Ok, now do your own datacenter vs cloud.
Ok, now do your own datacenter vs cloud.
IP address can belong to Mozilla, but the rest is correct.
It is, actually. It is local to them, it is remote to you. They are differentiating from a remote server in someone else’s datacenter. It is not that confusing.
If they had said “locally hosted in our datacenter” would you be confused why they didn’t move a rack into your house?
My question is why are you projecting your limited interpretation as a global truth?
I don’t think you need to do anything different. Sometimes when I learn new things I say “oh, interesting.”
What’s the sentence before that one?
Here, read the latest news: https://www.zdnet.com/article/mozilla-moves-to-monetize-thunderbird-transfers-project-to-new-subsidiary/
Never wondered why Thunderbird donations aren’t tax deductible?
I agree. I’d prefer they just run their own Kubernetes and manage it themselves. Maybe throw some business at Red Hat if they need help with it.
Remember how the cloud is someone else’s server? Now you can buy it (or lease) and bring it home, and it becomes only sorta someone else’s.
Amazon and Azure offer their own on-prem products.
Thunderbird is built by a for-profit subsidiary of the Mozilla Foundation, it just isn’t the Mozilla Corporation.
Google Distributed Cloud allows you to run Google Cloud Platform locally in your own datacenter. They can deploy apps to that infrastructure and use the cloud console for management, or even use normal kubernetes tools for it.
Couldn’t say if that’s what they’re actually doing, but running Google Cloud locally is a thing.
Nala brings dnf-style history and undo to Debian and Ubuntu. Highly recommend.
It seems like the kind of thing the Foundation would run anyway (or sponsor as a separate project), rather than the Corporation being involved at all.
Harder on the corporate side, but this has been an issue in the warehouses.
Encrypt them before they’re ever put there. One example I can think of is in resilio sync, which has the option for sharing a folder to an encrypted peer. Other peers encrypt it before sending anything, that peer doesn’t have the decryption keys at all.
Yeah, I want my passwords unencrypted in the browser, where they belong!
Remainder that Tails is an NSA PRISM targeting keyword. Congrats on making the list, folks!
They are logged, but swatting people get around it. They are suspicious “looking” calls, but so are bomb threats.
Swatting is pretty much always a blocked number to a non-emergency line. If they are traced it is typically one of those free online voip services. It takes work and access to really get from A to B, which is why it only happens when there are awful results.
In the US at least, 911 gets special access and calling it will always get you to your local dispatch (unless you have voip with the wrong account address). Non-emergency is just a normal phone number. If someone wants to call from out of the area or hide their number, non-emergency is how they have to do it. This is suspicious because in a real situation like “I just shot my dad” or whatever they say, nobody is taking time to look up non-emergency.
Hadn’t checked, that is not a hard requirement for the platform - assuming they actually have it in their infrastructure.