.linkedin.com/in/micheline-murphy-ba165b53/), Consulting Systems Engineer, World Wide Technology Jose Bogarin (https://www.linkedin.com/in/josebogarin/)VP, Development and Engineering, Cloverhound Moderator Danielle Carter, Customer Voices and Cisco Champion Program
This week on the show I share a 2017 Jeep Grand Cherokee that has a radio that will not adjust the volume, a Terrain switch that doesn't function at all, AND seems to have two different VIN numbers. Is the VIN mismatch the cause of my problem? Is this vehicle stolen? If not, can these issues be corrected through programming? https://www.alfaobd.com/https://www.nicb.org/vincheckWebsite- https://autodiagpodcast.com/Facebook Group- https://www.facebook.com/groups/223994012068320/YouTube- https://www.youtube.com/@automotivediagnosticpodcas8832Email- STmobilediag@gmail.comPlease make sure to check out our sponsors!SJ Auto Solutions- https://sjautosolutions.com/Automotive Seminars- https://automotiveseminars.com/Jarhead Diagnostics- https://www.jarheaddiag.com/L1 Automotive Training- https://www.l1training.com/Autorescue tools- https://autorescuetools.com/
In this episode, we welcome back Emrys MacInally, following another successful year speaking at PSConf.EU. Emrys shares his experiences and highlights from the conference, shedding light on key discussions and takeaways. We dive deep into the importance of mental health within the PowerShell community, exploring how the community can support each other. Emrys provides insights into best practices for versioning PowerShell modules and delves into the nuances of error handling, explaining why developers should avoid using the 'throw' statement in scripts. Additionally, Emrys introduces his ErrorRecord module, which simplifies the process of creating error records, offering a practical solution for more efficient error management. Tune in for an enlightening conversation packed with valuable tips and expert advice for PowerShell enthusiasts. Guest Bio and links: Emrys MacInally has worked in the IT industry for over 19 years, focusing primarily on the delivery of back-end services on Windows. Since the release of PowerShell 2, PowerShell has become his primary automation tool. His love for PowerShell has only grown since then. PowerShell Podcast Home page: https://www.pdq.com/resources/the-powershell-podcast/ PowerShell Pro Tips - https://www.youtube.com/watch?v=K95ovoMh170 https://discord.gg/pdq https://www.powershellgallery.com/packages/Configuration/1.6.0 https://4sysops.com/archives/create-configure-and-delete-system-restore-points-with-powershell-vssadminexe-and-system-properties/ https://www.powershellgallery.com/Packages/PSLinux/1.0.6 https://psweekly.dowst.dev https://telegra.ph/PowerShell-Beyond-the-Prompt-06-27 https://www.powershellgallery.com/packages/Configuration/1.6.0 https://github.com/LindnerBrewery/ErrorRecord https://lindnerbrewery.github.io/posts/GitVersion_Mainline/
SailGP Season 4 Grand Final takes center stage in San Francisco today ahead of Day 2 action. Millions of dollars on the line, but who has the edge in maximizing the most out of their F-50 in SF bay conditions?
Ari Peskoe describes himself as an electric utility critic and has advice for electric utility enthusiasts.Ari Peskoe is the Director of the Electricity Law Initiative at the Harvard Law School Environmental and Energy Law Program and a prolific writer about regulation of the U.S. power sector on issues ranging from constitutional challenges to states' energy laws to interstate transmission development. The interview is wrapped in commentary from co-hosts Paul Dockery, Ahlmahz Negash, and Farhad Billimoria.You can find the podcast on Apple Podcast, Spotify, or wherever you get your podcasts. Share with friends that are energy enthusiasts, like us!03:11 - 30 seconds of theoryFarhad on Cost of Service vs Incentive based regulationJoskow, P.L., 2024. The Expansion of Incentive (Performance-Based) Regulation of Electricity Distribution and Transmission in the United States. Review of Industrial Organization, pp.1-49.Ahlmahz on Procedural JusticeJenkins, K., McCauley, D., Heffron, R., Stephan, H. and Rehner, R., 2016. Energy justice: A conceptual review. Energy research & social science, 11, pp.174-182.11:01 - Ari Peskoe on Governance11/01/2023 - CleanLaw Podcast - Electricity Law InitiativeCleanLaw–Replacing the Utility Transmission Syndicate's Control, Hannah Dobie interviews Ari Peskoe about his new article in Energy Law JournalPeskoe, A., 2023. Replacing the Utility Transmission Syndicate's Control. Energy LJ, 44, p.447.Market Configuration Matters; Effects of Market Choices on Consumers in the Northwest US51:10 - Ranking Governance, Configuration, and Market Design59:37 - Ari Peskoe's Energy System Analogy1:04:48 - Debriefing on transmission, governance, and public power with Ahlmahz Negash and Farhad BillimoriaPublic Power Underground, for electric utility enthusiasts! Public Power Underground, it's work to watch!
We try Omakub, a new opinionated Ubuntu desktop for power users and macOS expats.Sponsored By:Core Contributor Membership: Take $1 a month of your membership for a lifetime!Tailscale: Tailscale is a programmable networking software that is private and secure by default - get it free on up to 100 devices!Kolide: Kolide is a device trust solution for companies with Okta, and they ensure that if a device isn't trusted and secure, it can't log into your cloud apps.Support LINUX UnpluggedLinks:
In this episode of the Ducks Unlimited podcast, host Katie Burke interviews guest Rick Milligan, a call and decoy collector. Rick shares his passion for collecting and discusses those who served as mentors to him in the field. They also talk about an upcoming exhibition in the museum and delve into Rick's introduction to the outdoors and hunting. Tune in to hear Rick's journey as an outdoorsman and call collector.www.ducks.org/DUPodcast