deleted by author cuz @scaverat beat me to it. : ^ )
deleted by author cuz @scaverat beat me to it. : ^ )
But you can still do 64 bit math on a 32 bit processor, if you have a carry/borrow flag.
Nah, all this is solved with star-dates. One of the Federation’s crowning achievements - Warp Drive is small potatoes compared to getting hundreds of delegates from as many different worlds to all agree on one calendar system that is not based on their own world’s orbit around its primary… Diplomatic impossibility, but they managed it.
<Padme mode> Hopefully we are all working on 64 bit dates, right? right? </Padme mode> :^)
Well you are ready to open your own E-Sports training shop! You just need 15 gaming computers and a beefy enough server to run whatever game-servers you might want. (I hope you choose to host a minecraft server in the mix though)
Well, I am not in Australia, but so far my AT&T Uverse has worked well. We don’t need the VOIP or TVOIP we use our cell phones and don’t watch TV so it’s all Internet.
The central office at the other end of that fiber probably has emergency generators too.
In an area power outage, if one keeps the router alive via UPS does the router have anything to talk to? In my case I am “Fiber to the node”, there is a box on the sidewalk at the other end of the block that receives the fiber, then copper to my house.
Is there a version of Sketch up for Linux?
Packing dishes you can also use your clean kitchen towels/dishcloths too. Number your boxes too: 1 of 20, 2 of 20. Borg like.
Does that mean, to play minecraft on their server I would put “www.dududu.com” in my Minecraft client?
Can you replace the CMOS battery with a supercapacitor that is kept charged? This should not need to be replaced every 4 years, I think.
Workstations machines get first name type names that are inspired by the brand of the machine. This asus is named adam.
Just never make it lie…
One place I worked we had a rule - do not name a server for any group using it. It seems the groups become territorial when you try to add a different group to “their” server.
T: "Tay" (a mythical creature from Scottish folklore, often described as a small, elf-like being)
U: "Ufi" (a legendary creature from Native American folklore, said to resemble a small humanoid figure)
V: "Vim" (a mythical creature from Hindu mythology, sometimes depicted as a bird-like being)
W: "Wyy" (inspired by the Wyvern, a legendary creature similar to a dragon but with only two legs)
X: "Xin" (a mythical creature from Chinese mythology, often depicted as a lion-like beast)
Y: "Yen" (a legendary creature from Vietnamese folklore, resembling a large, serpent-like creature)
Z: "Ziz" (a mythical creature from Jewish mythology, described as a giant bird)
Not so much servers as removable media. Three letter creature names: ape, bat, cat, dog, elk, fox, gnu, hen, imp, jay, kit, lee (fish), mus, nan (from Inuit folklore), owl, pug, qua, rat, sas (from Slavic folklore) and so on (I need to find my printed list beyond here)
Don’t remove the back door from your house, bar it with a sturdy 2x4 that holds it closed. Just be sure to use a 2x4 that is not made weak by the application of a specific chemical that only the secret bad guy knows about.
Well, at least it has a USB3 slot - you could put a NVME drive in a USB3 external case and boot that way.
When one of these guys attacks your site, do they send the info back to the spoofed address or does the scraped info go to their real IP address? Is there some way to get a fix on the actual bot and not on some home user that got his network facing IP address hijacked?