Yes, but have you seen some of the decisions the Supreme Court has come up with?
Yes, but have you seen some of the decisions the Supreme Court has come up with?
Do you only experience the 5-10 second buffering issue on mobile? If not, then you might be able to fix the issue by tuning your NextCloud instance - upping the memory limit, disabling debug mode and dropping log level back to warn if you ever changed it, enabling memory caching, etc…
Check out https://docs.nextcloud.com/server/latest/admin_manual/installation/server_tuning.html and https://docs.nextcloud.com/server/latest/admin_manual/installation/php_configuration.html#ini-values for docs on the above.
I recommend checking out Friendly Social Browser.
You could’ve scrolled down to the bottom, clicked on “Links,” then clicked on the repo link
The repo has instructions to install a Snap or build from source. If you build from source, it looks like you should download an archive from the releases page rather than just pulling from master.
The unicode standard has stated that U+2019 is the preferred character for apostrophes since at least the late 90s.
And it’s not like using a curved apostrophe in typesetting was novel even then.
as opposed to U+2019 being posthumously appropriated
U+0027 was also an ASCII character. The death of ASCII as a common format is the only one I can think of… what death are you referring to here?
From https://en.m.wikipedia.org/wiki/Right_single_quotation_mark
The Unicode character ’ (U+2019 right single quotation mark) is used for both a typographic apostrophe and a single right (closing) quotation mark.[1] This is due to the many fonts and character sets (such as CP1252) that unified the characters into a single code point, and the difficulty of software distinguishing which character is intended by a user’s typing.[2] There are arguments that the typographic apostrophe should be a different code point, U+02BC modifier letter apostrophe.[3]
In other words, U+2019 is the typographic apostrophe character. It’s also the right single quote character. There are people who think that the typographic apostrophe character should be something else (and having read their arguments, I agree), but in practice, it isn’t, and certainly wasn’t back in the 90s / early 2000s.
Can you elaborate on why this is mildly infuriating?
Open-Webui published a docker image that has a bundled Ollama that you can use, too: ghcr.io/open-webui/open-webui:cuda
. More info at https://docs.openwebui.com/getting-started/#installing-open-webui-with-bundled-ollama-support
Okay but “they” can control the weather?
It’s called “climate change” aka “global warming” (or as MTG would call it, “fake science”). It’s not very precise, but “bigger hurricanes” was definitely one of the expected results.
Also “they” is of course pretty much everyone, but mostly capitalists (aka liberals). And conservatives (“conservative liberals?”) like MTG are the most to blame (at least in the US).
Fun Fact: If you were to rip a Bluray to your computer, you’re legally not permitted to watch that movie if you’re no longer in possession of the disc.
Not sure why you think this.
You can legally rip a Bluray for backup purposes. If you sell or give away the Bluray, you have to delete the backed up copy. If it’s lost, stolen, or unintentionally damaged, you do not.
However, you cannot bypass the DRM to watch it or when you’re creating the backup. This is true regardless of whether you still possess the physical disc.
Decrypting DRM is illegal not based on whether you own the content but because the DRM encryption itself is separately copyright protected.
Bypassing DRM is illegal because the DMCA explicitly prohibits the circumvention of technological measures that control access to copyrighted works, and there isn’t an exemption for personal use, personal backups, or fair use in general.
The Keychron K2 and K6 both look solid. Starting at $70 for a Bluetooth/wired mechanical keyboard, RGB backlighting, extra keycaps for Macs / OS toggles… there’s even a hot swappable variant for $10 more (or heck, on sale for $70), option for an aluminum frame… shame they don’t run on QMK.
Oh - turns out they have several keyboards that do run QMK/VIA, like the K6 Pro.
If I used staggered keyboards for anything other than gaming, or if I didn’t already have a wireless gaming keyboard, I’d be considering one.
I don’t know that a newer drive cloner will necessarily be faster. Personally, if I’d successfully used the one I already have and wasn’t concerned about it having been damaged (mainly due to heat or moisture) then I would use it instead. If it might be damaged or had given me issues, I’d get a new one.
After replacing all of the drives there is something you’ll need to do to tell it to use their full capacity. From reading an answer to this post, it looks like what you’ll need to do is to select “Change RAID Mode,” then keep RAID 1 selected, keep the same disks, and then on the next screen move the slider to use the drives’ full capacities.
upper capacity
There may be an upper limit, but on Amazon there is a 72 TB version that would have to come with at least 18 TB drives. If 18 TB is fine, 20 TB is also probably fine, but I couldn’t find any reports by people saying they’d loaded 20 TB drives into theirs without issue.
procedure
You could also clone them yourself, but you’d want to put the NAS into read only mode or take it offline first.
