• 0 Posts
  • 151 Comments
Joined 1 year ago
cake
Cake day: July 3rd, 2024

help-circle


  • It could have been an accident or incident that resulted in a death. They may have been collecting evidence. There are even some police in my area that uses conventional land surveying equipment and rapid high density laser scanners. Precise measurements of things like skids marks and other evidence of how the vehicles came to rest can be used to estimate initial speeds and confirm or refute the testimony of witnesses.

    It could also be something more mundane like an actual land surveyor collecting data to support future design work or verify completed projects.

    Neither of these are jobs that can be done at night or at times more convenient for your car.


  • You want mpd to server and play the music, connected with a web front end (there are a few to choose from) accessible on the private store wifi. You should probably serve this frontend only to a certain machine on the network (like the managers computer in the back) and lock everything else out. The last time I ripped CDs on Linux I used whipper, which I believe was the successor to morituri. This is all only legal if the CDs they have already included the licensing fees to play them publicly or are themselves freely licensed. There are sources of freely licensed music out there that you can play publicly without paying.


  • The article is saying that these sharks aren’t really sharking though. The sharks behavior has been changed by environmental factors (regular human feeding and humans raising the local sea temperature by dumping warm water from the desalination plant).

    1. Sharks are attracted by usually warm water from desalination plant.
    2. Tourist guide boats start chumming the waters to keep the sharks around for tourists.
    3. The attraction of so many mostly harmless sharks changes their feeding dynamic. Ever tried eating an ice cream cone near a small child? Ever tried pushing an ice cream cart through a crowd of small kids? Way different dynamic as supply and demand changes as the crowd grows.
    4. Formerly mostly harmless and “shy around humans” sharks start directly approaching humans as a source of food.
    5. Sharks investigate human, beg for food. How do sharks investigate? By biting, nibbles really, or bumping into people swimming.
    6. The first bite generates a predictably violent reaction from the humans, which triggers a feeding frenzy response. Humans aren’t equipped to defend or escape this.

    The point is that at every step of the way, these sharks are acting in a very strange way (for them) as a direct result of human action. We’ve seen this kind of thing before when people feed wild animals, strange and dangerous human seeking behaviors develop: alligators, bears, moose, etc. Dangerous animals? Yes, but the behaviors that result in human deaths are in no way natural.








  • There is a reason that I have fallen asleep during the extended 3rd act fight scene in every single god damn marvel movie since Mark Ruffalo became the Hulk.

    They all turn into the same movie, with the same fight. And these super long fights all seem to be surprisingly light on showing any of the actual real world impacts of such violence. Nobody ever gets seriously hurt unless the plot needs more sacrifice. But even when they do, the injuries mostly happen off camera and the blood never flows or spurts, it just instantly appears as makeup. It’s really giving people a deep rooted and totally unfounded sense that violence both solves every problem (it doesn’t) and does so bloodlessly (it doesn’t). At least Batman knows he’s not a hero.

    But really, the DC universe isn’t much better. Think about how shocking a little bit of blood at the beginning of the new Superman movie was, before they basically destroy metropolis (which was rather expected and mundane). And then they only show the tiny fraction of people personally saved by Superman, not the countless mangled corpses buried under rubble. This may be why the public has trouble confronting the realities of war and violence.




  • So, far right parents in a conservative religion in a Republican town in a Republican state produced a child so tortured by a culture of hate and violence that as soon as they even start to lean either way their instinct is murder. Breaking the cycle of hate is relatively easy compared to breaking the cycle of violence. The statements they made to their roommate (even if that heresay is true) just confirm that they were a troubled child from a troubled culture trying to change. It should surprise no one that those childish attempts would be a VERY twisted reflection of the ideal. So no, he was not part of the left. Just a child in pain reacting the only way their conservative upbringing taught them.



  • My smartphone isn’t a phone with “extra” features to me. My smartphone is a portable personal computer with extra sensors, a GPS receiver, and wireless internet, which also happens to have a phone app. I don’t want to carry an extra “dumb” phone. I would prefer my smart watch to be the communication and identity hub for me and my devices: holding the SIM card, acting as a wifi hotspot, routing calls and internet to my handheld brick or laptop, etc. Instead of acting like a third party add-on, it would be a mostly distraction free core. Let me use a smartphone, laptop, steam deck, cobbled together cyber deck, or whatever else have you as my local screen, storage cache, and/or proper desktop. Then I can put the screens down or leave them behind without feeling cut off or potentially stranded in a world that practically requires it to navigate with any ease. I want a smart watch that enables me to leave the house without car keys, driver’s license, and credit cards; essentially with nothing but my watchphone. I want to be a cyberpunk Dick Tracy. What I want, with the freedoms and open standards I want, with the privacy I want, without being locked into a single monopoly walled garden, is probably a pipe dream. I want what is probably the next evolution of the “year of the Linux desktop”. But a kid can dream.



  • Jellyfish cannot to setup to securely and safely be exposed to the Internet. It is only safe to access through a VPN. That rules it out as an option for sharing with friends, family, or even my own spouse. You call it phoning home to the mother ship; I call it paying Plex to manage user authentication for me. Until Jellyfin’s security holes are patched and it becomes clear that the Jellyfin developers actually care about security, it stays locked down to my LAN. Setting up a VPN is difficult for the average user on a good day, impossible in some circumstances on even the best of days, and is not access I want to hand out (and support) to all the people I share my Plex with anyway.