[-] Kissaki@beehaw.org 7 points 2 days ago* (last edited 2 days ago)

Maybe I would

  1. Create a file called pdfs.html
  2. Add embedded PDFs
    <embed src="pdf1.pdf"></embed>
    <embed src="pdf2.pdf"></embed>
    <embed src="pdf3.pdf"></embed>
    
  3. Maybe give it a container div with display grid for min size and useful layout
  4. Open the HTML file in my webbrowser Firefox

To generate the embed codes for every PDF file in a folder I would use my command line shell Nushell, which generates the embeds for all files for me.

ls *.pdf | each {|x| $'<embed src="($x.name)"></embed>'} | str join
[-] Kissaki@beehaw.org 1 points 3 days ago* (last edited 3 days ago)

Why would I add a line break when I don't want or need a line break? It's a list item, not a text paragraph.

I define the layout and spacing in CSS for the li element.

I don't think I've ever noticed this as prevalent or common. If at all then as a strange outlier.

If it's a list item with line breaks, sure. But the linked diff adds it at the end of the li with no content following. And it does so on the previous li. Leading to a line diff on a to this unrelated item.

[-] Kissaki@beehaw.org 3 points 4 days ago* (last edited 4 days ago)

Diff of the new terms

They add a <br> inside the <li>? wth

Messy layouting

57
submitted 1 month ago by Kissaki@beehaw.org to c/technology@beehaw.org
3
-3
23
submitted 1 month ago by Kissaki@beehaw.org to c/technology@beehaw.org

My highlight at 5:26; thin molten tin being shot out and vaporized for extreme ultraviolet light creation.

The video gives a lot of context around the machine and product; the company, other products, global chip manufacturing, long-term strategy, and looking forward, etc.

18
Deadlock - FUNKe Study (www.youtube.com)
submitted 5 months ago* (last edited 5 months ago) by Kissaki@beehaw.org to c/gaming@beehaw.org
  • 0:00 Teamwork, Combat & Their Meeting Points
  • 5:25 Deadlock Does It All Right
  • 16:53 A Little Movement Aside
  • 21:52 How To Work Together
[-] Kissaki@beehaw.org 29 points 5 months ago* (last edited 5 months ago)

"creating and bringing value requires secrecy"

or maybe stuff leaks and finds interest because it's questionable in the first place

[-] Kissaki@beehaw.org 24 points 7 months ago* (last edited 7 months ago)
63
submitted 7 months ago by Kissaki@beehaw.org to c/foss@beehaw.org
10
submitted 8 months ago by Kissaki@beehaw.org to c/foss@beehaw.org

PresentMon is a set of tools to capture and analyze the high-level performance characteristics of graphics applications on Windows. PresentMon traces key performance metrics such as the CPU, GPU, and Display frame durations and latencies; and works across different graphics API such as DirectX, OpenGL, and Vulkan, different hardware configurations, and for both desktop and UWP applications.

3
submitted 8 months ago by Kissaki@beehaw.org to c/politics@beehaw.org
[-] Kissaki@beehaw.org 33 points 8 months ago

Finally, when something is hard to read because it's small I can stretch it!

[-] Kissaki@beehaw.org 43 points 8 months ago

The title made it sound like a full lock-in. But one survived.

Harper grabbed a bar from his truck and handed it to another bystander, who managed to break the back window and pull the young woman to safety.

Tesla has faced criticism in the past for the design of its manual release levers, which are considered poorly designed and unintuitively placed.

278
submitted 8 months ago* (last edited 8 months ago) by Kissaki@beehaw.org to c/gaming@beehaw.org

Steam store pages received a new Anti-cheat field. Disclosure is mandatory for kernel-level anti-cheat solutions. And recommended for other anti-cheat solutions (like server-side or non-kernel-level client-side).

The field discloses the anti-cheat product, whether it is a kernel-level installation, and whether it uninstalls with the product or requires manual removal to remove.

Screenshot of anti-cheat indications

35
submitted 8 months ago by Kissaki@beehaw.org to c/gaming@beehaw.org

This game is so pointless and forgettable that I can't even be bothered to write a description. It sucks, don't play it. Watch my video instead!

#ubisoft #nft #garbage

23
submitted 9 months ago* (last edited 9 months ago) by Kissaki@beehaw.org to c/technology@beehaw.org

This GitHub repository has the technical details.

