[-] Eyron@lemmy.world 1 points 2 days ago

You're not wrong.

Realistically, there's a bit of a nuance. Many modern web apps have different components that aren't HTML. You don't need HTML for a component. And those non-HTML components can provide the consistency they need. Sometimes, that's consistency for how to get the data. Sometimes, that's consistency for how to display the data. For displaying, each component basically has its own CSS, but it doesn't need to. A CSS class isn't required.

Tailwind isn't meant to be a component system, It's meant to supplement one. If you're writing CSS's components, it looks horrible. If you're writing components at CSS that needs a foundation of best practices, it works pretty decent. They're still consistency. They're still components. They're just not centered around HTML/CSS anymore. It doesn't have to be.

Sematically, it is still worse HTML. Realistically, it's often faster to iterate on, easier to avoid breakage: especially as the project becomes larger. Combine that with the code being more easily copied and pasted. It can be a tough combo to beat. It's probably just a stepping stone to whatever's next.

[-] Eyron@lemmy.world 5 points 3 months ago

Fancy. I just have a dumb switch that does it offline with any bulb. No dimming, though

[-] Eyron@lemmy.world 6 points 6 months ago

A hidden experimental flag isn't "fixed." It might be the start, but until it's stable and usable through the normal UI, it's not really done.

[-] Eyron@lemmy.world 11 points 7 months ago* (last edited 7 months ago)

It can be pretty easy to get up a second-hand console cheap, free, and/or as a gift.

Have you ever seen how much good/working stuff people throw away? If you're a little bright, you can get people to pay you to haul their "junk" away.

[-] Eyron@lemmy.world 6 points 9 months ago

Voyager - if I didn’t love Voyager Janeway would kick my ass.

No need for threats. Voyager is good.

Blink twice if you need help.

[-] Eyron@lemmy.world 4 points 9 months ago* (last edited 9 months ago)

It seems you are mixing the concepts of voting systems and candidate selection. FPP nor FPTP should not sound scary. As a voting systems, FPP works well enough more often than many want to admit. The name just describes it in more detail: First Preference Plurality.

Every voting system is as bottom-up or top-down as the candidate selection process. The voting system itself doesn't really affect whether it is top down or bottom up. Requiring approval/voting from the current rulers would be top-down. Only requiring ten signatures on a community petition is more bottom up.

The voting systems don't care about the candidate selection process. Some require precordination for a "party", but that could also be a party of 1. A party of 1 might not be able to get as much representation as one with more people: but that's also the case for every voting system that selects the same number of candidates.

Voting systems don't even need to be used for representation systems. If a group of friends are voting on where to eat, one problem might be selecting the places to vote on, but that's before the vote. With the vote, FPP might have 70% prefer pizza over Indian food, but the Indian food vote might still win because the pizza voters had another first choice. Having more candidates often leads to minority rule/choice, and that's not very good for food choice nor community representation.

[-] Eyron@lemmy.world 6 points 10 months ago* (last edited 10 months ago)

That many steps? WindowsKey+Break > Change computer name.

If you're okay with three steps, on Windows 10 and newer, you can right click the start menu and generally open system. Just about any version supports right clicking "My Computer" or "This PC" and selecting properties, as well.

[-] Eyron@lemmy.world 40 points 10 months ago* (last edited 10 months ago)

Do you remember the Internet Explorer days? This, unfortunately, is still much better.

Pretty good reason to switch the Firefox, now. Nearly everything will work, unlike the Internet Explorer days.

  • Firefox User
[-] Eyron@lemmy.world 5 points 1 year ago* (last edited 1 year ago)

That wasn't what I said. 2^56 was NOT a reference to bits, but to how many IPs we could assign every visible star, if it weren't for subnet limitations. IPv6 isn't classless like IPv4. There will be a lot of wasted/unrunused/unroutable addresses due to the reserved 64-bits.

