Have you not read the relevant chapters in The Wealth of Nations?
Have you not read the relevant chapters in The Wealth of Nations?
If he meets enough Billie Eilishes he can finally have enough copper to sell and buy a house.
Its niches are nowhere near as strong as reddit though. The only reason I can’t ditch reddit is small hobby subs and stuff like that. Their alternatives on lemmy are just not good enough, because of a hideous combination of lack of users and fragmentation.
Wait, don’t Bluetooth devices randomize their macs like wifi to hide their identities from unpaired devices?
They found a very interesting way of selling their hybrid cars as full on EVs where I live. Their e-power stuff are small ICEs working as generators for electric motors that then drive the wheels. Apparently the fact that the wheels get all their power from an electric motor makes it definitely not a hybrid no sir, despite the fact the cars have tiny ass batteries and the single source of power for the whole system is the ICE. Also they somehow have worse fuel efficiency than many contemporary ICEs that cost quite a bit less. I don’t understand Nissan.
Are you capacitance-shaming her?
Yeah my galaxy watch 6 can go 2 days on a charge. I say “can” because it does depend on usage, but it’s not a rare thing to happen.
Yeah obviously made up for fake internet points. There’s no way there was a third toot, it’s just impossible. I don’t buy it.
Nobody’s gonna abandon cars as a whole over this, the same they wouldn’t abandon bicycles as a whole over some other outrageously monetized luxury feature they could live without.
That’s true. But fortunately even the most basic hashing algorithms are more than enough to make worrying about these things pointless when it comes to passwords. You have to poorly implement everything by hand and make a series of bad calls to run into any issues.
What? The password should only receive the hashed password, and that’s gonna have a fixed length. What’s stored in the db should have the exact same length whether the password is 2 characters long or 300. If the length of the password is in any way a consideration for your database, you’ve royally fucked up long before you got to that point.
I don’t know what the exact agreement here is, but such things are very often not enforceable. You can’t have someone sign their rights away. You can have them sign the document, but that document will be worthless in court and will not be respected. Those are more to scare people and discourage them from suing the company.
How is that? Does risc-v have magical properties that make its designers infallible, or somehow make it possible to fix flaws in the physical design after the CPU has already been fabbed and sold?
I got one machine with an amd gpu and another with an Nvidia. The amd machine is so much more comfortable to use, it’s not even funny. The amd card just keeps chugging along and doing its job without bothering me, whereas the Nvidia card keeps making me make sure the drivers are properly loaded in the first place.
What skill? This is not a fucking game lmao. I don’t use an immutable distro because I have better things to do with my time than to try and climb a steep learning curve using some very questionable documentation. I can acknowledge the benefits, but I also acknowledge it’s gonna take me time to get there. And I judge that the time investment is not worth it.
That… is very naive and inaccurate approach. You can’t use frequency and core counts to guesstimate performance even when the chips in question are closely related. They’re utterly useless when it’s two very different chips that don’t even use the same instruction set. But anyway, there are benchmarks in that page and they clearly show that the amd chip is clearly not performing 9x the operations. It is obviously more powerful, though not nearly by that much.
I desperately want something to start competing with apple silicon, believe me, but knowing just how good the apple silicon chips are from first hand experience, forgive me if I am a little bit sceptical about a little writeup that only deals in benchmark results and official specs. I want to read about how it performs in real life scenarios because I also know from experience that benchmark results and official specs alone don’t always give an accurate picture of how the thing performs in real life.
Yes. It could talk to another smart device and ask it to send its packages. You could be careful and connect none of the smart crap in your house to your network, but the smart fridge in your upstairs neighbor’s kitchen could still be helping with smuggling your data out. Or your devices could be connected to some unsecured network around.
In any case, the only surefire way to stop your data from getting smuggled out is to physically kill all the wireless connectivity capabilities of the device. Disconnect antennae, desolder chips, scrape out pcb traces. Otherwise you’re just hoping the firmware is not doing anything funny. Fortunately I think these are all hypotheticals that have not (yet) been observed in real smart home products.