Skip to content

CBDC Explained : Can your money really expire?

Technology
4 4 0
  • Android 16 is here

    Technology technology
    72
    1
    140 Stimmen
    72 Beiträge
    0 Aufrufe
    B
    I feel like Android and Linux (being that it's what Android itself is based on) do the whole "everything is an app" much better than, say, Windows. On Windows, generally speaking, your entire desktop experience is built-in and so tightly coupled that it's hard to switch it out. On Linux, you don't NEED a GUI at all, but if you want one, you'll have a display server, a window manager, etc. On Android, at least without the desktop mode, the base GUI is the launcher, which is just an app. System apps that require root access are still apps. Of course the kernel isn't really an app and I don't think Google Play Services fits most people's definitions of an app. System libraries aren't apps. So those are the parts that you could consider true "OS updates" as opposed to "app updates", but since the "apps" part of the system (if you include system apps) is so much more visible to the user, an OS update will seem like it's mostly a bunch of app updates.
  • 0 Stimmen
    1 Beiträge
    0 Aufrufe
    Niemand hat geantwortet
  • 1 Stimmen
    5 Beiträge
    2 Aufrufe
    A
    Turns out dry sarcasm doesn't come across well in text form, if only there was a way to indicate it
  • Nextcloud cries foul over Google Play Store app rejection

    Technology technology
    1
    1
    6 Stimmen
    1 Beiträge
    1 Aufrufe
    Niemand hat geantwortet
  • 81 Stimmen
    8 Beiträge
    3 Aufrufe
    P
    I expect them to give shareholders and directors a haircut before laying off workers, yes. But we know Microsoft never does that, so they can go f themselves.
  • 142 Stimmen
    4 Beiträge
    2 Aufrufe
    P
    The topic is more nuanced, all the logs indicate email/password combos that were compromised. While it is possible this is due to a malware infection, it could be something as simple as a phishing website. In this case, credentials are entered but no "malware" was installed. The point being it doesn't look great that someone has ANY compromises... But again, anyone who's used the Internet a bit has some compromised. For example, in a password manager (especially the one on iPhone), you'll often be notified of all your potentially compromised accounts. [image: 7a5e8350-e47e-4d67-b096-e6e470ec7050.jpeg]
  • Microsoft's AI Secretly Copying All Your Private Messages

    Technology technology
    4
    1
    0 Stimmen
    4 Beiträge
    2 Aufrufe
    S
    Forgive me for not explaining better. Here are the terms potentially needing explanation. Provisioning in this case is initial system setup, the kind of stuff you would do manually after a fresh install, but usually implies a regimented and repeatable process. Virtual Machine (VM) snapshots are like a save state in a game, and are often used to reset a virtual machine to a particular known-working condition. Preboot Execution Environment (PXE, aka ‘network boot’) is a network adapter feature that lets you boot a physical machine from a hosted network image rather than the usual installation on locally attached storage. It’s probably tucked away in your BIOS settings, but many computers have the feature since it’s a common requirement in commercial deployments. As with the VM snapshot described above, a PXE image is typically a known-working state that resets on each boot. Non-virtualized means not using hardware virtualization, and I meant specifically not running inside a virtual machine. Local-only means without a network or just not booting from a network-hosted image. Telemetry refers to data collecting functionality. Most software has it. Windows has a lot. Telemetry isn’t necessarily bad since it can, for example, help reveal and resolve bugs and usability problems, but it is easily (and has often been) abused by data-hungry corporations like MS, so disabling it is an advisable precaution. MS = Microsoft OSS = Open Source Software Group policies are administrative settings in Windows that control standards (for stuff like security, power management, licensing, file system and settings access, etc.) for user groups on a machine or network. Most users stick with the defaults but you can edit these yourself for a greater degree of control. Docker lets you run software inside “containers” to isolate them from the rest of the environment, exposing and/or virtualizing just the resources they need to run, and Compose is a related tool for defining one or more of these containers, how they interact, etc. To my knowledge there is no one-to-one equivalent for Windows. Obviously, many of these concepts relate to IT work, as are the use-cases I had in mind, but the software is simple enough for the average user if you just pick one of the premade playbooks. (The Atlas playbook is popular among gamers, for example.) Edit: added explanations for docker and telemetry
  • 1 Stimmen
    9 Beiträge
    2 Aufrufe
    G
    So we need a documentary like Super Size Me but for social media. I think post that documentary coming out was the only time I've seen people's attitudes change in the general population about fast food.