0 Followers
0 Following
1 Posts

I used to have a batch file to create a ram disk and mirror my Diablo3 install to it. The game took a bit longer to start up but map load times were significantly shorter.

I don’t know if any modern games would fit and have enough loads to really care…but you could

leagues are bullshit. the problem is having higher standards for others than for yourself. if you don’t want to settle for someone like yourself, focus on improving yourself not trying to date.

I’m not sure why this shocks people. It’s definitely not new or tesla specific.

Does your car have an app that let’s you see data from your car or do anything to remotely control it like unlock the doors? then that can be done by the car company that runs the backend the app communicates with.

It’s also not limited to app based things, cars have had this since OnStar was a thing. It’s just much more obvious these days.

I dont have any specific llms to recommend but if you do want to go that route you could always run it remotely through something like Google collab.

But I don’t know if I would trust the results of an llm doing this as any mistake would make your entire resume untrustworthy

I hope they find a way to add more variety to the gameplay interactions. Not just having a variety of builds that work though that’s important too. but it feels like no matter what your build is you then have the same approach to all encounters. There’s lots of different mob types and random modifiers on them but either it breaks your build and you can’t clear them…or you clear them the same way you clear everything else.

Correct, though to be pedantic anyone can be a CA- you just generate a cert with the right bits to say it’s a ca certificate and then use it to sign any other certificate you want.

But the only devices that will consider your signature worth anything are ones you also install your ca certificate on. So it’s useful and common in internal networks but isn’t really what is being asked here.

The hard part is getting in the root CA store of operating systems and browsers. As far as I know they are all maintained independently with their own requirements.

it’s frustrating that people react and spread misinformation without doing the bare minimum of research, but I don’t think making obvious satire is frustrating. if anything hopefully people learn from it and stop taking screenshots of things as truths

i didn’t downvote but imo it is light on data. having some more info on methodology would help, like where did the data come from? was there any normalization or other processes?

It’s hard to know if this is a map of words used most in an area relative to how little it’s used elsewhere, or just most common? or just…cherry picking slang that isn’t actually commonly used but is from that area?

Or you’ll see something equally efficient and equally performing at the same power levels…except you’ll see newer gens or upgraded skus allowed to pull more power

another useful one is <(cmd here)

It’s like $(cmd here) but instead of returning the output of the command as a string passed into the arguments, it makes a new file descriptor for the output of the command and returns the path to it, for use in commands that want a file as an argument.

So for example if you want to use diff to compare your local passwd file to a remote one…

diff -u <(ssh host1 cat /etc/passwd) /etc/passwd

Admittedly I can’t think of many things I’ve used this for outside of diff and alternatives to diff…but I’ve used it there a lot, like comparing the results of running two slightly different queries.