You’ve also dramatically lowered the dpi and introduced untold screen artifacting! The death knell that came for cardboard as well.
You’ve also dramatically lowered the dpi and introduced untold screen artifacting! The death knell that came for cardboard as well.
I get around 980 down 450-550 up on a Wifi 6e 160mhz 6ghz link, if I drop to my 5ghz network with 160mhz I run around 770 down and 375 up.
Any poor quality connector can affect a sector scan and drive performance. Doesn’t matter if it’s connected to a corroded usb port or a bent internal sata, at the end of the day if you’re getting disk errors it’s best to measure using two methodologies/data pathways.
You might consider the Mackie Crx Cubes. They use bmr drivers that allow a wider Soundstage without needing as much physical space and can be had at a pretty reasonable price. Bass is lacking though, so allocate funding for a small woofer if you want the absolute best experience.
Unless you’re just opening up all the ports on your router, it should be blocking all incoming connections by default. I’d recommend doing 1:1 port mapping for the specific internal ips of your services if your router provides that capability, but at minimum just locking it down to only opening the ports required for your services should suffice.
So wholesome. Now you’ve gone and got me all emotional, SatansMaggotyCumFart
This comment right here officer. (Fwiw, I up voted)
Careful doing just this. They actually track http request headers and look for desktop signifiers, so your best bet is to use a VPN in tandem with whatever setup you go with. (Tried doing this a few years back without the vpn, they sent me some very upset texts.)
Most UPS systems of quality will come with software capabilities. You can leverage this and just use a daemon to check the charge status every minute or so. If it’s ever off AC or reporting charge levels lowering, you can toss the system into a low power profile. This might accomplish what you’re trying to do.
Lol not sure why people are giving you shit! It’s clearly organized, although perhaps not how some people would personally like it. Glad you’re having fun with it!
Lol your yuck is always going to be someone’s yum and vice versa, so careful where you throw that disgusting word around, it’ll come back to you eventually.
No, but they have to disclose all possible avenues of collection. I for one like storing my health data in icloud for processing and retention. They take that data, run it through algorithms, and use it to provide me things like estimated sleep cycle details.
Yes. Also yes. I find quite a bit of it distasteful, but as a systems administrator I have to be informed of all privacy policies guiding the disclosure and use of company data. It sucks, they’re lengthy and overwhelming, and often you’re right they do ask for too much but at the end of the day it’s less than you’d expect and they never make their money selling it, which is more than you can say about any software company of Apple’s scale.
If I set the boundaries they’d have none. That’s my preference and why I E2E encrypt everything on my device. I’d give up features and self host if I could, but all of that just isn’t possible for your average user or for them to stay competitive in their business model. Users don’t want to know what E2E is, they don’t want things “losable”, and honestly don’t care about their privacy (check the privacy policy of meta and TikTok vs Apple if you don’t believe me that there’s a difference and the vast majority do not care). That being said Apple provides what I see as the best middle ground. Enough privacy to remain confident my data is secure (E2E icloud backups, E2E messaging, etc) but enough gathering to keep their services competitive with more lucrative competitors with looser policies. Oh. And it would be too far when they started selling it to third party companies. That’s what msde me leave my android phone behind, when Google started migrating all the apis to Google Play Services instead of ASOP apis.
No offense taken, I understand your rage and I agree with your sentiment. They ask too much. But when you compare the other options, it’s the safest path in my honest opinion.
I unfortunately don’t have much to share beyond a decent understanding of compute systems at an enterprise scale (where we utilize these low level subprocessors to do various things such as gather asset data or deploy operating system configurations, see: https://en.m.wikipedia.org/wiki/Intel_Active_Management_Technology). The point I’m trying to make though is that current operating models don’t allow for system trust. If you can’t trust apple with high level data like that needed for llm models on-device (which is how they’ve configured it, requiring a specific user approval and interaction before forwarding minimal data to private process servers) then you shouldn’t trust any device that lacks a complete open boot/firmware/ and OS stack because if these companies were going to exploit your data that egregiously, they already have the lowest level (best) access possible to a system that can transparently (without your knowledge) access encryption enclaves, networking, and storage. Truly open alternatives do exist by the way (see Coreboot, etc) but you’re going to be looking at devices 10-20 years old since almost the entire industry runs proprietary at that level and it takes time for the less heavily funded community players to get up to speed.
I’d say I’m optimistic, hopeful, and we’ll intentioned but it’s been many a year since I’ve felt “nice”. Something shifted in society during the Covid era and I just feel awful going out of my way for most people these days. Very much in the “every person for themselves” category.
They’re not just security platforms. They’re low level computer systems with entire bespoke operating systems and better-than-kernel level access to the system (networking, etc). You have no idea what you’re talking about. Please inform yourself.
You do understand they use all this data to provide services using it and as such they have to disclose that in their privacy policy, right? For example, health data collection, is literally required to be disclosed to offer health services such as step tracking. You’re way way off base here.
You almost certainly run all of your software on code you lack access to the source for. Firmware and etc has been completely proprietary for ages. There’s even a tiny proprietary os embedded in almost every processor on the planet. Your statement lacks context of computing and shows a misplacement of trust.
https://www.zdnet.com/article/minix-intels-hidden-in-chip-operating-system/
https://en.m.wikipedia.org/wiki/AMD_Platform_Security_Processor
Apple secures third party audits for their devices and designs, additionally security researchers have methods of verifying certain aspects of device behavior. People dig into stuff and Apple has not only a history of good privacy design, but as far as I’m aware they’ve never been caught doing anything remotely out of scope of their tight knit privacy policies with user data. Your complaint is baseless.
From what I can tell this isn’t going to function, mainly just due to the additional proprietary connectors on that Dell card. I imagine there’s some sort of firmware integration as well though since it’s got a data line coming off it too. Quick side question, is there any reason you’re not just picking up some N95 boxes off Amazon? They’re so cheap you’d pay for them in power savings vs this box alone and you could essentially treat it as a Raid 1 of the entire system with a handful of backup scripts.