Not a lawyer.
But how to “cover your ass”.
If pressured to still send a quote with it included, ask your manager to email over the details - ie get it in writing.
You are looking for them to tell you to include this unprovidable service in the quote as part of the details/instructions.
IE your manager to tell you to do the unethical thing in writing.
And respond back along the lines of “as discussed, we can’t provide this service and can’t procure it from the upstream provider. However I will do as instructed and email the quote to the customer with this service included”.
This is indicating that you have discussed it (ideally save any other emails about this subject).
If your boss emails back “we haven’t discussed this”, then raise the issue in writing and don’t send the quote until it is resolved by email (if your boss talks to you in person, feel free to send a “follow up” email outlining what you discussed and ask for clarification).
If your boss emails back “do as you are told”, then do as you are told.
Save all the emails.
BCC to a personal account will be seen in server logs. Better to export backups or take screenshots and put them on a USB. Or ZIP them with a password and find a way to exfil them without raising red flags if USB devices are restricted. There are many ways to do this, I’m sure I can suggest some.
Generally, working under instruction where your pushback might lead to termination generally results in unfair dismissal and settlements.
Especially if you can prove that you have raised the issue, and still been told to proceed.
It doesn’t sound like this is a risk-to-life or risk-to-public scenario, so I don’t think “whistle blower” procedures are needed.
Doesn’t even have to be an instance.
Custom code that runs the pubsub protocol… Without publishing anything.
Everything is open.
Unless instance admins find the pubsub instance suspicious and defederate it, at which point it won’t be able to receive posts/comments
Maybe a case with additional buttons?
https://www.ipitaka.com/products/pinbutton-phone-cases
Found that from googling. No idea how good/useful it is.
I was aware of kubernetes 6 months ago, but had never used it.
I got a 3 node cluster running in a day, and was learning kubernetes.
The only issues I’ve had were due to hardware failure causing etcd instability, and misconfigured operators generating terabytes of logs leading to pod eviction.
I don’t know what would signify it being production ready. It had all the levers and knobs I needed. I haven’t yet needed to run a sysadmin debug container to poke around the host OS.
It’s also great for learning. If you make a mistake, it’s very easy to wipe and reinstall and get back to where you were.
Talos is great
I see no reason you can’t use yaml.
Yaml and json are essentially identical for basic purposes.
Once the scraper has been confirmed working, are you going to be doing a lot of reading/editing of the raw data? It might as well be a binary blob (which is a bad idea as it couples the raw data to your specific implementation)
Perhaps my post is alluding to the requirement of more communication.
Maybe a pinned quarterly report?
Thanks.
I would like to have some help with server and maintenance costs. Currently the site costs about $2,100 USD a year to run, but a large portion of that was for the initial domain name purchase which was around $580 USD.
Thankfully we’ve grown pretty slowly so it hasn’t cost so much so far, but it will begin to add up soon. @snowe2010
@snowe2010’s goal is to earn $200 per month
58% towards $200 per month goal
Can only sponsor through GitHub?
Some do?
Some mines are designed to have a time limit on them and become inactive after a set period of time.
However, other mines can remain active and dangerous for many years after the conflict has ended.
According my linked article:
US officials says the mines they send Ukraine will be “non-persistent”, meaning they have an internal mechanism to shorten the lifespan of the trigger.
The mines are designed to become inert after a set period of time ranging from as little as four hours to two weeks, officials said.
They say the mines use an electrical fuse that requires a battery, and the mine becomes inert when the battery runs out.
The US intends for Kyiv to use the anti-personnel mines in the eastern part of the country, US officials said, where Russian troops have made slow and steady progress against Ukrainian defensive lines.
Ukraine has also made assurances they will try to limit the risk to civilians.
And in rust!
Just buy from the EU.
Yes, but…
The same could happen the the EU, as with any foreign power.
It’s unlikely as the EU is fundamentally built differently. But it could, no doubt a country that wanted to push through their adjenda by exploiting loopholes that haven’t been discovered/exploited because of “decorum” could still happen.
Buy source-provided.
So, you get everything you need to maintain the platform with the purchase cost.
If you want updates and improvements, they have additional cost.
Like so many software licencing models. 1 year of updates - except it’s source provided.
It’s more expensive, but you get what you pay for.
Renew your licence every year for another year.
Stop paying? You get to use the EJ69 fighter jet platform as it was in 2019 for as long as you can manufacture parts for it.
Or you could buy the cloud-hosted fighter jets. And risk the off-switch. But it’s less upfront cost, higher long-term cost
Sleeping on an airport bench for your 2 week business trip knowing you’re getting fired when you get home
On jerboa, I see 😈 MedicPig 🐷 BabySaver 😈 as your name on all comments
Well, I guess the EU is 26/27th decent.
However, the EU is working towards defunding (I guess pushing-to-change, aka punishing) shitty members.
https://theconversation.com/why-has-the-eu-stripped-hungary-of-1-billion-the-latest-confrontation-explained-246614
So yeh, the EU isn’t perfect. It’s working on it, and it is making progress.
Nice when an oversight body isn’t corrupted
Pretty sure that and the White House advert halted the dip the last few days.
Except fElon hasn’t changed, so down it goes!
accessed from the internet
Accessed only by you and close family/friends who you are also hosting services for?
Or accessed by anyone?
“Accessed by anyone” carries more risk.
“Accessed by users you host for”, the risks can be eliminated (well, other than risks from those users) by using a VPN. As in, only the people authorised to be on the VPN can access the services.
Wireguard is the go-to these days.
Tailscale is much easier and free for 3 users and 100 nodes.
If it absolutely has to be “accessed by anyone” I would look into a “reverse proxy over VPN/tunnel” or just straight tunnel style approach like chisel (or crowbar, or corkscrew), rathole, frp, or cloudflare tunnels.
Basically, don’t point a domain at your home public IP and don’t forward ports on your home router/firewall
As an augmentation, the ability to spot and track objects visually would be amazing.
But then planes just have to fly above 10k ft, and pretty much guaranteed cloud cover.
DNS and domains are just human-friendly IP addresses.
You only have 1 public IP address.
So, to access different services you need to use different ports.
Or run a service on a single port in front of the other services that can understand the connections and forward the connections to the actual services - known as a reverse proxy. In the case of http/https, there are plenty of reverse proxies that can direct requests based on all sorts of parameters, subdomains being one of them.
If you are just starting out, I’d recommend a docker compose stack and Nginx Proxy Manager.
Learning containers & docker makes everything easier.
NPM is a very easy to use reverse proxy with a nice GUI, so you don’t have to configure CertBot/ACME or learn the specific config language of Nginx.
If you are unsure of domains and all that, you can try it out for free.
Your computer has a hosts file (/etc/hosts on Linux, I think it’s in system32 on windows). This allows you to tell the computer “for the domain example.com use the IP 10.0.0.200” or whatever you want. You need a hosts file entry for each subdomain.
What this means is that you can run up a docker compose stack on your computer and point a bunch of sub domains to 127.0.0.1, use self-signed certs, and play around with nginx proxy manager and docker.
No money spent, no records published, no traffic leaving your computer.
Zero risk.
There are loads of tutorials out there on NPM and docker compose stacks. Probably some close to your specific requirements.