-
Screenshot20241225at12.24.28PM.png
-
Located in
Documents
/
images
-
Screenshot20241225at12.24.01PM.png
-
Located in
Documents
/
images
-
Screenshot20241225at12.45.56PM.png
-
Located in
Documents
/
images
-
At 2,000 and climbing! [SOLVED] Standalone all-in-one Jitsi server max capacity 600 users, no matter how much hardware (at least in AWS)
-
I am working on a very extensive load-testing for capacity planning project analyzing Jitsi and various related components in educational and other settings, for my current employer. In the current load-testing I have hit a hard limit around 600-650 users for a default-install standalone all-in-one Jitsi server. This is not expected behavior. I am hoping the JItsi community can help determine if it is as simple as a configuration tweak, or if it is a more serious bug.
-
Hawke's SIIMPAF Components Architecture
-
Located in
Documents
/
images
-
Hawke's SIIMPAF Basic Data Pipeline Diagram
-
Located in
Documents
/
images
-
Almost 2 years later and still no Fxtec F(x)tec PRO¹ X 256/8GB - QWERTY Smartphone :-(
-
I ordered this $900 phone back in December 2021, and in September 2023 still no phone and just continued stall tactic.
-
Thoughts on Quantum Computing, "Qomputing", Organic Computing, etc.
-
I was recently asked on Linkedin for my opinion on Quantum computing, this was my top of head response...
-
Building Education Technology the "Hard Way" (And Why That's Actually the Easy Way)
-
I've watched countless companies burn through millions (billions in the aggregate) trying to reinvent wheels that already exist. Not long ago, I reviewed a competitor's failed attempt to build what we launched in six weeks and less than $20,000 USD — they spent three years and $30+ million, and they still couldn't deliver. This isn't about being better-funded, or event smarter; it's about the wisdom of understanding a fundamental truth that most of the tech industry refuses to accept: in the 2020s, 90% of what you need has already been built.
-
New attack bypasses HTTPS protection on Macs, Windows, and Linux
-
"Hack can be carried out by operators of Wi-Fi hotspots, where HTTPs is needed most." - From Ars Technica, by Dan Goodin - Jul 26, 2016 5:14 pm UTC, referencing upcoming conference...