export PATH=$PATH:/mypath1:/mypath2
in ~/.profile
. Means “add :/mypath1:/mypath2
to what is already in $PATH.” If you need the entire system to be aware, set or update it in /etc/environment
with PATH=...
export PATH=$PATH:/mypath1:/mypath2
in ~/.profile
. Means “add :/mypath1:/mypath2
to what is already in $PATH.” If you need the entire system to be aware, set or update it in /etc/environment
with PATH=...
Absolutely. The only difference is that the benefits aren’t imaginary, they are quite tangible.
Slow chargers are really hard to fuck up, you’re good with almost anything. That being said, slow charging is 10w - so you already have what you need.
As opposed to the human-made brain melting videos?
I would find this all extremely concerning if China didn’t regulate US platforms so heavily. For example, Tiktok has safety limitations for children in China while they have nothing at all for children in the US. It’s being used as a social/mental health weapon.
Just remember that daddy allows you access to the propaganda that encourages defending Tiktok.
Finally, your speech has not been limited. You can take it to any of the competitors. There would be free speech concerns for Tiktok, but it’s a Chinese company, not protected by the US constitution, and checks notes China proactively limits speech.
RAM could be a cheaper culprit. Try re-seating it.
Do not use Manjaro. It is a known trap. What you can do is install pamac, which is what Manjaro uses for GUI package management. It’s been a hot minute since I’ve used Arch, so here’s a tutorial:
https://itsfoss.com/install-pamac-arch-linux/
Alternatively you could look at Garuda, which is a solid Arch distro. You’ll either love or hate the theme, but that’s easy to change. It also comes with an interactive kernel by default (most distros use a regular kernel build, which works better for servers).
Whatever you do, please please please not Ubuntu. It’s the lowest common denominator. Emphasis on “lowest”. It was good in the past, but Canonical have really lost the plot.
And once again, I am seriously questioning Apple’s privacy claims. Why else would Apple build such a moat around Safari?
At some point when people ask about the Holocaust, we’re going to have to start asking “which one?”
For your use case, consider it to be a packaging format (like AppImage, Flatpak, Deb, RPM, etc.) that includes all the dependencies (including services, not just libraries) for the app in question.
Should I change this?
If it’s not broken don’t fix it.
Use Podman (my preferred - the SystemD approach is awesome), containerd, or Incus. Docker is a graveyard of half-finished pet projects that have no reason for existing. Podman has a Docker-compatible socket, so 100% of Docker tooling will work with it.
I don’t consider The Prestige to be one of his better works. I like to be left thinking. The Prestige has closure and explanations built in. It’s like the age-old books vs. movies argument: people nearly always say the books are better because books offer the reader agency. It’s not merely because they enjoy looking down their noses at us movie goer mortals - they enjoyed the books more because their preferred interpretation of the words were layered above the literal text.
I didn’t suffer through Tenet, I was completely immersed - which almost never happens for me. I needed absolutely none of the muffled dialogue to figure out what was going on - and I didn’t watch it in a cinema.
And if you hated it and suffered through it, that’s fine too. I don’t get why you have a problem with other people enjoying it.
I have read on more than one occasion that Wine is becoming the “Linux Gaming ABI.” It’s no longer just about Windows. With the huge variety presented by distros, Wine is simply a nice stable target that never moves.
Just like modern plots, modern audio editing spoonfeeds the audience: https://youtu.be/XOXJLwzIOoA?si=XY-0mUmwx9_V51Tl. We need to be told each and every detail about the security system in order to understand that it’s extreme, even though those details wouldn’t add to the plot in any way (as I recall, the last thing you can hear is the risk of suffocation - which is the last aspect of the security system that was relevant later on).
Next thing you know, audiences will start complaining that depth of field/camera blur is obscuring in unimportant details in the background.
You didn’t understand my ridiculous plot?
Why is it such a sin to cater to a different audience to you? If you don’t enjoy his movies then don’t watch them. He’s one of a handful of screenwriters who does complex stuff, there’s an absolute deluge of lighter stuff for the rest of you.
