

What are the implications for users of FOSS? Should we not be downloading from github?


What are the implications for users of FOSS? Should we not be downloading from github?


Links in the article. Hugging Face and Swiss Telecoms host


a gentleperson and a scholar


Please read the article before commenting.
“The model is named Apertus – Latin for “open” – highlighting its distinctive feature: the entire development process, including its architecture, model weights, and training data and recipes, is openly accessible and fully documented.”


Yes, I’m just pointing out that phones aren’t terrible at acting as servers, it’s a generational issue.
I’m definitely going to give this a try when I replace my current phone next year.


usbc solved a lot of the connector issues, so long as you can get a hub to play nice with Linux drivers.


What protocol is it based on?


looks nice, a bit more like discord than Element for sure.


They are working on it, the leas dev is working with the lead Dev of slidge to propose a new Spaces protocol to enable “sub-channel” type functionality.
Houdini M2 over LORA is kind of a replacement.


Its a commercial product fundamentally. Looking at the company’s site its clear this is an attempt to sell their commercial/enterprise “private cloud” node hardware to the general public but they’ve botched the marketing.
Medical and Transport are their core business, and they are a software-first company that has built a hardware solution for ready drop-in of their secure private cloud server software stack. https://www.nexalta.net/blog-news/11
Looking at NAS options is how I found this, I got suggested a few NAS kickstarters, but the hardware on this one seems to be superior over all. Too bad the documentation sucks.
Prohibition leads to the propagation of means of evasion. By attempting to ban teenagers from popular means of communications they will incentivize mass adoption of “illicit means” of communications, and create another generation both familiar and comfortable with “illegal online activity” like the Napster generation. Just like Napster, this will also accidentally push youth into online platforms and channels where they are more likely to encounter content not suitable for minors and malware.
The only “truly effective” form that this type of internet control can take is requiring a digital ID verification to establish a connection to the network at the ISP, and that is a nightmare setup we should be prepared to fight tooth and nail.