21
submitted 10 months ago by Kissaki@beehaw.org to c/science@beehaw.org

Abstract (added emphasis and paragraphing):

Anthropogenic methane (CH4) emissions increases from the period 1850–1900 until 2019 are responsible for around 65% as much warming as carbon dioxide (CO2) has caused to date, and large reductions in methane emissions are required to limit global warming to 1.5°C or 2°C.

However, methane emissions have been increasing rapidly since ~2006. This study shows that emissions are expected to continue to increase over the remainder of the 2020s if no greater action is taken and that increases in atmospheric methane are thus far outpacing projected growth rates.

This increase has important implications for reaching net zero CO2 targets: every 50 Mt CH4 of the sustained large cuts envisioned under low-warming scenarios that are not realized would eliminate about 150 Gt of the remaining CO2 budget. Targeted methane reductions are therefore a critical component alongside decarbonization to minimize global warming.

We describe additional linkages between methane mitigation options and CO2, especially via land use, as well as their respective climate impacts and associated metrics. We explain why a net zero target specifically for methane is neither necessary nor plausible. Analyses show where reductions are most feasible at the national and sectoral levels given limited resources, for example, to meet the Global Methane Pledge target, but they also reveal large uncertainties.

Despite these uncertainties, many mitigation costs are clearly low relative to real-world financial instruments and very low compared with methane damage estimates, but legally binding regulations and methane pricing are needed to meet climate goals.

[-] Kissaki@beehaw.org 27 points 11 months ago

the most relevant:

To take advantage of the vulnerability, a hacker has to already possess access to a computer's kernel, the core of its operating system.

For systems with certain faulty configurations in how a computer maker implemented AMD's security feature known as Platform Secure Boot—which the researchers warn encompasses the large majority of the systems they tested—a malware infection installed via Sinkclose could be harder yet to detect or remediate, they say, surviving even a reinstallation of the operating system.

For users seeking to protect themselves, Nissim and Okupski say that for Windows machines—likely the vast majority of affected systems—they expect patches for Sinkclose to be integrated into updates shared by computer makers with Microsoft, who will roll them into future operating system updates.

[-] Kissaki@beehaw.org 39 points 1 year ago

Putin, Trump, and Musk. They're doing the same thing. Lying without restraint, freely, at every opportunity.

"The European Commission offered X an illegal secret deal: If we quietly censored speech without telling anyone, they would not fine us.

Maybe we can translate that claim to what may have happened?

"The European Commission asked X to conform to regulation protecting its citizens or face fines."

[-] Kissaki@beehaw.org 30 points 1 year ago

“Temu is designed to make this expansive access undetected, even by sophisticated users,” Griffin’s complaint said. “Once installed, Temu can recompile itself and change properties, including overriding the data privacy settings users believe they have in place.”

So just like the majority USAian app out there?

Which apps do that? Because I am certain it's NOT the majority, and very skeptical about any other apps doing that.

[-] Kissaki@beehaw.org 27 points 1 year ago

From the article-linked ruling press release - what it means in practice, what this was about:

In order to protect works covered by copyright or related rights against offences committed on the internet, a French decree introduced two personal data processing operations. The first operation consists of the collection, by rightholder organisations, of IP addresses which appear to have been used on peer-to-peer websites to commit such offences and the referral of those IP addresses to the Haute Autorité pour la diffusion des œuvres et la protection des droits sur internet (High Authority for the dissemination of works and the protection of rights on the Internet) (Hadopi) 1. The second operation, carried out by the internet access providers at Hadopi’s request, consists, inter alia, of matching the IP address with the civil identity data of its holder. Those data processing operations enable Hadopi to initiate a procedure against the persons identified, combining educational and punitive measures, which may lead to a referral to the public prosecution service in the most serious cases.

I find the ruling press release is much more understandable (and much more informative) than the OP-linked article.

[-] Kissaki@beehaw.org 52 points 1 year ago* (last edited 1 year ago)

Firefox plans to support Manifest V3 because Chrome is the world's most popular browser, and it wants extensions to be cross-browser compatible, but it has no plans to turn off support for Manifest V2.

If Google decided to break V2 compatibility with V3, Mozilla should announce V4 (or V3 extended), which is V3 but with the missing stuff readded.

That'd be a good practical and great product/tech marketing move. Just like most people won't see how V3 is worse than V2, V4 will indicate it's the evolved and improved V3.

It would also simplify supporting V3 and V4 at the same time for extension authors. A great practical gain for extension authors, not having to read and understand two manifest schemes and APIs.

view more: next ›

Kissaki

joined 1 year ago