deleted by creator
deleted by creator
Two Israeli officials said the Israeli war cabinet approved ten days ago the parameters of a new proposal for a hostage deal, which are different from past aspects of deals rejected by Hamas and more forward-leaning than previous Israeli proposals.
This stuff really doesn’t happen that quickly.
It could be carrier related - shout out to that time a bunch of Valentine’s Day texts arrived in November
The push to live services, online DRM, microtransactions, DLC and other such things is because they have identified that there is more money to be made as a ‘server operator’ than a ‘game developer.’
They don’t really care about getting paid for the game, they’d rather give it away for free if they can make more money off controlling the servers.
They have sold two ‘tiers’ of kindles for awhile, the one with ads on the lock screen is discounted.
It’s not my favorite thing but iirc the lock screen is supposed to be the only place with ads.
deleted by creator
By the UN definition, Hamas is a genocidal organisation. Its founding charter, published in 1988, explicitly commits it to obliterating Israel. Article 7 states that “The Day of Judgment will not come about until Moslems fight Jews and kill them”. Article 13 rejects any compromise, or peace, until Israel is destroyed. Hamas fighters who burst into Israel on October 7th and killed almost 1,200 Israelis (and other nationalities) were carrying out the letter of their genocidal law.
This doesn’t seem like it would take a lot of research but it might be the first time I’ve heard about this charter.
https://www.nngroup.com/articles/computer-skill-levels/
Generally people are worse with computers than you think.
A computer preinstalled with Linux is definitely more likely to confuse than you imagine
deleted by creator
It wasn’t?
FTA
The trauma experienced by hundreds of thousands of children and their parents in Gaza will also have long-term debilitating effects, psychiatrists and psychologists have warned, particularly as there are no therapeutic facilities left. Few of Gaza’s hospitals are functioning any more, even for operating on the severely injured.
With an estimated 8,000 children killed in Gaza, and many tens of thousands more injured and orphaned, the UN children’s fund has said the Gaza Strip is “the most dangerous place in the world to be a child”.
Removed by mod
It’s from the earlier days of computing/portable devices where almost nothing had the sort of inter-connectivity we take for granted.
You’d download apps or music onto your PC and then ‘sideload’ them onto your PDA or MP3 players.
Sometimes this required both proprietary cables and software. (This is why some of us still get excited by simple USB ports)
a word for such things is ‘dark patterns’
it’s not designed to be liked but to keep the player returning habitually and upping so called “retention.”
It’s mostly up to which manufacturers allow boot loader unlocking.
The pixels are somewhat a continuation of the nexus line which were more developer centric.
deleted by creator
deleted by creator
I used Signal since it was called TextSecure and I don’t think I ever successfully got another person using it.
Eventually uninstalled it because it was just largely useless, anytime I messaged a friend who seemed to be using it they were more confused than anything.
Having the right cartridge available without trying to find a shop selling them is.
One of the obstacles in this is if your printer only takes a single brand of ink.
I usually just order ink, but it’s not too hard to find ones compatible with my brother in a store if I need one immediately.
the majority of our country has better sense than to elect him president again.
The majority of country didn’t elect him the first time and definitely isn’t necessary to elect a president.
The presidency is decided by electoral college votes, not by the people’s vote.
I suppose it’s possible to build a system that would let you specifically allow a VPN IP to be green-listed on your account, but you’d probably have to allow it by signing in from a known good IP first.
I think it seems like lot of work for something that isn’t really private and is still probably vulnerable to exploit.