Skip to content

Say Hello to the World's Largest Hard Drive, a Massive 36TB Seagate

Technology
120 78 0
  • The Internet is for Extremism - by Jeremiah Johnson

    Technology technology
    9
    1
    79 Stimmen
    9 Beiträge
    13 Aufrufe
    L
    I've been saying this for years. glad someone wrote about it.
  • 87 Stimmen
    8 Beiträge
    54 Aufrufe
    S
    What's the difference? They all look the same. Let's call him the boy with the golden spoon in his mouth who got offended.
  • Why This Python Performance Trick Doesn’t Matter Anymore

    Technology technology
    4
    1
    68 Stimmen
    4 Beiträge
    39 Aufrufe
    S
    I'm surprised about the module lookup thing, since I assumed it was just syntax sugar to do from ... import .... We do the from syntax almost everywhere, but I've been replacing huge import blocks with a module import (e.g. constants) just to clean up the imports a bit and git conflicts. Looks like I'll need to keep this in mind until we upgrade to 3.13.
  • What Does a Post-Google Internet Look Like

    Technology technology
    42
    92 Stimmen
    42 Beiträge
    202 Aufrufe
    blisterexe@lemmy.zipB
    I'm just sad I'm too young to have ever seen that old internet, and what it was like... Makes me more determined to try and steer the current internet back in that direction though.
  • Sunsetting the Ghostery Private Browser

    Technology technology
    8
    1
    33 Stimmen
    8 Beiträge
    47 Aufrufe
    P
    Sunsetting Dawn? Of course
  • Audible unveils plans to use AI voices to narrate audiobooks

    Technology technology
    6
    1
    0 Stimmen
    6 Beiträge
    40 Aufrufe
    fancypantsfire@lemm.eeF
    Ah, I see what you’re saying, I misunderstood and thought you were taking about picking a different book. Indeed, for the worst case scenario a mediocre AI voice could be an improvement!
  • 44 Stimmen
    4 Beiträge
    32 Aufrufe
    G
    It varies based on local legislation, so in some places paying ransoms is banned but it's by no means universal. It's totally valid to be against paying ransoms wherever possible, but it's not entirely black and white in some situations. For example, what if a hospital gets ransomed? Say they serve an area not served by other facilities, and if they can't get back online quickly people will die? Sounds dramatic, but critical public services get ransomed all the time and there are undeniable real world consequences. Recovery from ransomware can cost significantly more than a ransom payment if you're not prepared. It can also take months to years to recover, especially if you're simultaneously fighting to evict a persistent (annoyed, unpaid) threat actor from your environment. For the record I don't think ransoms should be paid in most scenarios, but I do think there is some nuance to consider here.
  • 141 Stimmen
    4 Beiträge
    30 Aufrufe
    P
    The topic is more nuanced, all the logs indicate email/password combos that were compromised. While it is possible this is due to a malware infection, it could be something as simple as a phishing website. In this case, credentials are entered but no "malware" was installed. The point being it doesn't look great that someone has ANY compromises... But again, anyone who's used the Internet a bit has some compromised. For example, in a password manager (especially the one on iPhone), you'll often be notified of all your potentially compromised accounts. [image: 7a5e8350-e47e-4d67-b096-e6e470ec7050.jpeg]