Hi there! Looks like you linked to a Lemmy community using a URL instead of its name, which doesn’t work well for people on different instances. Try fixing it like this: !breadtube
I need some help with Handbrake and HDR not encoding on AV1 SVT, 10bit and NVEnc. I haven’t been able to find an appropriate instance to ask about it so I figured my pirate buddies might be able to help me find a place.
Hi there! Looks like you linked to a Lemmy community using a URL instead of its name, which doesn’t work well for people on different instances. Try fixing it like this: !av1
Hi there! Looks like you linked to a Lemmy community using a URL instead of its name, which doesn’t work well for people on different instances. Try fixing it like this: !lemmy, !fediverse, !fediverse, !fediverselore, !lemmydrama
Starlings¹, derived from the Old #English word 'Staer', are known for their mesmerizing gatherings in massive flocks during autumn and winter, a breathtaking spectacle known as murmurations.
In #mythology, Starlings have an intriguing connection to Myna birds², both of which are capable of mimicking human speech. One fascinating tale from medieval #Welsh lore revolves around Branwen³, the daughter of Llyr. Mistreated by her Irish husband, Branwen teaches a tamed starling to speak and sends it across the #Irish Sea to inform her brother, Bran, who then raises an army to rescue her. This myth highlights the intelligence attributed to starlings and their association with communication and aid in #folklore.
Additionally, historical names for Starlings reflect various aspects of their behavior and appearance. For instance, the term "Sheep Stare" from #Somerset highlights their habit of alighting on the backs of sheep to pick at ticks in their coats, a behavior beneficial to both parties.
is a booster-bot not really of linux, I would say ANTI-LINUX, and promotes constantly marketing by 3-4 corporations that seek to dominate linux and displace all alternatives.
Hi there! Looks like you linked to a Lemmy community using a URL instead of its name, which doesn’t work well for people on different instances. Try fixing it like this: !linux
<p>In a novel exploration into the intricate ways our physical states impact our use of words, researchers have discovered a fascinating link between poor sleep quality and an increased use of specific types of arousing language, namely humor and curse words. The study, published in<em> <a href="https://doi.org/10.1007/s12144-024-05665-7">Current Psychology</a></em>, suggests that those experiencing poor sleep quality may be more inclined to use arousing forms of language as a physiological mechanism to counteract feelings of tiredness.</p>
<p>Prior studies have extensively documented individual differences in the use and appreciation of humor and the use of curse words, focusing on the effects of such language on listeners and identifying various factors, including gender, age, temperament, personality, political orientation, and culture, that influence humor usage. However, most of these studies have not explored the impact of using arousing language on the speakers themselves.</p>
<p>Given the established effects of word arousal on cognitive processing and physiological responses, and the known <a href="https://www.psypost.org/repeating-the-f-word-can-improve-threshold-for-pain-during-an-ice-water-challenge/" target="_blank" rel="noopener">benefits of humor and cursing in coping with pain</a> and stress, this study aimed to investigate the relationship between sleep quality and the use of arousing language, hypothesizing that fatigue might increase the propensity to use such language.</p>
<p>“Since around the time I was in first grade, I have been interested in words and word meaning,” said study author Shelia M. Kennison, a professor of psychology at Oklahoma State University and author of <em><a href="https://www.apa.org/pubs/books/cognitive-neuroscience-humor" target="_blank" rel="noopener">Cognitive Neuroscience of Humor</a></em>.</p>
<p>“Curse words are fascinating when considered as a type of word. Most people use them but may not want to admit to using them. They can cause humor (e.g., when small children use them) and fear (e.g., in a confrontation). In the present study, I was interested in the idea that our use of curse words may be linked to biological processes (i.e., our physiological levels of fatigue) operating below the level of consciousness.”</p>
<p>The research team gathered data from a sample of 309 undergraduate students enrolled in psychology and speech communication courses. To assess the various constructs of interest, the researchers utilized a set of existing, validated measures. Participants completed these measures via an online survey, which also included demographic questions and an attention check to ensure data reliability.</p>
<p>The use of humor was evaluated using the Humor Styles Questionnaire, which identifies four distinct humor styles: affiliative, self-enhancing, aggressive, and self-defeating. Participants rated their agreement with statements on a 7-point scale, reflecting the extent to which each statement described their humor usage.</p>
<p>Curse word frequency was measured through a self-report mechanism where participants indicated how often they used 20 common English curse words, ranging from “never” to “very frequently” on a 6-point scale. This approach aimed to quantify the frequency of curse word usage in everyday language.</p>
<p>Sleep quality was assessed using two instruments: the MOS Sleep Problems Index-II (SPI-II) and a subset of items from the CESD-R depression symptoms measure focused on sleep-related symptoms (CESDR4). These measures required participants to reflect on their sleep experiences over the past four weeks and the most recent week, respectively, providing a multifaceted view of sleep quality.</p>
<p>Lastly, sensation-seeking was measured using the Sensation Seeking Scale-Version V (SSS-V), which evaluates the tendency towards thrill and adventure seeking, experience seeking, boredom susceptibility, and disinhibition. This scale helped to control for personality traits that might influence both sleep quality and language use.</p>
<p>One of the key discoveries was the significant correlation between poor sleep quality and the increased use of self-defeating humor. This specific style of humor, characterized by making oneself the target of jokes, was more commonly reported among participants who experienced more sleep problems.</p>
<p>Additionally, the study found a notable relationship between sleep quality and the frequency of curse word usage. Participants who reported more sleep issues were also found to use curse words more frequently. This relationship was evident with both sleep quality measures, indicating a consistent pattern across different aspects of sleep assessment.</p>
<p>The findings suggest that not only does poor sleep affect the type of humor one might use, but it also influences the propensity to use language that is considered more arousing, such as curse words.</p>
<p>“I am always surprised at the relatively high frequency of self-reported cursing among students at my university, which is in the Bible belt and a fairly conservative region of the country,” Kennison said. “One might imagine that our students would avoid cursing due to sociocultural norms here.”</p>
<p>These relationships held even after accounting for other variables, such as gender and sensation-seeking personality traits, indicating a specific link between the physical state of fatigue and the propensity to employ arousing language.</p>
<p>“The causes for our use of curse words are complex and include biological factors (e.g., are we tired),” Kennison told PsyPost. “Some of the biological factors may not be completely under our voluntary control.”</p>
