

People use their phones primarily as media consumption devices. That means bigger screens are desirable to the public at large.
We were well on our way to miniaturization until your phone also became a pocket computer
People use their phones primarily as media consumption devices. That means bigger screens are desirable to the public at large.
We were well on our way to miniaturization until your phone also became a pocket computer
Tapatio, Valentina’s, or Cholula.
Squirrels are known for storing large amounts of nuts all over the place, hense the term “squirreling away” but they often forget about stores, leading to new trees sprouting
Just straight vanilla powershell is pretty good
IIRC, they only do this if you’re logged in with a Microsoft account.
Bitlocker is disabled by default if you only use local accounts
Not that it helps now, but you can also dump your bitlocker recovery key through powershell and save it independently.
(Get-BitLockerVolume -MountPoint “C”).KeyProtector
At the end of the interview when they ask “do you have any other questions for us”, if it went well and you decide that you want to work there, ask about what your first day looks like compared to an average day after you’re settled in.
This can be a little social engineering push to have your interviewer shift their perception of you into someone that is already hired.
Im not sure exactly how the system works, but if I were designing one, there would be 3 approaches I can think of.
The first is to equip the lock with a GPS system and dictate that it locks if it’s not within range of a particular location. This one would be the most expensive to implement, but should come with minimal opportunity for messing with it.
Next down the list is each lock is equipped with a radio to connect to a wifi or sub-GHz broadcaster, and as soon as it misses enough heartbeats to a central control point, it locks the wheels. This could be disrupted by jamming the signal, but jammers of this type are highly illegal, and easily trackable.
Last is the cheapest option, which is to include an RFID module tied to the lock and a system to broadcast a signal at the perimeter. If a cart comes within range for a long enough period then the RFID tag is activated and the wheels lock.
I suspect it’s probably a sub-GHz radio situation, with the broadcast power tuned to be within a few hundred meters of the store. If you had some kind of SDR you could probably pinpoint the signal they use and repeat it, letting you wheel a cart outside the zone, but as soon as you stop the signal the wheels will lock.
Ubuntu server is okay, but I’ve come to really appreciate a minimal, stable Debian install instead.
I work in an office as a network administrator. Largely my day to day is a meeting every morning to go over what everyone is doing for the day, then looking through and responding to all the alerts that came up from all the servers I manage(things like failing backups, unexpected reboots, stopped services, strange login behavior, etc)
Then, if I still have time in the day, I put time towards some of the long term projects I have which largely consists of finding things that can be automated and scripting up solutions to that
I tend to just take the defaults when I’m deploying. I wouldn’t get any benefit of having home or tmp on a separate partition, but it’s nice that it’s an option.
This is the short of it. Tate explains in no uncertain terms that society is to blame for the insecurities they feel, and provides an easy answer on how to fix it that kind of works, because it emulates self-confidence.
I pre-ordered this game because I loved Psychonauts and this game was marketed as a sort of heavy metal themed Zelda game.
I then learned about 2 hours in that its also an RTS, which is a genre I never got along with and set it down never to be played again. Thankfully, when you’re a patient gamer, you can’t be lied to by advertising.
There was a short story I read a while back that also featured that plot point, but I don’t remember what it was called.
Only that I found it after reading into inspirations for The Laundry Files by Charles Stross.
Time to restore a whole machine backup to a VM with no network connectivity, and manually pull the command?
on my last thread somebody wrote that unspoken expectations are premeditated resentments
How do I stop having expectations?
This is almost certainly not what they meant. You can’t expect someone to read your mind and solve problems you might have.
If management is not meeting your expectations, then the answer is to have a conversation with them about it(ie: make them spoken expectations), not to remove them altogether.
It’s not fear of the freedom, it’s choice paralysis. People want to go to one website, sign up for one account and then be part of a network with absolutely zero research beforehand. I like the fediverse, but the barrier to entry is higher than that because it first requires you to understand the technology at a base level.
Internet services getting shitty and then dying is nothing new. Look at MySpace, Digg, or any BBS. people just abandon the old one and join the new popular one. They’ll leave when it gets shitty enough and join the new thing
Man’s unlocked the secret code to infinite money.
If I pay for everything with a debit card it doesn’t count as real money because it’s just a number on a screen and therefore doesn’t exist.
It depends on what you think the purpose of keeping creative works outside of the public domain is. Generally, the idea is so that the original creator can make a living off of their art without someone immediately copying their work and undercutting them. The idea of keeping a character true to the original interpretation is not usually considered in this discussion.
Personally, I believe that IP should enter the public domain way sooner than it actually does. I’m generally in favor the original definition of 14 years, with a 14 year extension before the work enters public domain. That gives someone 28 years to make a living off of a character before the ideas become free game for others to use and adapt in any way they see fit.
Having Spongebob as IP keeps him on rails for who he is as a character. Change that, Spongebob as a character is changed by the public that could make the original unrecognizable
I fundamentally disagree with this premise. The vast majority of characters that are in the public domain are not significantly different from their source work, outside of a handful of modern exceptions. Dracula is still mostly Dracula, even in the modern day. Same for Sherlock Holmes, or anyone in a Shakespeare play. The idea of completely twisting a character once they enter the public domain happens, like with Blood and Honey, or that Popeye horror movie coming out, but I think you’d struggle to find anyone that only knows Winnie the Pooh or Popeye from their modern, cheesy slasher adaptations rather than the original stories.
As with most things of this nature, it’s presented in a way that makes it difficult to argue against, but the evil will come with how it is enforced.
Basically everyone agrees that harmful content should be harder for children to access, and reigning in social media’s exploitation of psychology is laudable.
Right now, there isn’t a good way to control access without handing a ton of personal information to a 3rd party agency with questionable oversight. When you want to access porn in meatspace, you share your name and age with the store clerk, who will promptly forget it. The system doesn’t translate to a digital medium with permanent records.