• 0 Posts
  • 122 Comments
Joined 2 years ago
cake
Cake day: February 15th, 2024

help-circle

  • If I were to hazard a guess, they’re reusing a mobile board design for this somewhat and at least in mobile applications socketed dimms draw 30-50% more juice than soldered. It could also be the npu or gpu requiring the 5-10% extra memory bandwidth they get from being soldered. I do agree that I don’t think it was worth the trade offs from a consumer perspective, but framework seems to generally make good choices so I’m thinking there must’ve been some outside pressure at play affecting the financials of the project or something.














  • Ptsf@lemmy.worldtoSelfhosted@lemmy.worldTape drive backups
    link
    fedilink
    English
    arrow-up
    3
    arrow-down
    1
    ·
    2 months ago

    Tape drives will be expensive and likely beyond overkill for this. I’d recommend you grab a blue ray DVD writer and use that instead. The discs are generally shelf stable for 25 years and hold about 50-128GB depending on the disc. Duplicates are cheap, storage is relatively easy, and it doesn’t require constant upkeep/power like a hard drive would. Downsides? They just stopped making the discs, so they’ll grow in cost over time. That’s about it that I can think of.






  • Ptsf@lemmy.worldtoSelfhosted@lemmy.worldJellyfin over the internet
    link
    fedilink
    English
    arrow-up
    3
    arrow-down
    5
    ·
    edit-2
    3 months ago

    People like you in this industry are legitimately the reason botnets and significant compromise still exists. “You don’t need to be a genius to do all this additional config to make this thing I’m referring to as secure, secure.” Do you even read your own writings before you hit post? Also your final argument is so slathered in whataboutism I can’t even. Yes, any internet connectivity is going to be less secure than an air gap, but when you’re advising implementations you should keep security posture and best practices in mind. What you’re speaking on is more complex than any one person’s understanding of it due to significant layers of abstraction. Exhibit a? Ssh is not a codebase. It’s a network protocol. The codebase is literally different depending on implementation yet you continue to talk about it as if it’s a single piece of software that has been reviewed and like all ssh shares the same vulns but the software is entirely different depending on who implemented it so you have no real clue what you’re talking about and it’s actually sad people will be misled by your nonsense and false bravado. (https://en.wikipedia.org/wiki/Secure_Shell)