I have been using Bookstack, I like it though it is missing a few features I would love:
As heating network, they are and will be regulated like other energy suppliers: https://www.gov.uk/government/publications/energy-security-bill-factsheets/energy-security-bill-factsheet-heat-networks-regulation-and-zoning
That’s interesting, it looks like I may have a bias on that due to my scientific background.
I always said salt, of sodium chloride for NaCl. Who is using sodium for table salt? The only time I heard that associated was when saying that table salt is a source of sodium, which is true.
Most likely because the news is in English. And why would Natrium be better on an international forum?
It is Sodium in most Latin languages (despite Natrium being Latin), in Hindi and in Arabic. And Chinese has a different root. Among the 10 most spoken languages (according to Wikipedia), only Russian is using Natrium.
Sorry, my autocorrect changed its into it’s.
Tailscale surprisingly was the fastest, even faster than plain Wireguard, despite being userspace. But it also consumed more memory (245 MB after the iperf3 test!) and CPU.
Do we know if this is a variation due to the test protocol or Tailscale is using wireguard with specific settings to improve, slightly, its speed?
With Tailscale and other mesh VPN, by default all your machines are client and servers. If you have 3 machines A, B and C, when machine A wants to send something to B it will connect to the server that B has.
These mesh VPN have a central server that is used to help with the discovery of the members, manage ACLs, and in the case one machine is quite hidden and not direct network access can be done act as a relay. Only in that last case do the traffic go through the central server, otherwise the only thing the central server knows is that machine A requested to talk to machine B.
You still have to trust them if you want to use their server, but you can also host your own server (headscale for Tailscale). Though at this point you still need to somewhat trust Tailscale anyway since they re the ones doing the client releases. They could absolutely insert a backdoor and it would work for a while until is is discovered and would then totally ruin their reputation.
I don’t know if there is any specific utilities for that. You can always export your settings and reimplement them in lldap: this should be doable with a python script.
I never really understand why LDAP was so complicated. There must be needs in big setups that I am aware of but strangely I always found it not intuitive.
Yes, same for me. On android DAVx5 is perfect, and on MacOS, iOS there is native support. For Linux and Windows, your mileage may vary (fairly easy on Linux but very different variations and some require additional software).
It supports a proper sync (my wife’s shared events do show up on my phone and I can modify them there) and the address book is specific to each user by default, but you can create shared address books as well. Again, that is synced two ways.
For LDAP, by default nextcloud only reads it. But you can enable LDAP writing as well.
I do this with nextcloud (and lldap for the user management). Though that could probably be overkill for just contacts and calendars.
Have you tried the IKEA? I can’t comment on the colour accuracy, but they are non cloud, you just need a ZigBee gateway somewhere (like a Conbee II)
If you use the linuxserver.io image, as of last month yes. They migrated to everything updated through the docker container.
I’ll provide an ELI5, though if you actually want to use it you’ll have to go beyond ELI5.
You contact a web service via a combination of IP address and port. For the sake of simplicity, we can assume that domain name is equivalent to IP address. You can then compare domain name/port with street name/street number: you need both to actually find someone. By default, some street numbers are really standard, like 443 is for regular encrypted connection. But you can have any service on any street number, it’s just less nice and less standard. This is usually done on closed networks.
Now what happens if you have a lot of services and you want all of them reachable at address 443? Well basically you are now in the same situation as a business building with a lobby. Whenever you want to contact a service, you go to 443, ask the reception what floor they are in, and they will direct you there. The reception desk is your proxy: just making sure you talk to the right people.
I did consider it, and I have not cancelled the old one yet. But that becomes more expensive than migrating to the higher end plan without CG NAt of the provider.
No dedicated opt-out offered, but I can migrate to the 3Gbps plan that is not using CG-NAT (for now…) But that is £25/month more expensive. That’s a nice VPS.
Yes exactly
Indeed, the way they did that makes me quite angry. But at the same time, that’s 1Gbps vs 20Mbps upload, and I was struggling with the limitation when working from home sometimes. The one one is also cheaper so if the tunneling option works without too much pain, I’d be willing to give it a go.
Around 20-25% power consumption reduction against native resolution, that’s neat.