They sold laptops with this feature at one time. https://www.youtube.com/watch?v=q5M0TwnkWUM&list=PLec1d3OBbZ8IBeFODHXLy0m0okuZhqJnT
They sold laptops with this feature at one time. https://www.youtube.com/watch?v=q5M0TwnkWUM&list=PLec1d3OBbZ8IBeFODHXLy0m0okuZhqJnT
And if you overthrew the ruling class, you’d still want to know how the new system was affecting various demographics. All systems have biases and the only way to account for them is to know about them.
These types of figures are still important to know. You want to see if certain populations are being affected disproportionately and have a baseline to work from when seeing how policy changes are working.
If you make a policy change and see recovery overall but you’re still getting 52% of Latinos reporting insecurity, you’ve done something wrong and you have data to back it up.
The potential for distros optimized for specific tasks without needing to swap out entire kernels. A “gaming” focused scheduler probably looks different from a big data cruncher or a super multi-tasker server.
What’s funny is right at launch I would have seriously considered upgrading, but I’m on second gen Ryzen and that platform was deemed not new enough at the time. Now they’ve added a bunch of BS and even though I think they’ve removed the restriction I’m over the new shiny thing and am looking heavily into a full linux setup.
Are you concerned about sensitive data leaving the PC or some sort of infection (like a crypto-locker) being brought onto it? Also, what is your threat level? Are you likely to be targeted specifically?
With an airgap, it would be pretty difficult to get data off of it without being onsite. The most important things would be physically securing the device (locked room), using full disk encryption, and using some sort of 2-factor login system. (hardware security key, like a yubikey ideally).
Securing against infection is nearly impossible, as stuxnet showed. Your best bet to beat these is some common sense security with what you’re transferring and lots of backups. If you do find an infection, you just blow the whole system up and restore from a clean backup.
Yep Lemmy uses SMTP and in my experience most self-hostable platforms do as well. You can see in the Lemmy config documents how it gets set up: https://join-lemmy.org/docs/administration/configuration.html.
Pronouns are extremely relevant in formal communication. People do their best to infer them from names but that’s not always easy or even possible.
There are hundreds of gTLDs now, maybe everyone can stop abusing country code TLDs and leave them for their intended purposes.
Subatomic particles act in insane ways that are absolutely not mechanical or predictible. A very limited size of object behaves “normally”. I think believing that the universe mostly acts like our everyday objects is the skewed perspective.