![](/static/253f0d9b/assets/icons/icon-96x96.png)
![](https://lemmy.ml/pictrs/image/q98XK4sKtw.png)
Not sure. Like any field I suspect there’s specialties including people who do research/modeling vs consuming that data and advising based on it.
Not sure. Like any field I suspect there’s specialties including people who do research/modeling vs consuming that data and advising based on it.
Code and snippets to analyze data work well when you can send chunks of it to multiple servers (think analyzing the effect of weather patterns).
Since a lot of that stuff is running on Linux (similar to cloud computing) it makes sense that people that write function/scripts/utilities would already be comfortable in that environment and use it as their daily driver.
And that’s the point of the game. It’s an art piece on the horrors of war.
A deep dark look at what war truly can be instead of the glorified way it’s often portrayed.
Heavy like This War of Mine and Papers Please
I love the internet archive but yeah, there was just no way this wasn’t going to backfire. And by handling things the way they did they damaged the reasonable defense of archivist (not only for themselves) because publishers and others often cite that archival and backups are just “pseudonyms” “synonymous” for piracy.
They aren’t but the way this was handled made it impossible for them to argue otherwise and it also creates a legal precedent for lawsuits and judgments by publishers against others who are doing such work.
It’s already been used far beyond its planned operational status and everything since then has been gravy.
It’s amazing that they’re able to find workarounds to keep it useful for scientific tests and analysis.
It’s a fine line. If they’re working on them reporting the issue before it’s resolved increases the risk somebody can use this as a kind of todo list of social and technical engineering weakpoints to get at other user data.
You may not but the customer support rep at a company that had your info uses windows. Same for the insurance companies, various government agencies local with limited it experience as well as national.
Makes sense. And if it’s not relative to the content you just put decorative only right?
So…
Welcome to Firefox ([Logo for Firefox] marked as decorative)
vs
Our sponsors are [Logo for Microsoft] [Logo for Firefox] [Logo for Google]
It’s a neat option but the example proof of concept alt text “The Firefox logo”, as I understand it, it isn’t ideal for describing the image.
Maybe something like this?
The Firefox logo which consists of a Fox wrapped around a sphere
On the one hand that’s ridiculous but it’s nice to see that they didn’t throw the prior owner under the bus or give out their info.
Offloading the data to the cloud and making it accessible on other devices no longer signed into iCloud.
That is so much worse if true.
I wonder if they’re doing that to reduce the write cycles on the cells and since they’re “encrypting” the contents of the cells they figure the overall IO flag of the data being deleted is “good enough”.
So, in a perfect world, when you wipe the phone it’s basically just trashing the encryption key and so it’s useless data.
That’s all assuming that the encryption method/keys are foolproof which is always a bad bet.
And, this here makes me wonder how effective that is.
And a person claimed in a later post that “around 300” of their old pictures, some of which were “revealing,” appeared on an iPad they’d wiped per Apple’s guidelines and sold to a friend.
That’s a huge issue. Not just for photos but also files for sensitive data, secrets, etc. this, if true, is a massive issue overall since it even happening at all shouldn’t be possible.
Here’s the ELI5.
Imagine there’s a set of lockers in a school.
When a student leaves the school or changes lockers they remove the label on the locker but don’t empty it.
A TRIM, however, means that they not only remove the label from the locker by also clean out its contents.
Exactly. Even for mobile use besides accessing your home resources you can avoid your cellular provider monitoring/hijacking your traffic.
Of course self hosting means you’re still sending that info from your home network over your ISP.
So it’s a trade off there but depending on your ISP vs your cellular network makes sense.
Nice to see Displaced Gamers getting some much deserved attention.
Some great videos of his not only show old unused code but also, in some cases, game genie codes that can be used with cartridges.
The Input Lag and Attack Animation Delay of Teenage Mutant Ninja Turtles (NES) - Behind the Code
Except this bypasses that I believe.
Keeping in mind that may mean that somebody like a cellular provider could do so. Since your local network in that context would be them.
Basically and then that only makes sense if the company’s going to foot the bill. Otherwise they could just make it very very clear that by using extended mode they’re reducing the lifetime of the battery and doing so at their own risk, yadda yadda.
If it’s, as the article suggests, to use what’s already there (larger capacity) then nah. That’s slimy just like BMW.
What about good ole Big Top Beer at my local Raytown market