An ordinary Venezuelan won’t skip a visit to SAIME to renew its passport just because Maduro’s state isn’t legitimate. They won’t ignore a fine or tell a police officer they have no authority because the state they serve is illegitimate. They’ll go to SAIME because only the state can issue a valid passport. They’ll obey the officer because he still... See more
Finally, there is that options ndots:5 . This indicates “how many dots should there be in a name for that name to be considered an external name”. In other words, if we try to resolve a , a.b , a.b.c , a.b.c.d , or a.b.c.d.e , the search list will be used - so resolving api.example.com will result in 5 DNS queries (for the 4 elements of the search... See more
regarding configuration options in an /etc/resolv.conf file
Sure, the legitimacy argument has served to sanction chavista actors and claim legal control over foreign assets. But as a political tool, it has failed to drive real change. The theory embraced by some opposition lawyers and advisors was straightforward: the force of law comes from its legitimacy—that is, the justification or reasoning that... See more
Bitcoin remains a strangely useless asset that doesn’t do anything. All you can do with it is buy, sell, or hold. The only use for cryptocurrency other than pure zero-sum speculation is bitcoin’s original use case: evading regulations, most often for illegal purchases, money laundering, or dodging sanctions.
Tech is destructive if it operates outside of core human values and holistic, empathetic thinking. Those STEM disciplines are useful, but only when they contribute to human flourishing.
It’s possible to tell Kubernetes to use the DNS configuration of the host. This is used, for instance, in the CoreDNS pods, since they need to know which resolvers to query for external names. It’s also used by some infrastructure, essential pods, that need to resolve external names but don’t want to depend on the Kubernetes internal DNS to be... See more
Replacing method calls and module separations with network invocations and service partitioning within a single, coherent team and application is madness in almost all cases.