I think cloning drives is generally faster than rebuilding them in RAID, as well as easier on the drives, but my personal experience with RAID is very limited.
Basically, what I’d do is:
In terms of timing… I have a Sabrent offline cloning hub (about $50 on Amazon), and it copies data at 60 Mbps, meaning it’d take about 9 hours per clone. Startech makes a similar device ($96 on Amazon, that allegedly clones data at 466 Mbps (28 GB per minute), meaning each clone would take 2.5 hours… but people report it being just as slow as the Sabrent.
Also, if you bought two offline cloning devices, you could do steps 1-3 and 4-6 simultaneously, and do the same again with steps 7-8.
I’m not sure how long it would take RAID to rebuild a pulled drive, but my understanding is that it’s going to be fastest with RAID 1. And if you don’t want to make the NAS read-only while you clone the drives, it’s probably your only option, anyway.
Other people have computers - friends, family, etc… Libraries, hotel and apartment lobbies, community centers, etc., frequently have them available for free use.
EV certs give you an extra green bar or something along those lines. If your customers care about it, then you have to. If they don’t - and they probably don’t - it’s a waste.
What exactly are you trusting a cert provider with and what are the security implications?
End users trust the cert provider. The cert provider has a process that they use to determine if they can trust you.
What attack vectors do you open yourself up to when trusting a certificate authority with your websites’ certificates?
You’re not really trusting them with your certificates. You don’t give them your private key or anything like that, and the certs are visible to anyone navigating to your website.
Your new vulnerabilities are basically limited to what you do for them - any changes you make to your domain’s DNS config, or anything you host, etc. - and depend on that introducing a vulnerability of its own. You also open a new phishing attack vector, where someone might contact you, posing as the certificate authority, and ask you to make a change that would introduce a vulnerability.
In what way could it benefit security and/or privacy to utilize a paid service?
For most use cases, as far as I know, it doesn’t.
LetsEncrypt doesn’t offer EV or OV certificates, which you may need for your use case. However, these are mostly relevant at the enterprise level. Maybe you have a storefront and want an EV cert?
LetsEncrypt also only offers community support, and if you set something up wrong you could be less secure.
Other CAs may offer services that enhance privacy and security, as well, like scanning your site to confirm your config is sound… but the core offering isn’t really going to be different (aside from LE having intentionally short renewal periods), and theoretically you could get those same services from a different vendor.
It sounds like your bank is doing MFA (multi-factor authentication) correctly, and that’s a good thing, because it sure would be obnoxious to have to verify all that information just to view your balances, and it’s a higher risk activity to allow someone to transfer funds than to view your balances.
If the dealership didn’t verify your identity and someone else made changes to your lease, would you have a problem with that?
You don’t have to use an authenticator on your phone. You can use a password manager like Bitwarden (their $10/year premium plan, or their $40/year family plan) that supports saving TOTP and auto-filling them from a browser extension (click to copy or you can have it automatically copied to the clipboard after you auto-fill the password). It also supports passkeys and you can avoid getting locked into a single ecosystem that way.
Each credit reporting agency offers this option, at no charge …
It is highly recommended to lock your credit. Frankly, it should be locked by default. In September of 2017, Equifax announced a data breach that exposed the personal information of 147 million people.
Note that, before this incident, it wasn’t consistently free. I remember it being free to lock, but costing $20 or so to unlock. A law passed in 2018 required credit bureaus to offer freezes and unfreezes (and to fulfill them within certain time frames) for free.
Also note that you might need to look for a “freeze” instead of a lock. Experian charges $25/month for their “CreditLock” service, for example, but they offer a free security freeze.
The main disadvantage I can think of would involve a situation where your email (and possibly also other personal data) was exposed without your name attached. It’d be possible for your DLN and/or SSN (or the equivalents for other countries) and email to be exposed without your name being exposed, for example. This wouldn’t have to be a breach - it could be that, for privacy purposes, certain people working with accounts simply don’t get visibility to names.
It’s also feasible that an employee might have access to your full name but only to partially masked email addresses. So if your email is [email protected] and they see site-firstname-****@domain.com, they can make an educated guess as to your full email address.
Also, if your email were exposed by itself and someone tried to phish you, it would be more effective if they knew your name.
The article you posted is from 2023 and PERA was basically dropped. However, this article talks about PREVAIL, which would prevent patents from being challenged except by the people who were sued by the patent-holder, and it’s still relevant.