9
submitted 13 hours ago* (last edited 13 hours ago) by Kissaki@beehaw.org to c/gaming@beehaw.org

Talks about Deadly Premonition and Postal 3, and how they significantly incorporate dark themes and depictions.

From 2025-08-18. In the context of platforms deplatforming or deindexing some games due to payment processor demands.

[-] Kissaki@beehaw.org 6 points 13 hours ago

Video title says day 69 - nice; was that day 69 within a new theme/stream theme or something?

13
submitted 1 day ago by Kissaki@beehaw.org to c/gaming@beehaw.org
[-] Kissaki@beehaw.org 8 points 5 days ago

Most probably don't care or don't know, and hence, will fall for it.

23
[-] Kissaki@beehaw.org 2 points 6 days ago

China isn't Saudi Arabia, and Trump collective media control efforts hasn't reached gaming yet. Tiktok was China ownership reduction from 40-20 percent, while China still retains algorithm control. This one is a buy.

It's an opposite movement of ownership between countries, yes, but every different overall and in the details.

21
submitted 2 weeks ago by Kissaki@beehaw.org to c/gaming@beehaw.org

Pay to get paid offers, decline the offers to get nothing

53
submitted 1 month ago by Kissaki@beehaw.org to c/gaming@beehaw.org

Over the years, our server has been racking up costs, and the now-unsupported software it was running on finally gave out.

All online services have now been migrated into permanent offline features. We made sure nothing was lost.

  • The Level Editor now saves levels directly to your disk […]
  • All community-created levels […]
  • All-time high scores have been immortalized […]
  • New high scores are saved locally […]

The game Dual Snake on Steam is free and was released in 2018.

57
submitted 4 months ago by Kissaki@beehaw.org to c/technology@beehaw.org
3
submitted 4 months ago by Kissaki@beehaw.org to c/programming@beehaw.org
-4
submitted 4 months ago by Kissaki@beehaw.org to c/programming@beehaw.org
23
submitted 4 months ago by Kissaki@beehaw.org to c/technology@beehaw.org

My highlight at 5:26; thin molten tin being shot out and vaporized for extreme ultraviolet light creation.

The video gives a lot of context around the machine and product; the company, other products, global chip manufacturing, long-term strategy, and looking forward, etc.

18
Deadlock - FUNKe Study (www.youtube.com)
submitted 8 months ago* (last edited 8 months ago) by Kissaki@beehaw.org to c/gaming@beehaw.org
  • 0:00 Teamwork, Combat & Their Meeting Points
  • 5:25 Deadlock Does It All Right
  • 16:53 A Little Movement Aside
  • 21:52 How To Work Together
[-] Kissaki@beehaw.org 29 points 8 months ago* (last edited 8 months ago)

"creating and bringing value requires secrecy"

or maybe stuff leaks and finds interest because it's questionable in the first place

[-] Kissaki@beehaw.org 24 points 10 months ago* (last edited 10 months ago)
63
submitted 10 months ago by Kissaki@beehaw.org to c/foss@beehaw.org
10
submitted 10 months ago by Kissaki@beehaw.org to c/foss@beehaw.org

PresentMon is a set of tools to capture and analyze the high-level performance characteristics of graphics applications on Windows. PresentMon traces key performance metrics such as the CPU, GPU, and Display frame durations and latencies; and works across different graphics API such as DirectX, OpenGL, and Vulkan, different hardware configurations, and for both desktop and UWP applications.

[-] Kissaki@beehaw.org 33 points 10 months ago

Finally, when something is hard to read because it's small I can stretch it!

[-] Kissaki@beehaw.org 43 points 10 months ago

The title made it sound like a full lock-in. But one survived.

Harper grabbed a bar from his truck and handed it to another bystander, who managed to break the back window and pull the young woman to safety.

Tesla has faced criticism in the past for the design of its manual release levers, which are considered poorly designed and unintuitively placed.

[-] Kissaki@beehaw.org 27 points 1 year ago

the most relevant:

To take advantage of the vulnerability, a hacker has to already possess access to a computer's kernel, the core of its operating system.

For systems with certain faulty configurations in how a computer maker implemented AMD's security feature known as Platform Secure Boot—which the researchers warn encompasses the large majority of the systems they tested—a malware infection installed via Sinkclose could be harder yet to detect or remediate, they say, surviving even a reinstallation of the operating system.

For users seeking to protect themselves, Nissim and Okupski say that for Windows machines—likely the vast majority of affected systems—they expect patches for Sinkclose to be integrated into updates shared by computer makers with Microsoft, who will roll them into future operating system updates.

[-] Kissaki@beehaw.org 39 points 1 year ago

Putin, Trump, and Musk. They're doing the same thing. Lying without restraint, freely, at every opportunity.

"The European Commission offered X an illegal secret deal: If we quietly censored speech without telling anyone, they would not fine us.

Maybe we can translate that claim to what may have happened?

"The European Commission asked X to conform to regulation protecting its citizens or face fines."

[-] Kissaki@beehaw.org 30 points 1 year ago

“Temu is designed to make this expansive access undetected, even by sophisticated users,” Griffin’s complaint said. “Once installed, Temu can recompile itself and change properties, including overriding the data privacy settings users believe they have in place.”

So just like the majority USAian app out there?

Which apps do that? Because I am certain it's NOT the majority, and very skeptical about any other apps doing that.

[-] Kissaki@beehaw.org 27 points 1 year ago

From the article-linked ruling press release - what it means in practice, what this was about:

In order to protect works covered by copyright or related rights against offences committed on the internet, a French decree introduced two personal data processing operations. The first operation consists of the collection, by rightholder organisations, of IP addresses which appear to have been used on peer-to-peer websites to commit such offences and the referral of those IP addresses to the Haute Autorité pour la diffusion des œuvres et la protection des droits sur internet (High Authority for the dissemination of works and the protection of rights on the Internet) (Hadopi) 1. The second operation, carried out by the internet access providers at Hadopi’s request, consists, inter alia, of matching the IP address with the civil identity data of its holder. Those data processing operations enable Hadopi to initiate a procedure against the persons identified, combining educational and punitive measures, which may lead to a referral to the public prosecution service in the most serious cases.

I find the ruling press release is much more understandable (and much more informative) than the OP-linked article.

[-] Kissaki@beehaw.org 52 points 1 year ago* (last edited 1 year ago)

Firefox plans to support Manifest V3 because Chrome is the world's most popular browser, and it wants extensions to be cross-browser compatible, but it has no plans to turn off support for Manifest V2.

If Google decided to break V2 compatibility with V3, Mozilla should announce V4 (or V3 extended), which is V3 but with the missing stuff readded.

That'd be a good practical and great product/tech marketing move. Just like most people won't see how V3 is worse than V2, V4 will indicate it's the evolved and improved V3.

It would also simplify supporting V3 and V4 at the same time for extension authors. A great practical gain for extension authors, not having to read and understand two manifest schemes and APIs.

view more: next ›

Kissaki

joined 2 years ago