• 0 Posts
  • 33 Comments
Joined 1 year ago
cake
Cake day: July 2nd, 2023

help-circle

  • It can often improve performance and memory latency and usually only has a minor CPU performance impact as it trades cycles waiting for memory for cycles decompressing memory. It is usually decent even on low power embedded devices.

    There are a few edge cases where ZRam is not great. If your data is already compressed or encrypted copying it around in memory is much more expensive. It’s also harder to tell exactly how much data can be loaded into the “free” memory. It’s also a bit slower for serialized memory access in large data sets if the compression ratio is low.









  • The biggest issue is that your corners are lifting from the bed during the print. Fixing this is usually a combination of making sure the bed is clean and adding a brim to increase adhesion. Maybe messing with temperature and cooling fan settings for the first few layers.

    Second is things look a bit over extruded. This could just be due to the corner issue though so fix that before any other changes.









  • damium@programming.devtoLinux@lemmy.mlUpgrade vs Reinstall
    link
    fedilink
    English
    arrow-up
    12
    ·
    10 months ago

    Your experience may depend on which distro you use and how you install things. If you use a distro with a stable upgrade path such as Debian and stick to system packages there should be almost no issues with upgrades. If you use external installers or install from source you may experience issues depending on how the installer works.

    For anything complex these days I’d recommend going with containers that way the application and the OS can be upgraded independently. It also makes producing a working copy of your production system for testing a trivial task.



  • I’n Windows it is not stored in a keyring but instead in the registry. This has basically the same security threat model as a local key file.

    The ssh-agent on Linux will do what you want with effectively the same security. The biggest difference being that it doesn’t run as a system service but instead runs in userspace which can make it easier to dump memory. There are some other agent services out there with additional security options but they don’t change the threat model much.