I’m a technical kinda guy, doing technical kinda stuff.

  • 0 Posts
  • 112 Comments
Joined 1 year ago
cake
Cake day: September 27th, 2023

help-circle


  • Not really, it’s just phrased differently to the usual signup pitch, they’re putting in a middle ground between full “premium” subscribers (whatever that is) and public access with tracking and ad metrics.

    Companies need revenue to operate. They get that revenue from advertising data and selling ad slots, or subscriptions. Whether they actually cease all tracking and ad metrics when you subscribe is something I’d doubt though, and that could be a case for the legal system if they didn’t do what they claim.

    Personally, this behaviour is the point where I would not consider the site to be valuable enough to bother with.








  • Blu-Ray USB drive and M-Discs is about the best you can get at present. Keep the drive unplugged when not in use, it’ll probably last 10-20 years in storage.

    Seeing as there hasn’t been much advance past Blu-ray, keep an eye out for something useful to replace it in the future, or at least get another drive when you notice them becoming scarce.


  • I don’t think there’s anything commercially available that can do it.

    However, as an experiment, you could:

    • Get a group of photos from a burst shot
    • Encode them as individual frames using a modern video codec using, eg VLC.
    • See what kind of file size you get with the resulting video output.
    • See what artifacts are introduced when you play with encoder settings.

    You could probably/eventually script this kind of operation if you have software that can automatically identify and group images.






  • If you’re interested in the systems behind Apollo, go find and read “Digital Apollo”.

    It goes all the way through the project and describes in good detail everything, how they developed the control systems, the computer hardware, how the software was designed, how they implemented one of the first real computer systems project management, all the interactions between astronauts/test pilots who still wanted to “manually fly the lander”, the political back and forth between competing teams, the whole thing.

    It’s a great read if you have a technical mindset.



  • Usually iterations of:

    “Closed and locked due to duplicate of: (question asked 9 years ago about Visual Studio 2011 and Visual Basic, when you’re using VS code '22 and C#)”

    “This seems like an XY problem, what are you really trying to accomplish?”, after a one thousand word post describing in detail exactly what you are trying to accomplish and the many different reasons why you can’t just use #GENERIC_EVERYDAY_METHOD.

    Either that or the quick and dirty method that I want for a one off data conversion that uses standard libraries is heavily down voted and lost while the elaborate, all-cases-considered, 7-third-party-library-using answer becomes the top result.


  • Letting it ring has no impact. They have autodiallers that call, and when someone picks up, only then is that call assigned to someone in the call centre.

    You can often tell this because there is a marked delay in the response to your initial “Hello?”. Long enough that you can reliably just hang up if you don’t hear a response in two seconds.

    If it’s a real person who actually wants to call you and they you call again straight away, you can just shrug off your hang-up as a network issue.


  • Dave.@aussie.zonetoLinux@lemmy.mlCompanies that use desktop Linux
    link
    fedilink
    arrow-up
    10
    arrow-down
    1
    ·
    3 months ago

    how the IT team tries to justify being locked into Microsoft, and then telling me I could potentially become a point of vulnerability

    Because they can manage and control all the windows PCs , pushing updates automatically, restricting what users can do locally and on the network, they have monitoring tools and whatever antivirus and antimalware tools they have, and are able to easily manage and deploy/remove software and associated group licensing and so on and so forth.

    Meanwhile you’re a single user of unknown (to them) capabilities that they now have to trust with the rest of their system, basically.

    The first rule of corporate IT is, “control what’s on your network”. Your PC is their concern still, but they have no effective control over it. That’s why they’re being a bit of a pain in the ass about it.