And for a free trial, no less! If this isn’t laughed out of the courtroom and dismissed with prejudice, we’re all screwed.
I blow hot air.
And for a free trial, no less! If this isn’t laughed out of the courtroom and dismissed with prejudice, we’re all screwed.
I think once upon a time, some dumb politician used it to announce something dumb and it didn’t work lol
Devices should never accidentally bend. Unless you drove over it with a car, chances are it wasn’t your fault.
Ah, that makes sense. I was thinking more like a mini-m&m tube.
I’m having a hard time envisioning the flexibility required to make that work. It couldn’t have been both at the ends at the same time? Also, did this kid just get naked in front of everyone at their party? To each their own, I guess.
If you want a decentralized search, set up a DHT crawler and build a db of millions of torrents in a week or two. If you want anonymity/legal protection, use a trusted VPN. I’m not sure I’d trust a random independent tor-like implementation, especially when the real tor is slow and has imperfect anonymity.
And the Chamber of Commerce has already sued the FTC to block the ban and ofc they picked Texas as the state in which to file their lawsuit.
If you’re worried about unauthorized access to the physical machine, you could always just do disk-level encryption instead or store the app’s data in something like a Veracrypt virtual disk. They’d still be able to access the data if they go through your OS/user, but wouldn’t pick anything up by accessing the drive directly.
Nothing short of E2EE can truly stop someone from accessing your data if they have physical access to the server, but disk encryption would require a targeted attack to break, and no host is wasting their time targeting your meme server. I seriously doubt they’d access it even if you had no encryption at all, since if they get caught doing that they’d get in a heap of legal trouble and lose a ton of business.
Oh, it’s drag-and-drop only with no keyboard support whatsoever. Changing a variable is hidden beneath 12 menus, and it uses a proprietary IDE that locks up after every click. Looks great in screenshots though!
You can 100% fire all your developers!*
*As long as your business users have loads of free time and the skillset of developers.
Is DDOSing really a problem anymore? Any CDN worth their salt should handle even massive DDOS attacks no problem.
Just buy our vendor’s/partner’s SaaS solution and all of this magically goes away!
This article is actually pretty awesome! Definitely taking some notes for when my role requires management.
Marijuana grows in nature and you just need to dry it out and light it on fire.
Is each instance like another person with a server?
Yes.
Could that person just shut it down whenever they wanted to?
Yes.
Are there any companies that have invested in hosting Lemmy/ other fediverse servers?
Idk, they’d be very niche.
Sorry I’m sure I messed up some of the terminology, I hope my questions make sense!
Nah, you pretty much nailed it.
Lemmy, and a lot of the fediverse, functions very similarly to email. Gmail can send emails to Proton even though they’re hosted by two completely separate companies. A post/comment/vote/interaction is like an email in that a copy of every interaction is sent to every federated instance, like emails sent to recipients. This creates a lot of redundancy and traffic between instances, which has its pros and cons.
The Mac Pro only costs three times as much as a cheese grater???
What software isn’t?
“If it can be done and it is done, for example, for crimes such as child pornography, for intellectual property, which is stealing, they should have to do it too.” - LaLiga chief Javier Tebas
Ah yes, two equivalent crimes: CSAM and… um… watching sports without paying
The article is not talking about async processing. It’s talking about the process scheduler and thread blocking. It even has a section titled “Real-time Scheduling” that talks specifically about the process scheduler.
It’s simply not possible to fit the author’s definition of real-time without using something like an RTOS, and the author seems to understand that. The main feature of an RTOS is a different scheduler implementation that can guarantee cpu time to events. The catch is that an RTOS isn’t going to handle general purpose usecases like a personal computer very well since it requires purpose-built programs and won’t be great at juggling a lot of different processes at the same time.
They don’t ban your account, they ban your switch. If your switch is caught, it won’t be able to use any Nintendo services ever again. But your account would still work on other devices.