today's leftovers
-
New attacks use Windows security bypass zero-day to drop malware
-
From QNAP QTS to TrueNAS Scale | Ganneff’s Little Blog
So for quite some time I have a QNAP TS-873x here, equipped with 8 Western Digital Red 10 TB disks, plus 2 WD Blue 500G M2 SSDs. The QNAP itself has an “AMD Embedded R-Series RX-421MD” with 4 cores and was equipped with 48G RAM.
Initially I had been quite happy, the system is nice. It was fast, it was easy to get to run and the setup of things I wanted was simple enough. All in a web interface that tries to imitate a kind of workstation feeling and also tries to hide that it is actually a webinterface.
Naturally with that amount of disks I had a RAID6 for the disks, plus RAID1 for the SSDs. And then configured as a big storage pool with the RAID1 as cache. Below the hood QNAP uses MDADM Raid and LVM (if you want, with thin provisioning), in some form of emdedded linux. The interface allows for regular snapshots of your storage with flexible enough schedules to create them, so it all appears pretty good.
-
Secure and efficient QNetworkAccessManager use
Doing HTTP operations with Qt is relatively straightforward, but there are also a few pitfalls, unexpected default settings and low-hanging performance improvements around it worth keeping in mind.
-
How to Bootstrap a Django Application with Docker – NextGenTips
In this tutorial, we will learn how to bootstrap a project to use Docker. I have loved to dockerize my application from the start because it gives me freedom from using a virtual environment. It saves you a lot if you are a DevOps person. You don’t have to install many dependencies every time for any programming language you are working on.
Before you can start any project, we need to create the following files, if you are looking to dockerize your environment.
-
17 open source technologists share their favorite keyboards | Opensource.com
Keyboards are necessary to work with a computer system whether it's for coding, writing, or moving around items in a spreadsheet. They allow access to a computer's peripherals and are used to get deep into the operating system of any computer. Keyboards come in all shapes and sizes. Some are more comfortable to use than others. We asked our community members to share the best (and the worst) keyboard they'd ever used. Some of the answers might surprise you!