• 1 Post
  • 13 Comments
Joined 1 year ago
cake
Cake day: June 6th, 2023

help-circle





  • Yeah, that’s normal. That’s the seam – where each layer starts/stops. Yours don’t look any worse than mine.

    Sometimes you can tweak settings to reduce them a bit, but the only way to avoid them completely is to print in spiral/vase mode (which is very limiting: 1 contiguous perimeter, no infill).

    More importantly: You can control where they appear on the part! Your slicer may have settings like ‘nearest’ , ‘random’, ‘aligned’, ‘rear’, or may have a way to paint on the part in the UI where the seams should be. Seams are clearly visible when they’re in the middle of an otherwise-smooth expanse like the side of your boat there, but are barely noticeable if you put them on a corner.


  • chkno@lemmy.mltoLinux@lemmy.mlWayland or X11? Why?
    link
    fedilink
    arrow-up
    4
    arrow-down
    1
    ·
    edit-2
    1 year ago

    X11 for xdotool. ydotool doesn’t support (& can’t really support with it’s current architecture) retrieving information like the current mouse location, current window, window dimensions & titles. Also, normal (unprivileged) user ydotool use requires udev rules or session scripts and/or running a ydotool daemon & many distros don’t yet ship with this Just Working.

    X11 for Alt-F2 r to restart Gnome Shell without ending the whole session. This is a useful workaround for a variety of Gnome bugs.




    1. Paper tokens: Produce 100 billion authentication tokens (could be passwords, could be private keys of signed certificates), print them on thick paper, fold them up, publicly stir them in giant vats at their central manufacturing location before distributing them to show that no record is being kept of where each token is being geographically routed to, and the have them freely available in giant buckets at any establishment that already does age-checks for any other reason (bars, grocery stores that sell alcohol or tobacco, etc.). The customer does the usual age-verification ritual, then reaches into the bucket and themselves randomly selects any reasonable number of paper tokens to take with them. It should be obvious to all parties that no record is being kept of which human took which token.

    2. Require these tokens to be used for something besides porn access. Maybe for filing your taxes, opening bank accounts, voting, or online alcohol / tobacco purchases. This way, people requesting these tokens do not divulge that they are pornography viewers.