

- VM, 2) docker (macos runs docker inside a VM, u run KDE inside of it as a fat container), 3) MacOS specific tooling - this will depend on what they let you install. homebrew is a start, nix env also exists.




its us-east-1 as usual, I guess its that time of the year. and the companies haven’t changed either… so, basically the IT guys told the budget approvers we need more money they calculated it and said, no. see you next year for another one.


I switch between both a lot to mix up my day. Dont have lower back pain if I do. Also, do some core exercises.
How would they enforce this on open source projects without companies behind them?
This doesn’t require the user to be able to block, it’s required that there is the ability to block a user from the system in general.
Here is the official list of nextcloud providers that do the setup and maintenance for you: https://github.com/nextcloud/providers#providers
I’m using fedora as my work system, because I have a relatively new laptop that needs the new kernels. Haven’t experienced anything you’re describing. Are you on fedora regular or on sliverblue (the immutable version)? If you’re having issues running the newest kernel, follow the fedora documented way to build and run your own. I did just that when needed a prerelease kernel and it worked out fine. I usually upgrade to a new release by the end of the cycle, so that the new version had 6 months to mature. I never immediately upgrade.


I use sway because it gives me 4 hours more battery life compared to gnome.


Really, how do I check on this? I’m on Lemmy.world and follow multiple topics on beehaw at the moment.


Yes you should be worried. Dont expose services you’re not able to keep up to date and know how to manage and secure. Using tailscale is a great alternative as it allows you to have access without exposing anything to the internet, I’d prefer that. For everything else, subscribe to a CVE service for those (I use nextcloud and matrix and follow all security findings) and be ready to take them offline as soon as a critical exploit appears. Dont expose your passwords directly to the internet - ever; no matter if anyone else tells you its OK.