Hacker News new | past | comments | ask | show | jobs | submit | nijave's comments login

They allow e-check in... Except for equipment return...

At least they print a receipt with the unit MAC/serial as proof it's been returned.


Assuming the ISPs equipment works correctly. AT&T fiber in the U.S. has apparently had issues for months with a few patches to stabilize things.

My Tp-Link Omada AP has better coverage and speed. I setup my parents up with edgerouterx and Tp-Link AP and it's been hands off for the last 1+ years.

If ISPs can actually offer decent equipment I think it's a win but that seems like more the exception than norm. Reasonably priced prosumer and small business equipment has been way more stable in my experience.


Comcast is supposedly rolling out mid split to boost upload. Spectrum has already rolled out high split in some markets

Maybe your building has an exclusive contract with the only ISP available.

That was the case with our last apartment. There was AT&T fiber running in front and the building was wired with cat5e. I can almost guarantee there was an AT&T fiber ran to a wiring closet somewhere but Spectrum (cable) had an exclusive servicing contract.


My parents are hitting and exceeding their 1.2TiB data allotment streaming TV shows. I'm considering setting them up with T-Mobile home internet.

Data caps alone are extremely anti consumer friendly. It's very difficult for non technical folks to understand how much they're consuming. Especially given the stark different between 1080p and 4k which might not even be obvious depending on their TV and streaming service.


>while those living in the heart of downtown usually only have cable internet at best

If you're in the U.S. probably exclusive provider revenue share agreements with apartment buildings. The ISP gets exclusive access to the building and the building owner gets a % of ISP revenue.

Anecdotally, that rev share can be tens of thousands a year.


As others have mentioned, title fraud. My recent closing disclosure has buyer, seller, agent, and title company. It'd be pretty easy to call the buyer claiming to be the title company and request a wire for exactly the right amount to a fraudulent location.

I'm skeptical anyone here has actually bought a house. That's not how it works at all.

Because every country has agreed on a standard procedure

Why would that be a factor? This website only analyses US based loans.

Cashier's check was only accepted for amounts less than $10k at our closing by our title company. This seems common to require wire. The title company contracted with a 3rd party escrow service so the money was required into the title company's account at the escrow service. I assume a cashier's check would need to be mailed to the escrow company

3rd party. ROFLMAO.

>a guy in a shed

That should be enough without needing to shame them over timeline.

You can also judge based off issue open/close rate and contribution frequency (GitHub has pretty charts for these if the project is hosted there)


My take was they sort of dug in said "Docker isn't made right for Linux, we're reinventing it"

On Fedora w/ SELinux that led to quite a bit of compatibility issues for a while with lots of quirky things that didn't behave the same.

I think their implementations have gotten pretty stable and improved in compatibility since then


That's my take as well. Red Hat's design choices fit into Linux much more neatly. Docker has always been rubbish with late cgroups v2 support, punching holes in my firewall, no rootless, etc.


> punching holes in my firewall

I teach various Linux training courses. One of which is Containers. It always shocks several people per-class how Docker just blatantly ignores and rewrites existing firewall rules. And there's no real option to prevent that unless you want to manually configure ALL network routing.

For me personally, that was one of the big issues the pushed me over to Podman.

Also, Docker's insistence on "forcing" and preventing the disabling of using the malware-ridden Docker Hub didn't help me appreciate their security practices.[]

[]

https://jfrog.com/blog/attacks-on-docker-with-millions-of-ma...

https://www.infosecurity-magazine.com/news/malicious-contain...

https://www.bleepingcomputer.com/news/security/millions-of-d...

https://www.bleepingcomputer.com/news/security/docker-hub-re...

https://sysdig.com/blog/analysis-of-supply-chain-attacks-thr...

... ETC ...


I want to switch to podman. What are the general gotchas and difficulties you could see in doing that for multi architecture+os builds/deployments?


You might just be convincing me to switch, I generally love docker and compose but the firewall thing still blows my mind and that there still just is not a solution.

My workaround has been to bind all docker port forwards to localhost and only ever expose them externally via reverse proxy. Which is annoying because that means I can't run the reverse proxy itself in docker.


> It always shocks several people per-class how Docker just blatantly ignores and rewrites existing firewall rules.

Yeah. Many times I've mentioned that to people, and they just don't believe it's a thing which Docker does. Including here on HN. :/


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: