• 5 Posts
  • 35 Comments
Joined 2 years ago
cake
Cake day: June 22nd, 2023

help-circle

  • Corn and beans, 3 ingredients. 1 cup dried beans (around 50 cents), 1 can of TJ cut corn (89 cents), 1.5 cups water. Pressure cook the beans and water for 30 minutes. Release pressure or wait for it to drop by itself depending on how impatient you are. Stir in the corn.

    Before you stirred in the corn, the just-cooked beans were boiling hot, but since the corn was at room temperature, the whole mix now is nice and warm but not scalding, so you can eat it right away. Nourishing (natural protein combination), low sodium, vegan, tasty, cheap, hard to beat.







  • I see roughly the same thing:

    Your post says there is a podcast at [url] and that you are working on a guide as a companion to it, but it doesn’t say anything about where the guide is or whether any of it is online yet at all. Ok, I see now that the link url is discuss.james.network which is a different domain than the podcast, but that is still not much help. If that’s where the guide is, you should say so. I’d expect to see a discussion forum on a domain like that, not a podcast transcript.

    Really, though you should just include the guide in the post. Otherwise you’re just promoting your podcast and discussion site.





  • What does this question even mean (no I don’t want to listen to a podcast to find out)?

    Sometimes I think people have been using the term “self-hosted” to mean what we used to call a home PC. I have always thought of a hosted computer (whether self-hosted or hosted by a company) as meaning a server which normally would live in a data center, and sometimes even means a rented box or VPS on which you self-host by installing and managing the software yourself (as opposed to using managed hosting or cloud services). Of course if you have good enough internet, you can self-host a server at home, but the considerations are otherwise about the same. I.e. it would usually not also be your workstation or gaming box.

    So what is it that your friends are going to do with the machine? That would be pretty important in figuring out how to prepare it.








  • scrutinize the protocol beforehand.

    Sorry but that buys into the data miners’ self serving myths. It implies the protocol is ok unless some failure makes it leak more information than was intended. In fact it’s invasive even if it works exactly as hoped. “Tracking” is a misnomer too. It’s hostile surveillance even if it’s at population level. (Any nonconsensual surveillance that produces info to be used by people you don’t like is hostile by definition. And it’s near guaranteed that some of the buyers-advertisers, political campaigns and funders, govt agencies, whatever-will be people you don’t like). So shut it down.