Administrator of thelemmy.club
Nerd, truck driver, and kinda creeped that you’re reading this.
The screens are pretty fragile, however they’re protected when folded. Just don’t drop them onto anything while open…
Other than that they’re surprisingly robust. I’ve had 2 Moto Razr models and a Samsung Z Fold. First Razr did break the screen by leaving it open in a stupidly precarious position and it hit a piece of metal below directly on the folding screen when it fell. But day to day use I never worried about it.
Thanks I’ll warp back a few years and tell myself that.
I dunno, I use a mirror tile heated to 60⁰C. TPU and PLA seem to stick just fine. Have you tuned your first layer height?
I also give it a good scrub with isopropyl between prints.
That’s what I was using before, but my problem is my bed is fairly significantly warped… Inflexible glass fixes this entirely and I’ve had absolutely no issues with adhesion. At least not with PLA or TPU.
Although thinking about it I could clip the PEI to the glass giving it a flat bed…
And be ready to pay. And while the panels aren’t so bad don’t necessarily expect enthusiast-consumer grade features like local dimming zones and whatnot.
Better bet is to just buy the best TV regardless of the crap and never hook it up to the Internet. And amid reports that some even hook into open WiFi signals, maybe open the damn thing and unhook/cut the WiFi antennas.
Then use whatever you like.
The cancerousness is hugely dependant on what type of plastic you’re printing lol.
No the S1 is direct drive. I tried a retraction tower to little effect but perhaps I’ll try a wider range.
This one I accidentally printed with too many walls to squish much lol. I did another with one wall and no infill, came out the same appearance wise but squishes nicely.
I had read that TPU doesn’t really like to be retracted. I did a retraction tower and it didn’t seem to make any difference really at least in the ranges I tried. I have avoid crossing perimeters on (using OrcaSlicer) with something like 350% detour but that won’t help with the archway of course since those lawyers are just completely separate pieces
I’ll have to try the combing setting though
Wouldn’t be caught dead in a Tesla tbh
It’s time.
7.09 global but I do have a few files with over a 30 ratio
With a traditional download, examplesite.com sends a file to your computer, that’s it.
With torrents, instead of that you download little pieces of the file from many different computers. Sometimes hundreds of different computers. Then once you’ve downloaded the file you can then start sharing pieces to other people downloading. The more people doing this, the faster the downloads will be for everyone else and the less strain it will put on each computer’s Internet connection.
Also if not many people are seeding, there’s a danger that the file will have 0 seeders and nobody can download it at all.
This is also why torrenting is good for privacy. Shutting down one website isn’t so hard. Shutting down hundreds of random personally owned computers is very hard.
That point is addressed tenfold in the video
Us instance admins appreciate it I promise
I’m not interested in conjecture I’m interested in facts. Get me some research papers. Get me some court docs. Something.
Cox got caught buying that data, and when confronted about it, Google, Amazon, and Meta all failed to deny that they also buy that data from those malicious app makers
But what is that based on? This paragraph?
A spokesperson for CMG told Newsweek that “CMG businesses have never listened to any conversations nor had access to anything beyond third-party aggregated, anonymized, and fully encrypted data sets that can be used for ad placement.”
I don’t think that explicitly means they had datasets made up of clandestinely recorded conversations in the wild.
third-party aggregated, anonymized, and fully encrypted data sets that can be used for ad placement.
Really could describe ANY possible set of tracking data… Unless you put this quote into a clickbaitey article and strongly imply it’s something sinister.
Someone back this up with proof. Security researchers would’ve noticed this. They’d’ve had to have hacked their way around the microphone permission systems and microphone use indicator (depending on OS) on your phone and upload that data without being caught by security analysts. That kind of bug would probably be worth a fairly decent bounty too.
The article talks about a slide in a PITCH to advertisers. But not a concrete system. Then it goes on to say advertisers bought a dataset from other sources. What dataset? From where? It doesn’t say. Transcriptions from voice assistants? Maybe. But without hard evidence I don’t believe random apps are just recording clandestinely in the background. But people want to believe this so writing shitty unsourced articles with click bait titles and tenuous-if-I’m-generous linking of weak facts lacking entirely in context generates lots of clicks.
The end of the console gaming era?
$3 or less at a guess