Great movie. Where was “story time” in The Birdcage? As I say that I have to wonder about any bad faith in OP’s shower thought considering Mrs. Doubtfire was rightly pointed out as crossdressing and not drag queen.
FYI docker engine can use different runtimes and there is are lightweight vm runtimes like kata or firecracker. I hope one day docker will default with that technology as it would be better for the overall security of containers.
That’s a very strict interpretation of the community rules. My interpretation is anything Linux-related, which reads Linix-based distro related, i.e. software that runs on linux operating systems. Kernel discussions are niche enough that you should start a new community called linuxkernel imo.
Due to all the enshittification of the streaming services, I decided to opt out of it all by selfhosting Jellyfin with all of my media on my NAS. Get to it from anywhere with tailscale.
I agree with what you’re saying, but all software is insecure and it should be up to the user what their risk tolerance is. Instead, users’ control of their equipment is whittled down and before long the only choice will be deal with it or don’t play. Pinephone comes to mind as a phone with root access that is somewhat secure, but it also has latent vulnerabilities that could be exploited as its version of sudo is also an attack vector. Everything is a trade off especially in software/tech.
That goes for unrooted phones as well. The danger with rooting a phone comes from the automated software that is doing the initial rooting. It could install anything in there and the user would be none the wiser. Once it’s rooted and permissions are requested via the superuser app, it’s not any more dangerous than a non-rooted phone, assuming nothing malicious was installed during the rooting process, that is.
I have mixed architecture cluster as well. It works great as long as you set your manifests up properly and either use public images that support both or you build your own, or you set up node affinity to ensure the architecture-specific pod runs only on the node with the correct architecture.
Install tailscale and k3s on the master node and worker nodes. I have a setup like this and it works well. I have nodes in different physical locations from the master node, it works fine.
How can you invalidate just the portion of a law you don’t like based on a technicality without invalidating the whole law that is subject to the same technicality?
Great movie. Where was “story time” in The Birdcage? As I say that I have to wonder about any bad faith in OP’s shower thought considering Mrs. Doubtfire was rightly pointed out as crossdressing and not drag queen.