<p>“The general public may see the use of curse words as completely about someone choosing to curse and all about the person’s disposition and/or character (i.e., people who curse a lot are not good people). The research suggests that people who curse a lot may have biological processes occurring that are contributing to it. They are not necessary of poor or questionable character. It may be that they are tired.”</p>
<p>While this study provides valuable insights, it also has limitations, including its reliance on self-reported measures and its cross-sectional design, which restricts the ability to infer causation.</p>
<p>“A self-report methodology was used,” Kennison noted. “Participants estimated their curse word usage frequency. We suspect that the data are underestimates of curse word usage, as many people may view cursing a lot as not ideal given social norms (especially their parents preferences).”</p>
<p>“In future research, I would like to explore the same variables using methods where I would be able to track curse word usage and fatigue throughout the day across many days (i.e., experience sampling methodology). Because curse words are relatively infrequent and because people may be somewhat reluctant to admit how often they curse, it is a difficult topic to study.”</p>
<p>This research offers a pioneering look at how our physical states, particularly sleep quality, can influence our choice of language, shedding light on the complex interplay between physiological well-being and communication. It opens up new avenues for understanding the adaptive functions of language and highlights the importance of considering physiological states in psychological and linguistic research.</p>
<p>“In two studies now, we have found links between the use of curse words and the use of humor, which is also a type of verbal behavior that is related to changing our level of mood and alertness (i.e., increasing positive mood and increasing arousal),” Kennison said. “These types of language use not only affect those listening to the words, but in my view also affects the physiology of those producing the language.”</p>
<p>The study, “<a href="https://link.springer.com/article/10.1007/s12144-024-05665-7" target="_blank" rel="noopener">The relationships among sleep quality, humor styles, and use of curse words</a>,” was authored by Shelia M. Kennison and Maria Andrea Hurtado Morales.</p>
Hi there! Looks like you linked to a Lemmy community using a URL instead of its name, which doesn’t work well for people on different instances. Try fixing it like this: !kde
I created a lemmy instance and noticed the stats on the index page showed that the instance had 2 users registered, even though only the admin account existed at that point. I created a second account, and now it shows 3 users. However, the database query SELECT name from person WHERE local=‘t’; only shows only the admin...
I’m very new to the Warhammer 40K universe. I found a group that plays role games and I wanted to join that I felt I needed to learn the lore first....
Hi there! Looks like you linked to a Lemmy community using a URL instead of its name, which doesn’t work well for people on different instances. Try fixing it like this: !piracy
<p>In a study published in the <em>Archives of Sexual Behavior</em>, researchers have identified femmephobia — negative attitudes toward femininity in men — as a stronger predictor of anti-gay behavior among heterosexual men than other commonly cited factors, such as social dominance. This challenges existing frameworks on discrimination and suggests a need for a shift in focus to address these deeply ingrained societal biases.</p>
<p>Previous studies on discrimination against gay individuals have concentrated on homophobia and hierarchical views, theorizing that prejudices stem from moral convictions or the belief in the inherent superiority of certain groups. Yet, the concept of femmephobia has remained largely underexplored until now. By employing correlational analyses, researchers have been able to draw connections between attitudes and behaviors without directly manipulating study variables — offering a window into the natural occurrence of these phenomena in the general population.</p>
<p>The motivation behind this study stems from a critical gap in understanding the factors that contribute to anti-gay behavior. Researchers wanted to understand how societal perceptions of gender and femininity influence discriminatory actions — proposing that femmephobia could play a pivotal role. This inquiry was driven by the hypothesis that negative views on men’s femininity might be a significant, yet overlooked, behavior that fuels this.</p>
<p>417 heterosexual men ranging from 18 to 35 years old were recruited from Facebook, postcard mailings, and filters — and were all surveyed to gauge their levels of femmephobia alongside other factors like social dominance orientation, right-wing authoritarianism, narcissism, and homonegativity. Through an online questionnaire, participants self-reported their anti-gay behaviors and attitudes towards men’s femininity.</p>
<p>The findings were striking: femmephobia accounted for 23% of the variance in anti-gay behavior, outstripping the combined explanatory power of other predictors such as social dominance orientation, and right-wing authoritarianism. Furthermore, the study revealed that social dominance only predicted anti-gay behavior in the presence of high levels of femmephobia — highlighting a complex relationship between societal biases and discrimination.</p>
<p>In essence, discomfort with men displaying stereotypically feminine behaviors was found to be a significant force driving heterosexual men to engage in anti-gay actions.</p>
<p>While the study is revealing, it crucial to consider where it may fall short — namely, in the realm of reliance on self-reported data, which raises concerns about potential bias, and the studyʼs correlational nature, due to which causality cannot necessarily be inferred from the findings.</p>
<p>Still, the study’s implications extend beyond academia, and can be kept in mind by practical applications for educators, clinicians, and policymakers when crafting policies or other paradigms that challenge societal norms around gender and femininity.</p>
<p>“Our findings emphasize that negative views toward femininity in men powerfully predict anti-gay behavior, outstripping many other previously studied factors associated with anti-gay aggression and discrimination,” the researchers concluded. “The findings suggest that when understanding anti-gay behavior, assessing attitudes toward gender and gender expression, particularly femininity, is an important piece.</p>
<p>“Increasingly positive attitudes toward same-sex relationships, parenting, and the general inclusion of sexual minorities within society may be proliferating. However, ingrained societal notions about the “proper” displays of femininity and acceptable reactions to violations of norms surrounding femininity may persist. These enduring perceptions might explain why anti-gay behavior remains prominent even though societal acceptance of same-sex relationships, in principle, is at an all-time high.”</p>
<p>Rhea Ashley Hoskin, Karen L. Blair, and Diane Holmberg from the University of Waterloo, Trent University, and Acadia University, respectively, authored the present study, “<a href="https://link.springer.com/article/10.1007/s10508-023-02704-5">Femmephobia Is a Uniquely Powerful Predictor of Anti‑Gay Behavior</a>.”</p>
I think of myself as technically inclined. I have installed Linux multiple times and have basic command line knowledge, and I’ve programmed in many languages, with the most experience making a static website game using HTML/CSS/JS....
