In other countries, malls are still alive and well. In Philippines, that is where people literally chill in a hot tropical climate because of 24/7 air conditioning!
Malls are also seen as a sign of progress and modernity for many developing countries, so there is some cultural expectations to building and maintaining malls.
In US, we way overbuilt malls. There’s just too many. While I’m not a fan (shopping is not a destination, and I want to get it done as quickly as possible), I’m not entirely convinced they’re dying here either. Some people do like shopping and some people like the community experience. 3/4 of malls need to die, but we’ll see if it settles on a more sustainable number, or if online shopping ate their face
In the US we’re having a bit of a crisis of “third places”. Where do people hang out as a community? Where do you go? So many newly built suburbs don’t have any approximation of town center or community places. Malls served that need for a few decades, but many are going away. Now we’re trying to replace malls with “shopping districts”, basically rebuilding town centers that too many suburbs never had…. Plus they seem to be just a mall with less roof
+1 for cmk. Been using it at work for an entire data center + thousands of endpoints and I also use it for my 3 server homelab. It scales beautifully at any size.
You haven’t provided any info about your partition scheme for either drive, but I assume you’ve got your bootloader installed in an EFI partition in the newer drive. You will still have an EFI partition on the old drive created by the Ubuntu installer, so just be sure you know which bootloader you’re using.
Option 1 and 2 aren’t functionally any different. It’s not clear what issues you’re worried about, but if you’re nervous about breaking the Ubuntu installation, you might just want to wait until you can get the new drive.
You also don’t give any indication of how much data you have that you want to keep. If the 2tb drive is almost full, you have fewer options than if it is mostly empty or half full. You could resize your EXT4 partition and create a new partition, for example, allowing you to mount a fresh, clean filesystem to a subfolder in your home directory. Once the data migration is finished, you can format the old partitions and mount them somewhere else, or resize the newer partition over them. Be aware that your HDD will eventually fail mechanically, however. Maybe 5 years from now or next week, but they all fail someday.
It’s not clear to me what the goal of option 3 is, but it’s dependent on how you use your machine. If you want to install a lot of applications or games that you want to run fast, you don’t want to migrate a bunch of your data to your newer SSD. If you just want a temporary place to store the data you want to keep until you can format the old drive, I guess this is a fine approach, but creating a dedicated user for this is just adding unnecessary complexity, IMHO.
You haven’t provided any info about your partition scheme for either drive, but I assume you’ve got your bootloader installed in an EFI partition in the newer drive. You will still have an EFI partition on the old drive created by the Ubuntu installer, so just be sure you know which bootloader you’re using.
Yes, the new drive has a boot partition mounted to /boot/efi, according to the Disks utility.
It’s not clear what issues you’re worried about, but if you’re nervous about breaking the Ubuntu installation[…]
Actually, that’s a good point. I’m expecting to get rid of the installation anyway, so I don’t need to worry about breaking anything there.
It’s not clear to me what the goal of option 3 is
Same as option 2, avoiding breaking a system I’m getting rid of anyway.
Thanks for pointing out the errors in my line of thought!
Given that complex life as we know it is only about 500-600 million years old, around the time of the Cambrian Explosion, the only image that comes to mind is two Eukaryotic cells getting frisky, having a one replication stand, then parting ways
Plastic is pretty stable. Since this is an aquarium it isn’t get direct sunlight at a rate to make the plastic degrade to the point of polluting the water.
Also, since it’s an aquarium, the are already many kinds of plastics involved. The pumps, tubing, filters, and so on all contain plastic that would have a heater likelihood of degrade sure to mechanical action.
Reef tank owner here. People who make these use a type of plastic known to not degrade and become an issue. All is good!
Most plastic (not all, but most) is good to go. It’s metal you have to worry about. Or lotion on people’s hands / makeup.
If something is bad for a reef tank, you usually find out pretty quick with quick deaths. The ocean doesn’t tolerate contamination or fluctuations of anything - it likes things very stable…
Eduroam is just a network of RADIUS servers that cross-honor authentication among participating institutions. If your org participates in Eduroam, it means users from your org can connect to the eduroam WiFi SSID at other orgs, and vice-versa. It’s helpful for traveling academics and visitors from other .edus
It’s also frequently used to authenticate access to online resources like online libraries, journals, and research infrastructure. Useful for when schools collaborate on grant projects.
The eduroam service requires a CA certificate to validate the APs broadcasting eduroam’s SSIDs are providing the real service. The issuer of that certificate isn’t one of the well-known SSL certificate resellers, so it needs to be installed in your device’s CA store, or configured in your 802.1x WPA supplicant. The protocol used is EAP-TLS, if you’re curious.
So what can the hosting institution see? Not much, from an authentication standpoint. Transactionally, the hosting institution sees a username and org name in an outer transaction. An encrypted payload with your user credentials is then tunneled to your home org’s servers which either validate or invalidate those credentials. If the home org validates, then the hosting org lets you connect.
Beyond that, the network admins can “see” whatever they can normally see when you’re using someone else’s infrastructure: your DNS queries, the application ports you use, a lot of encrypted SSL/HTTPS traffic, plus the contents of anything that isn’t encrypted or sent over SSL.
Some orgs disallow tunneling traffic out when you’re on their eduroam, so sometimes IPSec, SSH, Tor, and maybe even WireGuard are disallowed.
Sorry, I think this is very helpful but unfortunately I’m not english + don’t have much knowledge on the matter, so I really don’t understand much of the things you said…
Thank you for answering, but I must ask you (if you have the time) to explain if they could see or not what I was doing 😭
Slightly longer: Someone can probably see your connections to google and notion and infer that you are using Notion, but they cannot see your Google/Notion account and not what content you are working on. (Also those are very popular tools, unless you are the enemy of the state number 1, why would they care?)
Even longer: If your laptop or your gmail or your notion account is compromised, they can see everything.
You’ve asked a similar question here before this post. Have you been naughty? :-)
At your uni, you probably have what’s called a reasonable expectation to privacy-- the terms of use for accessing the computer and network facilities would be spelled out at your uni’s IT website.
The information observed and reported on by their tools most likely amounts to what websites and services you looked up by name, and the IP addresses & ports you accessed while using their network. It will be things like start & stop times, protocol used, number of bytes transferred, and maybe some “flags” on the connection. Flags in this case are special markings on the data flow to give the network hints about how to hand that traffic most efficiently.
MS Office Online, Notion, Gmail, they all use secured HTTPS connections, so the content is secured between you and the remote service.
As long as you’re not doing anything illegal or that severely violates the terms of use laid out by the University, nobody will even notice your traffic. Hack away.
No more than someone running a coffee shop wifi would see. Some basic traffic for name resolution then encrypted traffic for web browsing that they can’t read. Unless your notes application transmits in cleartext (unlikely).
kbin.life
Newest