![](/static/66c60d9f/assets/icons/icon-96x96.png)
Skyrim gets it wrong too. These video game devs need to spend more time reading the scripture. /s
Skyrim gets it wrong too. These video game devs need to spend more time reading the scripture. /s
The guy is wrong. Dragons have 6 limbs, 4 legs and 2 wings on their backs. Like angels. What the commentator is describing is Wyverns.
I have a Synology NAS, and the account you create with them is separate from the ones you create on the device. They couldn’t log into my device. Their account allows for easy integration with their stuff like the dynamic dns or other outside services. I like it because if my internet goes down, I get an email saying they lost connection, which is great for diagnostics.
If I set up my router to block all traffic to them, it would not prevent me from using the device.
This is true. You create a plex account, which allows you to log in from anywhere and will give you access to your media. The real problem is that if your outside internet goes down, you can’t log into your own server.
My first thought was “this is why you use Jellyfin”.
Alpha Centauri was awesome, but so were a lot of the other games. Colonization was a lot of fun. Call to Power is the civ game I want a real sequel to. Going way into the future tech was a lot of fun, and being able to build cities at the bottom of the ocean.
Of course, I think the whole franchise has gone downhill since Civ IV, so take my opinion as you will.
I have an anecdote that says the opposite. I got the same fridge, washer, and dryer from LG when we moved in our house 10 years ago and have had no problems with any one of them. My wife hates that we got a model with the freezer as a drawer on the bottom and would have preferred a side by side but no problems with anything breaking.
Our Bosch dishwasher on the other hand had a gasket start leaking during the pandemic and it took the repair people 4 or 5 months to get a replacement in. I think they were redesigning a faulty part at the same time as all the supply chain issues so we had a really bad time with that. It was only a couple years old at the time and has worked ever since.
I feel if you display it in a wheel, than opposing colors should be opposite emotions.
I don’t see ads, so who knows what is in my profile.
I’m fascinated how British English uses “revise” where American English uses “study”. I wonder how this came about. In America, you would say “I’m studying for an exam”, but use “I’m revising my paper” to mean you already have a draft of the paper done and you are looking it over to make improvements.
Side note. Don’t use hardware acceleration with TDARR. You will get much better encodes with software encoding, which is great for archival and saving storage.
Use hardware acceleration with Jellyfin for transcoding code on the fly for a client that needs it.
If you know what your client specs are, you can use TDARR to reencode everything to what they need and then you won’t have to transcode anything with Jellyfin.
You have a point that it will be hard to explain this to everyone on why it is better.
From my understanding, when you use a password manager, the user will enter a pw into it that they remember and the vault will unlock. Then when they go to log into a website, a different, longer, and impossible to remember password will be sent to the site at login. (Assuming they are using the manager well). A week later when they go to log in again, the same long password will be delivered.
The problem is that if a bad actor gets involved, whether it is the website is attacked or they send the user a phishing url or something and the password from the manager is exposed, it will have to be changed. That scammer can now log into that website as the user whenever they want, and possibly any other website that user used the same password for. Hopefully they didn’t if they are using a manager.
With passkeys, a user will log into their manager with a password they remember, but when they go to log into a website, a different token will be sent, based on their key, every time. So if a scammer is listening at the router they still can’t log in again because it has expired.
It is still not a perfect thing, I would imagine that phishing sites could still get a scammer in, who could possibly do bad things or change the login credentials but it is still much more secure than sending a password to the site for the user.
That is why good sushi fish is flash frozen and then thawed before serving. It will kill all the parasites in the meat.
I’ve had it in the states. With good fish it can be good, but I’d take halibut over salmon fried any day.
Part of the reason that Silicon Valley became so big instead of some place like Boston on the east coast is that California has always banned non compete clauses for workers. This allowed for more cross talk for the workers in the area and everyone was better for it.
Reading this makes me want to find a Linux distribution that does not use the gnu stuff at all.
Wax is made of hydrocarbons, which is as organic as it gets.
Good luck proving that your data came from meta sources after you paid.
How about if you have a destination, find me a rest area/restaurant/whatever that is on the route. Not just around somewhere.
This just sounds like a manager has a metric of “all prescriptions must be ready in x minutes” and it is easier for the pharmacist to just click “it’s ready” before the alarm goes off.