This was back in '99 and I didn’t know much about linux (or servers) at the time, so I’m not exactly sure what they did… but one morning I woke up and noticed my web service wasn’t working. I had an active login on the terminal but was just getting garbage from it, and I couldn’t log in remotely at all. My guess was that someone hacked in, but hacked the system so badly that they basically trashed it. I was able to recover a little data straight from the drive but I didn’t know anything about analyzing the damage to figure out what happened. so I finally ended up wiping the drive and starting over.
At that point I did a sped-run of learning how to set up a firewall, and noticed right away all kinds of attempts to hit my IP. It took time to learn more about IDS and trying not to be too wreckless in setting up my web pages, but apparently it was enough to thwart however that first attacker got in. Eventually I moved to a dedicated firewall in front of multiple servers.
Since then I’ve had a couple instances where someone cracked a user password and started sending spam through, but fail2ban stopped that. And boy are there a LOT of attempts at trying to get into the servers. I should probably bump up fail2ban to block IPs faster and over a longer period when they use invalid user names since attacks these days happen from such a wider range of IPs.
<p>Researchers have uncovered a complex interplay between social comparison, body surveillance, and selfie behaviors among Chinese female adolescents, highlighting the significant role of self-esteem as a moderating factor. This research, published in the journal <em><a href="https://journals.sagepub.com/doi/10.1177/00332941231162006">Psychological Reports</a>,</em> provides insight into how the pressures of social media and societal beauty standards influence young women’s self-image and online behavior.</p>
<p>The digital age has caused a surge of social media platforms — namely platforms in which posting selfies is a main practice, especially among adolescents. Prior studies have indicated a connection between social media use and various psychological issues, such as body dissatisfaction and negative mood. The act of taking and sharing selfies in particular has been criticized for its potential to exacerbate these issues.</p>
<p>At the heart of this phenomenon are two critical concepts: body surveillance, or the ongoing monitoring of one’s appearance against perceived beauty standards — and social comparison, the tendency to assess oneself against others. These behaviors have been linked to how individuals, particularly women, perceive their physical selves in relation to others.</p>
<p>The motivation behind this study stems from a growing concern over the impact of social media on mental health and self-perception among adolescents. With selfie culture, researchers aimed to delve deeper into the psychological mechanisms that drive selfie-taking and sharing behaviors, particularly among female adolescents. The study sought to explore how these behaviors are influenced by social comparisons on social networking sites (SNS) and whether the process is affected by individuals’ levels of self-esteem and body surveillance practices.</p>
<p>To investigate these relationships, the study utilized a survey method, collecting data from 339 female adolescents averaging 17 years of age, recruited across two high schools in central China. Participants were asked to complete self-report questionnaires that assessed their selfie behaviors, instances of upward and downward physical appearance comparisons, levels of body surveillance, and self-esteem. This allowed the researchers to analyze the relationship between these variables equally.</p>
<p>The findings revealed that body surveillance serves as a mediator between the act of comparing oneself to more attractive peers (upward comparison) and the frequency of selfie posting. In simpler terms, girls who often compared themselves to peers they perceived as more attractive were more likely to engage in behaviors that involved monitoring and scrutinizing their appearance — which in turn led to more frequent selfie posting on social media.</p>
<p>Moreover, the impact of body surveillance on selfie behaviors was found to be significantly stronger among adolescents with lower self-esteem. This suggests that for those with a less positive view of themselves, the cycle of comparison, surveillance, and posting is particularly pronounced.</p>
<p>It is important to consider that the studyʼs design and focus may have certain limitations. These include itʼs cross-sectional nature that only shows associations between variables at a single point in time — not total causality. Additionally, since the research only included female adolescents from China, the findings might not directly apply to other demographic groups or cultural contexts.</p>
<p>Despite these limitations, the research sheds light on the complex dynamics of social comparison, body surveillance, and selfie behavior in the digital age, emphasizing the need for a nuanced understanding of social media’s impact on adolescent well-being.</p>
<p>The study, “<a href="https://journals.sagepub.com/doi/10.1177/00332941231162006">Social Comparison and Female Adolescentsʼ Selfie Behaviors: Body Surveillance as the Mediator and Self-Esteem as the Moderator</a>,ˮ was authored by Zhenyong Lyu, Panpan Zheng, and Dongquan Kou at Yangzhou University.</p>
<p>In a new study published in the <a href="https://doi.org/10.1177/15553434231225909"><em>Journal of Cognitive Engineering and Decision Making</em></a>, researchers from the U.S. Air Force, Leidos, and Booz Allen Hamilton have taken a significant leap in understanding the dynamics of trust within human-machine teams, specifically in the context of military operations involving unmanned aerial vehicles (UAVs).</p>
<p>This research illuminates how fighter pilots’ trust in one component of a technological system can affect their trust in the system as a whole—a phenomenon known as the pull-down effect. Crucially, the study finds that experienced pilots can differentiate between reliable and unreliable UAVs, suggesting that the pull-down effect can be mitigated, thereby enhancing mission performance and reducing cognitive workload.</p>
<p>The trust between humans and machines is a pivotal factor in the successful deployment of autonomous systems, especially in high-stakes environments like military operations. Trust is considered a cornerstone of effective human-machine interaction, influencing operators’ reliance on technology.</p>
<p>Prior research has shown that trust in automation is directly linked to system reliability. However, when multiple autonomous systems are involved, as in the case of UAV swarms, judging reliability becomes significantly more complex. This complexity introduces the risk of the pull-down effect, where trust in all system components is reduced due to the unreliability of a single element.</p>
