• 1 Post
  • 16 Comments
Joined 1 year ago
cake
Cake day: July 2nd, 2023

help-circle

  • It can often improve performance and memory latency and usually only has a minor CPU performance impact as it trades cycles waiting for memory for cycles decompressing memory. It is usually decent even on low power embedded devices.

    There are a few edge cases where ZRam is not great. If your data is already compressed or encrypted copying it around in memory is much more expensive. It’s also harder to tell exactly how much data can be loaded into the “free” memory. It’s also a bit slower for serialized memory access in large data sets if the compression ratio is low.







  • The biggest issue is that your corners are lifting from the bed during the print. Fixing this is usually a combination of making sure the bed is clean and adding a brim to increase adhesion. Maybe messing with temperature and cooling fan settings for the first few layers.

    Second is things look a bit over extruded. This could just be due to the corner issue though so fix that before any other changes.








  • If you want an automated system that can protect against ransomware your backups need to be hosted in some way where the backup server has control of the retention and not the client (NAS, local disk, etc are not sufficient). If your NAS supports automated snapshots that can’t be deleted by the backup user it can mostly fill this gap but may need to be checked for how it handles snapshots when the disk fills.

    For self-hosted solutions I’ve used BURP, Amanda, and Borg backup in the past but have switched to Proxmox backup server as my VMs all run in Proxmox. You still need to consider full disaster recovery scenarios where both your primary and backup system fail. For this PBS sports both tape and remote server replication.

    There are also many cloud solutions that do this automatically. For cloud I would always use them in tandem with some kind of local backup.

    For all of these they should have an admin account that has strong protection and doesn’t share credentials with any of the primary systems.