

We need to know your personal grooming metrics, you can opt out if you create an account.
We need to know your personal grooming metrics, you can opt out if you create an account.
This is just my opinion, and there are always legitimate use cases for wired or wireless. Losing connection at the worst time is the main reason. I play online, so it’s a complete and absolute, non-negotiable dealbraker to me. Every other benefit wireless gives and every other negative wired gives is trumped by this singular requirement.
I won’t go into every situation, but almost every minor issue in wireless results in disconnects. This ends up with me using wired anyways, which leads to the problem in my previous post: worn out USB ports. Wired by comparison has far less disconnects.
On a side note: I also wanted to add (but didn’t feel it was worth editing at the time), razor is stupid expensive for just that one little feature. I’ve had this controller for years, and back then it was the only one I could find like it. To me, it has been worth - but if I was to buy another I’d definitely look for something similar that is cheaper with possibly more features. It wasn’t meant to be a razor promoting post.
I prefer wired. The problem I have with most is that they are battery. Thus, the wired part is always a USB connection that inevitably wears out with use and disconnects randomly.
It’s not an innovative controller with programmable buttons or anything, but the razor controllers have a keyed recess that all but makes it impossible to disconnect or wear the port. It’s really the only selling point, but one that has kept me from looking for anything else.
I’m 8 yrs old /s.
I can’t wait for the PlayStation one billion Mario edition.
PlayStation 6 would be cool tho.
Land.
Tap to not give a crap about the UK.
Untap to give a crap about the UK.
You may tap or untap this card multiple times during your opponents turn.
You may only tap or untap this card once during your turn.
This card does not untap at the start of your turn.
If your device permits it, run raid on disc, and use nvme as cache. My Synology does this.
I don’t see anyone mentioning it, but what if you do forget (or don’t know) your email password? Is there absolutely no way to recover your account? I’m sure there might be some services that are that restrictive, but I’d think that most are recoverable with some extra steps, no? Unless I’m missing something?
Yes. They are bigger. It sends a message to the entire predatory ecosystem. Which would not happen if they went for a smaller Gacha game.
Other than that, no, let’s give them fines too.
I don’t live in NY but as I understand it, they had to offer this service to every qualified individual. They most likely didn’t have the option to only support certain or just existing customers.
Think of it this way: Had ATT the option to exclude, they would have and abuse it as much as possible. They can’t, so either they follow the law or take their business elsewhere. Leaving paves the path for another company or cooperative who does want to follow the new laws, rather than having ATT undermine at every opportunity. It hurts in the short term, but in the long term it helps. NY isn’t the first place to chase big telcomm out.
Yeah, no kidding. I would never be satisfied with infinite money, I’d need more!
I’ve also been involved in something similar. It costs a lot to expand infrastructure. Part of my job would be to plan and explain the costs associated with that. Wireless still needs a wired connection, and wireless still has connection limitations. You can’t just add more users and expect things to work. And you can’t just plop another receiver without it interfering with the others. It needs to be properly planned and something as simple as a building’s signal reflectivity can mess an entire project up. More towers, more equipment, more redundancy, more personnel, more cables, more power, and forking all the money to do all this within the time limit or face fines is a huge task. And that’s assuming it could even work on a technical level, sometimes you just can’t do things (don’t want to interfere with FAA requirements and such) and people don’t understand.
I hate ATT too, but from a purely financial and planning point of view, I’ve been there. You can’t just snap some fingers and make things happen just like that.
Not sure what to do. I gave it my IMEI but it said that wasn’t recognized as belonging to a Pixel 4a…except my phone clearly is, isn’t running custom firmware, and still in my purchase history.
Might only be the whistleblowing stuff. Might not. Guess you’ll have to kill me to find out.
You might be interested to know that there are several hardcore modding scenes, where the point is to mod the game for fun. The mod guides are updated every month or so and includes thousands of mods. It takes days to install, and actually playing is optional. In most cases, a new save is required every update, so modders keep an additional playable state if they actually want to play the game.
Lexy’s LOTD is my fav one, it’s only over a thousand mods, has very detailed instructions, and a very friendly community.
I was sitting at the doctor’s office and overheard an old man claim Harris was so stupid that she couldn’t figure out how to use a vacuum.
It broke MY brain trying to wrap my head around that one.
I feel like starfield is an experiment in user driven content (mods) to sell a game. The issue with Skyrim is that there is really only one map, and before any map extension mod came out, there were so many mods out there that competed for space on the map. Even today, large world overhaul mods are constantly stepping on the toes of other mods. City redesigns are also a problem unless you’re really good at load orders and merging.
Starfield feels like each world is an open map, ready for people to start designing content: either a colony, a cave, or anything really. The story seems loose and open ended so that it won’t interfere with large collaborative content. It’s not a game they are selling, but a modding storefront. It’s like Skyrim Creations, but putting the horse (armor sold separately) before the cart.
Pagers are not guaranteed to be 1 way comms and bringing them into secure locations is a security violation. Additionally, depending on the classification, no unauthorized and undisclosed devices of any kind would be permitted, including any electronics or electronic media such as tapes, CDs, discs, etc. Even when I was issued a verified 1-way pager, I was specifically briefed I was not permitted to bring it into a classified location. Most of the highly classified SCIFS are shielded anyways, you can’t use it inside so it’s safer to leave it out, along with all other devices.
If your organization allows it, then (if federal) they are breaking the law and should be reported/up-channeled. If it’s corpo, you should bring up additional concerns with your security team.
Edit: Also, it goes without saying, current events are probably a good reason why pagers (and other devices) aren’t allowed in classified areas. While most focus on disclosure (getting out), we must not forget the risk of data/operations getting destroyed.
Close, but you are still trusting the device you own. If I were to compromise that device, I could capture that key and use it. Again, this is my limited understanding, but a zero trust solution works in such a way that the actual keys are not stored anywhere. During setup, new temporary keys are generated. A keypass binds to the temporary key for use of authentication. The temporary key can be revoked at any time for any reason, whether it’s due to a breach or routine policies. It can be as aggressive as it needs, and the implication is that if someone else (either you or an attacker) got issued a new temporary key then the other would not receive it. Using an incorrect temporary key would force an initialization again, using the actual keys that aren’t stored anywhere.
The initialization process should be done in a high trust environment, ideally in person with many forms of vetting. But obviously this doesn’t take place online, so there is the risk that your device is not trusted. This is why the process falls back on other established processes, like 2FA, biometrics, or using another trusted device. How this is done is up to the organization and not too important.
But don’t get too hooked on the nuances of passwords, keys, passkeys,etc. The entire purpose is to limit trust, so that if any part of the process is compromised, there is nothing of value to share.
Disclosure: Worked in military and this seems to be a consumer implementation of public/private key systems using vector set algorithms that generate session keys, but without the specialized hardware. It’s obviously different, but has a lot of parallels, the idea in this case is that the hardware binds to the private/public keys and generates temporary session keys to each unique device it communicates with, and all devices can talk with members of it’s own vector set. Capturing a session key is useless as it’s constantly being updated, and the actual keys are stored on a loading device (which is subsequently destroyed afterwards, ensuring the actual key doesn’t exist anywhere and is non recoverable, but that’s another thing altogether). My understanding of passkey systems is solely based on this observation, and I have not actually implemented such a solution myself.
No. But I do sing the victory fanfare tune from final fantasy every time I do some small thing. Wash dishes? Victory! Laundry? Victory! Cook dinner? Victory! Take a shit? Victory!