The problem isn't the number of addresses, but the number of allocations. Our smallest allocation, today, for a 128-bit address: is only 48-bits. Allocation-wise, we effectively only have 48-bits of allocations, not 128. To run out like with IPv6 , we only need to assign 48-bits of networks, rather than the 24-bits for IPv4. Go read up on how ARIN/RIPE/APNIC allocate IPs. It's pretty wasteful.

[-] Eyron@lemmy.world 4 points 1 year ago

Vote. Seriously. (If practical: get involved, too). The U.S. is currently in the middle of a large shift of generational power.

Many of these changes are fairly recent:

  • 2020 was the first federal election where the Baby Boomers didn't make up the largest voting generation.
  • It was only in 2016 that the number Gen X and younger voting numbers grew larger than the boomer and older numbers.
  • Those numbers had been possible since 2010. Despite having more eligible voters (135M vs 93M), the "GenXers and younger" only had ~36M actual voters, compared to ~57M older ones.

Looking forward, the numbers only get better for younger voters. There hasn't been a demographic shift like this in the U.S. in a long time (ever?). The current power structures can not be maintained for much longer. It is still possible for that shift to be peaceful. Please encourage the peaceful transfer: vote. Vote in the primaries. Maybe even vote for better voting systems. This time is unique, but change takes time. Don't let them fool you otherwise: that's just them trying to hold on to their power.

[-] Eyron@lemmy.world 5 points 2 years ago

tl;dr

The memory bandwidth isn't magic, nor special, but generally meaningless. MT/s matter more, but Apple's non-magic is generally higher than the industry standard in compact form factors.

Long version:

How are such wrong numbers are so widely upvoted? The 6400Mbps is per pin.

Generally, DDR5 has a 64-bit data bus. The standard names also indicate the speeds per module: PC5-32000 transfers 32GB/s with 64-bits at 4000MT/s, and PC5-64000 transfers 64GB/s with 64-bits at 8000MT/s. With those speeds, it isn't hard for a DDR5 desktop or server to reach similar bandwidth.

Apple doubles the data bus from 64-bits to 128-bits (which is still nothing compared to something like an RTX 4090, with a 384-bit data bus). With that, Apple can get 102.4GB/s with just one module instead of the standard 51.2GB/s. The cited 800GB/s is with 8: most comparable hardware does not allow 8 memory modules.

Ironically, the memory bandwidth is pretty much irrelevant compared to the MT/s. To quote Dell defending their CAMM modules:

In a 12th-gen Intel laptop using two SO-DIMMs, for example, you can reach DDR5/4800 transfer speeds. But push it to a four-DIMM design, such as in a laptop with 128GB of RAM, and you have to ratchet it back to DDR5/4000 transfer speeds.

That contradiction makes it hard to balance speed, capacity, and upgradability. Even the upcoming Core Ultra 9 185H seems rated for 5600 MT/s-- after 2 years, we're almost getting PC laptops that have the memory speed of Macbooks. This wasn't Apple being magical, but just taking advantage of OEMs dropping the ball on how important memory can be to performance. The memory bandwidth is just the cherry on top.

The standard supports these speeds and faster. To be clear, these speeds and capacity don't do ANYTHING to support "8GB is analogous to..." statements. It won't take magic to beat, but the PC industry doesn't yet have much competition in the performance and form factors Apple is targeting. In the meantime, Apple is milking its customers: The M3s have the same MT/s and memory technology as two years ago. It's almost as if they looked at the next 6-12 months and went: "They still haven't caught up, so we don't need too much faster, yet-- but we can make a lot of money until while we wait."

[-] Eyron@lemmy.world 11 points 2 years ago

They describe an SSH infector, as well as a credentials scanner. To me, that sounds like it started like from exploited/infected Windows computers with SSH access, and then continued from there.

With how many unencrypted SSH keys there are, how most hosts keep a list of the servers they SSH into, and how they can probably bypass some firewall protections once they're inside the network: not a bad idea.

view more: next ›

Eyron

joined 2 years ago