shakedown.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A community for live music fans with roots in the jam scene. Shakedown Social is run by a team of volunteers (led by @clifff and @sethadam1) and funded by donations.

Administered by:

Server stats:

290
active users

#servers

1 post1 participant0 posts today

Trump’s Aggression Sours #Europe on #US Cloud Giants
Companies in #EU are starting to look for ways to ditch #Amazon, #Google, and #Microsoft cloud services amid fears of rising #security risks from US. But cutting ties won’t be easy.
Organizations appear to be reconsidering their use of these companies’ cloud services—including #servers, storage, and #databases—citing uncertainties around #privacy and data access fears under Trump administration.
wired.com/story/trump-us-cloud
archive.ph/8FBGJ

WIRED · Trump’s Aggression Sours Europe on US Cloud GiantsBy Matt Burgess
Replied in thread

@snow Maybe consider a provider that allows you to do #Blackholing?

  • In fact that is something #DECIX advocates for: Stopping #DDoS at the #IX level!

#Contabo for example allows to book a dedicaded, managed #pfSense #Firewall woth their #dedicaded #Servers so you can just block entire ASNs aggressively.

A cheap-ass company I worked for (7 1/2 years) canned me 3 times because they didn't want to pay a reduced market rate. These shitheads treated me as an employee. But I was a contractor, stiffed for all of my overtime. This is what working in tech in Los Angeles is like.

One time, they hired a Russian to replace me.

Understand, I made P/SOS run in Linux, including all of the system calls, in order to "make the Net/ARM code run in Linux without modification."

"Well, tell me how to do this."

"How to do what?"

"This. What you did."

"You have got to be kidding me. You took my job and you expect me to tell you how to do it? Go to hell."

My manager was snickering (he had nothing to do with this).

A few weeks later, they hired me back. Even called me "the greatest programmer I've ever met," but that was my manager, who snickered.

Do what Paul suggests. Don't do the Russians' work for them.

And, when the script kiddies finish fucking all of our governmental systems up, give me a call. Reasonable rates for remote work. Unreasonable rates if I have to set foot in any building the Musk Rats took over. And I will be covered in PPE. I don't want to contract whatever it is that is eating Elon's brain.

hachyderm.io/@inthehands/11400

Hachyderm.ioPaul Cantrell (@inthehands@hachyderm.io)If anyone out there is working for the federal government and is managing systems in the crosshairs of the ongoing coup attempt, I am begging — begging — you: Let them fail. Don’t stop them from breaking it when they do something stupid. Don’t help them learn the system when they shouldn’t even have access to the system.. Don’t set up self-healing guardrails for systems left unattended after you’re locked out or fired. Don’t save them from themselves. LET THEM FAIL. 1/

#Arm to launch its own chip in move that could upend #semiconductor industry
Arm plans to launch its own chip this year after securing Meta as one of its first customers, in a radical change to the #SoftBank-owned group’s business model of licensing to likes of Apple and Nvidia.
Arm’s chip is expected to be a #CPU for #servers in large #datacentres and is built on a base that can then be customised for clients including Meta, manufactured by #TSMC
ft.com/content/95367b2b-2aa7-4
archive.ph/XVjpn

Financial Times · Arm secures Meta as first customer for ambitious new chip projectBy Tim Bradshaw
Continued thread

@small-tech/https version 5.3.0 released

• Uses Auto Encrypt 4.1.1 (removes OCSP stapling support because Let]s Encrypt has removed OCSP support).

npmjs.com/package/@small-tech/

This module is a drop in replacement for Node HTTPS module that automatically handles TLS certificate provisioning and renewal both at localhost (via Auto Encrypt Localhost¹) and at hostname (via Auto Encrypt with Let’s Encrypt certificates²).

So, this is how you create a HTTPS server in Node.js that uses this module and automatically handles TLS certificate provisioning and renewal for you both at localhost (during development) and at hostname (during production):

```js
import https from '@small-tech/https'

const server = https.createServer((request, response) => {
response.end('Hello, world!')
})

server.listen(443, () => {
console.log(' 🎉 Server running at https://localhost.')
})
```

(Yes, that’s it! I wrote a metric shit-tonne of meticulously-tested code so you don’t have to.) :)

💡 Note that the localhost certificate support via Auto Encrypt Localhost is 100% JavaScript and does NOT rely on an external binary like mkcert or certutil.