<p>“I was interested in conducting this research because the pull-down effect is a phenomena based in heuristic responding that has relevance to the U.S. Air Force,” explained study author Joseph B. Lyons, the senior scientist for Human-Machine Teaming at the Air Force Research Laboratory and co-editor of <em><a href="https://amzn.to/49LNrzH" target="_blank" rel="noopener">Trust in Human-Robot Interaction</a></em>.</p>
<p>“In the Air Force, we need to understand how humans respond to human-machine interactions and, in this case, if perceptions of one technology can propagate to others, that is something we need to account for when fielding novel technologies. Also, this is a topic that has only been done in laboratory settings, so it was not clear if the observed effects would translate into more Air Force relevant tasks with actual operators.”</p>
<p>To investigate this phenomenon, the researchers employed a highly immersive cockpit simulator to create a realistic operational environment for the participants. The study involved thirteen experienced fighter pilots, including both retired and currently active pilots, with a wealth of flying hours in 4th and 5th generation Air Force Fighter platforms, such as the F-16 and F-35.</p>
<p>Participants were exposed to a series of six flight scenarios, of which four included an unreliable UAV exhibiting errors, while the other two scenarios featured perfectly reliable UAVs. Each pilot encountered 24 UAV observations in total, with a mix of reliable and unreliable UAVs designed to simulate real-world operational conditions closely.</p>
<p>The simulation environment was designed to reflect the complexities of managing UAV swarms, requiring pilots to monitor and control multiple UAVs (referred to as Collaborative Combat Aircraft or CCAs) simultaneously. The scenarios tasked pilots with monitoring four CCAs for errors, communicating any unusual behaviors, and selecting one CCA for a mission-critical strike on a ground target, all while managing the cognitive workload and maintaining situational awareness.</p>
<p>Contrary to what might have been expected based on previous research, the study revealed that the presence of an unreliable UAV did not significantly diminish the trust that experienced fighter pilots placed in other, reliable UAVs within the same system. This suggests that experienced operators, such as the fighter pilots participating in this study, are capable of nuanced trust evaluations, effectively distinguishing between the reliability of individual system components.</p>
<p>This finding challenges the assumption underpinning the pull-down effect — that the unreliability of one component can tarnish operators’ trust in the entire system. Instead, the pilots demonstrated what can be described as a component-specific trust strategy, suggesting that their expertise and familiarity with operational contexts enable them to make more discerning judgments about technology.</p>
<p>Moreover, the study found a significant increase in cognitive workload associated with the unreliable UAV compared to the reliable ones. This was an expected outcome, logically aligning with the notion that dealing with unreliable system components requires more mental effort and monitoring from human operators.</p>
<p>Yet, the researchers observed that higher trust in UAVs corresponded with lower reported cognitive workload, hinting at the potential for trust to mitigate the cognitive demands placed on operators by unreliable technology.</p>
<p>“After reading about this study, people should take away a couple things,” Lyons told PsyPost. “First, we found no evidence that negative experiences with one technology contaminate perceptions of other similar technologies in realistic scenarios with actual operators (in this case fighter pilots). While this is interesting, it also represents one study and thus requires replication in other settings. Second, people should take away the idea that theories and concepts should be tested in realistic domains with non-student samples wherever possible.”</p>
<p>Interestingly, despite introducing heterogeneity in the UAV systems to see if this could mitigate the pull-down effect — through different naming schemes and suggested capability differences — the study did not find significant evidence that such measures influenced the pilots’ trust evaluations. This result suggests that the pilots’ ability to maintain specific trust towards reliable components was not necessarily enhanced by these attempts at system differentiation.</p>
<p>“I was surprised that our manipulation of different asset types did not seem to have any bearing on the pilot’s attitudes or behaviors,” Lyons said. “However, and as noted in the manuscript, it is possible that the scenario did not pull out the need (or affordance) for this asset heterogeneity as much as it should have. I think this is an area that is ripe for additional research.”</p>
<p>However, the study is not without its limitations. The small sample size and the specific context of military aviation may limit the generalizability of the findings. Furthermore, the researchers acknowledge the need for future studies to explore the mitigating effects of factors such as system heterogeneity and operator training on the pull-down effect.</p>
<p>“There are always caveats with any scientific work,” Lyons said. “This was just one study, with a pretty small sample size. These findings need to be replicated across other samples and other domains of interest. Never put all of your eggs into the basket of just one study.”</p>
<p>This research opens up new avenues for enhancing the design and deployment of autonomous systems in military operations, ensuring that trust calibration is finely tuned to the demands of high-stakes environments.</p>
<p>“Within the Air Force, we seek to understand how to build effective human-machine teams,” Lyons told PsyPost. “A significant part of that challenge resides in understanding why, when, and how humans form, maintain, and repair trust perceptions with advanced technologies. The types of technologies we care about are diverse, and we care about the gamut of Airmen and Guardians across the Air and Space Force.”</p>
<p>“I feel that the heuristics we use in making trust-related judgements are underestimated and underrepresented in the literature,” he added. “This is a great topic for academia to advance our collective knowledge.”</p>
<p>The study, “<a href="https://journals.sagepub.com/doi/10.1177/15553434231225909" target="_blank" rel="noopener">Is the Pull-Down Effect Overstated? An Examination of Trust Propagation Among Fighter Pilots in a High-Fidelity Simulation</a>,” was authored by Joseph B. Lyons, Janine D. Mator, Tony Orr, Gene M. Alarcon, and Kristen Barrera.</p>
On the internet, it is common to call a guy a misogynist, but what is the exact meaning of misogynist? Is it 1. A guy who hates women? Or 2. a guy who thinks men are superior. Or 3. A guy who believes in women should follow traditional norms like cooking.
