• 6 Posts
  • 131 Comments
Joined 3 years ago
cake
Cake day: June 22nd, 2023

help-circle
  • My ISP provides a /48 for IPv6 via prefix delegation so all internal machines that support it have a ULA and DHCPv6. I have disabled SLAAC . In docker I assign a /64 of that prefix to docker containers. The local addresses is what most of the internal network stuff is based on (DNS etc) rather than the globally accessible address. The PD addresses are only about going onto the internet.

    SLAAC actually is just fine, I just didn’t really want to be exposing the manufacturer information of the addresses online so preferred DHCP, but either or both together works from OpenWRT prefix delegation.










  • I keep trying to use the various LLMs that people recommend for coding for various tasks and it doesn’t just get things wrong. I have been doing quite a bit of embedded work recently and some of the designs it comes up with would cause electrical fires, its that bad. Where the earlier versions would be like “oh yes that is wrong let me correct it…” then often get it wrong again the new ones will confidently tell you that you are wrong. When you tell them it set on fire they just don’t change.

    I don’t get it I feel like all these people claiming success with them are just not very discerning about the quality of the code it produces or worse just don’t know any better.



  • I still had some issues with the mouse speed on cachyos even after I disabled acceleration. I felt off on its default and I ended up boosting it. Thing is my mouse has its speed inbuilt so I don’t need external software or anything else to configure it on Linux so I don’t understand why I had to boost the speed to make it behave a bit better, it felt like there was some latency as well.



  • Theft has a very specific definition, critically it requires the taking of something so that someone else is permenantly deprived of the thing. When something is cloned or copied its not theft, its all intellectual law driven so copyright and trademark breaches. No one is deprived of the product, only potentially the payment for a service.