Yes, paid time off requests or advanced request to use leave (doctor appointment, or other) is typical for any planned absenced in the US.
Yes, paid time off requests or advanced request to use leave (doctor appointment, or other) is typical for any planned absenced in the US.
I’ve never used it before but it appears to fit your criteria https://f-droid.org/packages/com.jerameeldelosreyes.sushi/
Apparently you can save it to Google drive then download the Google drive program and make that folder available offline so it downloads it to the computer.
When you setup the Google Takeout export choose Save in a Google Drive folder
Install the Google Drive PC client (Drive for desktop)
It will create a new drive (i.e. G:) in your explorer. Right click on the takeout folder and select “Make available offline”. All files in that folder will be downloaded by the Google Drive Desktop in the background, and you will be able to copy to another location, as they will be local files.
I’m using a commercial desktop with an i5 Sandy bridge. I maxed out to 32Gb of ram only because I’m running trueNAS, debian with containers, and home assistant. Most RAM goes to trueNAS and trueNAS doesn’t accurately report ram. For CPU, mostly just task limited but I don’t really think thats a proxmox issue. Obviously it’s not going to support an enterprise or even small business but it works for what I need of less than 4 users on my budget.
Proxmox doesn’t really ask for much but I probably would recommend docker for your arm devices.
https://en.wikipedia.org/wiki/Robots.txt
Should cover any polite web crawlers but it is voluntary.
https://platform.openai.com/docs/gptbot
Might have to put it behind a captcha or other type to severely limit automated access.
It’s not realistic to assume it won’t get scraped eventually. Such as someone paying people to bypass capatcha or web crawlers that don’t respect robots.txt. I also don’t know if Google and Microsoft bundle their AI data collection that doesn’t also remove your site from web search.
I keep everything behind a VPN so I don’t have to worry much about opening things up to the Internet. It’s not necessary about the fact that you’re probably fine but more so what the risk to you is if that device is compromised, ex: a NAS with important documents, or the idea that if that device is infected, what can that device access.
You could expose your media server and not worry too much about that device but having it in a “demilitarized zone”, ensuring all your firewall rules are correct and that that service is always updated is more difficult than just one VPN that is designed to be secure from the ground up.
Have you checked and enabled hardware acceleration?
Support and troubleshooting steps are dependent on your GPU and OS.
He’s purring
What your trying to do is a big overkill if you want only one device to connect to a VPN.
Your VPN installed on your raspberry pi should have a “local network sharing” option. Based on some blogs mullvad had some issues with hostname and network shares (as of 07/2022) and you should try to connect via IP address if you’re having trouble.
Local network sharing only works on the same subnet (IP address of your computer, Pi, and TV should have the first 3 parts of the IP match, ex: 192.168.4.xxx not 192.168.x.xxx).
If you’re trying to SSH to the Pi when not connected to the same network it’s going to be much more difficult.
If all above fails, this GitHub issue suggests advanced split tunneling setup on the Pi so that it can listen for SSH locally.
Coming from someone who uses neither currently but has used Facebook before, I think it’s more to do with the fact that people are used to Facebook, Google and other companies collecting data. Facebook does a ton of lobbying to tell you just how much they value privacy.
Facebooks data policies are supposed to follow US law. As you already mentioned, I won’t go any further on that. With a foreign country that isn’t exactly super friendly with the US, they could use this same data against citizens. You have no real GDPR, or US privacy laws to protect you if China decides to target a diplomats family or whatever.
For most people, it’s probably not going to affect you either way, but because data is something we really don’t understand the full value of. As an Example, ethnic groups could be targeted and tiktok can be used as a data source.
With the whole Facebook being used to potentially manipulate elections, Tiktok could be as well and the US/other countries have even less they can do to stop it.
But a lot of the hate that you’re seeing on the news is playing into China bad and not really casting light that they are okay with US companies collecting the same data. See: https://www.theatlantic.com/technology/archive/2014/06/everything-we-know-about-facebooks-secret-mood-manipulation-experiment/373648/
https://www.businessinsider.com/tiktok-censor-china-critical-content-uighur-uighurs-2020-11?op=1
Sounds like do not track +
Cheap earphones won’t hurt your ears. Volume is the only real source of damage to your ears.
A simple thing you can do is be informed on what data google is tracking on your phone.
If you are signed into a Google account on your phone, you should check your Google dashboard: https://myaccount.google.com/intro/dashboard and make sure to turn off any tracking you don’t want. You can also request your data is deleted through the dashboard or through Google takeout.
If you stay with the built in OS and you can also get away from a Google account (don’t sign into a Google account on the phone), you’re tracked less, but that’s a bit challenging for many.
On Android and I believe IOS it’s a single connection. I would start with the basic functionality (also don’t create a tailscale account with GitHub bc it does weird things with sharing if you ever want to have multiple users).
Once you’ve got the VPN and storage working I can think of two options to give you the functionality of 2 vpns
Tailscale + truenas is a simple solution that should allow OP access outside the network without any network config.
E
As others mentioned, you can probably use a 3 gang standard faceplate.
The other option would be using a Shelly this is wired like a 3-way switch inside the box; the outside will look normal. As long as you have space, I think the mini should work but I’m not super familiar with their models.
I setup openvpn on my network originally + duckdns on a dynamic IP in 2021/2022. It’s an “older” protocol but I felt it was easier to setup since it’s been around longer and the tools just make it easy.
Wireguard has speed advantages but being newer, takes more work to see those speed advantages. There’s a docker container called wg-easy that I’ve heard mixed things about (speed in a docker container vs easy to setup).
I used tail scale when I rebuilt my VPN server because I was originally using Oracle Linux (wanted to learn it more but went back to Ubuntu).
If you can get certificates working, wireguard shouldn’t be too difficult. I prefer VPN over exposing multiple ports/protocols for a family or small userbase. If you’re sharing libraries or other services with extended family, I’d probably expose those to the Internet and work on hardening/having that server in a demilitarized zone + certificate based authentication and MFA on any public admin accounts.
I bought the GL-AR750S a while ago and kept it stock. It’s a customized version of OpenWrt with an “advanced mode” that lets you get into what I believe is just the regular wrt configuration portal.
I didn’t have anything that the router couldn’t do from VPN to repeating to spoofing Mac to get through cafe-style portals at hotels.
Looking at their website, it looks like their newer models still use wrt https://openwrt.org/toh/gl.inet/start.
Mike’s Weather Page is a hobbyist page that aggregates a ton of info.