ferric_carcinization

joined 3 months ago
[–] [email protected] 5 points 2 days ago (1 children)

It's way more common than you may realize. Intel & AMD (and other x86 CPU manufacturers of the time) did it before the first Crusoe CPU launched. (2000 according to Wikipedia)

CISC architectures are now seen as inefficient, so all the new ones are RISC and new CISC CPUs just translate the instructions to their intenal RISCier microarchitecture. The CPU's microcode specifies what an instruction translates to.

[–] [email protected] 6 points 5 days ago* (last edited 5 days ago)

A communication protocol used in microchips, small modules & embedded devices that uses 2 wires. Think something like USB, but dead simple.

[–] [email protected] 16 points 1 week ago (6 children)

If they have it on a hat, in real life, then it's linked to their real identity. They might just want to keep it separate from Lemmy.

[–] [email protected] 2 points 1 week ago

CSS can actually do a lot. Many effects that are often done trough JS can also be done with CSS.

[–] [email protected] 4 points 1 week ago (2 children)

I mostly meant that a 2 party system consisting of 2 right-wing parties & a horrible voting sysem doesn't exactly scream "functioning democracy" to me.

[–] [email protected] 3 points 1 week ago (1 children)

What could that mysterious white liquid be?

[–] [email protected] 6 points 1 week ago (4 children)

Has a functioning democracy ever feel like this

TIL the USA has had a functioning democracy.

[–] [email protected] 13 points 1 week ago

Don't forget Self, the type of self.

[–] [email protected] 1 points 1 week ago

I'm currently traveling through time at 0.00027̅ h/s.

[–] [email protected] 3 points 1 week ago (1 children)

What about μc or nc, a bit umder 300m/s & 3m/s, respectively.

[–] [email protected] 5 points 2 weeks ago (2 children)

What does "BringThemHome" mean here?

[–] [email protected] 6 points 2 weeks ago (1 children)

I'd still say that it's better.

With "delete after reading", the recipient has to delete the email manually, so the email is kept if no action is taken. But with the methods listed in the post, the content disappears unless action is taken to save it in some form.

Yes, the content can be easily saved & you should never trust that no clients are malicious, but people are forgetful & lazy. If you need the recipient to perform an action each time, there's a good chance that they won't.

I still understand your point. You can't get around the analog gap unless you transmit everything directly ro the brain. And even if you could do that, with text, it's easy to reproduce from memory.

view more: next ›