damium

joined 1 year ago
[–] [email protected] 7 points 4 days ago (1 children)

It looks like underextrusion at speed. It might be a clog or you might want to try a higher hotend temperature. PLA can have inconsistent ideal temperatures even with the same brand due to different colors and additives between batches and 185 is on the low side.

[–] [email protected] 0 points 2 months ago

It can often improve performance and memory latency and usually only has a minor CPU performance impact as it trades cycles waiting for memory for cycles decompressing memory. It is usually decent even on low power embedded devices.

There are a few edge cases where ZRam is not great. If your data is already compressed or encrypted copying it around in memory is much more expensive. It's also harder to tell exactly how much data can be loaded into the "free" memory. It's also a bit slower for serialized memory access in large data sets if the compression ratio is low.

[–] [email protected] 119 points 3 months ago (2 children)

Right image, but under those each one below would also be wearing large pants covering each side of the subtree.

[–] [email protected] 9 points 4 months ago (4 children)

It's not well explained for sure but judging by the names of the cookies I bet those store the consent (opt in/out) values for the other tracking options. Another way of putting it would be those are functional cookies related to the cookie consent form itself so that you don't have to re-select consent options every time you visit the site.

[–] [email protected] 4 points 5 months ago (2 children)

If 35° (or something close to it) is the slicer setting for overhang detection it likely changes the cooling/speed/flow settings. If that is the case you can set it to a lower detection value and maybe get better results or change the normal cooling/speed/flow to be closer so it isn't as drastic of a change.

[–] [email protected] 2 points 5 months ago

From what I've read is not authentication bypass, it's a RCE using certificates to deliver the payload. If a specific signature is found it runs the code that was sent in place of the signing public key. It also means that only someone who has the ability to generate that specific key signature could use the RCE.

There were some other bits that looked like they could have been placed to enable compromising other build systems in the future when they checked for xz support.

[–] [email protected] 3 points 6 months ago (3 children)

If filesystem UUIDs are IP equivalents. Then device paths are MAC addresses. FS labels are DNS. Device mapper entries are service discovery.

[–] [email protected] 4 points 6 months ago

Business systems from the 80s used to automatically convert everything name related to caps. It made it easier to do string matching which was generally case sensitive in the DB. It also made data entry easier as you just turn capslock on and type.

No so much formal as lazy semi-formal.

[–] [email protected] 7 points 6 months ago (3 children)

The biggest issue is that your corners are lifting from the bed during the print. Fixing this is usually a combination of making sure the bed is clean and adding a brim to increase adhesion. Maybe messing with temperature and cooling fan settings for the first few layers.

Second is things look a bit over extruded. This could just be due to the corner issue though so fix that before any other changes.

[–] [email protected] 4 points 6 months ago

The reasoning is that it is not illegal to fake most student ID cards but it is a federal offense to fake or alter government issued ID documents.

That way if it becomes an issue they can just pass it on to the authorities as their problem.

[–] [email protected] 5 points 6 months ago

"Invalid" or "unparseable" are more understandable descriptors in normal language. I don't think I ever heard of garbage/junk being used for that in language theory but it may be domain specific usage.

[–] [email protected] 0 points 6 months ago

There are a lot of edge case characters around visually indistinguishable names. If that is a concern usernames should use a restricted known character sets instead of trying to block specific characters. You likely should also treat lookalike characters as equivalents when checking for username overlap.

view more: next ›