

What’s saturated light and what is bingodabbing?
What’s saturated light and what is bingodabbing?
That’s kinda an insane amount of ram for most simulations. Is this like a machine learning thing? Is his python code just super unoptimized? Is it possible he’s making a bunch of big objects and then not freeing the references when he’s done with them so they’re never garbage collected?
Looks really nice!
Like astrsk, I feel like the stroke might be slightly too thick at some sizes. I would make it approximately 20% thinner. (Though depending on how these are constructed that might be too much work. If so, it’s not bad as is)
I still don’t think this is correct for two reasons. 1: I believe the DMCA and friends count as copyright law. 2: just reading the text of the law (#17 U.S. Code § 106):
Subject to sections 107 through 122, the owner of copyright under this title has the exclusive rights to do and to authorize any of the following:
(1) to reproduce the copyrighted work in copies or phonorecords;
(2) to prepare derivative works based upon the copyrighted work;
(3) to distribute copies or phonorecords of the copyrighted work to the public by sale or other transfer of ownership, or by rental, lease, or lending;
(4) in the case of literary, musical, dramatic, and choreographic works, pantomimes, and motion pictures and other audiovisual works, to perform the copyrighted work publicly;
(5) in the case of literary, musical, dramatic, and choreographic works, pantomimes, and pictorial, graphic, or sculptural works, including the individual images of a motion picture or other audiovisual work, to display the copyrighted work publicly; and
(6) in the case of sound recordings, to perform the copyrighted work publicly by means of a digital audio transmission
It seems pretty clear that only the copyright owner has the rights to make copies, subject to a number of exemption.
Now IANAL so I could be missing something pretty huge, but my understanding was that this right to make copies (especially physical ones for physical media) is at the core of copyright law. Not just the distribution of those copies (which is captured by right 3)
I don’t think this is true. While copying might fall under fair use if used for some purpose, you definitely can get in trouble for copying even without distributing those copies.
For example, you can’t rent a library book and then photocopy the whole thing for yourself
Kubuntu at least also has this option!
There’s probably an option in your distro to automatically install updates, but it’s annoying when that happens when you’re in the middle of something or if they require restarts
I like it a lot when I don’t need a full IDE or a terminal editor (which I use micro for).
The folding in Kate isn’t bound to a keyboard shortcut by default, but you can bind the katepart > Toggle current node
in settings > configure keyboard shortcuts
. It’s also available via mouse on the left side.
I believe Kate does that! It’s a GUI and not a TUI though. Not sure if that was a requirement as well
In that case it’s highly unlikely your problem is with DNS. And much more likely it’s a problem with the actual connection to the server. If you are willing to share the IP/domain I can help troubleshoot (either here or in a DM).
If you do a DNS lookup (through nslookup
or many other tools) on the client you’re using to connect, does it get the right IP back?
Sorry I completely misread your comment to be saying that the maximum efficiency was 50% not that it occurred at 50%.
I believe for the highest efficiency you only want to use about half of the rated power of the PSU. So if your system draws 350W, 700 is a very reasonable power supply
Shouldn’t it be the median person?
How does paleo art work now? What’s done differently?
For me that’s under Internet > Saved Networks > network name > Share, instead of doing it from the main list of networks
Yeah. Open one PDF normally. File > import a second one and select whatever option imports by appending pages.
He does appear to be a professor in the field
By default, an enencrypted boot drive is not sufficient to be able to decrypt a LUKs drive. If you have to type in your password to start the computer/unlock LUKs then you should be good.
If you’ve setup a keyfile or TPM based decryption of LUKS, then your data is probably not safe (though a TPM based decryption could be if the OS is secure and secure boot is setup properly)
In this case, if you have another server then you could setup a mutual tang/clevis system where each device gets the keys it needs from the other server on the LAN. Both would be LUKs encrypted. So if one is online the other gets the required key from the online one while booting. But if both are offline then no keys are available and you have to type in a LUKS password to boot. Something like https://www.ogselfhosting.com/index.php/2023/12/25/tang-clevis-for-a-luks-encrypted-debian-server/ but what they do with multiple servers is probably overkill
https://www.youtube.com/watch?v=aMT_EGXQwyk
I’m not all the way through it but the first part is pretty cool