Needless to say, Kitten³ uses this module under the hood and it’s a big part of why Domain⁴ can deploy servers so easily that don’t require any day-to-day maintenance.

In case you’re wondering why I’m spending so much time releasing all these modules, it’s because I believe in sharing every brick of the house I’m building so others can easily build different houses if they want to. I’m not saying that what I’m building with Kitten, Domain, and Place⁵ will be the end all be all of the Small Web⁶ (the peer-to-peer web). And I want others to be able to experiment by building their own tools without having to go through the grueling development process I’ve had to in the past six years to build basic infrastructure.

Enjoy!

💕

¹ codeberg.org/small-tech/auto-e
² codeberg.org/small-tech/auto-e
³ kitten.small-web.org
codeberg.org/domain/app
codeberg.org/place/app
ar.al/2024/06/24/small-web-com

npm@small-tech/httpsA drop-in standard Node.js HTTPS module replacement with both automatic development-time (localhost) certificates via Auto Encrypt Localhost and automatic production certificates via Auto Encrypt.. Latest version: 5.3.0, last published: 12 minutes ago. Start using @small-tech/https in your project by running `npm i @small-tech/https`. There are 2 other projects in the npm registry using @small-tech/https.

Auto Encrypt version 4.1.0 released

• Removes OCSP stapling, as Let’s Encrypt is removing OCSP support.

If you’re already using Auto Encrypt upgrade before May or your certificate renewals will start to fail. Upgrade now if you want to get certificates for new domains as new certificate requests are already failing.

codeberg.org/small-tech/auto-e

Auto Encrypt automatically provisions and renews Let’s Encrypt TLS certificates on Node.js https servers (including Kitten¹, Polka, Express.js, etc.)

Regular Node.js HTTPS server (without Let’s Encrypt certificates):

```js
import https from 'node:https'
const server = https.createServer(…)
```

Auto Encrypt https server with automatic Let’s Encrypt certificates:

```js
import AutoEncrypt from '@small-tech/auto-encrypt'
const server = AutoEncrypt.https.createServer(…)
```

(Certificates are provisioned on first hit and automatically renewed 30 days before expiry.)

¹ kitten.small-web.org

Codeberg.orgauto-encryptAutomatically-provisioned TLS certificates for Node.js servers using Let’s Encrypt.

So, as some of y'all know, I have a couple beefy #servers kicking around. I want to put them to good use.

I have a #resistance project in mind for one box - a massive archive for #science, #websites, #software, #art and whatever else is under immediate threat, as well as a #poisonWell for #ai. I'm already mirroring #wikipedia and hosting some other #data repos. I'm looking into #ArchiveTeamWarrior (wiki.archiveteam.org/index.php).

I have 56 cores. I have 144GB of RAM. I have a 1.5GB fibre link -all I need is storage.

If you can spare it, please consider donating to my hard drive fund, for 2x 12TB SAS drives within #canada. Alternatively, if you have some mass storage devices (>8TB) you could #donate, get in contact!

This is a crucial time for the #internet. It's up to people like us to preserve and maintain what too many of us take for granted.

#kofi: ko-fi.com/essboyer
Goal: $120 / $1100

Drives: canadacomputers.com/en/server-

Please boost!

wiki.archiveteam.orgArchiveTeam Warrior - Archiveteam

I went to Calm Coding at @varia and it was very cool! We listened to #cumbia, ate cookies and talked about #servers, #microblogging, #sftp, #texteditors, #obsidian, #emacs, #vim, #bash, #zotero, #mastodon, #bluesky, #wikimedia, #hibiscus, #markdown, #orgmode, #hugo, #knitting, #happenings, #websites, #rent and #bread. Admittedly there was some coding as well.
I felt very welcome and I think it's pretty dope that I already met real peoples through Mastodon! 8-)
Ty @bene & @ccl for organizing!