![](https://lemmy.max-p.me/pictrs/image/d3667ced-4ea5-4fbf-b229-461c68192570.jpeg)
![](https://lemmy.ml/pictrs/image/d3d059e3-fa3d-45af-ac93-ac894beba378.png)
I do like the YouTube integration. A good chunk of them have a link to a main long form video which is nice when you don’t want to watch a video in 50 parts. You can scroll and be like, that’s a cool project let me watch the full 30 mins video.
I do like the YouTube integration. A good chunk of them have a link to a main long form video which is nice when you don’t want to watch a video in 50 parts. You can scroll and be like, that’s a cool project let me watch the full 30 mins video.
A lot of these are partial bans. Canada for example only bans it for government issued phones which makes sense, there shouldn’t be any apps let alone social media apps on those devices.
Probably move on to YouTube Shorts or Instagram reels. I don’t have Instagram but the YT Shorts are basically just TikTok crossposts anyway.
Ideally Pixelfed would win but that’s very hopeful, a lot of the creators are expecting to be paid.
There’s too much money to be made with the format for it to die yet.
Postgres 16 and pict-rs 0.5.16, but neither are critical it’ll just miss features. Like if you use pict-rs 0.4.x then you can’t use the image proxy, but you shouldn’t anyway.
AFAIK the only downside of still being on 15 is it doesn’t perform quite as well on high traffic instances but should otherwise be fine.
Ask your admin to turn it off, or if you’re the admin, turn it off.
They really went with the worst possible way to implement this in that it mangles the post to rewrite all images to the image proxy, so it’s not giving you a choice. So if you want the original link you have to reprocess it to strip the proxy. It’s like when they thought it was a good idea to store the data as HTML encoded, so not-web clients had to try to undo all of it and it’s lossy. It should be up to the clients to add the proxy as needed and if desired. Never mangle user data for storage, always reprocess it as needed and cache it if the processing is expensive.
Now you edit a post and your links are rewritten to the proxy, and if you save it again, now you proxy to the proxy. Just like when they applied the HTML processing on save, if you edited a post and saved it again it would become double encoded.
Personally I leave it off, and let Tesseract do it instead when it renders the images. It’s the right way to do it. If the user wants a fresh copy because it’s a dynamic image, they can do so on demand instead of being forced into it. And it actually works retroactively compared to the Lemmy server only doing it for new posts.
This tool is great to see when remote instances will attempt to send activity to you and how far behind you are: https://phiresky.github.io/lemmy-federation-state
There’s an exponential backoff, so sometimes it can take hours before you start receiving activity again, so it’s nice to know when to expect it.
In my first apartment, I had a smoke detector that was mains powered. The wire metals weren’t compatible and eventually the wirenuts burned and cut off power to half the room. The smoke detector’s wires were all burnt up. It never alarmed unfortunately so I only learned about it when half the room just went dark. That could absolutely have turned into an electrical fire.
Definitely worth getting it checked.
Plug drive in main computer, install Debian on it along with network config and SSH access, put drive back into server and power on.
I guess technically you can also make an ISO that will just auto wipe the drive and install upon booting it but you still need a keyboard to get into the boot menu.
Yep and there’s even a BIOS option for that use case! I really like they they go “oh, people use the parts for that, we’ll add a feature for it!”
Fingerprint reader working perfectly on my FW16. Not sure it’s the same reader module, but getting it set up on Arch was easy, pretty much worked out of the box in Plasma 6. Adding fprint to pam.d/sudo
also worked right out of the box for fingerprint sudo.
I have one (FW 16 AMD), I don’t have any complaints so far. It comes mostly assembled but you put your RAM, SSD, screen bezel, keyboard, touchpad and all the port modules yourself. The machine is well built and genuinely very easy to work with. You can swap the keyboard and touchpad without touching a screw.
For the most part it seems like they’re holding up to their promise, you can buy a new motherboard for a CPU upgrade, remove the old one, put the new one in, and you’re good to go with the rest of your existing stuff (as long as it’s compatible, if the new board needs DDR5 instead of DDR4 then you need new RAM too but that’s expected). So far everything I’ve disassembled as part of the firs assembly has been a breeze. It’s a very nice laptop to work on and swap parts that’s for sure. You get the assurance that you can swap the battery, input modules, IO modules for the foreseeable future.
Where I’ve been disappointed is the third-party ecosystem for it is not what I was hoping it would be, there’s not a lot of third-party modules for it. But the designs are all open-sourced so you can 3D print parts for it. Maybe in the future we’ll have more modules. Overall though, it’s not like you could even think about that on any other laptop brands, you get the laptop and it’s what it’ll be for the rest of its life.
Runs great on Linux, most of the company actually uses Linux so support for Linux is very good. All of the models will run Minecraft very well, Minecraft in particular has been known to run significantly better on Linux to begin with, especially on Intel graphics where the OpenGL drivers on Windows are terrible.
My feeling about that is that I should assume anyone who could monitor my traffic should be assumed to do so and I therefore should apply reasonable defenses regardless. Even if the government doesn’t do it, hackers around the world will. That means the moment it leaves my router, it’s assumed compromised.
Same for smart Internet connected devices. The government might be listening, but I certainly don’t trust the manufacturer to not be listening for the purpose of advertising either.
How many stories broke out recently of ISP router having been compromised by foreign hackers for years? Yeah. The Internet is the wild west.
Felons should be able to vote, even while in prison. Otherwise you just have to make sure your political opponents are all charged with a felony and skew and keep skewing the results because those people can never vote to potentially make their crime no longer a crime.
Like, if they ever make it a crime to be gay, now they’ve basically also stopped gays from being able to vote on the issue. That’s not good democracy.
Windows 95 and Macintosh LC, elementary school computer lab stuff. My grandpa had a Windows 3.1 IBM PS/2. Those were all pretty old and practically obsolete computers when I used those, 98SE was out and ME was right around the corner.
My very first Linux distribution experience was Mandrake Linux I believe version 9 or something like that. Didn’t last that long though, I revisited Linux later with Ubuntu 7.04 which is when I actually switched to Linux full time.
ArchLinux since 2011. Still running that install to this day!
Mine’s running on a single docker-compose.yml and it’s like 4 services: the backend, the frontend, the database and pictrs. That’s hardly insane nor complicated nor ruining existing setups.
It’s probably one of the easiest services I’ve run in quite a while.
Is it true that he can still run for the office even if he’s in jail?
The presumption is normally the people wouldn’t vote for a criminal let alone one that’s in jail.
And the authenticator is configurable and they can enforce some device security like not rooted, bootloader locked, storage encryption is on through the Intune work profile. If you work on a bank, you don’t want the 2FA to even live on a device where the user gives root access to random apps that could extract the keys (although at this point come on you can probably afford Yubikeys).
As a user, not a fan, but as an IT department it makes complete sense.
Just like anywhere else. All it does is sandbox work apps from personal apps so they don’t talk to eachother (not even screenshots!)
When I worked in a restaurant kitchen, we used to soak rags with water and freeze them in the walk in freezer, then once it’s nice and frozen we’d wear the rag around our necks.
There’s large blood vessels in the neck feeding your brain, so if you’re able to cool down the blood there, it’ll spread to the whole body surprisingly fast.
I actually managed to get cold in hot humid july summer in the kitchen with that method.