

leagues are bullshit. the problem is having higher standards for others than for yourself. if you don’t want to settle for someone like yourself, focus on improving yourself not trying to date.
leagues are bullshit. the problem is having higher standards for others than for yourself. if you don’t want to settle for someone like yourself, focus on improving yourself not trying to date.
And for context, it does this because cheaters are willing to run cheats that run at that kernel level, and the only way to detect and prevent them is if the anticheat is in your kernel first.
Correct, though to be pedantic anyone can be a CA- you just generate a cert with the right bits to say it’s a ca certificate and then use it to sign any other certificate you want.
But the only devices that will consider your signature worth anything are ones you also install your ca certificate on. So it’s useful and common in internal networks but isn’t really what is being asked here.
The hard part is getting in the root CA store of operating systems and browsers. As far as I know they are all maintained independently with their own requirements.
i didn’t downvote but imo it is light on data. having some more info on methodology would help, like where did the data come from? was there any normalization or other processes?
It’s hard to know if this is a map of words used most in an area relative to how little it’s used elsewhere, or just most common? or just…cherry picking slang that isn’t actually commonly used but is from that area?
All I can think of are some variations of you trusting a service to validate your id and give you a token that just asserts your id has been validated.
But it’s still not really privacy preserving because it relies on trusting both parties to not collaborate against your privacy. if at some point the id provider decides to start keeping records of what tokens were generated from your id, and the service provider tracking what was consumes with that token, then you can still put it all back together.
then I would install one
rather than allowing edits for invisible edits for X minutes, couldn’t your client just delay actually sending it for X minutes allowing to cancel or edit freely until that point?
Gmail allows a similar feature and it seems safer in a distributed system than relying on everyone else to respect what happens after you send a raw message and an edit right after
The average user uses sleep mode and wakes from sleep. Sleep mode should be under 10w, or around $1/mo.
though laptops are notorious for proprietary charging.
I’ve seen dells that can charge via USBc at full 140w but only on a Dell dock. On any USB PD charger it will only do 60w, and complains about it as it throttles everything.
well yes, but it’s profitable because customers continue to buy their products and services.
the problem with blaming companies is none of them do this out of desire to hurt the environment. they do it to meet customer demand.
as an example imagine if we all stopped buying gas from Shell. their environmental impact would plummet…and their competitors impact would go up as we continue to buy the same amount of gas from other companies
growing it like a garden is a perfect phrase imo
because on windows or Mac it may have just worked. …until it doesn’t, or leaves your windows scaled wrong or placed on monitors that don’t exist or some other failure condition. at which point you reboot and hope for the best.
when it doesn’t work on Linux I’d check logs, actual configuration, and even the source if I need to.and then I’d hopefully improve things and make it work the way I want it to.
there’s also the impact of having less consistency in hours. i.e if I work Friday and don’t work Monday but am blocked waiting for someone whondoesnt work friday…it’s waiting until Tuesday.
even just knowing enough to not consider clothes ruined when a button pops out or a tear forms would be nice
If adopt systems then the question is easy to answer: no, journald does everything you need.
without adopting systemd… well. Are you evaluating going without any log handling at all and maybe just dumping logs ephemerally to tty0? DIYing all log stuff like your init scripts DIY things?
Personally if I had to go without journald I’d probably go back to using syslog-ng. But I guess there’s an argument for shipping straight into something like opentelemetry-collector if you’re willing to put in a lot of work.
If anything the gap is bigger than ever as the top end shoes are basically performance enhancers like the nike airflys used to set most records…and their new vaporflys being banned in the Olympics.
I guess it’s better than hyper expensive shoes just being a paying for a brand thing?
Before launching products*
walled gardens are only a little less awful when still supported
it’s typically up to the distribution to configure things like that, and many Linux distributions do come in both server and desktop or workstation variants like Ubuntu desktop vs Ubuntu server, or RHEL server vs RHEL Workstation
I can’t say how well they tune these things as I haven’t ran them personally, but they do exist.
You should look into IPMI console access, that’s usually the real ‘only way out of this’
SSH has a lot of complexity but it’s still the happy path with a lot of dependencies that can get in your way- is it waiting to do a reverse dns lookup on your IP? Trying to read files like your auth key from a saturated or failing disk? syncing logs?
With that said i am surprised people are having responsiveness issues under full load, are you sure you weren’t running out of memory and relying heavily on swapping?
I used to have a batch file to create a ram disk and mirror my Diablo3 install to it. The game took a bit longer to start up but map load times were significantly shorter.
I don’t know if any modern games would fit and have enough loads to really care…but you could