Or how about, rather than your narrow, specific 3 definitions, a fourth thing, such as how it’s phrased in the wiki:
Misogyny is hatred of, contempt for, or prejudice against women or girls. It is a form of sexism that can keep women at a lower social status than men.
The emphasis there is why you’re being called names on the internet. If you’re advocating systems or societal norms of gender oppression, you’re being misogynist. This remains true even if you’re not doing it intentionally.
The world we live in is deeply patriarchal, so it can be hard to see these problems, because the views and opinions you’ve got are just “normal”. Something being the norm doesn’t mean it isn’t oppressive, and having an opinion doesn’t mean you shouldn’t consider the impacts of that opinion.
Generally, if someone calls you a misogynist, and you go “bUt I rEsPeCt wOmEn”, you might want to take a little time to figure out where it’s coming from. It can certainly be real without fitting in your 3 tidy little self-serving definitions.
I’ll also point out that you can replace nearly every instance of misogyny in this thread with racism, and replace women with black, and it would be the same discussion. Or you could swap misogyny/women with misandry/men. Oppression is oppression, no matter who holds the power.
Linux is a slightly different way of thinking. There are any number of ways that you can solve any problem you have. In Windows there are usually only one or two that work. This is largely a result of the hacker mentality from which linux and Unix came from. “If you don’t like how it works, rewrite it your way” and “Read the F***ing Manual” were frequent refrains when I started playing with linux.
Mint is a fine distro which is based off of Ubuntu, if I remember correctly. Most documentation that applies to Ubuntu will also apply to you.
Not sure what exactly you installed, but I’m guessing that you did something along the lines of sudo apt-get install docker.
If you did that without doing anything ahead of time, what you probably got was a slightly out of date version of docker only from Mint’s repositories. Follow the instructions here to uninstall whatever you installed and install docker from docker’s own repositories.
The Docker Desktop that you may be used to from Windows is available for linux, however it is not part of the default install usually. You might look at this documentation.
I don’t use it, as I prefer ctop combined with docker-compose.
Towards that end, here is my docker-compose.yaml for my instance of Audiobookshelf. I have it connected to my Tailscale tailnet, but if you comment out the tailscale service stuff and uncomment the port section in the audiobookshelf service, you can run it directly. Assuming your not making any changes,
Create a directory somewhere,
mkdir ~/docker
mkdir ~/docker/audiobookshelf
This creates a directory in your home directory called docker and then a directory within that one called audiobookshelf. Now we want to enter that directory.
cd ~/docker/audiobookshelf
Then create your docker compose file
touch docker-compose.yaml
You can edit this file with whatever text editor you like, but I prefer micro which you may not have installed.
micro docker-compose.yaml
and then paste the contents into the file and change whatever setting you need to for your system. At a minimum you will need to change the volumes section so that the podcast and audiobook paths point to the correct location on your system. it follows the format <system path>:<container path>.
Once you’ve made all the needed changes, save and exit the editor and start the the instance by typing
sudo docker compose up -d
Now, add the service directly to your tailnet by opening a shell in the tailscale container
copy the link it gives you into your browser to authenticate the instance. Assuming that neither you or I made any typos you should now be able to access audiobookshelf from booksIf you chose to comment out all the tailscale stuff you would find it at localhost:13378
docker-compose.yaml
<span style="color:#323232;">version: "3.7"
</span><span style="color:#323232;">services:
</span><span style="color:#323232;"> tailscale:
</span><span style="color:#323232;"> container_name: audiobookshelf-tailscale
</span><span style="color:#323232;"> hostname: books # This will become the tailscale device name
</span><span style="color:#323232;"> image: ghcr.io/tailscale/tailscale:latest
</span><span style="color:#323232;"> volumes:
</span><span style="color:#323232;"> - "./tailscale_var_lib:/var/lib" # State data will be stored in this directory
</span><span style="color:#323232;"> - "/dev/net/tun:/dev/net/tun" # Required for tailscale to work
</span><span style="color:#323232;"> cap_add: # Required for tailscale to work
</span><span style="color:#323232;"> - net_admin
</span><span style="color:#323232;"> - sys_module
</span><span style="color:#323232;"> command: tailscaled
</span><span style="color:#323232;"> restart: unless-stopped
</span><span style="color:#323232;"> audiobookshelf:
</span><span style="color:#323232;"> container_name: audiobookshelf
</span><span style="color:#323232;"> image: ghcr.io/advplyr/audiobookshelf:latest
</span><span style="color:#323232;"> restart: unless-stopped
</span><span style="color:#323232;"># ports: # Not needed due to tailscale
</span><span style="color:#323232;"># - 13378:80
</span><span style="color:#323232;"> volumes:
</span><span style="color:#323232;"> - '/mnt/nas/old_media_server/media/books/Audio Books:/audiobooks' # This line has quotes because there is a space that needed to be escaped.
