Crossover is the commercial version of the code behind proton, developed by the same company. It doesn’t work as well on Mac as on Linux. Since “Like Linux but worse” is exactly the point you’re responding to, so you’re pretty much in agreement with them?
- 0 Posts
- 17 Comments
AlotOfReading@lemmy.worldto Technology@lemmy.world•Bluetooth 6.0 adds centimeter-level accuracy for device tracking — upgraded version also improves device pairingEnglish8·8 months agoNot bad, but you’re missing that the Bluetooth device can report audio latency back to the source so it can delay anything that needs to synchronize. In practice there’s half a dozen more buffers in between and a serious tradeoff between latency, noise sensitivity, and bandwidth.
AlotOfReading@lemmy.worldto Technology@lemmy.world•Starlink is refusing to comply with Brazil's X ban (Update: Starlink will comply)English2·9 months agoExtradition treaties are almost always reciprocal and this particular treaty is publicly available. No public treaty is going to include a promise not to coup another government because of the obvious political consequences of admitting you might to everyone else.
AlotOfReading@lemmy.worldto Technology@lemmy.world•“Should art be regulated by the SEC?” NFT artists file lawsuitEnglish6·9 months agoNo, the “non-fungibility” simply means that anyone who creates an NFT with the same link will be distinct from your link to the image, even if the actual URL is the same. Both NFTs can also be traced back to when they were created/minted because they’re on a blockchain, a property called provenance. If the authentic tokens came from a well known minting, you can establish that your token is “authentic” and the copy token is a recreation, even if the actual link (or other content) is completely identical.
Nothing about having the “authentic” token would give you actual legal rights though.
AlotOfReading@lemmy.worldto Technology@lemmy.world•Regarding this picture, where do you think quantum computers lie and why?English2·9 months agoThat’s perfectly solveable with math. Each grid square can take 10 colors, so there are 10^100 possibilities. That’s about 330 bits of entropy, or equivalent to a 51 character password. That’s gross overkill if the underlying cryptosystem isn’t broken, but insufficient if it is (depending on the details).
Cryptography routinely deals with much, much larger numbers than what you’re suggesting (e.g. any RSA key), and even those get broken occasionally.
AlotOfReading@lemmy.worldto Technology@lemmy.world•Nvidia is ditching dedicated G-Sync modules to push back against FreeSync’s ubiquityEnglish11·9 months agoNo. Nvidia will be licensing the designs to mediatek, who will build out the ASIC/silicon in their scaler boards. That solves a few different issues. For one, no FPGAs involved = big cost savings. For another, mediatek can do much higher volume than Nvidia, which brings costs down. The licensing fee is also going to be significantly lower than the combined BOM cost + licensing fee they currently charge. I assume Nvidia will continue charging for certification, but that may lead to a situation where many displays are gsync compatible and simply don’t advertise it on the box except on high end SKUs.
You can find plenty of people complaining online about the startup time of the windows and gnome (snap) calculators. The problem in those cases isn’t solved by compiled languages, but it illustrates that it’s important to consider performance even for things like calculator apps.
You can sometimes deal with performance issues by caching, if you want to trade one hard problem for another (cache invalidation). There’s plenty of cases where that’s not a solution though. I recently had a 1ns time budget on a change. That kind of optimization is fun/impossible to do in Python and straightforward to accomplish Rust or C/C++ once you’ve set up your measurements.
deleted by creator
AlotOfReading@lemmy.worldto Technology@lemmy.world•Microsoft Edge nags users with a 3D banner to change Windows 11's default browserEnglish2·11 months agoOther than Apple music and iCloud, they’re generally less intrusive about popups than Microsoft. Their tactic is to completely prevent competitors from integrating with the system at all rather than nag you to use a setting. For example, there’s no way to use Google maps or Spotify in all the same ways you can use Apple music or Maps.
AlotOfReading@lemmy.worldto Technology@lemmy.world•Move over, Ford and Chevy: Kei trucks are pulling up as customers opt for smaller, cheaper vehiclesEnglish6·11 months agoA torque converter is part of the whole transmission system even if it’s a separate housing. When you buy a new transmission, it comes with a torque converter.
Torque converters also create the majority of heat in automatic transmissions and are why automatic transmissions get coolers in the first place. How many manuals have you seen with transmission coolers?
AlotOfReading@lemmy.worldto Technology@lemmy.world•EVs Could Last Nearly Forever—If Car Companies Let ThemEnglish1·11 months agodeleted by creator
AlotOfReading@lemmy.worldto Technology@lemmy.world•Waymo Under Investigation for Driverless Car Crashes and Traffic ViolationsEnglish51·1 year agoThere is independent government oversight. That’s NHTSA, the agency doing these investigations. The companies operating these vehicles also have insurance as a requirement of public operating permits (managed by the states). NHTSA also requires mandatory reporting of accidents involving these vehicles and has safety standards.
The only thing missing is the fee, and I’m not sure what purpose that’s supposed to serve. Regulators shouldn’t be directly paid by the organizations they’re regulating.
AlotOfReading@lemmy.worldto Technology@lemmy.world•Ordered back to the office, top tech talent left instead, study findsEnglish5·1 year agoJust for context, a large chunk of “top tech talent” at the companies in the study are going to be making 200-400k. While there’s still going to be issues with pay, it’s a pretty different situation than fast food workers or similar.
WSL is just a well integrated VM running Linux. It’s mainly intended for CLI tools, but there’s nothing preventing you from e.g. running an X server and having programs appear in the Windows “window manager”.
The super key is largely inaccessible though. It’s tied very deeply into Windows, which is still the one talking to the keyboard.
AlotOfReading@lemmy.worldto Technology@lemmy.world•AI Computing on Pace to Consume More Energy Than India, Arm SaysEnglish31·1 year agoI’m not assuming it’s going to fail, I’m just saying that the exponential gains seen in early computing are going to be much harder to come by because we’re not starting from the same grossly inefficient place.
As an FYI, most modern computers are modified Harvard architectures, not Von Neumann machines. There are other architectures being explored that are even more exotic, but I’m not aware of any that are massively better on the power side (vs simply being faster). The acceleration approaches that I’m aware of that are more (e.g. analog or optical accelerators) are also totally compatible with traditional Harvard/Von Neumann architectures.
AlotOfReading@lemmy.worldto Technology@lemmy.world•AI Computing on Pace to Consume More Energy Than India, Arm SaysEnglish121·1 year agoML is not an ENIAC situation. Computers got more efficient not by doing fewer operations, but by making what they were already doing much more efficient.
The basic operations underlying ML (e.g. matrix multiplication) are already some of the most heavily optimized things around. ML is inefficient because it needs to do a lot of that. The problem is very different.
It’s a little weird and very European, so OpenSUSE.
Any cryptography you’re likely to encounter uses fixed size primes over a residue ring for performance reasons. These superlarge primes aren’t relevant for practical cryptography, they’re just fun.