At least I want to see some proofs my voice data being transmitted over some medium. Those slides are ads created by ad company to potential ad clients.
pending anonymous user
At least I want to see some proofs my voice data being transmitted over some medium. Those slides are ads created by ad company to potential ad clients.
I expect “modular” as in how Fairphone approaches it.
It is NOT. It is just a smart case with pogo pins that can communicate with the phone.
EDIT: I think using “smart” is too much credit to them.
The apology reads:
Dear Samsung Galaxy Z Fold owners, we’re sorry. We know you were excited to buy a phone that folds in half and fits in your pocket, awkwardly. You were promised the future, a technical marvel, a world of boundless multitasking and performance.
And now, you’re probably looking at the new HONOR Magic V3 and feeling a little… betrayed. Size matters, and we feel your pain. Like being tipped for a gold medal and then coming last in the race, the knowledge that a thinner, lighter, and more durable foldable exists is enough to make anyone question their choices.
We get it. You were an early adopter, a pioneer bravely venturing into the uncharted territory of foldable screens with questionable durability. You deserve better. In fact, you deserve a gold medal.
In all seriousness, we at HONOR are committed to pushing the boundaries of technology and bringing you the best possible foldable experience. We’re just saying… it’s okay to feel let down. We’d feel the same way.
Surprising to see after the CrowdStrike debacle.
Lucky me I rarely get spam calls
Photos are never a concrete representation of the reality. Photos are being pre-processed by image processor already and we also got Photoshop. One can even fake a film based photo if he knows what to do. The proliferation of image generation models and impainting models make the access easier but image manipulation tools always exist.
Does that counts as emtrapment?
So how are they going to detect, proof, and enforce?
That “ethical” is problematic. What considered to be ethical is very subjective to the culture context.
Edit: better wording
tl;dr: only applies to NY Eastern District, and likely only US citizen can enjoy
Thanks for the hint. I followed and checked: safe
$ efi-readvar -v PK
Variable PK, length 983
PK: List 0, type X509
Signature 0, size 955, owner 3cc24e96-22c7-41d8-8863-8e39dcxxxxxx
Subject:
C=JP, ST=Kanagawa, L=Yokohama, O=Lenovo Ltd., CN=Lenovo Ltd. PK CA 2012
Issuer:
C=JP, ST=Kanagawa, L=Yokohama, O=Lenovo Ltd., CN=Lenovo Ltd. PK CA 2012
Except the directory structure is totally gone. At least I can’t see it with either by mounting or with archive software.
Tried. They only release it for Windows, or a bootable ISO, which I can’t see what files are in there. I also tried getting the firmware from LVFS but I’m not sure if I done it right as non of them start with "EFI " header (which I assume that’s the file I should be looking at).
That “security related reasons” will likely applied everytime and makes everything behind closed door. I won’t trust this. Seen too much “security” shenanigans.
ctrl+alt+f1 get to tty and install back those uninstalled?
No, OP absolutely still need staggered rollout. Immutable distros are a blue-green deployment self-contained. Yet, all the instance can upgrade and switch all at once and break all of them. OP still need some rollout strategy externally to prevent the whole service being brought down.
I bought it about a year after general availability when I’m still in college, and doesn’t know it will be this bad.
I never run a mail server but Google already placing my mail sent via my xyz domain hosted on proton to spam folder silently.
I guess running my own will be a lot worst.
P.S. I know that’s a bad TLD choice, and I’m planning to migrate, but that will take a lots of time and work to the point I wonders if that worth it as I don’t sent many anyways.
What data?