tree

joined 3 years ago
MODERATOR OF
 

What happened? Well, our first regret was assuming that our factory at that time — a factory that made lots of Bluetooth speakers — could easily design the electronics for us, saving us lots of time and money. That went pretty well at first. But they, in turn, outsourced the Bluetooth software and chipset to another company in another country.

As a result, the Stereo Dock would crash often — rapidly adjusting the volume would do it. The Bluetooth pairing/unpairing experience was rough. And when we played music, it just didn’t sound very good. The back-and-forth between three companies trying to fix bugs became a huge challenge. And worst of all: the cost of the Stereo Dock kept getting higher and higher.

https://play.date/stereo-dock/

 

https://www.gunnerkrigg.com/?p=3010

Chapter 95: Page 43

It's just from a long forgotten project she was working on.

https://www.reddit.com/r/gunnerkrigg/comments/1ga4hbm/chapter_95_page_43/

 
[–] [email protected] 5 points 2 months ago (6 children)

There was discussion about implementing Hashcash for Lemmy: https://github.com/LemmyNet/lemmy/issues/3204

[–] [email protected] 10 points 8 months ago

"Abolish corporate personhood" doesn't go far enough. Abolish corporations. Companies over a certain size should be forced to convert to either a worker-owned co-op or a non-profit organization. Human society needs to evolve past being centered around maximizing shareholder profits.

[–] [email protected] 2 points 10 months ago (1 children)

It's a bug in the dark theme CSS. On the light theme it's a much more subtle highlight.

https://github.com/LemmyNet/lemmy-ui/issues/2264

[–] [email protected] 33 points 1 year ago (4 children)

A scary possibility with AI malware would be a virus that monitors the internet for news articles about itself and modifies its code based on that. Instead of needing to contact a command and control server for the malware author to change its behavior, each agent could independently and automatically change its strategy to evade security researchers.

view more: next ›