It means your coffee pod machine just came online and the coffee is currently spewing from the spout … probably.
Onno (VK6FLAB)
Anything and everything Amateur Radio and beyond. Heavily into Open Source and SDR, working on a multi band monitor and transmitter.
#geek #nerd #hamradio VK6FLAB #podcaster #australia #ITProfessional #voiceover #opentowork
- 17 Posts
- 648 Comments
Onno (VK6FLAB)@lemmy.radioto
Ask Lemmy@lemmy.world•What are your thoughs about YouTube clickbait?
18·4 days agoBetween the clickbait, YouTube “enhancements”, exploding AI slop videos and the atrocious search facility, the platform is rapidly becoming completely unusable for finding relevant information when you’re looking for answers.
As an entertainment platform it’s forcing creators to make long form content and making viewers sit through more and more low quality content.
It’s evolving, but I’m pretty sure it’s heading towards extinction, rather than greatness.
Onno (VK6FLAB)@lemmy.radioto
Showerthoughts@lemmy.world•If you eat farm fresh eggs, you're probably ingesting trace amounts of rooster cum
5·5 days ago… and your point is?
Onno (VK6FLAB)@lemmy.radioto
Showerthoughts@lemmy.world•Attaching one's name to an astronomical survey likely buys immortality beyond the heat-death of the Earth
6·8 days agoUnlikely.
You underestimate the size of the Universe. There’s 8 billion people on Earth, there’s about 200 billion stars in our galaxy, and between 100 billion to 200 billion galaxies in the observable universe.
It uses a security feature of Linux called cgroups or control groups to limit access to resources at a kernel level.
It’s used all over the place, including as the basis of Docker.
There’s a common but persistent misconception that Docker is like running a virtual machine. This is understandable but incorrect.
A better way to think of it is as a security wrapper around an untrusted process.
If you look at your running processes whilst a container is running, you’ll see the processes inside the container running on your “host” machine - remember, it’s not a host - guest situation.
There is no relationship between the user inside the container, unless you start mapping the UID and GID.
The only exception to this is the root user which shares the UID/GID with the actual root user.
See: https://www.howtogeek.com/devops/why-processes-in-docker-containers-shouldnt-run-as-root/
Edit: I suspect, but don’t know for sure, that the root user inside the container is actually the same user as the one running the Docker process, which is typically the root user on the “host”.
- The Docker container should change the user to an internal one (created by the build stage) and the process should run as that user.
- The uid and gid can be specified at runtime.
See: https://www.docker.com/blog/understanding-the-docker-user-instruction/
Onno (VK6FLAB)@lemmy.radioto
Android@lemdro.id•The unsung heroes of Android: Remembering 8 legendary apps we’ve lostEnglish
6·20 days agoAnd we’re still stuck with its aftermath in that search engines require quotes rather than a + for requiring words, which they now ignore whenever the mood strikes.
Why?
Because some fuckwit at Google decided that the + was reserved for Google+ search results.
Onno (VK6FLAB)@lemmy.radioto
No Stupid Questions@lemmy.world•How difficult is tennis for someone who’s never played before?
4·20 days agoIt’s likely not about tennis, unless the CEO is a dick, it’s about an excuse to meet you and evaluate how you are as a human being.
Unless there’s a specific dress code requirement, I’d arrive in comfortable clothes, smart casual, clean and with a smile on my face.
When you’re asked about your lack of racket I’d point out that not only have you never played, you didn’t think it would be prudent to spend money on gear you know nothing about.
Remember, this is about people, not about hitting a tennis ball.
Onno (VK6FLAB)@lemmy.radioto
Ask Lemmy@lemmy.world•What's a good song choice for a nurse pinning/graduation ceremony?
11·25 days agoStayin’ Alive - Bee Gees
Onno (VK6FLAB)@lemmy.radioto
Showerthoughts@lemmy.world•I wonder if it would be possible to force the AI crawlers to mine crypto
10·26 days agoThis seems at first glance at least potentially doable.
Create a website with content that’s only rendered with JavaScript and embed a miner.
Your challenge is to get the work product back, but you might be able to create dynamically generated URLs that show up in your logs as the work result.
You’d have to find a way to chunk the work and make it such that the work required is enough to be valuable to you, but not so costly as to stop the crawlers from using your site.
I suspect that in order for this to actually happen you’d have to have a significant infrastructure to deal with the crawler load, which you could instead be using to do the actual work.
Ultimately I suspect that this is the software equivalent of a perpetual motion machine, cute in theory, physically impossible.
Good luck!
Onno (VK6FLAB)@lemmy.radioto
Today I Learned@lemmy.world•TIL a volcanic eruption in the Philippines 74,000 years ago reduced humanity to fewer than 10,000 worldwide.English
181·29 days agoDid you actually read the article you posted?
Not in the Philippines, but what is now Indonesia.
Onno (VK6FLAB)@lemmy.radioOPto
Privacy@lemmy.ml•Australian Under 16 media ban is censorship by stealth and data harvesting by law
3·1 month agoThey’ll use machine learning to determine based on your behaviour if you’re under 16, then they’ll ask for proof of age.
Thank you for making my point.
Onno (VK6FLAB)@lemmy.radioOPto
Privacy@lemmy.ml•Australian Under 16 media ban is censorship by stealth and data harvesting by law
4·1 month agoIn ICT circles, sure, on the nightly news it’s crickets.
Onno (VK6FLAB)@lemmy.radioOPto
Privacy@lemmy.ml•Australian Under 16 media ban is censorship by stealth and data harvesting by law
11·1 month agoWe know very little beyond:
- It will go live on 10 December 2025
- There will be heavy fines.
- Government ID is not allowed to be the only method.
- A self declaration (tick box) is insufficient as a check.
There are to my knowledge no third party providers approved for this legislation. The process to assess actual implementation details started in July 2025, and the results thus far are underwhelming to put it mildly, you might call it a shitshow.
Below is the official sum total of what we know, most of it motherhood statements and “coming soon”.
https://www.esafety.gov.au/about-us/industry-regulation/social-media-age-restrictions
Media commentary wants to “protect the children”, but have no idea how you might do so, let alone consider the implications or implementation details.
Source: I’m an ICT professional with 40+ years experience.
The comments here seem to be missing a salient point.
In order to determine if a user is under 16, you need to determine that for every single user … including you!
This means that your personal data will be harvested in order to determine if you are over 16 or not.
To migrate historic email you can use Google Takeout.
Onno (VK6FLAB)@lemmy.radioto
Ask Lemmy@lemmy.world•What do you think: should all government software be open source?
2·1 month agoI think all public funds that generate data and/or software needs to be public.
The notion that maintenance is an issue is a red herring. Proprietary software purchased by government requires ongoing support contracts right until the vendor discontinues the product and leaves the public funds to prop up another billionaire.
Open source would also stimulate the economy since businesses could benefit from the project and use or apply it to their use, something which currently requires more investment with the same vendor.










The consortium clearly has too much money.