For me a VM set up via UTM works quite well on my Mac. Just make sure you do not virtualize x86, that kills both performance and battery life. This way I get the nice battery life and performance in a small packge but am not limited by MacOs for my development.
Need a caption on an image or video? AI will generte it for you! But the quality is a different question. Is the caption correct? Is the caption usefull? In my test with images it was roughly 60/40 on the correctness.
On the other hand. If you force a company to provide those captions. They might use the cheapest provider. If they do a better job is anyones guess.
At the end of our launch livestream last month, we teased Framework Laptop 12, a colorful little laptop that is the ultimate expression of our product philosophy. We received a ton of interest around this product, and we have a lot more to share on Framework Laptop 12… in exactly a week! We’re opening pre-orders on April 9th at 8am Pacific. That’s also when we’ll share the full specifications, pricing, and shipment timing. We have a hunch that the early batches are going to go very quickly, so you may want to set up your Framework account ahead of time. In the meantime, you can check out the hands-on video we just posted on our YouTube channel where we go deeper on the design decisions we made.
We know that a lot of you are eager for updates on Framework Laptop 13 and Framework Desktop too. We’re happy to share that we’ve started manufacturing ramp on the new Ryzen™ AI 300 Series-powered Framework Laptop 13, along with the new translucent Bezels and Expansion Cards. We expect first shipments to go out and press reviews to go live in mid-April. We have a lot of manufacturing capacity ready to work through the pre-order batches quickly.
On Framework Desktop, we’re in the DVT2 phase, which is the last development phase before we start production. This is the period in which we complete full validation, finalize firmware and software development, and go through certifications. We’re also making some design refinements throughout the product to improve performance, look and feel, and ease of repair. This includes improving overcurrent protection on internal headers, reducing fan and coil noise in the power supply, and adding visual indicators for the chassis fasteners used for Mainboard swaps. With this development build, we have a larger number of development units in this cycle that we’re sending out to Linux partners and open source AI developers to ensure that the software stack is robust and mature before we start shipping customer units.
Finally, these awesome products come from an equally awesome team! We have a new role open in the team that we expect many of you will be interested in: a Community Marketing Manager, to drive community initiatives and manage the various channels all of you are reading this on. You can apply to this and check our other roles on our careers page.
Disclaimer: don't have TikTok so didn't checkout the linked source.
But on the topic of a non-engineer building a tunnel, there is also Colin Furze on Youtube [0]. Building a tunnel under his house to connect his 'bunker', workshop, home and future udnerground garage.
Seems like an advert for their Product SPR: Secure Programmable Routers. I don't know their system, so don't see the rest of my comment as a critique.
If your systems supports VLAN tagging per SSID there is an option to make the single Router setup more secure. This will most likely only apply to companies and home labs. For example at my company we have Zyxel gear were we can tag WLAN connections with a VLAN based on the SSID.
Beware, simplified description ahead. We have a Guest SSID. All connections from this SSID get tagged with a dedicated VLAN on the Access Points. The traffic is then routed to our Firewall and from there to the internet. All switches in between use the VLAN to prevent Guest connections from reaching any other devices on the LAN.
The decision diagram and conclusion below, applies to any pair of OSS or vendor routers in the "guest" and "secure" roles.
Guest Router First, Secure Router Second
Option #1 is the recommended and accepted best practice. The guest network connects directly to the internet, and the secure router plugs into the guest Router.
> we have Zyxel gear were we can tag WLAN connections with a VLAN based on the SSID
Open-source SPR can place each wireless client device in its own VLAN, with a unique WPA3 passphrase for every client.
This allows granular, per-device rules for routing and filtering, instead of dumping all devices into one-VLAN-per-SSID.
An "advert" for a BSD-licensed open-source codebase? Pointers to a comparable OSS networking project, implemented in memory-safe golang or rust, would be appreciated. There is https://router7.org, but for a narrow use case.
Hi -- this is the SPR team, we actually did not push this on ycombinator and are happy to see it being discussed. We've previously made one post about SPR here, under Show HN:
The post in the link does not pertain to the user PSK but it is about the difficult trade offs that users have when they need to chain routers together.
Imagine someone has a router that they want to put all the IOT stuff that does not get security updates and has poor code quality compared to the rest of a network.
Should that router be the first router that has access to the internet? Or should it be connected to the router that does. The answer is not so simple and that's what the blog post discusses.
In SPR we provide users a mechanism to block upstream RFC1918 addresses by default and selectively enable them.
We have also found numerous flaws in Guest WiFi systems that totally break isolation between the Guest Network and the main network. This affects many routers on the market today, in particular when a medium is bridged between wired and wireless, but also in general.
As seibol commented -- VLAN tagging per SSID is a valid approach as well if a router supports it. Thats a lot stronger than how many routers implement their guest isolation.
As for Multi-PSK -- the use case is creating micro-segmentation in a network with zero-trust, where the identity on the network is rooted in that password.
Without Multi-PSK, if it's not clear, every device that has the WiFi password can sniff encrypted traffic with WPA2, make a Rogue AP to attack WPA3 in case its in use, and can perform ARP spoofing on the network to interfere with other devices.
My approach is just setting proper firewall rules on a dedicated ESSID with a dedicated VLAN. A device on a restricted VLAN shouldn't be able talk to anything. The downside is its more work, but the plus side is it can be done on trusted firmware (OpenWRT) and not something that would require an entire code audit to determine if there are any logic flaws.
This doesn’t isolate the devices from each other, though. (Well, maybe if you have isolation set up on the AP and the devices are all connected to the same radio or isolation happens to work across radios and no one exploits any of the myriad ways in which Ethernet, on the same broadcast domain, is not a secure protocol.)
Lack of usable support from a lot of access points and management systems. Do any of the major multi-AP systems support it? UniFi has no support. I don’t think any of the Ruckus products support it.
(Also, “push the button” is a bit of an awkward concept with multiple APs.)
edit: it’s also a disaster due to a proliferation of crappy client devices that more or less require it.
I see. I'm using a normal router in bridge mode as an extender and that's been working well enough and comes with WPS built in so for instance, I can turn it on there if the printer is closer but of course it would be nice to turn it on in one place and have all the extenders have it on as well.
My best Markdown experience so far on iPad is with Working Copy. It is primarily a Git client.
The preview mode handles pictures well, but for editing you are stuck with a basic code editor. Using the preview mode I can even navigate to other notes in the same repository via links in the notes.
Might not work for your use case. If it sounds interesting, give it a try.
For some time I used a Samsung Galaxy Book 12 (similar computer to a surface tablet computer).
For my use cases it was definitely the wrong choice. The tablet is quite heavy, so use as a tablet was very limited for me and due to the keyboard design it is also bad as a notebook.
I think the integrated stand of the Surface would at least allow you better use as a drawing tablet when you detach the keybord.
My sweet spot is a decent Notebook plus an iPad Mini for Notetaking (Goodnotes) and drawing.