![](/static/253f0d9b/assets/icons/icon-96x96.png)
![](https://lemmy.world/pictrs/image/8f2046ae-5d2e-495f-b467-f7b14ccb4152.png)
Sometime between now and September, obviously.
Sometime between now and September, obviously.
Okay, I’m hooked, I have to know the non-clickbait story
I believe that one was patched a while ago
I’m a big fan of tiling window managers like i3 or awesome (awesome wm). Awesome is the one I use. It’s tiling and the entire interface is built from scripts that they encourage you to modify. Steep learning curve but once you get it how you like, there’s nothing like it.
hence the omission I suggested unreasonable. That database needs to be updatable by the end user, trivially. IMHO could/should be done ad-hoc by a hobbyist or as part of a standard oil change every ~6mo.
“[an] integrated vehicle system that uses, at minimum, the GPS location of the vehicle compared with a database of posted speed limits, to determine the speed limit, and utilizes a brief, one-time visual and audio signal to alert the driver each time they exceed the speed limit by more than 10 miles per hour.”
Honestly the only part of this that is unreasonable is that it isn’t immediately followed with “the database updates will be maintained and provided in an open, unencrypted format for free for the life of the vehicle, and the tracking data cannot be used for any other purpose”. GPS is a one-way, triangulation-based signal. It doesn’t inherently track or leak anything. I think we would be a lot safer if we all could agree what speed to go.
Never change
That is usually more incompetence than malice. They write a game that requires different operation on amd vs Nvidia devices and basically write an
If Nvidia: Do x; Else if amd: Do Y; Else: Crash;
The idea being that if the check for amd/Nvidia fails, there must be an issue with the check function. The developers didn’t consider the possibility of a non amd/Nvidia card. This was especially true of old games. There are a lot of 1990s-2000s titles that won’t run on modern cards or modern windows because the developers didn’t program a failure mode of “just try it”
Businesses “follow the constitution” here. The nuance is that the first amendment (freedom of speech) explicitly only applies to consequences from government. As a private corporation, the people running Harvard have the right to their own speech, in this case: a policy denying graduation, without consequence from the government.
I in no way endorse the speech that Harvard is expressing, but I do have the right to impose my own consequences on them for it (I.E not supporting things they do financially, disparaging them in an online forum like Lemmy, etc). The constitution prevents the US government from punishing Harvard for these actions in the same ways, unless a law has explicitly been broken.
TL/DW for those of us who don’t learn well from video content?
I thought most surveys showed like 30-40% of israelis were in support of a single-state solution?
You would expose a single port to multiple vlans, and then bind multiple addresses to that single physical connected interface. Each service would then bind itself to the appropriate address, rather than “*”
You should consider reversing the roles. There’s no reason your homelab cannot be the client, and have your vps be the server. Once the wireguard virtual network exists, network traffic doesn’t really care which was the client and which was the server. Saves you from opening a port to attackers on your home network.
It doesn’t need csam data for training, it just needs to know what a boob looks like, and what a child looks like. I run some sdxl-based models at home and I’ve observed it can be difficult to avoid more often than you’d think. There are keywords in porn that blend the lines across datasets (“teen”, “petite”, “young”, “small” etc). The word “girl” in particular I’ve found that if you add that to basically any porn prompt gives you a small chance of inadvertently creating the undesirable. You have to be really careful and use words like “woman”, “adult”, etc instead to convince your image model not to make things that look like children. If you’ve ever wondered why internet-based porn generators are on super heavy guardrails, this is why.
Sorry I should have said “carbons and carbons related qol extensions”
Did you ever get carbons working properly? (As in, mobile and desktop clients of the same user both getting messages and marking as read remotely between them)
*privacy from everyone except us, which conveniently makes our ad revenue line go up.
I actually had one of these myself. I worked at a college help desk as a student, and I got a call and the guy said “every time I flush the toilet, Xbox live disconnects”
My first thought was that it was a joke, the absurdity of the thing right? I unironically asked if I was being pranked, and he said he knew we wouldn’t believe him so he made a video. Sure enough, he walks into the bathroom, flushes the toilet, and like 5s later his Xbox shows a disconnection message on the TV.
Absolutely dumbfounded, I sent the networking guys up to his room, and like all of these stories, it does have a reasonable explanation. They ran the xbox’s Ethernet cable under a rug that was in front of the bathroom. Every time someone went to the bathroom, they would step on the cable, and the Xbox would disconnect. The timeout was 30s or so, just long enough that they’d pee or flush the toilet or whatever before they noticed the disconnection.
“Phonk” traditionally referred to the music style itself without lyrics, but as most emerging music styles do, it’s evolved into a sort of new-age emo/grunge mix of Phonk, Hip-Hop, and Alternative Rock. All of the below can be considered modern phonk, even though in the strictest sense, traditional phonk is lyricless. A lot of people will know the “phonk walk” song Why Not by Ghostface Playa
https://www.youtube.com/@trash-gang This youtube channel has popularized many of the rising artists in the genere as it’s evolved over the last 3-4 years, and if you’re looking for some recommendations from an enthusiast, check out (in no particular order):
Generally the lifecycle with this sort of thing is old_thing becomes an alias to new_thing, and eventually old_thing gets dropped as an alias down the line.
It’s still decent advice to learn dnf native calls and to update scripts using yum to those native calls.