[-] computergeek125@lemmy.world 2 points 3 hours ago* (last edited 3 hours ago)

The reference numbers appear to be sourced from the Wikipedia article

https://en.wikipedia.org/wiki/John_James_Audubon#Dispute_over_accuracy

[-] computergeek125@lemmy.world 4 points 7 hours ago

In terms of gates - kind of. They're relatively similar at this point.

The major difference (to my understanding) is the difference between a flash drive, SD card, and SSD is the controller and cache.

Flash drives and SD cards have no cache and no fancy controller. SSDs have a controller that is aware of its memory cells and can load balance them, cache data on differently configured cells (or RAM, depending on the hardware), and perform maintenance on cells the OS declares to be empty.

[-] computergeek125@lemmy.world 9 points 1 day ago

Tbh this is a programming community. While yes, a quick summary would not have gone amiss, I don't fault OP for not including it. RFCs are often pretty dry but this one is reasonably straightforward as a subset of JSON to reduce some ambiguity.

[-] computergeek125@lemmy.world 1 points 2 days ago

Might be your client, the image shows up on Voyager

[-] computergeek125@lemmy.world 0 points 3 days ago

That sounds like the average megacorp terms of service these days.

Yes, just because everyone's doing it doesn't mean they can't be better. They should be better, but worldwide government regulations don't force that (yet).

But at some point to interact with any kind of large company, your information is going to end up crossing the path of a large company, especially one of the hyperscale cloud and connectivity providers like Microsoft, Akami, Cloudflare, Google, Amazon, etc.

Whether businesses get copies of information is usually included in a site's privacy policy, and if you're curious about that list (and it's not publicly documented), I'd hope there's a contact to get more info about the policy (like a privacy@ email address)

If you really want to limit your information exposure, you either have to audit everyone you do business with this way (because most large companies do this) or hire someone (or a service) to do it.

You could also consider not interacting with large companies at all - but you'd limit yourself from part of the modern world. If that's your game, by all means by my guest.

[-] computergeek125@lemmy.world 2 points 3 days ago

Maybe we should build a warp drive to go meet it.

[-] computergeek125@lemmy.world 7 points 3 days ago* (last edited 3 days ago)

Who let out 426?? I thought I was supposed to be in a windowless room!

(/j)

referenceICYMI, the joke is about SCP-426

[-] computergeek125@lemmy.world 1 points 4 days ago

Ok. Can you back that up with a source?

Fast pace tiktok style videos aren't really great to analyze on a phone, and your clip doesn't seem to contain any outbound links.

[-] computergeek125@lemmy.world 3 points 6 days ago

Oh totally. I have a pile of RS-232 adapters that you still need to program just about every modern Ethernet switch, and they're all type-A ports.

[-] computergeek125@lemmy.world 28 points 1 week ago* (last edited 1 week ago)

No we're not OK

I remember in grade school my district had a system where everyone who bought anything at the cafeteria went through an internal "type in your ID to the pin pad" system. Internally, the computer would decide whether the student was charged against their account or if it did a discount/free. This was how they dealt with that.

[-] computergeek125@lemmy.world 7 points 1 week ago

Not on all vendors tho - coloring was an optional part of the standard. Dell often uses grey for USB3

view more: next ›

computergeek125

joined 1 year ago