

I’m gonna try to guess the most likely LLM response to your post, trained on reddit data:
“This.”
How’d I do?
I’m gonna try to guess the most likely LLM response to your post, trained on reddit data:
“This.”
How’d I do?
There’s also the very real issue of rail priority: https://www.marketplace.org/2024/09/10/amtrak-spars-with-freight-train-industry-over-rules-of-the-railroad/
But this is a weird thing to lie about — the only reason to implement toner DRM is to get people to buy your cartridges. But if your public statement is, “it’s ok to buy off brand cartridges,” then…well… that’s kinda weird.
Not saying you’re wrong, and they could be trying to have their cake and eat it too (court the anti-DRM crowd but also scare people into sticking with their toner). I’m just saying your snarky/sarcastic response seems unwarranted here.
Lemmy is not encrypted, my comments are public, your comments are public, we both know that. Anyone with a raspberry pi or an old netbook can scrape them.
If I use an encrypted service and all of a sudden everything that I thought was encrypted was decrypted by the service provider without my consent? That’s breaking encryption.
If on the other hand I use an encrypted service and they tell me that they can no longer offer the service, my data will be destroyed after X days, and I need to find another way of storing my encrypted data because of privacy invading government policies? That is not breaking encryption.
For many things I completely agree.
That said, we just had our second kid, and neither set of grandparents live locally. That we can video chat with our family — for free, essentially! — is astonishing. And it’s not a big deal, not something we plan, just, “hey let’s say hi to Gramma and Gramps!”
When I was a kid, videoconferencing was exclusive to seriously high end offices. And when we wanted to make a long distance phone call, we’d sometimes plan it in advance and buy prepaid minutes (this was on a landline, mid 90s maybe). Now my mom can just chat with her friend “across the pond” whenever she wants, from the comfort of her couch, and for zero incremental cost.
I think technology that “feels like tech” is oftentimes a time sink and a waste. But the tech we take for granted? There’s some pretty amazing stuff there.
Newer macOS is not Unix certified.
It’s UNIX 03 compliant https://en.m.wikipedia.org/wiki/Single_UNIX_Specification
One or two Linux distros were (are?) UNIX certified, though.
Haha yeah that was the counter example I was thinking of. I agree completely — you could make a Gentoo from source beginner distro, and I think you could make it reasonably “idiot proof,” but it would still be a bad user experience most likely (too much time spent compiling).
If your distro can’t be forked into a “beginner distro” then it’s fundamentally flawed IMHO.
To be clear, I’ve used Arch as my daily drivers for a while, and while it’s not the best fit for my needs (I use Debian mostly), there’s nothing that I experienced that was incompatible with a “beginner” distro.
You can also drop cache for debugging by running something like echo 3 | sudo tee /proc/sys/vm/drop-caches
But remember that the kernel knows best — this RAM will automatically be freed up when needed and you should never run this except for debugging (or maybe benchmarking).
I’ve been super happy with it. Knock on wood it’s been super reliable. I have a single ZFS drive, take snapshots with various retention policies, nothing fancy.
Another fun thing is to set up a reverse proxy on it as an endpoint for services on your local (home) network which can only be accessed by VPN. For example, my Jellyfin service isn’t public facing, but I didn’t want e.g. my parents to need to set up WireGuard. So instead they can point their TV to a raspberry pi on their network to access the service — even a first gen RPI can handle Jellyfin reverse proxy over WireGuard for moderate bitrates!
WireGuard, and an external HDD. Run at a remote location for off-site backup.
I do this with a raspberry pi 3 at the in-laws. I copied the data over locally before setting it up, and after that it’s just nightly incremental rsync, which is fine even over my slow (35Mbps) upload.
While neat, this is not self-sustaining — it’s taking more energy to power it than you’re getting out of it. (You can build a fusion device on your garage if you’re so inclined, though obviously this is much neater than that!)
One viewpoint is that we’ll never get clean energy from these devices, not because they won’t work, but because you get a lot of neutrons out of these devices. And what do we do with neutrons? We either bash them into lead and heat stuff up (boring and not a lot of energy), or we use them to breed fissile material, which is a lot more energetically favorable. So basically, the economically sound thing to do is to use your fusion reactor to power your relatively conventional fission reactor. Which is still way better than fossil fuels IMHO, so that’s something.
play(1)
? I’m getting cat $FILE > /dev/snd
vibes…
I think there are examples of projects getting criticized for not recreating the corposhit. Take GIMP — sure some folks really like it, but there are huge swaths of people who basically just say, “why doesn’t it work like Photoshop?!” and get very frustrated with its different approach.
Personally, I like Google Photos — the interface, not the product — so when Immich came along and basically cloned it, I was really happy (I think Immich is fantastic, and at this point calling it a Photos clone is kinda offensive tbh — it’s way cool).
Some corposhit just sucks, yeah, but some is actually well thought out — no shame in taking the concept and running with it, IMHO.
Verizon will tell you to fuck right off and will never unlock your device.
Will never unlock their device.
Take numbers with a grain of salt, e.g., this link says a 7200RPM 160GB SATA drive from 2004 is $107, or about $0.67/GB, instead of the $5 claimed in post.
50kW class laser.
Another source claims 1um wavelength with individual 1.5kW lasers in a hex pattern — unclear if it’s a phased array (would be awesome) or just trained on the same target (source mentions they are “combined using a mirror” so probably the latter).
Sounds like maybe high power YAG?
Fail2ban config can get fairly involved in my experience. I’m probably not doing it the right way, as I wrote a bunch of web server ban rules — anyone trying to access wpadmin gets banned, for instance (I don’t use WordPress, and if I did, it wouldn’t be accessible from my public facing reverse proxy).
I just skimmed my nginx logs and looked for anything funky and put that in a ban rule, basically.