![](/static/253f0d9b/assets/icons/icon-96x96.png)
![](https://lemmy.world/pictrs/image/a8207a32-daa2-4b31-aab4-2d684fc94d18.png)
The C=64 SID was even further ahead of its time
The C=64 SID was even further ahead of its time
H1B requires that companies show that no qualified Americans could be found, so those listings are written so nobody could or would want to apply. Stuff like 10 years experience in software released 5 years ago, entry level job/pay requiring a masters degree, etc.
What this sounds like is legit listings, but done to give the outward appearance that company is strong/growing and to scare current workers into thinking that they will get replaced if they are not killing themselves slaving away.
Rule of 3’s. You can go 3min without oxygen, 3 hrs without shelter, 3 days without water, and 30 days without food. It is a bit of generalization, but its close enough to set priorities in survival situations.
Hot dog is optional.
The $5 rotisserie chicken is not
Just wait until they track your phone in the stores and tie it to demographics like where you live and profession to build a financial profile to estimate how much you are able to pay. As you walk down aisles, the prices change to your price to gouge out every possible penny from you.
It really depends on where the office is in relation to your home.
Before covid and going WFH, the office was only 5 miles away on roads with no traffic. I would go back to this, no problem. Just enough to keep you on a schedule and get out of the house.
The biggest benefit of an office is that when you leave, you are gone until tomorrow.
When everyone is WFH, you never completely leave the office. I know boundaries, but in many cases, the lines can get a bit fuzzy.
It’s more likely battery than assault. Battery is just putting hands on. Assault generally needs higher threat level and/or more violent actions.
It depends on the exact nature of the failure. Controller errors are usually a complete failure. Media failure (magnetic spots on the disk or failed cells in ssd) are often sporadic and only impact data stored in those spots.
Regardless, drives rarely give you any warning. Look at any warning as a gift and get everything off and replace it ASAP.
That’s what she said
Time by Pink Floyd.
Back in the day. Moped, cassette Walkman, and very early wired earbuds. The engine noise covered the several minutes of ticking in the beginning, so it seemed like the tape had stopped. Then the alarm clocks kicked in and startled me so badly that I almost crashed.
Check out NetBox. It is a free open source datacenter inventory management and IP address management tool. It will let you catalog all of your physical assets along with the network assignments.
Not free, but I have been using Insync for years and it works well. $30 one time cost, but worth it.
You don’t need any internet connection to install Ubuntu. Just use the normal install, not minimal network installer. Install from a USB stick.
Also, there’s no requirement for a wire either. If that were the case, you could never install on any modern laptop.
You would need some sort of functioning network to upgrade packages or install anything not in the base image, but this would all be after installation when you have a working OS and wired or wireless won’t matter.
Code security is directly proportional to the amount of resources devoted to finding and fixing bugs regardless of open or closed. If nobody is maintaining the code, it doesn’t matter.
One advantage with open you is that you can look at the version control to see how active the code is being maintained.
New versions of software are released because the older version was lacking in some way. Features, security, functionality.
Lowest number wins.
Does the group have any archive, mailing lists, ticket system, etc, where they work on and document the work that they have been doing?
Past questions and answers will tell you common issues, solutions, should point you towards the areas where you need to focus.
Seems like your edge server is acting as a proxy for a media server on some other host on your LAN.
You want to make sure that the media server software is setup securely, patched, and properly isolated from anything else in LAN should that become compromised. Proxy closes off a lot of attack vectors but not application vulnerabilities. The Lastpass hack happened because of some vulnerability in an employees home plex server.
Fiction is fiction.
In real life, stalking the victim for months, sniper shots, or anything that involves any sort of sofisticiation or team of people is asking to get caught.
KISS principle. A successful hit would be as simple as possible, happen fast with no prior interaction, and involve as few people as possible.
investigation into sexual assault and harassment
Assault and not just harassment.
This makes more sense. The headline just says harassment which is generally a civil suit where you get sued but not arrested. Assault is criminal that you will be arrested over.
Moral turpitude laws are puritan christian bullshit that should not exist.
But since they do, me might as well use them to unleash the face eating leopards.