biscuitswalrus

joined 1 year ago
[–] [email protected] 1 points 11 months ago

I can't tell if this is furry, or beastiality justification, but this shirt only goes hard for deviants.

[–] [email protected] 2 points 11 months ago (1 children)

Yes but also no, but also yes. Here's why:

  • yes: most people don't use cabled headphones
  • no: high quality headphones require a jack
  • yes: those high quality headphones need amplifiers beyond what the phones inbuilt dac can handle

So I'd probably overall argue that those who really care about audio probably have a separate DAC like https://www.techradar.com/audio/hi-fi/ifi-hip-dac-3-review

Which is probably an unpopular opinion.

[–] [email protected] 3 points 11 months ago (1 children)
[–] [email protected] 10 points 11 months ago

I'm just going to give you props. I have worked in Managed IT Services for a dozen years and some of the worst clients are construction, engineering and architects who use solidworks, autodesk and archicad products.

You've eaten humble pie and admitted that using computers as a tool, and systems design are different and though you might understand a lot, just like I can build a 3d model, the devil is in the detail.

Building robust solutions that meet your business continuity plans, disaster recovery plans, secure your data for cyber risk and to meet ISO and yet are still somehow usable in a workflow for end users is not something you just pick up as a hobby and implement.

The way I handle technology Lifecycle is in 5 steps: strategy, plan, implement, support, maintain. Each part has distinct requirements and considerations. It's all well and good to implement something but you need to get support when it goes wrong or misbehaves. You need to monitor and report for backups, patching, system alerts. Lots of people might do the implement, but consider the Lifecycle of the solution.

People do these things at home but they're home labbing, they're labs. Production requires more.

Anyway a bunch of people closer to your part of the world will probably help you out here.

I just want to again recognise and compliment you on realising and openly saying you want help rather than just do the usual "oh I know best" that I hear over and over usually just before someone gets ransomed on their never patched log4j using openssl heartbleed publicly exposed server infrastructure.

[–] [email protected] 2 points 11 months ago (1 children)

Lol, a thousand hours would be 6 months of full time work (40 hour week). I'm not sure I'd employ someone who has 6 months of IT experience into a systems administrator job and task them to build a an erp/dms/unified coms solution for a client.

But this guy should be able to do it as a hobby?

[–] [email protected] 14 points 11 months ago* (last edited 11 months ago) (4 children)

Seems like my Samsung TV app is being hit by stuff too, I had 5 unskippable ads and can't seem to get stable 1080p at 60fps any more despite gigabit fibre and cat6. Meanwhile getting 4k on my YouTube app on Android on WiFi.

Go figure.

YouTube is so desperate to fight this war that they're harming legitimate watchers meanwhile my rockpi running Android TV seems to keep running sTube just fine.

[–] [email protected] 2 points 11 months ago

Hmm you could be right. Keeping old protocols running for legacy compatibility reasons could in this case keep the solution working for some time.

[–] [email protected] 5 points 11 months ago* (last edited 11 months ago) (3 children)

The mini version doesn't need hosting, it doesn't have a proxy middle man. A 16yo kid reverse engineered the protocol and then got contracted by beeper to implement it as beeper mini. It's a client directly connecting to apple like imessage native.

Will it break? I'd argue if the cost of breaking it in engineer time is worth doing to Apple, yes. All they'd have to do is roll their own crypto and reverse engineering that might be impossible. Probably easier ways to break it but then maybe it turns into a cat and mouse game.

Legally it's hard to say if it's OK too, the end user is likely fine, but the developer especially being contacted may not be since to reverse engineer it could be breaking terms of service or licensing clauses though I'm not really sure what kind of damages could be claimed. To reverse engineer they had to use the original on jailbroken iphones to go through the engineering discovery.

Anyway the point is, it's not going through beeper or anywhere other than Apple. So there's no component to host. It's different to beeper.

[–] [email protected] 2 points 11 months ago

That will stop billing but not remove your personal data from the providers database. Worse if your account then gets banned dispute resolution will be harder.

[–] [email protected] 17 points 11 months ago

My favourite thing is that files are sorted automatically by date if you use yyyy-mm-dd. Sometimes there are just practical reasons.

[–] [email protected] 2 points 1 year ago

Yep, sure, it's a wild world we live in and this topic is changing fast. Missing this memo won't matter when the next one will be the next generation but generations are only 6 months apart.

[–] [email protected] 6 points 1 year ago* (last edited 1 year ago) (2 children)
view more: ‹ prev next ›