Hacker Newsnew | past | comments | ask | show | jobs | submit | alexktz's commentslogin

Tailscale | Developer Advocates + many others | REMOTE (US, CA, UK)

Full JD here: https://job-boards.greenhouse.io/tailscale/jobs/4656023005

Tailscale is modernizing the way we connect our devices and services together and building a connectivity platform. We are rapidly growing across almost all areas of the business right now and that includes DevRel. The linked role is a video heavy one, but we're also looking for a Social Media Manager / Video Editor. We'll also soon be looking for a DevRel Engineer too.

There are dozens of other positions available too across Eng, Sales, and the whole company - see them all at https://tailscale.com/careers#open-job-positions


I'm afraid it's much more sophisticated. A Pangolin has both a Tail and Scales.


Hello everyone,

After:

~1,337 days, 271 releases, 78,000 stars on GitHub, 1,558 contributors, 31,500 members on Discord, 36,000 members on Reddit, 68 languages on Weblate, Surviving the controversial announcement about joining FUTO, Having overwhelming success and support from the community with the product keys model, Launching the Merch store, Attending our first FOSDEM, ...and before the release of GTA VI We are thrilled to announce the stable release of Immich!

This has been a journey long in the making. So much has changed since the first commit on the project, all the way back in February, 2022. The project and team continue to grow, and today we’re proud to announce v2.0.0, our stable release. Stable signifies that we have now resolved a significant amount of technical debt. It also means we will be prioritizing compatibility and less effort will be required to keep Immich up-to-date. Finally, it means that the warning banner on the website has been removed! Along with this, we’re happy to announce a new version of the immich.app website.

For more specifics about the stable release, see our FAQs below.



Jon is a breath of fresh air for the Ubuntu project.


Custom OIDC providers are supported to mostly address your 3rd party auth concerns.

https://tailscale.com/kb/1240/sso-custom-oidc/


Precisely when it means to.


I wonder. Combining this with ocr in obsidian or something might get you there. It’s not a single tool solution though.


Docker as the default librarian of images due to the root namespace hijack in docker clients has a duty of care to maintain trust. A policy of preventing namespace reuse for 1 year before recycling should give time to prevent poisoned images squatting on popular handles.


It has to be a never type of deal, people use images way older than a year, especially the ones most likely to be hit by poisoning


By the way... did you know...?


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: