As a workaround: I think GrapheneOS let’s you sandbox apps, including Google apps. You might install the standard Pixel camera in a sandbox and see how it performs.
Risk in this setup should be minimal due to the limited access the app would have.
As a workaround: I think GrapheneOS let’s you sandbox apps, including Google apps. You might install the standard Pixel camera in a sandbox and see how it performs.
Risk in this setup should be minimal due to the limited access the app would have.
Old software that can actually be superceded by some newer tech if someone feels like doing so.
Easy to use, lots of documentation. 10/10
I’ve found that for single person purposes, a RAID array is unnecessary. I just buy beefy 8TB drives. If it dies, just download any recent torrents again or pull a backup
So, you can work around these things but you’re going to run into problems if you do:
-If you reset the router, you need to restore the original password else they’ll know
-if they notice you using these devices when you wouldn’t have access, they’ll remove them further from your reach. Possibly permanently.
-If detected, a larger conflict is likely to be escalated. This includes a loss of the benefit of the doubt in the future.
I’d suggest that this is not the battle to fight. They’re likely fighting your apparent obsession with tech. Let them have this battle and continue your fun later.
Try the Stormlight Archive, wheel of time, or mistborn books. Maybe the redwall books if you’re younger. Fun and focus can still be had without a computer!
Oooo thank you for the links, that’s the part I had a difficult time with. I don’t think I’m subscribed to enough things, or I don’t check frequently enough, to get the information updates.
I’ll see what I’m qualified to do. I don’t know Rust in particular so this is likely to turn into a rabbit hole that produces nothing but a greater knowledgebase in my brain for the next time I get fiesty about something.
I think the reason they’d need to do a thing in a pressed timeframe is that, while psychohistory describes populations over time, sufficient understanding can allow someone to make a relatively small tweak that ripples through time.
I’ve been spending some time considering the future technology stack of Beehaw. I’d love to work on some kind of moderation tools, especially because I know that they could be inserted alongside the existing codebase - even if in an exceedingly hacky way. Heck, even client side site scraping with content matching is an option if for some horrible reason we had to.
The fun part is not being able to ask those who run the server about specifics for what’s needed.
I’d act like it never happened. If they recognize that they got weird, then they deserve some dignity. If they don’t, then I don’t want to get into that hot mess.
I’ve never had a problem side loading an entire folder into Firefox. Maybe it was an addon rather than extension though?
JVM can run on any platform that supports Java, as you’re building Kotlin directly into Java bytecode.
Multiplatform is for building native applications while using a single backend logic. You’ll have to write separate handlers for everything unique to the platform, according to documentation.
It’s pretty easy to just not put the AI tag on things, or to strip such things away from an image.
The point of a digital signature is to announce that you made this document, as it exists at the time of writing. Once a change is made it should no longer identify as signed.
Most institutions don’t use this functionality, despite the usefulness of it. At present, I’d recommend using it for publicly distributed files to protect against bad actors publishing a document that pretends to be yours.
As for legally binding, ask a lawyer. Generally, things are legally binding if they’re signed by all parties. The specifics get funky, but a digital signature is a solid step for announcing that you did this thing at this datetime and a judge should recognize that if it comes down to it. Bonus points if all parties attach their digital signatures.
Real, albeit shit-tier modder here. You are correct.
Mods depend a lot of the type of mod.
Entity model changes are relatively easy, often as simple as replacing texture and model files. This is highly dependent on the tech used to make the game and how it’s packaged.
Sound files, similarly, are a file replacement job as long as nothing too funky is involved.
After this, we start to get into larger toolchains. We need tools to decode game data so it can be manipulated, tools to gain access to the game as it starts up or as it runs, and tools to use those tools to create modifications and implement them easily.
Graphics upgrade mods often use directx overrides, such as in SweetFX and Reshade. Sometimes they replace or override existing game files directly.
Bug fixes and additional functionality are where things get really interesting. At first, these are done with hacks done in the form of function overrides that can only be created after analyzing the compiled game executable. Later, tools are built that allow easier access and present game functions to other developers for easy modification.
And sometimes the difficult parts are skipped over entirely when developers include modding APIs or SDKs for public use.
Whooooops, that’s what I get for not verifying things sitting in my brain for a long time
Learned Language Model, a form of machine learning that people tend to call “AI”. ChatGPT is an LLM
They do more than just tie hard drives together with a string. They build custom server hardware, maintain data center infrastructure including cooling and networking, pay their employees (the biggest cost), and all the overhead of running a business.
20% increase in one go is rather normal. Business tend to do one big price increase instead of constant small ones because our brains don’t see them billing efficiently relative to their costs, they see only a bunch of tiny price increases.
Inflation’s been happening since currency was created. We don’t notice day to day because the effects are stretched over a long period.
Try calculating the value of a 2010 dollar against the current 2023 dollar. You’ll find the cumulative effect of ~5% inflation each year is significant.
In addition, periods exist throughout American history during which inflation has spiked noticably within a year or two - this is nowhere near the first time.
Sounds like you’re not familiar with driving in the US. Passing along the shoulder is both illegal and incredibly dangerous. These long roads without passing lanes, often with frequent curves making a safe line of sight for passing impossible, create a situation in which courtesy is suggested: if traffic builds up behind while you travel drastically below the nominal speed of traffic with no opportunity to pass coming up, pull over to let them pass.
Unfortunately, the middle of nowhere exists and that’s where people tend to vacation when they want to exist outside of a concrete jungle. The middle of nowhere also lacks funding for significant road infrastructure; that will not change and changing it would be so inordinately expensive that doing so would be foolish. The answer here is simple courtesy as a driver.
Also, emergency vehicles aren’t going to be stuck behind am RV - they obligate everyone to pull over by law. The issue is that emergency vehicles do not exist in these areas. None. No help available. No funding, no people to do the job. The US is vast and significant portions of land exist with barely any residents.
You can also be sure that hospitals are at least an hour’s drive away in these locations where no opportunity to pass exists. There’s no way around it: someone impeding the flow of traffic significantly without allowing faster traffic to pass is dangerous, both because of emergencies and the inevitable human tendency to pass in risky situations due to frustration.
From a theory perspective alone, ignorant of Lemmy specifics: a database query can be made to list all cached images including a unique identifier for each image. Use this list to find each cached image.
Look at your cached image list and decide how you want to prune it. The most likely pattern for this system is FIFO, so prune the oldest cached data until you drop below the target disk usage.
In practice, you’ll likely use somebody else’s solution. Be sure to read the contents of their solution carefully to ensure it doesn’t move sensitive data to an externally accessible location or exfiltrate data directly.