• 0 Posts
  • 35 Comments
Joined 2 years ago
cake
Cake day: June 12th, 2023

help-circle










  • Well, it could change the meaning of the prompt unintentionally.

    The real challenge is that this technology is not universally accessible so people aren’t learning effective use-case and prompt strategies.

    Whilst 1B models are easy enough to run and have plenty of use, nobody can teach this, its a nightmare on Windows and most universities have collapsed under their own weight. Half my comp sci profs didn’t know python 10 years ago and I know for a fact this hasn’t improved (hiring developers – not fun).





  • That’s a fair point. But it also depends on the application as well.

    To use the example from earlier, good luck getting Emacs 25 to run on Windows 11.

    …but maybe another perspective is that it works really well with Windows because they prioritise backwards compatibility at the expense of development time and they can do that because they’re a large company and as a large company the community gets a very little say in the way that their operating system works.

    Linux is your operating system. It’s community driven and community developed and one of the expenses of that is that users are going to need a higher degree of technical capacity. The trade-off is that you get more privacy, and more say.

    However, I believe that it’s achievable for most users.

    I mean this sincerely, how can I help? I’m not an expert but i did teach this to university students and I’m a big advocate of privacy. What would you like to see?


  • Yeah I’ve installed heaps of old apps, it depends on dynamic vs static libraries etc but some people still use Emacs 25…

    I have lost power whilst updating, can be a nuisance depending in the distro, but snapshots (zfs and btrfs both work well for me) have been life saving.

    Mac and windows simply don’t have a lot of quality of life features. Working with them is painful. As self a documenting systems they are fantastic though, however, when I was younger we had things called schools that served to address that gap, these have fallen out of favour in modern times.



  • Hawk@lemmynsfw.comtoProgrammer Humor@programming.devTradeoffs
    link
    fedilink
    arrow-up
    18
    arrow-down
    1
    ·
    4 months ago

    The key is identifying how to use these tools and when.

    Local models like Qwen are a good example of how these can be used, privately, to automate a bunch of repetitive non-determistic tasks. However, they can spot out some crap when used mindlessly.

    They are great for skett hing out software ideas though, ie try a 20 prompts for 4 versions, get some ideas and then move over to implementation.


  • Set up wireguard in a docker container and then forward the port to wireguard, the default container on docker hub is fairly straightforward and you can always ask me for help if you need :).

    However, If you are using ipv4, you need to make sure that you’re not behind a CG-NAT (If you think you might be, call your ISP and tell them you have security cameras that need to get out or something like that).

    You could also try tailscale which is built using wireguard with nat-busting features and a bit easier to configure (I dont personally use it as wireguard is sufficient for me).

    After that Caddy + DNSMasq will simply allow you to map different URLs to IP addresses

    • dnsmasq
      • will let you map, E.g. my_computer -> 192.168.1.64
    • Caddy (Or nginx, but caddy is simpler)
      • will let you map to ports so e.g.:
        • with DNS (DNSMasq as above)
          • http://dokuwiki.my_computer -> http://my_computer:8080
        • Without DNS
          • http://dokuwiki.192.168.1.64 -> http://192.168.1.64:8080/

    Caddy and DNSmasq are superfluous, if you’ve got a good memory or bookmarks, you don’t really need them.

    VPN back into home is a lot more important. You definitely do not want to be forwarding ports to services you are running, because if you don’t know what you’re doing this could pose a network security risk.

    Use the VPN as the entry point, as it’s secure. I also recommend running the VPN in a docker / podman container on an old laptop dedicated just to that, simply to keep it as isolated as you can.

    Down the line you could also look into VLan If your router supports that.

    I personally would not bother with SSL If you’re just going to be providing access to trusted users who already have access to your home network.

    If you are looking to host things, just pay for a digital droplet for $7 a month, It’s much simpler, You still get to configure everything but you don’t expose your network to a security risk.