</span><span style="color:#323232;"> - /mnt/nas/old_media_server/media/podcasts:/podcasts # See, no quotes needed here, better to have them though.
</span><span style="color:#323232;"> - /opt/audiobookshelf/config:/config # I store my docker services in the /opt directory. You may want to change this to './config' and './metadata' while your playing around
</span><span style="color:#323232;"> - /opt/audiobookshelf/metadata:/metadata
</span><span style="color:#323232;"> network_mode: service:tailscale # This line tells the audiobookshelf container to send all traffic to tailscale container
</span>
I’ve left my docker-compose file as-is so you can see how it works in my setup.
I do agree with you that these problems are not the fault of Linux, but I never meant to imply that they were. The average PC user has absolutely zero care for where the fault is, the only thing that matters to them as an end user is their experience while using the operating system. Users who actually care about the quality and ethics of the software they use are likely to already be using Linux anyway, but that is very much not the norm. The layperson is perfectly happy to never care or understand a single thing about their operating system. I will be answering your response to each of my points, as well as rebuttals for this:
The Linux way to do most of them is using the package manager, and that’s much simpler than searching the internet for the correct download.
in the following:
Distro specific. It should be just like installing anything else, and it is for some distros, certainty for the ones I’ve been using.
They are pre-installed in Windows. In fact, most people won’t even understand why their media isn’t playing, and won’t even know that they need to install something, or how to install it. Some distros have them pre-installed, but there are plenty that do not. The point here is that it is inherently less intuitive and more difficult in Linux than in Windows.
This doesn’t require installing anything in Windows. This is purely easier in Windows for many distributions, and equal at best for those who have them installed by default. Thus using the package manager is not easier or more intuitive in this sense, especially since the packages have strange names (so you’d have to look up how to do it as a new user).
Distro specific, I’ve had NVIDIA drivers auto-updating for the past 15 years or so, long before Windows had that same capabilities. And it updates with my regular system update, no need to use any special GUI for it.
Nvidia’s driver software comes pre-installed in a lot of pre-built systems nowadays. It has automatic update checking so it will prompt you on boot to ask if you want to update. Even if it didn’t come pre-installed (which is also the case with most Linux distros), Windows users don’t have to look up a tutorial on how to download and install the drivers. In Linux, the package names and installation methods vary so greatly between distros, that I still have to look it up every time I set up a new distro, even with a decade of Linux experience. In either case, the user will need to use the Internet to search for a page (either the Nvidia driver site, or a tutorial for how to do it on their distro). And no, I’m not talking about Nouveau here, it still has lots of issues and delivers much worse performance than the proprietary driver. Sure, using an AMD card is easier, but the current market share suggests most people will be coming over with Nvidia hardware.
When all the first results are the Nvidia website with official driver downloads, and don’t require the user to use the terminal (and make sure the tutorial works for their distro), Windows is easier there. You just download an executable and run it. No need to add non-free repositories to your package manager, no need to use the terminal, just a search, 4 clicks, and you’re done. Yes, it’s a very “Windows way to do things”, but it’s also objectively easier than it is in a variety of Linux distros. A select few distros have a GUI way to manage this, which I’d rate as slightly easier than the manual Windows way, but still more difficult than the “this is already installed on my system” way that’s the case for many pre-builts and laptops.
Not Linux problem. Also, while I can see the argument that’s easier to use what’s already installed, that tells you nothing of how easy one thing is in comparison to the other. If computers came with the most convolutedly complex and unusable crap of an OS, full of bloatware and spyware pre-installed people would still use it. Not to mention that the Linux installation process was much easier than Windows for the longest time (until windows finally implemented automatic driver installation)
You seem to have answered this for me. People will use what is pre-installed on their system because it is easier for them to do so. Again, not the fault of Linux, but it adds a layer of difficulty to those who want to switch. The layperson doesn’t know what an ISO image is, or how to make a liveUSB out of one.
This has nothing to do with using a package manager or the “Linux way to do things”.
Not Linux problem. Although this is something to bear in mind while choosing your OS, it’s the companies that make games that are at fault here, there’s nothing Linux can do to remedy this situation, so it’s unfair to judge it for it. That’s like saying Windows is harder to use because running docker containers in it is impossible without some virtualisation, while this is something to consider when deciding what OS will you use to self-host, it’s not per-se a reason why Windows is more difficult to use.
Most end users will not care whose fault it is. The fact of the matter is that it will dissuade a large portion of gamers away from Linux, as Riot games don’t run at all. It’s much more difficult to convince someone that they should switch to another operating system when the games they play or programs they use (like Adobe software) won’t work. Sure, in many cases there are alternatives, but that’s a massive layer of difficulty, especially if you’re expecting people to learn new, alternative software with equally steep or steeper learning curves than the Adobe suite, or give up games they’ve been playing for years.
Again, nothing to do with a package manager or the “Linux way to do things”.
Same as above.
Again, the end user doesn’t care whose fault it is. If they can’t access the features their laptop or PC came with (like the ability to use their discrete GPU), then that’s going to be a hard sell. And even if they can by installing something like rog-control-center, that is still another layer of difficulty.
If there is a solution available for a specific computer, it is inherently more difficult on Linux. The computer will come pre-installed with the correct software (no download necessary), and even if you were to reinstall, all you have to do is download a single executable and run it. On Linux, however, you have to research and figure out what kind of software would even do this (asusctl or rog-control-center, for instance), then you have to check the model number of your laptop or motherboard for compatibility because only a select few will be compatible, then you have to add a PPA/repo to your package manager (if the solution even has that available; some will require you to build from source and/or update manually every update), and only then can you install the package. Far more steps, far less intuitive, and far more difficult for an average user.
