Nixos, meaning to try Gnuix but I got projects to finish!
- 5 Posts
- 871 Comments
mvirts@lemmy.worldto
Linux@programming.dev•Why I switched to NixOS (And why you should, too) - Márcio Sobel
1·15 days agoI am a nixos fan, I do tell people to use nixos, but for some reason all these switch to nixos posts feel sus. Idk.
mvirts@lemmy.worldto
Programming@programming.dev•How would you design parallel grep for huge JSONL files?
2·15 days agoIf you’re writing a program, definitely multiple threads or processes that each scan a chunk of the file, which basically means seek to the start of the chunk, read lines into the scan code until you hit the end of the chunk. For jsonl each chunk will need an alignment step to not break the jsonl.
For command line trickery, maybe the file could be chunked up by running multiple dd instances with an offset parameter piped into grep. This has many synchronization issues and all the outputs should be captured separately then combined afterwards. I can’t think of a good way to align this method to line edges but maybe you can put some fancy regular expression magic into the grep step to ignore malformed json at the beginning and end and overlap the chunks?
Grep is fast already, maybe test the simple approach and see how long it takes.
Local LLMs and learning CUDA on a machine with 6 1070Ti GPUs… Some of it works out of the box… For other stuff I’m having to explore what will work on the sm61 cuda architecture.
Also getting better at running a pair of old 3d printers.
I’m not one to buy new hardware if you can’t tell :P
I wouldn’t say it’s the only sane way, but it’s certainly my favorite
I think nix just has name recognition, that’s why I use nixos not guix :/
Guix really should be called Gnuix, maybe that name was already taken.
mvirts@lemmy.worldto
Linux@lemmy.ml•The Engineer Who Tried to Put Age Verification Into Linux
1410·24 days agoWhat is this, open source software for ants!?!
This whole story is ridiculous. Put it behind a compile flag and merge it, we all know first across the finish line gets bonus 5 years of standardization.
It’s the law that’s a problem, not the software.
If you can see how the other machines on the network access the drives, like with
net usein the windows command prompt, then you will know the protocol and address and share name to connect to.If it’s something like \\computername\a\path\here that’s a windows file share which you can connect to with samba. On modern Linux desktop systems you can sometimes get away with opening a file browser and typing in a location like smb://computername/a/path/here and it may just work
Keep in mind computername could be an IP address instead, and some file browsers are sneaky about letting you type in a path (nautilus/gnome, which I think is Ctrl+L) if smb://… Doesn’t work smbfs:// may be worth a try
mvirts@lemmy.worldto
Technology@lemmy.world•Why does this website feel like the end of FOSS?English
1·1 month agoWait, this makes no sense. Just ask your AI to write the libraries you need rather than clone an existing project
mvirts@lemmy.worldto
Technology@lemmy.world•Why does this website feel like the end of FOSS?English
1·1 month agoNow the next gpl needs to protect code written based on the docs
mvirts@lemmy.worldto
Linux@lemmy.ml•Will I survive the Linux CLI if I only switch because I'm a student and Arch distro speed?
1·1 month agoYes, you’ll be fine
mvirts@lemmy.worldto
Linux@programming.dev•Ubuntu and Fedora devs comment on California's new Digital Age Assurance Act
5·1 month ago~/.local/share/user-age
Boom, UNIX
Many fancy motherboards have a button to reset these settings as well. Often the bios settings are referred to as CMOS settings as well.
Definitely friend, especially the spineless variety
mvirts@lemmy.worldto
Linux@lemmy.ml•Looking for an OS that I can plug in to any (Android) phone and run it.
1·1 month agoI don’t know of any project to do this, but it’s an interesting idea.
For most/all phones, you would need to break the phone’s software security to boot another OS. To boot via USB the phone’s firmware would need to support that, or a sufficient USB vulnerability could be used to take over a running system and boot into a new OS. This would almost certainly be unreliable and only work on specific devices.
Note that if part of your goal is to extract data from the phone, only old phones store data unencrypted these days. One advantage of using a vulnerability to hijack the current os would be the availability of the keys to decrypt the phone’s storage if the storage is already unlocked.
Although it’s not as interesting, you certainly can load firmware on an android device that will boot from USB. Not sure if this already exists or would need to be built.
Time to take over the HOA. Now everyone must xeriscape
mvirts@lemmy.worldto
Linux@lemmy.ml•Audacity (cant record desktop audio, stuck on alsa)
1·2 months agoHave you tried changing the connections in this script to use the audacity inputs instead of pw-record?
Also I thought audacity was out, tenacity is in.
Also it looks like wireplumber has some options that my be relevant like node.features.audio.monitor-ports listed here:
https://pipewire.pages.freedesktop.org/wireplumber/daemon/configuration/settings.html
mvirts@lemmy.worldto
Asklemmy@lemmy.ml•What book, movie, etc. do you wish there was more of?
1·2 months agoLower decks



That’s what the martians said about Earth