My only thoughts are about abuse, have the devs thought about how to limit abuse of a tagging system?
I found that IFTTT has integrations for hardware and software that doesn’t always have a clear public API that can replace it. I would like to be proved wrong on this because I’m definitely using IFTTT and would love to replace it. But it’s pretty useful still.
To my knowledge, I’ve been using Node-Red as a service on my server (using NSSM) and it’s reverse-proxied through Apache and it’s pretty damn solid. I think maybe a long time ago when I started using it, it might have had some nodes that caused it to halt (and catch fire) but I think that might have been a bug that was fixed. It’s been solid for a while now.
Executing command line options I believe is out-of-the-box functionality. I found myself wanting to do something that wasn’t contained in the existing nodes and it’s really easy to make command line calls.
I don’t know exactly why I did this, but I thought it would be fun to see how much of an API I could build for this app I was building, and I managed to build an OpenAuth implementation into it and a bunch of rest calls. I feel like I might need to move this onto another language though, but it seems to be working beautifully so far.
The low-no-code things it has are pretty remarkable, but I think in order to craft something of any sufficient complexity, you are still going to need to writing code somewhere, whether it’s a function node to finesse json into a special structure, or to check and make a decision about what to do that is outside the limitations of the existing nodes, or maybe a template node javascript, but I can say without a doubt that it’s been a very pleasant experience playing with it.
You’ll need to think of “backup” as a different thing if you are looking at the free space. For instance, I can backup my data onto discs, but it costs buying discs. I can also make lots of copies of my images and videos automatically using SyncThing (which is open source), but it requires multiple computers to really be considered a “backup”.