I gave you examples of things that are more difficult in Linux than Windows. None of these things have to do with a difference in perspective on how to install software, or an investment in the “Windows way” to do things. I’ve been using Linux for around a decade, and I’ve had recent experience with each of these things in Windows while helping other people. They are simply easier in Windows. I want to again make it clear that I never said any of these were the fault of Linux, but you can’t merely overlook them simply because Linux isn’t at fault. New users would still want/have to do these things, and doing them can be difficult or impossible depending on compatibility. There are plenty of arguments for Linux, but the argument that it is simpler or easier in any overarching sense is not one of them. There are very specific instances where things are easier in Linux, or the experience of a user is simpler in Linux, but those few cases do not encompass the entirety of Linux. You have said yourself that you have not used Windows recently, and that seems very apparent to me. I dislike Windows, but Linux has not gotten anywhere near a point where one of my recommendations for switching to Linux are that it is easier or simpler.
I agree that the package manager is a much better solution than the Windows way of doing things, but it has nothing to do with most of the points I made.
You sure try modlogs are public? Some already use the name “mod” to hide their own mod profiles when doing actions and it’s trivial to setup admin actions to remove posts / comments without listing them in the modlog, while I agree it’s better than nothing it’s still up to each individual instance to decide what they give price of their admin / mod actions.
The server returned this error: FetchError: invalid json response body at lemmy2:8536/api/v3/post/list?community_name=westc…. This may be useful for admins and developers to diagnose and fix the error
Probably a good idea to forward this info to your instance admin.
Flaco, the Eurasian eagle-owl who escaped from New York City’s Central Park Zoo and became one of the city’s most beloved celebrities as he flew around Manhattan, has died, zoo officials announced Friday....
Hi there! Looks like you linked to a Lemmy community using a URL instead of its name, which doesn’t work well for people on different instances. Try fixing it like this: !superbowl
Reddit cites r/WallStreetBets as a risk factor in its IPO filing::As Reddit finally files to go public, the company wrote in its S-1 filing that “meme stock” schemes on r/WallStreetBets could pose a risk to investors.
Hi there! Looks like you linked to a Lemmy community using a URL instead of its name, which doesn’t work well for people on different instances. Try fixing it like this: !wallstreetbets
A cargo ship that was struck by a Houthi ballistic missile on Monday has created an 18-mile long oil slick in the Red Sea as it continues to take on water, two US officials said Friday....
No the ships are virtually all linked to israel (and more recently also America and Britain since they started bombing Yemen).
I have debunked this myth like 50 times by now but if you fancy just name one ship and I can show you how it was linked very quickly.
I have only seen one single instance of false targeting; a ship going to Russia that used to be British owned half a year ago which was falsely fired at because the Houthi’s used an outdated ownership list.
Also good job on going to protests that’s highly commendable and praiseworthy.
What do you mean by “save” as in “copy the file to the encrypted container” or “open the file in a picture editor and saving it”? The former won’t re-encode, the latter likely will.
Renaming a file won’t change its content and therefore won’t change its format.
If the pictures are important to you, make sure they’re backed up appropriately. For even remotely critical data, the rule of thumb is 3 copies across two different mediums with at least one copy at a different location.
Re-encoding MP3s will also degrade quality. Storing them in a ZIP file won’t re-encode them though.
Transcoding an MP3 to m4a will degrade its quality too. The opposite is also true; if you’re downloading music from Youtube for instance (M4A, OGG), don’t convert it to MP3.
The discriminator here is whether lossy compression is applied which is distinct from lossless compression. As the name implies, it loses information in the process.
JPG, MP3, M4A, OGG and many other common formats use lossy compression.
ZIP and PNG use lossless compression; files added to a ZIP file can always be turned to the exact same files again from an encoding standpoint.
Hi there! Looks like you linked to a Lemmy community using a URL instead of its name, which doesn’t work well for people on different instances. Try fixing it like this: !homelab
So I finally managed to figure it out and let the gdpr run for 3 days.
After day 1 I figured out without the gdpr folder, you can only delete a certain amount, 100 I think.
The rate limit is also set to 30/min (sleep 2s between actions) so I managed to get two instances running at once without hitting the limit.
One gdpr deleting from 2010 onward, one with an auto-typer hitting f3+enter ever 2 minutes 21 seconds to delete from 2023 backward.
Took another 2 days but I managed to delete my old profile. Googling will bring up a few archived posts on other websites, and name mentions but no posts, and the random sampling I did showed nothing when I tried checking on the individual comments.
So it took me a bit to figure out, but I managed.
They definitely assume people have a certain level of knowledge of things when doing the documentation, but luckily it’s easy to find information.
Distro agnostic packages like flatpaks and appimages have become extremely popular over the past few years, yet they seem to get a lot of dirt thrown on them because they are super bloated (since they bring all their dependencies with them)....
I tried signing my own keys. I replaced them in the bootloader, but when I do the final step to lock them down, the TPM chip flushes the new keys and reissues fresh keys again
It may just be that the firmware of your particular board is buggy to the point of being broken.
You could try updating it but sometimes it’s futile and the firmware is just the biggest pile of crap.
Indeed there are many times I “need my hand held” in order to take my first steps into a subject. I need an intellectually-intuitive foundation that is stable and I can build upon.
Absolutely reasonable expectation. I wish we had that.
why a user owned directory in root is needed
I initially glossed over the fact that you said “user-owned” here. It still shouldn’t affect anything because nothing uses /nix for anything security-critical at any point but it’d certainly be smelly.
User-owned /nix is only the case in single-user installs which I believe have been deprecated for a while and certainly aren’t the way to go anymore.
These days the preferred and default method is a multi-user install where /nix is owned by root there and exclusively managed by the privileged nix-daemon.
