It literally was in the opening paragraph. Previous years keynotes are available in a playlist here, so I assume they’ll do the same for this year’s keynotes as well. The event only just ended yesterday.
It literally was in the opening paragraph. Previous years keynotes are available in a playlist here, so I assume they’ll do the same for this year’s keynotes as well. The event only just ended yesterday.
Open Source Summit 2024 keynotes. I don’t think any of the recordings are available yet.
The malicious code is only thought to have affected deb/rpm packaging (i.e the backdoor only included itself with those packaging methods). Additionally, arch doesn’t link ssh against liblzma which means this specific vulnerability wasn’t applicable to arch. Arch may have still been vulnerable in other ways, but this specific vulnerability targeted deb/rpm distros
I hope you’re right and this isn’t about them getting ready to DRM brush handles to brush heads. Sonicare brush heads are ridiculously overpriced compared to the knock offs
Been a sync user since 2010. LJ has taken a lot of breaks but has always come back
You need to use chown if you want to own the libs
I don’t actually know the answer, but I couldn’t resist digging at least just a little bit. My gut tells me that it’s probably related to rad fem in some way, like with gold star lesbians etc and that somehow trans people are involved.
The only thing I could really find was the term “bi lesbian” which is just a way to invalidate the identity of multiple groups of people at once.
I think maybe some people might be uncomfortable identifying as a label of lesbian, and there are other ways to express this, like wlw. Also for some, lesbian still carries a stigma or implies a connection to porn. Maybe that just means we should work on reclaiming it though, instead of shunning the label
If you think that’s silly then you should see all the people praising a woman for putting an ice cube in a pot to the same effect.
Sure it stopped the water from boiling over, it also stopped the water boiling at all.
This is called the “Door in the face method” of bargaining. Start with a request so high and absurd that you “slam the door in their face” because it’s so absurd.
The next time they try, they’ll come back with an offer that sounds far more reasonable than the original request. Since you’re still primed with the previous context, your brain makes it sound less bad than it probably is ("At least it’s not the first offer!). You’re more likely to accept after this.
The opposite technique is called “foot in the door”, start with a small request (get your foot in the door) and then increase the ask after the small request goes over.
This will probably use some well-defined api endpoint to do their telemetry check-in, so this could probably be effectively circumvented if users were willing and able to do host level overrides to specifically prevent the unity engine from phoning home
You need a budget, but it’s not free.
But with Intuit, you are the product, so it’s only free in the sense that they get your info and you get mint in return.
I don’t really use it for this, but here are some things I do use it for:
I mostly just use it for metrics scraping though
It sounds like what you want is to either get a modem (either rented through the ISP or bought 3rd party, if your ISP supports it) and then ensure that this modem is in bridge mode without any sort of router features. That said, most places will just give you a dumb modem if you have no intention of using their router.
Then the other gear would be a router with the feature set you want. I personally am quite fond of my Mikrotik hap ac2 but the ac3 looks good too. I don’t use the Mikrotik for the wifi either (I use unifi for that), but it’s decent enough for a small space in a pinch.
Basically you would need to find out from your ISP if they allow you to bring your own gear – modem and/or router, with the router being the more important of the two and get their help to either swap your existing device into a bridge or getting you something that can.
This isn’t some instance specific feature or a custom shortcut – it’s a feature of Lemmy. The link posted by the bot works perfectly fine on both the lemmy-ui (browser) and on sync.
The reason why your link is problematic is because it will take people off their home instance, the other format keeps people on it. The bot is trying to suggest a way of linking internally to Lemmy that’s more user friendly than just an URL to a different instance
Because he prioritized his time in getting the application usable rather than implementing various tiers of payments instead.
One of the messages to the discord this morning seems to indicate he’s planning on adding the one time ad-free unlock today.
Updated amd64-microcode for EPYC processors appears available for several distributions which has mitigations available. I went ahead and proactively grabbed the microcode update from Debian unstable (not the best practice) and applied it without issue to my Bullseye/EPYC.
This isn’t exactly condoned as it’s not officially a backport, but I’ll take my chances as this is pretty critical.
Date of the updated microcode should be July 19th.
Going to play Devil’s advocate here, but open source does not automatically mean that things are safe or that anyone is even auditing the code on anything that resembles a regular basis.
Heartbleed was introduced into OpenSSL source code in 2012 and wasn’t discovered and fixed until 2014
I happily use Fedora for workstation purposes but hate to admit I use it, so it’s an accurate critique. It’s a great operating system though, naming aside.