• 0 Posts
  • 30 Comments
Joined 1 year ago
cake
Cake day: July 12th, 2023

help-circle

  • The thing is in this case, it’s only human suffering. People don’t actually work nonstop all week. Giving them fewer hours over four days means they’re more productive for those days because they’re not dragging out their work to fill the arbitrary 40 hours they have to work for. So companies pay workers the same, but can save money in amenities and office space or whatever by using it less AND have more productive workers. Longer work weeks don’t actually make companies more money (oversimplifying and speaking broadly).


  • I imagine the largest mobile phone operating system on the planet has a few more downloads than one of the several available package managers for the comparatively very small desktop Linux audience, yeah. This is the Linux community, not the Android or Google community, so I’m not sure what you’re yapping away about or why.

    edit: i wanted to know how many devices run android and according to this it’s three billion so you’re wrong anyway lmao


  • I was using Radarr/Sonarr to download files via qBittorrent and then hardlink them to an organized directory for Jellyfin, but I set up my container volume mappings incorrectly and it was only copying the files over, not hardlinking them. When I realized this, I fixed the volume mappings and ended up using fclones to deduplicate the existing files and it was amazing. It did exactly what I needed it to and it did it fast. Highly recommend fclones.

    I’ve used it on Windows as well, but I’ve had much more trouble there since I like to write the output to a file first to double check it before catting the information back into fclones to actually deduplicate the files it found. I think running everything as admin works but I don’t remember.






  • While we’re talking about asymmetric encryption, can someone explain to me why you can’t decrypt information with the same public key that encrypted it? I understand the analogies (locks on a briefcase, unmixing paint, etc), but I can’t “un-analogize” them to understand what’s actually going on. Encryption keys aren’t physical locks or paint. They’re numbers(?). So why can I encrypt something by multiplying by a known public encryption key, but I can’t decrypt it by dividing by that same known public key?




  • Radar and Sonarr are tools to track movies and TV shows respectively. You can add a movie/show to track, tell it the quality you want it in, and set up Prowlarr or Jackett to give Son/Radarr the access to the torrent trackers it needs. You can also use Usenet but I have no experience there.

    It will search those torrent trackers for releases matching your movies/shows in the quality and language you set for them and send the downloads to the torrent client you set up. When the client finishes downloading, Son/Radarr copies (or hardlinks) the files to your library folders.

    If Son/Radarr is tracking a show that you currently have downloaded in 480p, but the quality profile allows upgrades up to 1080p, it will search for 720p and 1080p releases and pick the best match it can find. When the torrent client finishes downloading it, Son/Radarr will automatically replace the 480p release with the 1080p release it just downloaded.