

If the fixes keep coming I might just get back into TF2. I first played it and got hooked through The Orange Box on the PS3 and then eventually on PC when i got a gaming laptop years later.
If the fixes keep coming I might just get back into TF2. I first played it and got hooked through The Orange Box on the PS3 and then eventually on PC when i got a gaming laptop years later.
Ya, I must have started using Linux well after Ubuntu made it really easy to install drivers.
Granted you do need to know where to find the option to install drivers, at least you used to maybe its even easier now, but I havent used Ubuntu in a few years.
Once you found where the option to install was it was a click of a button
In contrast Packt is on the crap end.
I had a similar experience where we had an entire class for Novell Directory Services. The reason our teacher gave for keeping the class in the curriculum? We MAY run into it in the workforce.
I buy a license for Crossover every year to support Codeweavers. I know its not much but its what I can do to show my support for such an amazing software (talking about WINE).
It’s great to see they are hiring, but I do hope they arent being rash with these openings. Ive work my fair share of tech companies and some have a culture to open positions because of KPIs and then 6 months to a year later have a massive layoff because they were completely off with their projections so now they have to cut positions which include some of the people hired well before the hiring bananza.
DNSSEC is a means of authenticating the data receives was not tampered with, such as MITM attacks, thus ensuring data integrity. It uses PKI but it’s not an alternative to DoH or DoT which encrypts the DNS traffic, either over HTTPS or TLS, providing confidentiality.
DNSSEC can be used in conjunction with DoH or DoT to achieve the Security CIA triad - Confidentiality, Integrity, Authenticity.
While this is nice, I do hope they consider making it easier to remove and install a new battery for the next iteration of the steam deck.
To clarify, I mean something similar to phones where the backplate can slide off or preferably a panel, secured by a screw, when removed allows direct access to the battery and allows it to be easily swapped out - similar to many kids toys.
Considering the recent revelations about the shady, scummy and unethical business practices by Honey, I can’t say I’m surprised that one of the co-founders is doing more shady shit with their new endeavor.
As a Sysadmin I would be immediately looking for a new job if management wanted to snoop on employees machines via a screen recording/capturing software. I wouldn’t want it done to me and I sure as hell wouldn’t feel right deploying such spyware!
Not to mention it immediately errodes the fragile trust between IT and the rest of the company and troubleshooting or implementing changes becomes that much harder.
What I tell EVERY person, not just coworkers, is DO NOT TREAT THIS AS A PEROSNAL DEVICE. Keep your personal stuff off the work machine.
It’s not even because of snooping by the company. What if the company performs a remote wipe after an unexpected termination? If that device is the only place you kept important documents… Well, you are up shit creek without a paddle.
Now, the type of remote assist tools we have make it very clear to the other person we are connected and can see their screen(s) - connection notifications, persistent banners and disconnect notifications. Every team I’ve worked on makes it protocol to ASK the employee if we can remote in.
It might seem like a formality but honestly if someone hasn’t heeded our advice and is logged into their banks site I don’t want to see it! It’s very much a CYA policy for IT, but it also shows respect for other employees privacy.
And then those “enterprise features” get borked on the next major macOS release.
Oh you wanted to ensure your remote assist tool could be granted the proper permissions to work? Well screw you! We took away the ability to grant Screen Recording permissions through a MDM profile. Suck it!
In case you didn’t know the Screen Recording permission is needed to be able to view the display/screen in applications like Zoom when screen sharing or for remote assist through Screen connect.
Apple’s “reason” was essentially “… Think of the users! It’s for their security”.
The biggest obstacle with Stadia suceeding was Google’s, rightfully earned, reputation to kill their products.
It ended up becoming a self fulfilling prophecy and has further cemented Googles reputation for killing products/services.
Google’s M.O these days seem to be “If it doesn’t make money instantly, kill it and move on.”
Does codeberg have anything that will prevent an influx of bots or AI accounts that have plagued GitHub?
I ask because as the user base for codeberg grows the bots, AI and nefarious actors will follow.
I like the idea of a federated source code hosting platform especially since it removes lock-in to a single corporation and a defacto monopoly.
That in itself is a good enough reason to migrate, but regarding this particular issue, bots/AI and artificial project promotion for malicious intent, feels like re-arranging deck chairs on the Titanic.
It’s all good, we both clarified our* thoughts on the matter and to be fair using “ruined” instead of “ruining” or “started to ruin” indicates a completed process or final state instead of a continuous one.
I agree that previously one could construct a search to sort the noise out, but as you stated this has become unfeasible without a sharp increase of queries needed to refine results which has shifted the thought from questioning if Google search is bad to now generally accepted belief - to the point where people are trying to quantify and provide evidence to back up the claim.
This article links to a research paper on the topic: https://www.fastcompany.com/91012311/is-google-getting-worse-this-is-what-leading-computer-scientists-say
*Fixed typo of ‘out’ to ‘our’
Public in this term has nothing to do with intelligence, but rather people outside of companies working on AI/LLMs or doing AI research. It’s why I mentioned it entering the zeitgeist.
I never mentioned a hard cutoff but said they ruined it before LLMs were in use by the general public. Essentially I’m referring to the starting of the degradation of Google’s search which they made conscious decisions that deliberately put profit above all.
Avid Amoeba is right that Google ruined their own search before LLMs entered the public consciousness (this does not mean LLMs didn’t exist before this, but that they were not widely available for the general public to use or became part of the zeitgeist).
If you don’t agree please listen to the Better Offline podcast episode “The Man That Destroyed Google Search”. The episode goes through the rollbacks/changes Google made to their search Algorithm well before AI was commonplace.
Better Offline: CZM Rewind: The Man That Destroyed Google Search: https://omny.fm/shows/better-offline/czm-rewind-the-man-that-destroyed-google-search
These measures align with Putin’s push for “traditional values” amid population decline
Hear me out Putin, but what if you didn’t toss everyone who can fog a mirror into your meat grinder of a war? No? Wait why do you want me to stand near the window?
I use DBeaver at work when I am having problems with psql commands in terminal. It’s prevented me from pulling out my hair a few times.
Unfortunately they are already in the market and making a mess: https://www.theregister.com/2024/07/21/crowdstrike_linux_crashes_restoration_tools/
I hate to say it but company data is most definitely on personal computers.
This is why stuff like adaptive MFA and DLP are a thing. What most people don’t know is if DLP is properly implemented the IT team/department have records of who, when, where, and what device were used to not just access/download data/files.
The problem is a lot of companies don’t properly implement DLP because it’s not a turn key solution. You need to properly classify your data first and that requires essentially a company wide audit with buy-in from all levels of management. After the classifications you can then implement restrictions and compensating controls.
Back in the day you could just block USB/network transfer, but if you have data accessible outside of a corporate network you then need to implement conditional access/adaptive MFA where only registered devices are permitted to access certain systems.
The Motorola Atrix 4G had a Desktop Mode (Webtop was its name and it was Ubuntu based) in 2011 before Samsung. They even released a cradle dock, that you could connect to a tv or monitor, and a laptop dock for it and the source code on Sourceforge (my guess is to be GPL compliant).
I got that phone specifically for the desktop mode. It had a full blown Firefox browser installed and you could run your apps along side it.
I was blown away and thought, “This is the future for computers” but I was incredibly wrong. After the short honeymoon period i found it to be sluggish and clunky when using an android app. The hardware although phenomenal for a phone couldn’t provide an optimal experience for a desktop.