If you like fedora as a base, you can install the Gnome version of fedora and install the Pop Shell. It has autotiling that you can turn on and off while you get used to it if you want. Its what I run on Nobara and it works perfectly fine for me.
If you like fedora as a base, you can install the Gnome version of fedora and install the Pop Shell. It has autotiling that you can turn on and off while you get used to it if you want. Its what I run on Nobara and it works perfectly fine for me.
Id say quite a few Twilight Zone episodes had endings that were better than the mystery. But of course, there were just as many episodes where the opposite was true.
In the song the Sk8r boy is the hero who triumphs in the end so i think it makes sense.
Indeed they are, but every single site wants my email and birthday before I can view content now. I don’t knock them for trying to make money from ads but I don’t need them selling my email address on the side too.
I’ve actually been using it for years but I’ve never messed with the launch gestures before. That’s a super useful feature.
KISS launcher is exactly what I was looking for in a launcher. 5 always used apps at the bottom calendar and weather widgets on the home screen, search for everything else. It seems like it used to have a lot of problems with custom icons but lately it’s been pretty much perfect.
Maybe not that much more complicated, but it does give a less experienced user a lot more opportunities to make a mistake that could result in data loss or just a computer that suddenly decides not to boot Linux anymore since a Windows update broke grub.
From a Star Trek perspective, when they have to eject the (warp) core they are also in for a pretty bad time.
The most important thing to do is backup your data to an external drive. Unless you are planning on dual booting (much more complicated) you will be wiping out the entire drive that has windows on it when you install Linux.
This guide goes through the whole installation process.
My conspiracy theory is that hes sitting on a mountain of Hillbilly Elegy DVDs and this is his plan to finally sell them all.
But yeah, he believes in whatever is making him money at any given point because hes simply 10 pounds of slime in a 5 pound sack.
Can, yes.
Should, maybe.
Enjoy doing, unlikely.
And for sure your home isp has all the email ports blocked upstream.
With all that being said, to call SMTP dead is wildly insane. I do figure it will die someday though. Probably around the same time of universal IPV6 adoption during the year of the linux desktop.
Octoprint is what I use. Slicing is probably the thing it woukd be least good at but all the rest is good. And theres an api to write plugins for if youre into that sort of thing.
This is more like triple bolting the door but leaving a window open. There’s nothing inherently wrong with the door, its still secure but you can bypass the secure option with a less secure method.
You also get additional protection because rather than each website holding onto a hashed (hopefully) copy of the user passwords that can be stolen in bulk, stealing the public keys for a passkey from a site wouldn’t compromise the account. Someone would have to get access to your physical device or hack your password manager individually to get access to your passkey.
And and, the magic for most people is no more passwords and 2 factor stuff to deal with. The standard is still new, and in the cases where you want to use physical keys, its always best to keep 2 in case one gets smushed or goes through the washer. Some sites that have passkeys enabled only let you have 1 passkey. So in that case its kind of risky to make a passkey the only way to sign in.
This is the real takeaway, if you have a forgot password button that bypasses everything then none of it is anything more than a login accelerator.
This is just someone siting in the middle and modifying a page not to show the passkey login option anymore and then stealing a password/session token.
As far as I can tell, this has almost nothing to do with passkeys specifically and would only apply in a situation where a website has a username and password fallback in case a passkey isn’t created or isnt working.
I agree with you.
And youre right that the article doesnt focus on the algorithmic hate factory which to me is the main difference between social media and traditional media. For instance, and this is just anecdotal, my grandma who had nothing besides an analog telephone and broadcast tv became just as polarized and angry as someone with social media just by reading and watching Fox news (and eventually OAN and Newsmax) all day. I cant imagine that Facebook would have made it any worse.
The algorithm is probably accelerating the polarization pipeline, but i guess my point was that social media isnt necessarily doing anything new or distinct. Its doing the same thing Rush Limbaugh was doing on the radio 25 years ago, its just on a new frontier.
The 24 hour news cycle was already throwing sensational controversial stories up and speculating wildly if not outright lying about to hold on to eyeballs. The longer you watch, the more commercials you see. Etc etc.
I would love to see a study of social media vs traditional media to see whether the mean time to full polarization changes and if so, how significantly.
Good Ted talk!
Nope not really. People were already mad but its a lot easier to get mad publicly on the internet than in person. But Im sure the same people could get just as angry watching biased news channels but they cant start arguments with anyone in that context.
And also, don’t forget Betteridges Law of Headlines.
If anyone wants to know, the reason that happens is because spiders move their legs with a hydraulic system and once they are dead the pressure gets released and they revert to their “default” state.
https://asknature.org/strategy/leg-uses-hydraulics-and-muscle-flex/