It’s open source and researchers are already duplicating the process, so I’m not sure if that will ever happen.
Anything and everything Amateur Radio and beyond. Heavily into Open Source and SDR, working on a multi band monitor and transmitter.
#geek #nerd #hamradio VK6FLAB #podcaster #australia #ITProfessional #voiceover #opentowork
It’s open source and researchers are already duplicating the process, so I’m not sure if that will ever happen.
I’d be in favour of removing internet access from the person who prompted the image generator to make these images.
Fairly sure that this is never going to happen, nor do I think it should, unless you’re describing duplicate content sent to the same community on the same instance within a certain period.
The fediverse is decentralized and by design each instance is independent. Data is shared between instances depending on subscribers. There isn’t a central database for every post or comment.
A person posting the same content on two instances would each automatically distribute that to other instances. At some point there’d be overlap when the duplicate content arrived at the same instance.
At that point, which one is duplicate and which one is original? Do you delete the duplicate? What about the other instances that already have the content?
Do you want to introduce a definitive source of truth that tracks which post was first? Doing so creates a single point of censorship and failure.
So, I’m going with, no, that’s not something I think can, or should ever happen.
I have no idea what Bazzite is.
The error says that there’s a missing file. If it used to work, but after you updated, upgraded, compiled, installed or something to get a new kernel, it broke.
I’m guessing that you installed the wrong kernel or didn’t update the initial ramdisk correctly.
You might be able to boot using the previous kernel, but I’d start with trying to figure out what you did to get here.
You should be able to boot from the installation media in rescue mode to fix this, but that won’t happen until you know what’s broken.
All those golden handshakes had to come from somewhere.
The legal system spent centuries attempting to order this and it continues to be debated, argued and transformed on a daily basis.
There is no mention of e-ink, OP has an Android device, I have an Android device, I read eBooks on it daily, I use FBReader. I’m not sure what all the kerfuffle is about.
On Android I use FBReader. I paid for the Premium version.
It seems appropriate to describe Facebook itself as a cybersecurity threat because of the OS platform it runs on. Perhaps they should also ban all the technologies named on this page … just to be safe.
Yup.
FYI, I also commented with a link to distrowatch that announces it.
I think that what you’re looking for is “CPU affinity”, but that is not something I know anything about.
In the 40+ years I’ve been playing with computers, I’ve always let the OS worry about where and when to run a process and only rarely do I renice
a process that needs to run, but not at the expense of everything else.
A Docker container is a security framework. The process running “inside” the container is just a Linux process like any other.
So, as I understand it, the performance will be identical to a process that is running “outside” a container, subject to the overhead associated with any security restrictions.
Ethernet over Power, not to be confused with Power over Ethernet, which are NOT the same thing.
To answer your post title question, I suspect that at this point it seems counterintuitive to introduce complexity in an environment already rife with exploits.
It’s not like it’s a new idea either. Microsoft published research on this in 2009, 16 years ago.
The abstract on that link holds the promise of many benefits, but it appears to carefully avoid specific claims, which makes me wonder if the idea ran into unexpected hurdles, which is common in software development.
The abandonment of the Barrelfish project is probably an indicator that this is an idea that didn’t pan out.
Having said that, I haven’t dug into kernel development over the past 40 years of my career, so it might well be that aspects and nuances of this idea were adopted and are in common use.
I confess that it is always odd to see a musician, now deceased for a decade, when searching for this platform. Mind you, that is an ongoing tribute to their legacy, which is how it came about.
In a 2020 post, Lemmy’s co-creator Dessalines wrote about the origin of the name Lemmy. “It was nameless for a long time, but I wanted to keep with the fediverse tradition of naming projects after animals. I was playing that old-school game Lemmings, and Lemmy (from Motorhead) had passed away that week, and we held a few polls for names, and I went with that.”
Source: https://en.m.wikipedia.org/wiki/Lemmy_(social_network)#History
JavaScript is often used in modern websites to actually render content, as-in, generate what you see on the page. Blocking access is possible if you don’t have JavaScript enabled, but it’s rare. More likely it’s just not showing content because it’s not there.
Disabling JavaScript in and of itself is not something I understand as a viable way to interact with the internet.
You are better off anonymizing your browser. You can do this by launching separate instances without any profile in incognito mode and only use it on one site before closing it down.
You can also automatically “crawl” websites using tools like headess Chrome and Puppeteer. No doubt there are websites that will do this for you, for a fee.
Ultimately, JavaScript is a programming language, nothing more, nothing less.
If you build a static website, you can host it on AWS S3 and it will likely cost you cents to run. S3 on its own will handle a lot of traffic and you’re unlikely to hit that threshold, but if you do, you can add AWS Cloud Front and have a site that can handle more traffic than you can imagine.
There are 10 types of people in the world, those who understand binary and those who don’t.