When oxygen was first released during the great oxygenation event, it killed all other life on earth.
- 0 Posts
- 9 Comments
truthfultemporarily@feddit.orgto Not The Onion@lemmy.world•Keystone Kash Pays Baffling Tribute to Kirk: ‘See You in Valhalla’English21·10 天前You only go to Valhalla if you died in battle or hang yourself from an ash tree.
truthfultemporarily@feddit.orgto Technology@programming.dev•Copilot Broke Your Audit Log, but Microsoft Won’t Tell YouEnglish3·1 个月前Tomorrows headline: SOC and ISO27001 are no longer required for any government contract.
truthfultemporarily@feddit.orgto News@lemmy.world•Air Canada union says flight attendants will continue strike, defy government16·1 个月前This is apparently the case in the whole industry and its ridiculous.
Yeah you use buttplug.io and hook it up to your CI/CD pipeline.
I think NAT is one reason why the internet is so centralized. If everyone had a static IP you could do all sorts of decentralized cool stuff.
Yeah but DLS would be a significant downgrade for many people, who already fight the suggestion to only eat meat six days a week tooth and nail.
https://pmc.ncbi.nlm.nih.gov/articles/PMC6013539/
https://pmc.ncbi.nlm.nih.gov/articles/PMC10537420/
https://pubs.acs.org/doi/suppl/10.1021/acs.est.3c03957/suppl_file/es3c03957_si_001.pdf
Things that count as DLS:
- 10 m² of personal living space + 20 m² for every 4 ppl as bathroom / kitchen
- 2100 kcal/day
- 1400 kWh/year, but this already includes public services (education/healthcare)
- 1 washing machine per 20 ppl
- 2.4 kg clothing / year
- wear tops for three days and bottoms for 15 days without washing
- 1 laptop per 4 people with a yearly power consumption of 62 kWh. (bizzarely they talk about an 800 MHz computer and seem to confuse HDD and RAM). If your gaming computer used 400 W you could use it for 150 hr/year.
The binary is called apt-get. There are others like apt-cache etc.
Apt is a script that just figures out which binary to use and passes the arguments on.
- apt update -> apt-get update
- apt policy -> apt-cache policy
The threat model is that all communication is recorded and will be decrypted once the technology becomes available. The question then becomes for how long you want your data to be secure. If its for example 40 years, you need to chose an algorithm today that is still secure in 40 years.