![](/static/66c60d9f/assets/icons/icon-96x96.png)
![](https://lemmy.ml/pictrs/image/q98XK4sKtw.png)
Not sure. Like any field I suspect there’s specialties including people who do research/modeling vs consuming that data and advising based on it.
Not sure. Like any field I suspect there’s specialties including people who do research/modeling vs consuming that data and advising based on it.
Code and snippets to analyze data work well when you can send chunks of it to multiple servers (think analyzing the effect of weather patterns).
Since a lot of that stuff is running on Linux (similar to cloud computing) it makes sense that people that write function/scripts/utilities would already be comfortable in that environment and use it as their daily driver.
And that’s the point of the game. It’s an art piece on the horrors of war.
A deep dark look at what war truly can be instead of the glorified way it’s often portrayed.
Heavy like This War of Mine and Papers Please
Possible something on your motherboard has PCIe lanes that are dedicated to GPU when it’s slotted, otherwise they can be used for other devices?
For example here’s a post about m.2 slots that, when used, affect the PCI on a particular board. May be worth checking your boards manual to see if there’s something similar.
The answer not only seemed a HUGE disappointment, but a bit baffling. The pdf manual says if you occupy that 5th m.2 slot, which is the Gen 5 one, the Pci-E 1 slot is automatically downgraded to 8x. This I thought would be unacceptable if running a behemoth like the RTX 4090 I eventually plan to get, as it requires a lot of power and bandwidth.
Bruteforce and fuzztesting with AI identifying possible success results?
I love the internet archive but yeah, there was just no way this wasn’t going to backfire. And by handling things the way they did they damaged the reasonable defense of archivist (not only for themselves) because publishers and others often cite that archival and backups are just “pseudonyms” “synonymous” for piracy.
They aren’t but the way this was handled made it impossible for them to argue otherwise and it also creates a legal precedent for lawsuits and judgments by publishers against others who are doing such work.
It’s already been used far beyond its planned operational status and everything since then has been gravy.
It’s amazing that they’re able to find workarounds to keep it useful for scientific tests and analysis.
I guess the trouble is that you don’t want to read the volumes where the db files are because they’re not guaranteed to be consistent at a given point in time right?
Does the given engine support a backup method/utility that can be used to copy files to some volume on a set schedule?
Exactly. At the end of the day there’s nothing being transmitted with OTP and using a standard app isn’t an issue.
It’s a fine line. If they’re working on them reporting the issue before it’s resolved increases the risk somebody can use this as a kind of todo list of social and technical engineering weakpoints to get at other user data.
You may not but the customer support rep at a company that had your info uses windows. Same for the insurance companies, various government agencies local with limited it experience as well as national.
Makes sense. And if it’s not relative to the content you just put decorative only right?
So…
Welcome to Firefox ([Logo for Firefox] marked as decorative)
vs
Our sponsors are [Logo for Microsoft] [Logo for Firefox] [Logo for Google]
It’s a neat option but the example proof of concept alt text “The Firefox logo”, as I understand it, it isn’t ideal for describing the image.
Maybe something like this?
The Firefox logo which consists of a Fox wrapped around a sphere
On the one hand that’s ridiculous but it’s nice to see that they didn’t throw the prior owner under the bus or give out their info.
Offloading the data to the cloud and making it accessible on other devices no longer signed into iCloud.
That is so much worse if true.
I wonder if they’re doing that to reduce the write cycles on the cells and since they’re “encrypting” the contents of the cells they figure the overall IO flag of the data being deleted is “good enough”.
So, in a perfect world, when you wipe the phone it’s basically just trashing the encryption key and so it’s useless data.
That’s all assuming that the encryption method/keys are foolproof which is always a bad bet.
And, this here makes me wonder how effective that is.
And a person claimed in a later post that “around 300” of their old pictures, some of which were “revealing,” appeared on an iPad they’d wiped per Apple’s guidelines and sold to a friend.
That’s a huge issue. Not just for photos but also files for sensitive data, secrets, etc. this, if true, is a massive issue overall since it even happening at all shouldn’t be possible.
Here’s the ELI5.
Imagine there’s a set of lockers in a school.
When a student leaves the school or changes lockers they remove the label on the locker but don’t empty it.
A TRIM, however, means that they not only remove the label from the locker by also clean out its contents.
What about good ole Big Top Beer at my local Raytown market