They just really wanted to release on 9/9/99 no matter what.
How is this different from Factorio?
I manage a stack like this, we have dedicated hardware running a steady state of backend processing, but scale into AWS if there’s a surge in realtime processing needed and we don’t have the hardware. We also had an outage in our on prem datacenter once which was expensive for us (I assume an insurance claim was made), but scaling to AWS was almost automatic, and the impact was minimal for a full datacenter outage.
If we wanted to optimize even more, I’m sure we could scale into Azure depending on server costs when spot pricing is higher in AWS. The moral of the story is to not get too locked into any one provider and utilize some of the abstraction layers so that AWS, Azure, etc are just targets that you can shop around for by default, without having to scramble.
We don’t know who struck first, us or them. But we do know it was us that scorched the sky. At the time, they were dependent on solar power. It was believed they would be unable to survive without an energy source as abundant as the sun.
It baffles me that you can advertise something as “unlimited” and then impose arbitrary limits after the fact. AWS and Google advertise their CDN rates with tiers for certain bandwidth limits. It seems like CF is advertising as “unlimited” and then once you’re fully invested, they pull the bait and switch and say you’re over the limit for that tier. Based on those HackerNews links, it seems systemic and something the FTC should fine them, like they did with AT&T over the same thing.
Explain it like I’m 5 please?
I thought $0.50 was low for this math to work out, but turns out 30 million copies of Stardew Valley have been sold, so that’s $15 million, which over 60 years is $250k/year.
Still though I have no clue if $0.50 is normal take home per copy sold for a self published game (it seems low), but I’m very happy he’s doing well for himself and hopes he makes more per copy sold. I’ve bought the game 4 times, so I’m doing my part!
It feels like this needs to be managed on an instance by instance level and not post to post.
Seriously, now that this is more widely known, it’ll for sure be taken advantage of a lot, to the point AWS will begrudgingly protect their customers once the damage is done.
I’ve been pretty happy with how Automattic has handled PocketCasts and the premium features feel like what you’d expect, while the main product is perfectly usable for 90% of people and use cases. I hope with their acquisition of Beeper, they continue this mindset and add premium features (extra themes, premium stickers, etc) without compromising the main app.
This is what I’ve read about where users in AD can be federated to FreeIPA: https://www.freeipa.org/page/V4/One-way_trust. Not sure if this covers your use case
No need to guess, it’s all outlined in the bill:
So basically, the law will not require ISPs to block access to TikTok domains and IP addresses. Google search results are also explicitly excluded from the term data broker, and exempt from the restrictions. The only requirement is for app stores to stop hosting the application, so existing installations of the app (after January 2025 assuming ByteDance doesn’t sell) will presumably persist and can be used, even if TikTok is banned.
It’s my understanding that FreeIPA can federate with Active Directory, but personally I haven’t tried that myself. As for Authentik, it looks interesting but it’s the first I’ve heard of it. I also rely on FreeIPA’s certmonger implementation, so I wonder if Authentik could replace that?
Just to understand your use case, you have users in Active Directory where you want to manage SSH keys and be able to login via SSH to linux machines?
Exactly, like how an ocean liner is a step up above a sailboat. That doesn’t mean you’re unsinkable and don’t need to worry about icebergs.
Windows is banned in my household, so l’m not worried about malware.
This is a false sense of security and just because you’re not running Windows doesn’t mean you’re immune to everything and can let your defenses down. For example, KDE recently had to announce that downloading themes will execute arbitrary code and cited someone who had personal information deleted because of downloading a theme.
Hopefully you’ll be able to be many steps ahead of the authorities
Are you able to include the HTTP Method being called and the amount of data transferred per request? It’s possible that the first request is an OPTION request and then the second request is a POST.
If you can see the amount of data transferred, then you can have some more indication that double the requests are being sent and quantity the bandwidth impact at least.
Obviously top left is a different movie, he’s got a different shirt on. The jury’s out on the other three though…
Have you tried turning it off and back on again?
Have you tried turning it off and back on again?
Have you tried turning it off and back on again?
Have you tried turning it off and back on again?
Have you tried turning it off and back on again?
Have you tried turning it off and back on again?
Have you tried turning it off and back on again?
Have you tried turning it off and back on again?
Have you tried turning it off and back on again?
Have you tried turning it off and back on again?
Have you tried turning it off and back on again?
Have you tried turning it off and back on again?
Have you tried turning it off and back on again?
Have you tried turning it off and back on again?
Have you tried turning it off and back on again?