What would you say to a person who continues to eat fish, even though they hate it and spit it out each time? “Stop eating fish, that’s your fault.”
Try forcing it to use Proton (game properties in Steam).
I’m Bitcoin there is a built-in reward to keep things moving forward even if there are no transactions. Different coins do different things.
The cryptography has much simpler algebraic analogues - what we are looking for is a “one-way function”. This means a mathematical symbol that only works on the left side of the equals. The simplest one is the remainder of a division. For example if I told you that I had a remainder of 5 after dividing by 20, you wouldn’t know if the original numerator was 25, 45, 65, 85, and so on. This operator is called mod
(modulus). Even if you don’t know what value I started with, It’s not hard to guess what possible numerators could be with modulus. That’s where the cryptography comes into play: a cryptographic hash is designed so that it’s practically impossible to guess the original numerator. We’ll stick with the modulus for explanatory purposes, but imagine that you can’t list off possible numerators like I did.
Now we can invent a puzzle for a computer to solve. We’ll start off with the same values as before, but - again - we are disallowing easy guesses. This forces us to check 1 mod 20
, 2 mod 20
, 3 mod 20
, 4 mod 20
, 5 mod 20
and so on. Eventually we’ll hit 25 mod 20
giving us the solution to X mod 20 = 25
. Now you can go back to the person that gave you the puzzle and prove that you’ve done 25 steps of work to arrive at a solution (or have made a lucky 1/25 guess). This is called “proof of work”. A cryptographic has consists of a certain number of bits, such as 256 bits - this means a series of 1’ s and 0’s 256 long. The puzzle presented to the computer is “find the numerator that results in the first 50 bits being zero” (the more bits are required to be zero, the longer it will take to find the answer). Because of the incredibly slim chance of guessing the correct numerator, it doesn’t really matter if the computer counts up (like we did with modulus) or guesses. So, in practice, everybody trying to find the solution starts at a random number and starts counting, or trying other random numbers, until someone wins the jackpot. It’s basically a lottery, but the correct numbers have to be discovered instead of being dropped out of a glass ball at the end of the week. Once a computer finds a solution, everybody else playing the game can check their numerator as [probabilistic] proof that they have done work.
Now we can use this lottery to create a blockchain. We start with 5 things: a globally agreed on solution we are looking for (789), an initial block (which is just a number - lets say 12345), Bob’s account #5 of $100, and Sally’s account #6 of $200, and a huge amount of players of the above game. Sally wants to transfer $20 to Bob, so she says to all the players: “I’m #6 and want to give #5 $20. There’s a $1 prize for finding a new block for me.” All the players make a new denominator, by placing the numbers next to eachother - so 12345 6 200 5 100 20 1
- or just 1234562005100201
. All the players start trying to find the number that will result in 789. Eventually someone finds 1234562005100990 after a lot of work/guesses. Everybody checks their work 1234562005100990 mod 1234562005100201 = 789
. The winning player receives their prize, and now everybody has a new block to start from: 1234562005100201 1234562005100990
. Next time someone wants to send some money they will use 12345620051002011234562005100990
as the initial block instead of 12345. Hence, we have set up a chain starting with:
12345
-> 12345620051002011234562005100990
-> …
There’s your block…chain. Anybody can independently verify that the work has been done by checking the answers. It’s incredibly elegant but, as we’ve seen, incredibly destructive.
The language itself has no type enforcement, the type checking is implemented within nixpkgs. This might seem like pedantry, but it really matters for things like LSPs (text editor autocomplete). I think that’s what scares some people off: it’s like OG Minecraft, you need to have the wiki/search.nixos.org open while you are doing your editing.
That being said, the type checking goes much deeper than what the windows registry does - e.g. it won’t allow you to enable conflicting services - like grub and systemd-boot - at the same time.
Apparently the upgrade (including configuration) is incredibly smooth. Those interested in tinkering with the vanilla experience have had to install it in a VM.
Install floorp.