What it means for NIX in reference to configuration files, dot files, and my mental model of mess that belongs in /home/$user. While unfounded, I immediately worry root will somehow get cluttered with junk too. It is probably wrong, but I think of $user being largely sandboxed in /home/$user/
Nix (the package manager) itself does have some limited local state (cache, current profile link) that is put into the appropriate XDG user dirs. It will never touch anything outside of those specific state dirs, the TMPDIR and /nix.
Apps installed via Nix behave as they always do w.r.t. cluttering directories. openssh will still create and manage its ~/.ssh directory for instance, just like on other distros. If you ran some daemon that you installed via Nix with sufficient privileges, it may try to create its state directory in /var or whatever; just like the same daemon from any other distro’s package would.
That is all to say: Nix does not do anything special here. Its packages largely behave the same as they do on any other distro and that behaviour includes state directory cluttering behaviour at runtime.
I don’t know what the SELinux context is for NIX, but I only have a limited grasp of SELinux from hacking around on Android to add things like busybox, and I know it is permissive but enabled in Fedora.
No SELinux support whatsoever.
There is somewhat explicit non-support even as Nix’ model of files and directories does not include xattrs; you cannot produce a Nix store path that has special xattrs for SELinux purposes.
Metadata like permissions, dates and owner information are all normalised in the Nix store. The only permitted metadata apart from the file name is whether regular files can be executed.
If your system uses SELinux, you must add an explicit exception for the Nix store. (Installers may do that automatically these days, I haven’t kept up with that.)
question how anything placed directly in the root directory of another distro will impact future updates from the packagers of the distro.
Other distros simply do not touch /nix; it’s not their domain.
FHS distros control FHS directories such as /usr or /bin depending on what individual packages contain but no sane package of an FHS distro will try to control /nix/store/hugehash-whatever/.
Isn’t this against the Unix framework to place something directly in root?
Nix does many things that go against original design principles of Unix and that’s a good thing. It’s not the 70s anymore and some aspects of Unix have not aged well.
Breadtube (Solarpunk) - A community for leftist videos, with a particular focus on Solarpunk and Anarchist content! (slrpnk.net)
Here’s the link in instance agnostic forms:...
Is There An Instance For Handbrake? (Video Encoding Software)
I need some help with Handbrake and HDR not encoding on AV1 SVT, 10bit and NVEnc. I haven’t been able to find an appropriate instance to ask about it so I figured my pirate buddies might be able to help me find a place.
deleted_by_author
Plasma 6.0 has been released. Check out the new overview, improved colour management, a cleaner theme, more effects, better overall performance, and much more. (cdn.masto.host)
cross-posted from: floss.social/users/kde/…/112008634681275406...
Is it normal for a new lemmy instance to display n+1 registered users on the status page?
I created a lemmy instance and noticed the stats on the index page showed that the instance had 2 users registered, even though only the admin account existed at that point. I created a second account, and now it shows 3 users. However, the database query SELECT name from person WHERE local=‘t’; only shows only the admin...
What is the worst thing that has ever happened in the Warhammer 40K lore?
I’m very new to the Warhammer 40K universe. I found a group that plays role games and I wanted to join that I felt I needed to learn the lore first....
Thinking of getting into self hosting but I'm a complete noob
I think of myself as technically inclined. I have installed Linux multiple times and have basic command line knowledge, and I’ve programmed in many languages, with the most experience making a static website game using HTML/CSS/JS....
What is the exact meaning of a misogynist person?
On the internet, it is common to call a guy a misogynist, but what is the exact meaning of misogynist? Is it 1. A guy who hates women? Or 2. a guy who thinks men are superior. Or 3. A guy who believes in women should follow traditional norms like cooking.
I feel like I'm taking crazy pills
I installed a few different distros, landed on Cinnamon Mint. I’m not a tech dummy, but I feel I’m in over my head....
There is some Tesla brigade working hard to remove everything from the internet that makes them look bad.
The last couple days I’ve noticed every post that shows Tesla not looking good, has been removed from some higher directive. Not deleted by OP....
If you're a DJ, Want to Share Unreleased Music, or Just Like EDM. I Created westcoastedm for North American Music Discussion (lemmy.dbzer0.com)
I want a resource like this, you want a resource like this, subscribe! and maybe it’ll get somewhere....
Celebrity owl Flaco dies a year after becoming beloved by New York City for zoo escape (apnews.com)
Flaco, the Eurasian eagle-owl who escaped from New York City’s Central Park Zoo and became one of the city’s most beloved celebrities as he flew around Manhattan, has died, zoo officials announced Friday....
Reddit cites r/WallStreetBets as a risk factor in its IPO filing (techcrunch.com)
Reddit cites r/WallStreetBets as a risk factor in its IPO filing::As Reddit finally files to go public, the company wrote in its S-1 filing that “meme stock” schemes on r/WallStreetBets could pose a risk to investors.
Sinking ship hit by Houthi missile leaves 18-mile oil slick in Red Sea, US officials say (www.cnn.com)
A cargo ship that was struck by a Houthi ballistic missile on Monday has created an 18-mile long oil slick in the Red Sea as it continues to take on water, two US officials said Friday....
deleted_by_author
How "stable" (release cycle) does a server OS need to be? Experiences with CoreOS?
That’s a question I always asked myself....
PowerDeleteSuite still works for nuking your Reddit history (github.com)
No API required. Kinda slow, but just leave it running overnight if you have a lot. Make sure you run it from old.reddit.com/u/me/overview
Why aren't more people using NixPKGs?
Distro agnostic packages like flatpaks and appimages have become extremely popular over the past few years, yet they seem to get a lot of dirt thrown on them because they are super bloated (since they bring all their dependencies with them)....