I’d like to see non-synthetic benchmarks showing real world performance increase in otherwise as close as possible to identical systems
I’d like to see non-synthetic benchmarks showing real world performance increase in otherwise as close as possible to identical systems
Why would you think soldering would increase performance vs socketed at all much less provide “much higher performance”
If soldered was the only option ans 6 skud was enough for everyone everyone would have to buy very expensive hardware to increase one spec instead of smart people getting to mix match and upgrade.
The sad thing is in the US its extremely likely the fellow would have already been dead after years living on the streets with a cardboard sign.
If you use a GUI configuration tool for NetworkManger like virtually every user I don’t know how that works. Odds are not well.
Are they so different that it’s justified to have so many different distributions?
Linux isn’t a project its a source compatible ecosystem. A parts bin out of which different people assemble different things. The parts being open source means you don’t need anyone’s permission or justification to make something different out of them.
From these many and varied efforts comes life, vitality, interest, intellectual investment. You can’t just take the current things you like best and say well what if we all worked on THOSE when many of them wouldn’t even have existed save for the existence of a vital ecosystem that supported experimentation and differentiation.
If we really believed in only pulling together maybe you would be developing in cobol on your dos workstation.
Go far enough back and there were no passports but you were near certain to be killed if you wandered into another tribes space. Horrific violence is incredibly common. Go further and you might be able to wander in to trade but not welcome to settle and only if a handful of assholes who run everything hadn’t personally decided they had a dispute you ordinary folks ought to die over with zero recourse to pick new assholes.
Looking backwards is almost always a mistake because most of history is pretty awful.
Thanks for the information regarding translation that makes it far more clear. I wouldn’t phrase that as “mind deformation” because that sounds like mental illness.
Most bugs aren’t unconditionally experienced by all comers or they would have been fixed. It’s entirely possible there are 17 horrible game breaking experience ruining bugs every single one triggered by a very specific combination of factors in a given work and out of millions of players one person to hit 5 and hate their life and many hit zero.
If you had bothered to read you would note they mention concrete defects that effected their playing not nits they were picking based on depth of experience.
Given extremely misery return policies if your game’s profitability is actually materially harmed let alone destroyed by returns you might have released a broken piece of shit and need to blame yourself rather than customers who believed in you enough to at least initially put their money where their mouth is.
You see what others don’t and this doesn’t help you feel positive about products.
Its a fucking game. If it doesn’t make you forget about it being a “product” and divert your attention from the reality for a few hours its developers have wholly and completely failed.
your professional mind deformation
Did this sound like how humans talk when you said it?
I ask QAs questions like your fantasy to find out whether the person is able to perceive different work aspects from a business perspective
You try to hire people who are literal soulless robots who think about the money that can be made from convincing people to pay you to shovel shit into their brain instead of having fun.
. This is very important to discover in an interview to filter the red flag attitude
Holy shit you might actually eventually hire someone who gives a fuck
I wish you the best, OP.
I just said you were a piece of shit nobody should hire but I totally “wish you the best”. If its a person you ought to avoid hiring its a person who walks into a legit conversation, shits all over it, insults people, and talks like a fucking robot.
Can you possibly keep your negativity to yourself if you have nothing useful to contribute next time?
Imagine a woman getting raped in the bushes and a bystander runs up and instead of helping her suggests they negotiate a more comfortable position.
The only thing desired is for Russia to leave and they have already said they would prefer that be decided on the battle field. Any temporary cessation of hostilities would just be giving them room to breath, re-supply, and mass forces. There literally isn’t anything to negotiate.
Are we suggesting that rich people who get a product for free and use it to forklift more piles of money into their scrooge mcDuck like vault ought to demand more accountability from the people who provided the free forklift.
How about they pay for that?
You asked for details and pick on the unlikely measure of cold boot but ignore the fact that in most configurations you can press the letter “e” to edit the boot up command line. It wasn’t “cute” it made you look like a gross human being.
Security is about understanding reasonable threat models. 99.99% of reasonable threats to your machine involve theft or loss of the entire machine and personal data or accounts being accessed. This doesn’t require advanced attacks or paranoia nor does it require extreme measures to protect against. No installer will create such a configuration without a passphrase because its a simple and effective step to take to protect your data that is enforced by systems created by people who are all smarter than you.
Your cute statement about child porn is tasteless and thoughtless. I don’t take reasonable precautions like taking 5 seconds to type a password because I’m paranoid or criminal I do so because I have basic common sense.
“Arguing that you don’t care about the right to privacy because you have nothing to hide is no different than saying you don’t care about free speech because you have nothing to say.” https://en.wikipedia.org/wiki/Nothing_to_hide_argument
I never suggested there wasn’t value in the TPM for anyone although I think such validation has small value for most folks use case. Normal users are worried about theft of laptop by criminals not spies bugging their machine. I suggested that any configuration without a passphrase was inherently insecure.
It’s not an “optimal setup” its the only setup that makes even the slightest sense because the alternative configuration can be defeated by a smart 12 year old with access to google.
Ah yes security brought to you by the same folks who brought you “bypass encryption by holding down the enter key” and “name your user 0day to get root access”
It’s like putting security cams and interior locks all over your house instead of locking the front door. If your storage can’t be read without the passphrase then NOTHING can fail in such a way as to provide access. Simplicity and obvious correctness have virtues.
There isn’t much reason to use anything other than FDE with a sufficient passphrase, auto login so the user doesn’t have to type two distinct passwords, and go luks suspends to evict key from memory on suspend.
Boot up enter the passphrase -> see your desktop -> close the lid -> open the lid -> enter your passphrase
You can google lets drop all the crap you think you understand but don’t use simple logic. Unencrypted data isn’t secure against physical access. If your data is automatically unencrypted without benefit of entering a passphrase then its not actually secure. There’s no free lunch.
Yes because having firefox in /usr/bin/firefox is trashy and disorganized compared to having it in /home/$USER/.var/app/flatpak/app/org.mozilla.firefox/x86_64/stable/6b73214102d2c232a520923fc04166aed89fa52c392b4173ad77d44c1a8fb51b/files/bin/firefox and running firefox is so much more gross than flatpak run org.mozilla.firefox
Can you like actually hear yourself?
On most systems you can press a hotkey in grub to edit the Linux command line that will be booted and in about 7 keystrokes gain access to any unlocked filesystem. Asking how you can break into a system you physically control is like asking how many ways you could break into a house supposing you had an hour alone with a crowbar the answers are legion. No machine in someone else’s hand which is unlocked can possibly be deemed secure.
Even dumber no installer will create such an insecure configuration because the people that design Linux installers are smarter than you.
It also meets any reasonable definition of bloat
You aren’t actually asking to how to bypass encryption because the key is already in memory. You are asking about the much simpler task of compromising a computer with physical access to same. Depending on configuration this can be as ridiculous as killing the lockscreen process or as hard as physically opening the case chilling the contents of ram enough that data survives transfer to different physical hardware. See also the massive attack surface of the USB stack.
Flatpak isn’t going to have every library, cli tool, or even every GUI tool. I think in the end out of date just isn’t worth it.