what the space for The Source Lab would look like.
First off it is a Lab, laboratory. A laboratory by definition
A laboratory (CommE or , AmE ; informally, lab) is a facility that provides controlled conditions in which scientific or technological research, experiments, and measurement may be performed.
Barrier-free, Universal design, Safe and Open. Is it possible?
In an interview with an O/S2 magazine back in the day, Mike F. Cowlishaw, the father of REXX, said that he always preferred to hire electrical engineers because they designed their solutions keeping in mind minimal prototyping was available. As where, software engineers just kept ploughing away on problems and iteratively improved their code. Programmers from a hardware background developed more sound code their 1st go-round or more frequently than their purely software oriented/taught peers.
You’ve been hearing the buzz for a while now. Bitcoin, and there’s a whole slew of others, well because that’s just what happens with what appears to be a great, no wait, an amazing idea, generate your own money by becoming involved in Bitcoin “mining” or any other cryptocurrency for that matter.
Over on Bitcoin.org‘s site they list the minimum requirements as follows:
Bitcoin Core full nodes have certain requirements. If you try running a node on weak hardware, it may work—but you’ll likely spend more time dealing with issues. If you can meet the following requirements, you’ll have an easy-to-use node.
- Desktop or laptop hardware running recent versions of Windows, Mac OS X, or Linux.
- 145 gigabytes of free disk space, accessable at a minimum read/write speed of 100 MB/s.
- 2 gigabytes of memory (RAM)
- A broadband Internet connection with upload speeds of at least 400 kilobits (50 kilobytes) per second
- An unmetered connection, a connection with high upload limits, or a connection you regularly monitor to ensure it doesn’t exceed its upload limits. It’s common for full nodes on high-speed connections to use 200 gigabytes upload or more a month. Download usage is around 20 gigabytes a month, plus around an additional 140 gigabytes the first time you start your node.
- 6 hours a day that your full node can be left running. (You can do other things with your computer while running a full node.) More hours would be better, and best of all would be if you can run your node continuously.Note: many operating systems today (Windows, Mac, and Linux) enter a low-power mode after the screensaver activates, slowing or halting network traffic. This is often the default setting on laptops and on all Mac OS X laptops and desktops. Check your screensaver settings and disable automatic “sleep” or “suspend” options to ensure you support the network whenever your computer is running
Line 2 is the bomb. 145 gigabytes of free disk space, accessible at a minimum read/write speed of 100 MB/s. Yes you read that correctly. Enough space for an operating system. I will get back to that later.
200 Gigabytes a month. So over an average 30 days that’s 6.66* Gigabytes per day outbound.
Just a few thoughts for now. Will add more later.
—Update March 14, 2018
Maybe you do not want to do so much “heavy lifting” to get into Bitcoin and cryptocurrencies.
Here’s one possible option I recently was told about.
Full Disclosure: I do not have any investment in this system at this time. I was informed about the sites existence by an associate that is involved with it. (14/03/2018 DEC 13:00 EST)
of your own in Cyberspace using Open Source Software and Hardware.
#BuildYourOwn #VirtualEnvironment #3dworlds #hypergrid #opensim
Red Hat to Acquire CoreOS, Expanding its Kubernetes and Containers Leadership
With CoreOS, Red Hat doubles down on technology to help customers build, run and manage containerized applications in hybrid and multicloud environments
via Red Hat to Acquire CoreOS, Expanding its Kubernetes and Containers Leadership
Cybersecurity, privacy protection, encryption fending off attackers that want to take control of your systems has been a part of the Internet since the dawn of it and before. Phreakers, Crackers and Hackers et al have long been a part of culture.
Today I was subject to an attack. I fake FB profile sends me a shortened URL, that of course leads to an app that hopes to snare me in it’s trap. I don’t bite. Well I do, from their perspective. First, they’re friends request is accepted, quick perusal of said profile, shows new car fresh scent, newness, therefore odd are it’s a Fakebook profile. Blocked.
Snagging the shortened URL and backtracking they’ve built an app on an HTML5 hosting service for free. Oh fun. Another proving ground for misanthropes to hatch their plans for World Domination, NOT!
Whether there’s an evil genius behind the app or it’s an AI, only time will tell.
I am curious know how this turned out, OG?
via small screen for the raspberry pi 3 – outsourced guru
I’d like to hear more about this and see the results & timelapses, please.