No, I guess Wayland is kind of on my to-do list....I just don't need anything it offers. I'm grumpily enough implementing systemd already
Ive never stopped, just recently did my first nixos build with enlightenment. Had an old XPS with 4k screen works nicely. I like the reenlightened theme
Logic is like satire now.
That's like charging me $0.90 or $1.80 depending on if I inflate my assets at all
What's dangerous is Russian money with American uselessfull idiots
If you put three libertarians in a room, the only thing on which they'll all agree is that there is only one libertarian in the room.
I love python. Even on windows but I tend to try to learn to live off the land and not prerequisite my admin skills on additional software that may not always be available or an option.
In before Kessler Syndrome
That's great suggestions. A "chaoslab" would be awesome for training. I think it's netflix that has a group dedicated to running chaos in production!
How to learn Windows? Years of pain and torture of course.
What to learn? Powershell, learn powershell.
Then as you follow along any guides or howtos for administrative tasks, try to search how to accomplish the same things in powershell. Take notes on your own powershell learnings. I keep all my windows administrative powershell one liners, scripts, and notes in the same digital notebook for quick reference and updating.
If you're already experienced with bash, like I was, learning powershell might be tough. As it was for me, I had trouble understanding why PS cmdlets seemed to hide data when piped... Format-table(ft) and Format-List(fl) help tremendously
Powershell remoting is still a pain in my ass in most places, I rarely use it.
There's a windows admins discord group that's pretty savvy I asked and learned a lot along the way there. https://discord.com/invite/winadmins
YouTube! Don't necessarily look for YouTube powershell windows videos. Just the necessary tasks through the GUI will give you the correct direction to begin converting a process to PS. Learn how other Admins process tasks by watching them. Especially if it's an often repeated task try converting some or all of what they do in the video into PS equivalent.
With all of that said knowing powershell doesn't really help recovering from disasters. Knowing how to install windows and recover data from borked systems is a task best learned through battles. So, absolutely set up VMs and installed all manner of versions you'll be working with...that way you'll have familiarity with when things go wrong in them. I've yet to install windows 11 in a VM but I did try to install a copy onto a surface tablet only to learn the hard way that do ing so leaves the tablet without the drivers necessary for using the keyboard and touchscreen...weird need a custom built image or recovery image, great fun.
Then he should fight Tyson.
Why would anyone publicly debate a convicted rapist?
I make a motion to restructure the board into a tribunal. We haven't had the table since the wrestling incident anyway.
Hunter Biden's LAPTOP.
Justice is a lie.
How to think like a computer scientist may help.
Seems like AI is going to make it so that vulgarity and naughtiness are the only human generated things left.
Pokes human with slick: "now fight"
What's so civil about war anyway
All that's left ... crumbs.
A philosopher walks into a bar, dragging his long beard.
The bartender, a grizzly bear of a man, bellows, "Hey Socrates, what's your poison?"
The philosopher, scratching his chin, replies, "I'll have a glass of impossibility, straight up."
The bartender laughs, "Sorry, fresh out of that. The unicorn drank the last of it."
The philosopher, not missing a beat, says, "Isn't every drink just a metaphor for the soul who orders it? A mirror in a glass?"
The bartender, twirling his mustache, retorts, "Well, in that case, how about a cocktail of confusion, shaken not stirred, with a twist of clarity to keep you guessing?"
The philosopher grins, "Perfect. And add a dash of reality, just to ruin the taste."
Our investigation of the security incident disclosed by Microsoft and CISA and attributed to Chinese threat actor Storm-0558, found that this incident seems to have a broader scope than originally assumed. Organizations using Microsoft and Azure services should take steps to assess potential impact.
According to Microsoft, the compromised key was inactive and therefore any access token signed by this key must be considered suspicious.
Unfortunately, there is a lack of standardized practices when it comes to application-specific logging. Therefore, in most cases, application owners do not have detailed logs containing the raw access token or its signing key. As a result, identifying and investigating such events can prove exceedingly challenging for app owners.
How computing instructors plan to adapt to ChatGPT, GitHub Copilot, and other AI coding assistants (ICER 2023 paper)
A pair of economists at MIT have conducted an experiment designed to determine if the use of ChatGPT by college-educated professionals can make them more productive. In their study, reported in the journal Science, Shakked Noy and Whitney Zhang designed and conducted a study in which college-educate...
Free software junkie (i.e. speech not beer), keyboard jockey, Coonass libertarian, how bah dat baw? Laissez les bon temps rouler - mais' wea