• 1 Post
  • 228 Comments
Joined 2 years ago
cake
Cake day: June 11th, 2023

help-circle




  • People are using NAS for things they aren’t meant to do. They are a storage service and aren’t supposed to be anything else. In a typical data center model, NAS servers are intermediate storage. Meant for fast data transfers, massive storage capabilities and redundant disk fault tolerance. We are talking hundreds of hard drives and hundred gigabit connection speeds inside the data center. This is expensive to run, so they are also very energy efficient, meant to keep the least amount of required disks spinning at any given moment.

    They are not for video rendering, data wrangling, calculations or hosting dozens of docker containers. That’s what servers are for.

    Servers have the processing power and host the actual services. They then request data from a NAS as needed. For example, a web service with tons of images and video will only have the site logic and UI images on the server itself. The content, video and images, will be on the NAS. The server will have a temporary cache where it will copy the most frequently accessed content and new content on demand. Any format conversion, video encoding, etc. Will be done by the server, not the NAS.

    Now, on self-hosting of course, anything goes and they are just computers at the end of the day. But if a machine was purpose made for being a NAS server, it won’t have the most powerful processor, and that’s by design. They will have, however, an insane amount of sata, PCI-e channels and drive bays. And a ton of sophisticated hardware for data redundancy, hotswap capacity and high speed networks that is less frequent in servers.



  • dustyData@lemmy.worldtoMildly Infuriating@lemmy.world[Deleted]
    link
    fedilink
    English
    arrow-up
    43
    arrow-down
    1
    ·
    2 months ago

    Just to be very clear. This is happening because you didn’t have MFA active. I know it hurts to hear, but this is why you always migrate first, wipe the device second. MFA would’ve allowed you several methods for proof of ID. If your phone gets stolen, then thieves can’t even use the phone for anything. You can remote wipe and block the device, and it turns into paperweight. The device nukes your data then locks the bootloader.


  • Beware, Gnucash is meant to be pro level accounting software. Is not a simple ledger or a tech/crypto gateway. I also use it for my personal life, but there’s like 30% of features I don’t use because they’re business accounting stuff I don’t need. It predates the cloud, it cares not for the latest trends, it crunches numbers and spits out reports. That’s part of what I like about it. It is not simple but it also isn’t bloated.



  • dustyData@lemmy.worldtoSelfhosted@lemmy.worldWhat is Docker?
    link
    fedilink
    English
    arrow-up
    17
    ·
    2 months ago

    On the contrary. It relies on the premise of segregating binaries, config and data. But since it is only running one app, then it is a bare minimum version of it. Most containers systems include elements that also deduplicate common required binaries. So, the containers are usually very small and efficient. While a traditional system’s libraries could balloon to dozens of gigabytes, pieces of which are only used at a time by different software. Containers can be made headless and barebones very easily. Cutting the fat, and leaving only the most essential libraries. Fitting in very tiny and underpowered hardware applications without losing functionality or performance.

    Don’t be afraid of it, it’s like Lego but for software.



  • dustyData@lemmy.worldtoMemes@lemmy.mlHappy birthday, Lenin!
    link
    fedilink
    English
    arrow-up
    1
    arrow-down
    5
    ·
    2 months ago

    […] implementation of the dictatorship [of the proletariat] was clearly defined by Lenin as early as in 1906, when he argued it must involve “unlimited power based on force and not on law,” power that is “absolutely unrestricted by any rules whatever and based directly on violence.”

    Leszek Kołakowski







  • That’s because of active directory. It makes managing hundreds of users, across as many devices, in a centralized manner, easier. You make a user for the person with the intended access scheme, hand them a random laptop imaged from a master system OS, and off they go with access to all the software and tools tied to their user login. There’s no similar alternative with a robust support service for Linux clients. If there were, then changing a culture to Linux clients wouldn’t have so much friction.