• 2 Posts
  • 33 Comments
Joined 2 years ago
cake
Cake day: July 13th, 2023

help-circle
  • As an user that paid for windows home server, why windows home server 2(011) was a complete failure

    1. Updating to whs2 required a full wipe - unacceptable by everyone
    2. Updating to whs2 required to pay full price and not upgrade price - lol
    3. The system drive wasn’t covered by redundancy and you would lose all the settings if the drive died
    4. The data drives also couldn’t get any kind of redundancy as they REMOVED the feature from the server and moved it to clients! What the fuck? It was the main selling point! Easy raid for everyone. What’s the purpose of the “home server” if it couldn’t pool drives, while the clients with Windows 8 home instead could set a massive, redundant, pool of 10 drives???
    5. They removed the useful feature that backed up automatically all the windows computers in the network
    6. They removed the basic features like the media gallery and such, to see that you would need windows media center… but 6 years after they killed windows media center

  • They had the right product at the right time. No other free or paid alternative was that user friendly in allowing laymen in mixing and matching multiple disks and having redundancy

    Doing that with pure Linux command line at the time it was inconceivable for 99% of users (at most a raid1 with mdadm over two drives could be easily attained) and windows home server initially was an alternative but Microsoft was completely misguided and “improvements” in Windows home server 2 completely killed it

    Then they added docker support and it was even easier to self host everything.

    But if they tried to launch today, with how mature are free alternatives, they would never reach critical mass adoption to be sustainable.

    For example, I don’t think that the paid fork of truenas that LTT has economically backed is going to be successful
















  • yes, of course malware is distributed via apk.

    But what’s the difference between:

    1. malware that is signed anonymously and then, when its signature is identified, it’s removed via play protect
    2. malware that is signed with a stolen identity and then, when its signature is identified, it’s removed via play protect

    ?

    Isn’t exactly the same stuff? Or there’s someone that is actually thinking that criminals will use their real ID card for the verification?

    Does not change anything for malware distribution, except bother them for a dozen minutes meanwhile they “verify” their stolen ID