I have my SD docked into a 4k monitor most of the time, and I can tell you with certainty that some games will struggle at 4k on the SD. You can still use the 4k monitor for them, just play at a lower resolution.
I have my SD docked into a 4k monitor most of the time, and I can tell you with certainty that some games will struggle at 4k on the SD. You can still use the 4k monitor for them, just play at a lower resolution.
Work laptop or personal laptop?
If it’s a work-supplied laptop then it’s their device, and you should not use it for personal stuff. Always assume that company-supplied devices are monitored. Having said that, IT won’t sit there watching your every move, but they will care if you watch porn or download torrents.
If it’s a personal laptop then they can go pound salt.
Does registry still have that problem of making it practically impossible to do garbage collection on old images?
Is a chicken egg an egg laid by a chicken, or an egg that if fertilized would hatch into a chicken?
That seems like a myopic view. Service misconfiguration is not always a vendor’s fault, and demanding software vendors to patch their products is not going to fix OSS vulnerabilities. In fact, we’ve seen examples this year of increased pressure to fix “issues” leading to developers unwittingly accepting malicious commits.
Mind you, I’m not contesting that some vendors produce dogshit products (looking at you, CrowdStrike), but calling all vendors villains is a bit of a stretch.
Yeah, you’d have a LoadBalancer service for Traefik which gets assigned a VIP outside the cluster.
virtual IP addresses
Yeah, metallb.
Or the classics of symphonic metal like Stratovarius.
The container is reproducible. Container configuration is in version control. That leaves you with the volumes mounted into the container, which you back up like any other disk.
Rant: We’re living in a time where curl | bash
has become normalized. This generation’s security practices are fucked.
Back to the topic: I see it as a problem of not enough education and too much trust. People are not taught how to verify the authenticity and legitimacy of software, and put too much trust in claims of authority. It’s not just a consumer problem either, look at the CrowdStrike incident: people in the industry knew it was shit, but the decision makers kept trusting it because they are a big name. How did they become a big name? The same way a lot of other companies do, by bribing the early decision makers into using them.
Back to consumers: it doesn’t help that there’s no first class sandboxing features. Both Android and iOS rely heavily on app store controls. Sure, there are some system controls, but the user has barely any agency over them.
It’s not that Seagate improved (which it may have), it’s more that WD has noticeably declined. It’s not a race to the bottom (yet), but there’s effectively no competition any more, so they aren’t incentivised to improve quality.
Figure out the uid/gid (numeric) for the user in lxc, then change the data permissions to those.
Only 2. But you’ll be shocked at how many losses the team had in the last 5 years!
Since FF 6 and 7 have already been mentioned, I’m going to give a honorable mention to Shining Force.
Use -m
and limit the build job’s memory so it doesn’t kill the docker daemon.
Do I read these top to bottom or clockwise?
When I was younger and more naïve, I used to think a case was useless. I kept my phones in my pocket most of the time, and didn’t feel particularly clumsy or reckless. Then I got a phone that happened to have a glass back, and it broke not because I fumbled it, but because it slid out of my pocket onto time floor while I was sitting down. Glass backs on phones are bullshit.
So TCP ACK is the backwash?
“BuT mAnIfEsT v3 wIlL pRoTeCt UsErS fRoM mAlIcIoUs ExTeNsIoNs.”