![](https://lemmy.world/pictrs/image/189c4267-7b10-4147-a98a-e782efec7af1.png)
![](https://fry.gs/pictrs/image/c6832070-8625-4688-b9e5-5d519541e092.png)
Data centers will probably be the only practical application. Consumer electronics will probably barely produce enough energy to power the regulator and tie-in circuit just to feed back into the pwm driver for fans nowadays.
Data centers will probably be the only practical application. Consumer electronics will probably barely produce enough energy to power the regulator and tie-in circuit just to feed back into the pwm driver for fans nowadays.
Some internet funeral aesthetics
I was working at a company at one point that got a contract to build something I viewed equivalent to malware. Immediately I brought it up to several higher-ups that this was not something I was willing to do. One of them brought up the argument “If we don’t do it someone else will.”
This mentality scares the shit out of me, but it explains a lot of horrible things in the industry.
Believing in that mentality is worse than the reality of the situation. At least if you say no there’s a chance it doesn’t happen or it gets passed to someone worse than you. If you say yes then not only are you complicit, you are actively enforcing that gloomy mentality for other engineers. Just say no.
Publicly traded corps just saw the letter “p”, assumed profit, and announced a 5 year plan to discover the rest of that sentence. Their shareholders are still upset it took them a whole letter before they had a plan…
Search telemetry in a web browser is absolutely insane. I can understand more usage statistics but search telemetry just makes it sound like they want data on who to make an offer to for the next default search provider slot.
Or worse yet, another half-assed partnership with some sketchy 3rd party with a completely fucked moral compass and a privacy policy to match.
Good video going over practical pros and cons currently:
Googles requirements for ARM cores on Android was pretty high. Don’t think I’ve seen a RISC-V core get close yet…
Something something furmark
They have been around for a little while now. Had one in college ~4 years ago. Upstream kernel support was a little rough but spec wise they were impressive alternatives to the RPi 3B
Friendlyjordies watchers knowing it would be abc that advocates for this…
I don’t know man, I’ve always liked the idea of a project outliving me. Though for the sanity of future engineers I hope that is not the case. Today’s solutions are usually just tomorrow’s problems.
Part of the problem is the game of telephone drops the cell chemistry related to the method almost immediately leading to general consumers applying it as a blanket rule for all batteries
Interesting source though…
Yep. Battery chemistry is a real pain in the ass. Every few years someone spins a wheel and determines the next big thing that everyone needs to do to prevent batteries from dying early. For a while people were told full cycles were healthy for avoiding cell memory. Now more sporadic cycles are being peddled.
Use the device as you need it. If you complete a full cycle, cool; if not, that’s fine. Just don’t let the damn thing completely die and don’t keep it permanently on charge. Those are the common things most people do on accident that can really screw up a cell.
I wish more distro’s packaged librewolf. I know there’s an appimage and such but I prefer native tested packages where possible.
The most useful quote to those familiar with the linux boot process:
“An attacker would need to be able to coerce a system into booting from HTTP if it’s not already doing so, and either be in a position to run the HTTP server in question or MITM traffic to it,” Matthew Garrett, a security developer and one of the original shim authors, wrote in an online interview. “An attacker (physically present or who has already compromised root on the system) could use this to subvert secure boot (add a new boot entry to a server they control, compromise shim, execute arbitrary code).”
If an attack needs root then it doesn’t matter. Your box is toast anyway. If you’re using http boot without verification then you should have seen a MITM attack coming.
Something akin to haveibeenpwned.com password hash partial match? Can that even be done with this data?
Edit: You goofs know you can calculate the hash locally and submit it for review without actually exposing your password to them right? That’s how bitwarden does it’s check. https://www.troyhunt.com/ive-just-launched-pwned-passwords-version-2/#cloudflareprivacyandkanonymity
Ah, but Mozilla isn’t even trying to do anything cool like that. They just use onereap and those fuckers look shady. Quotes from their privacy policy: https://onerep.com/privacy-policy#what-data-we-collect-and-how-we-do-that
We use your Personal Information for a number of purposes, which may include the following:
[snip]
- To display advertisements to you.
- To manage our Affiliate marketing program.
There will be times when we may need to disclose your Personal Information to third parties. We may disclose your Personal Information to:
[snip]
- Third-party service providers and partners who assist us in the provision of the Services and Website, for example, (a) those who support delivery of or provide certain features in connection with the Services and Website (e.g. Stripe, a payment services provider; Sendgrid, an email delivery service; HubSpot, a CRM platform, and Sentry, a crash reporting platform); (b) providers of analytics and measurement services (e.g. Google Analytics, ProfitWell etc.); © providers of technical infrastructure services (e.g. Microsoft Azure, Google Cloud, and Amazon AWS); (d) providers of customer support services (e.g. Zendesk); (e) those who facilitate conduct of surveys (e.g. Hotjar); (f) those who help to advertise, market or promote our Services and Website (e.g. Mautic, Facebook Ads, Google Ads, Linkedin Ads, Reddit Ads, and Microsoft Ads);
The bastards
I’m still trying to figure out good nftables rules for ipv6 prefix delegation…
Remember, no snares or entanglement devices
Everything loops back to steam in the end. Solid state thermoelectric devices have been around forever, and before that we had the idea of using thermal energy to augment magnetic fields and jump to kinetic energy without any intermediary conversion. All very low yield results, but we’ve tried it anyway.
Keep thinking about it, we need all the brains we can get, but don’t write it off as a novel idea that the other egg heads just haven’t gotten around to solving yet.