• 0 Posts
  • 112 Comments
Joined 1 year ago
cake
Cake day: July 30th, 2023

help-circle



  • computergeek125@lemmy.worldtoScience Memes@mander.xyz10001
    link
    fedilink
    English
    arrow-up
    2
    ·
    edit-2
    14 days ago

    My low level is a tad rusty from when I learned the C side in school, but if I recall the not operator resolves as a single Boolean (0 or 1 in true C), whereas compliment comes back as however many bits you put in - a not operation per bit.

    In C, the not operator is ! and the compliment operator is ~



  • Sadly the so-called “smart TV” is becoming the norm. Companies add unnecessary crap to TVs that’s often as slow as your car’s factory infotainment system, and when they feel like not upgrading the software anymore for security issues in a few years, it’s a permanent security hazard until you disconnect it from the network.

    I have a Vizio TV from several years ago with Yahoo branded smart functions (that should date it) that I need to factory reset because I can’t find the WiFi password erase.











  • “broken build” here likely refers to the phrase as defined by gamers to function as synonymous to “overpowered”.

    As in, “the build is so broken you can’t/it is difficult to play against it”. This phraseology could be used by either an ally or an enemy, but it contextually changes connotation from positive for allies to negative for enemies.

    Build is often used as a shorthand for a character’s combination of items, skills, and levels (as the various games define it).




  • That sounds like the average megacorp terms of service these days.

    Yes, just because everyone’s doing it doesn’t mean they can’t be better. They should be better, but worldwide government regulations don’t force that (yet).

    But at some point to interact with any kind of large company, your information is going to end up crossing the path of a large company, especially one of the hyperscale cloud and connectivity providers like Microsoft, Akami, Cloudflare, Google, Amazon, etc.

    Whether businesses get copies of information is usually included in a site’s privacy policy, and if you’re curious about that list (and it’s not publicly documented), I’d hope there’s a contact to get more info about the policy (like a privacy@ email address)

    If you really want to limit your information exposure, you either have to audit everyone you do business with this way (because most large companies do this) or hire someone (or a service) to do it.

    You could also consider not interacting with large companies at all - but you’d limit yourself from part of the modern world. If that’s your game, by all means by my guest.