Exactly. Don’t trust a stranger on the internet to help you avoid death.
Exactly. Don’t trust a stranger on the internet to help you avoid death.
There is a distinction to make. For example some snake venom is not poisonous when traveling through your digestive system, and only becomes a problem when it enters the blood stream (usually from a bite).
Rescue science/space journalism!
That class of storage is very expensive to get your data back. Buying a drive will be cheaper.
Thanks for continuing to provide this platform free of data collection and advertising!
Wireshark is the best FOSS for packet inspection, but you’ll have to test the efficacy of your solution on enterprise hardware directly if you’d like to know which ones it works for. You can virtualize many of these FW on Azure cloud for an hour and it won’t cost much, but you’d need to know what you’re doing.
The article says it happened many times back in those days and this is just one example. If modern scopes and AI haven’t seen anything like this then I’m quite confident that it was a problem with their tooling back then, with radioactive dust being the top contender.
You don’t need to buy server hardware, although it is nice. Depending on where you live you might be able to buy some decent second hand server hardware.
If it was me, I would buy new desktop hardware. Here is a fairly decent server that will do almost anything: Go for around 16 or 24 core CPU with high Ghz per core. 64GB or 128GB DDR5 RAM. Your most important factor will be storage speed. Go with NVMe drives. You have some choices here. JBOD: One or more independent M.2 key drives. Software RAID: Use your CPU to manage the RAID configuration. Hardware RAID: Use a RAID controller HBA card to manage the RAID (faster but single point of failure). Use RAID 1 for data protection (can lose one drive and still have all your data), RAID 0 (double the speed of your drives), RAID 10 (best of both but needs double the drives). Choose a motherboard that suits your choices.
Things to take into account: If you go with a RAID controller card, make sure that the PCIe lanes it uses can take the full speed of your RAID configuration or you might be bottlenecked there. Choosing an Intel or AMD CPU doesn’t make much difference. If you are not good with linux distros and don’t want a learning curve, stick with something like Ubuntu LTS 22.04 server. You most likely won’t need any graphics card, but it depends what you want to do.
You can run a minecraft server on an old laptop, so these specs might be overkill, I just put what I would get and it will do almost anything you want to do with it. An 8 core CPU, 16GB RAM, with 1 NVMe drive will also be capable of all your described needs just fine.
Dude if writers actually made enough money then it wouldn’t be such a huge thing that they get sponsored free lunches during the strike. Thats a fucking meal… However the profit produced on some shows is obscene in comparison. Put 300 mil in and get 500 mil out, thats 200 mil profit… You’re getting downvoted because you don’t understand the economics of the industry while being overconfident that you do.
NASA is considering putting large radio telescopes inside crater holes in the moon
The medium for the electromagnetic field is space time
Dark energy is not galaxies moving away from each other but instead its new space being created in between which makes it appear like they are moving away from each other. That’s why distant redshifts can exceed the speed of light, because they are not really moving, so the speed of light law is not broken.
Open the damn thing! I want to seeeeee!
You guys are doing good work!
MAC Address is not available on the IP layer after NAT and browser side JS is not allowed to detect it and pass it on. Browser fingerprinting and localstorage are ways to identify client devices that change their IP often, but those are also defeated by easy steps like an incognito browser tab. The best info we have is the IP and the timestamp. Those together along with a court order should be able to force an ISP or VPN provider to reveal the details of the user.
IP ban + report to the ISP or VPN provider should get the ball rolling. IP blacklist for known compromised hosts. Police report in the country with jurisdiction.
I think it would be an AI autoscan that flags some posts for mod approval before they show up to the public and perhaps more fine-grained controls for how media is posted like for instance only allowing certain image hosting sites and no directly uploaded images.
Beautiful
Actually, even if you bred an apple tree with itself, due to the genetic recombination of recessive genes, the same thing happens. So it’s more complicated than 50% of the genes missing.