LinkedIn: https://www.linkedin.com/in/alexander-merritt-a5783119/
Personal: https://alexmerritt.de
I've coordinated a lot of vulnerabilities in my day, but never have I had to even think about something as difficult as this one
On iPhone you either struggle tapping with a fat finger to move the cursor, or long-press spacebar and fight to get it into just the right spot.
On iPhone you either struggle tapping with a fat finger to move the cursor, or long-press spacebar and fight to get it into just the right spot.
~> du -Ash foo
4.2G foo
~> du -sh foo
6.4G foo
foo consumes 4.2Gi of "normal" storage, but after expansion remains with old data:parity ratio. Rewrite it:
~> zfs rewrite -P -r foo
~> du -sh foo
4.2 G
~> du -Ash foo
4.2G foo
~> du -sh foo
6.4G foo
foo consumes 4.2Gi of "normal" storage, but after expansion remains with old data:parity ratio. Rewrite it:
~> zfs rewrite -P -r foo
~> du -sh foo
4.2 G
No alternatives to obtain these books locally, so my kids are stuck without their choices, or I end up paying more. Nobody wins here.
No alternatives to obtain these books locally, so my kids are stuck without their choices, or I end up paying more. Nobody wins here.
@alex.zenla.io explains why we wrote the the Xen control plane in Rust.
@alex.zenla.io explains why we wrote the the Xen control plane in Rust.
This article from @kaylintrychon.bsky.social in @thenewstack.io breaks it down:
The real threat isn’t prompts—it's your architecture.
thenewstack.io/ai-security-...
This article from @kaylintrychon.bsky.social in @thenewstack.io breaks it down:
The real threat isn’t prompts—it's your architecture.
thenewstack.io/ai-security-...
thenewstack.io/what-you-nee...
thenewstack.io/what-you-nee...
In some cases, Edera can launch containers faster than Docker due to how we handle container images.
In some cases, Edera can launch containers faster than Docker due to how we handle container images.
I wrote my thoughts here:
edera.dev/stories/appl...
I wrote my thoughts here:
edera.dev/stories/appl...
We're starting a blog series exploring confidential computing and ways organizations can think about implementing it.
We're starting a blog series exploring confidential computing and ways organizations can think about implementing it.
Good excuse to upgrade to the 6-series though. Hopefully the newer series is cooler, so I don't need to drill small fans to the heatsink.
Good excuse to upgrade to the 6-series though. Hopefully the newer series is cooler, so I don't need to drill small fans to the heatsink.
After you log in via SSH, capture the value of SSH_AGENT_AUTH. Attaching to your tmux session, overwrite the current variable with the captured socket path.
After you log in via SSH, capture the value of SSH_AGENT_AUTH. Attaching to your tmux session, overwrite the current variable with the captured socket path.