That implies to me that surgeons aren’t training on heavier people though which seems bad
That implies to me that surgeons aren’t training on heavier people though which seems bad


I use bitwaarden and stratum since it has a wearos app as well and it’s nice to use that for 2fa codes


It’s taking a video and doing aligning/stacking of the frames like you said. Not taking an actual long exposure in the sensor. Most photos on modern phone cameras in low light are done this way. There’s a cool paper by google on their algorithm.


Why shutdown the homelab in the first place? Are you trying to save on power consumption?
The other idea I had was to use another lower power device spoofing the server’s Mac. But it seems like it would require an ethernet hub and those don’t really exist anymore.
I’ve had a lot of regressions, almost entirely around graphics drivers. I have like the worst case scenario. A 4K laptop (also dell) with an nvidia GPU in a prime configuration with the Intel graphics. Until very recently everything was laggy or unstable or unsupported. With recent drivers things have been more fine.
I also have weird audio issues like the card sometimes selecting a non available profile when disconnected from HDMI (hence why I asked about that)
CUPS has been really stable for me. Idk
Also yeah, docks seem to expose all of the bugs, even on windows. For the longest time I couldn’t get my keyboard to work if booting with a dock, and I still have weird resolution issues with booting while connected sometimes.
On an entirely different note, as far as I’m aware secure boot should have zero noticeable performance impact, and if it does, that means that something is going horribly wrong. Guides tell you yo disable secure boot because it’s annoying/semis complicated to administer and makes installing out of kernel modules harder (like the nvidia drivers), not because it has a performance or stability impact on the system.
Hmm. If it’s persistent across installs then something is definitely borked. My next step would be to download the livecd images of a couple distributions and see if the audio works while booting into any of those live environments (ventoy makes this really painless)
When you reinstall, you’re not keeping any configuration, right?
If none of the livecd images work I’d liveboot windows and see if audio works there. If it doesn’t, definitely a hardware issue. If it does, then see if it starts working under Linux again. If it doesn’t, then something is incredibly cursed and I’m out of ideas since it used to work there.
Edit: a stupid question: do you have the right output profile selected for the card. Something like stereo duplex?
That sounds like a pretty cursed occurrence. As you get more familiar with the structure of your operating system, I’ve found diagnosing and fixing weird issues gets a lot easier. You also get a better sense of what component is responsible for what and what commands let you investigate.
I think it’s reasonable to say that weird issues don’t stop though. At least for me. I always had tons of weird occurrences on windows too. What feels different about Linux is that I try and figure them out because it’s possible I can. Where on windows I would just accept that x was broken.
For a random question in case it’s the same no audio bug I encountered recently: Do you happen to play audio via HDMI? And does any audio sink (speakers, etc…) show up in sound settings?
Also do you happen to be using an nvidia gpu (and if so, is it a laptop with an Intel CPU as well?). That freezing issue used to happen to me all the time with some games and it was entirely due to nvidia’s Linux driver bugs.
One of the journals I submitted to explicitly banned puns or wordplay in their titles, which felt unnecessarily grumpy
There’s so much to host that isn’t related to pirated media sharing though. I host like 5 services and only one could be related to that. I know you clarified that you’re talking about content, but there’s also so much content that isn’t related to pirating either. Like most of the fediverse for example


Yeah it’s worked everywhere I’ve tested. But that’s only really been airport WiFi, so I’m not sure it’s indicative of it working in general. It’s easy enough to setup for testing that it’s probably worth a shot


I like zerotier over wireguard because it’s one layer lower. So anything that uses Ethernet frames can be routed over it like it was a network switch plugged into your computer. This is probably why mdns works.


A problem with this is that the river presumably goes all the way around the earth. Otherwise you could just travel west until you found its end. You really need a donut shaped earth, a sphere doesn’t help much
https://www.youtube.com/watch?v=aMT_EGXQwyk
I’m not all the way through it but the first part is pretty cool


That’s kinda an insane amount of ram for most simulations. Is this like a machine learning thing? Is his python code just super unoptimized? Is it possible he’s making a bunch of big objects and then not freeing the references when he’s done with them so they’re never garbage collected?


I think the problem here is that terror and terrorism are quite different things. Saying car terrorism implies the intention is to cause mass terror. You can’t really accidentally or unknowingly commit a terrorism. Call cars death machines or a scourge, but calling them terrorists seems inaccurate, and maybe more importantly, not useful. It seems to shift the blame from the system that leads to car dominance towards individual drivers as terrorists.


I still don’t think this is correct for two reasons. 1: I believe the DMCA and friends count as copyright law. 2: just reading the text of the law (#17 U.S. Code § 106):
Subject to sections 107 through 122, the owner of copyright under this title has the exclusive rights to do and to authorize any of the following:
(1) to reproduce the copyrighted work in copies or phonorecords;
(2) to prepare derivative works based upon the copyrighted work;
(3) to distribute copies or phonorecords of the copyrighted work to the public by sale or other transfer of ownership, or by rental, lease, or lending;
(4) in the case of literary, musical, dramatic, and choreographic works, pantomimes, and motion pictures and other audiovisual works, to perform the copyrighted work publicly;
(5) in the case of literary, musical, dramatic, and choreographic works, pantomimes, and pictorial, graphic, or sculptural works, including the individual images of a motion picture or other audiovisual work, to display the copyrighted work publicly; and
(6) in the case of sound recordings, to perform the copyrighted work publicly by means of a digital audio transmission
It seems pretty clear that only the copyright owner has the rights to make copies, subject to a number of exemption.
Now IANAL so I could be missing something pretty huge, but my understanding was that this right to make copies (especially physical ones for physical media) is at the core of copyright law. Not just the distribution of those copies (which is captured by right 3)


I don’t think this is true. While copying might fall under fair use if used for some purpose, you definitely can get in trouble for copying even without distributing those copies.
For example, you can’t rent a library book and then photocopy the whole thing for yourself
More details about the k-anonimity process. https://blog.cloudflare.com/validating-leaked-passwords-with-k-anonymity/
The short answer is that they download a partial list of passwords that hash to values starting with the same 5 characters as yours and then check if your password hash is in that list locally. This gives the server very little information about your password if it was not breached and more if it was (but then you should change it anyway), making an elegant compromise