• 0 Posts
  • 63 Comments
Joined 2 years ago
cake
Cake day: July 3rd, 2024

help-circle
  • Yes, I read your comment. It’s okay if you didn’t understand my comment. Clearly you don’t understand how filesystems and drive mounting works under Linux or the role of desktop environments in managing filesystems, mounting, and permissions. I don’t doubt that you’re genuinely struggling here, but there is no call for that kind of hostility. You might have some hope for figuring it out if you open your mind to the fact that you don’t fully understand what your problem is.

    Steam expects the games to be in a particular place with a particular set of permissions and ownership relative to the user(s) and/or group(s) expected to use those game files. I’m telling that Linux doesn’t care where those files physically reside. You can tell Steam that those files are exactly where Steam expects them to be at the filesystem level, without messing with Steam configs, nautilus, gnome, or KDE. There are several ways to do this, but without understanding the requirements of your machine no one here will be able to give you effective advice.

    I’ve seen some other comments from you about running something or other as root or just blanket chmods to 777 and I can tell you from experience that those are rarely effective solutions and can sometimes make things worse (just try something like that when configuring ssh configs, keys, and permissions).


  • What does any of this have to do with KDE, Gnome, or nautilus? If symlinks aren’t working, I’d dedicate an entire drive to Steam by mounting that drive (with matching permissions) right where Steam expects to find them. You can mount a filesystem/disc/ISO/drive/network share practically anywhere you want. If your network is fast enough, I bet you could even access your games over NFS, though I wouldn’t recommend it.




  • King has almost always written his stories in the immediate present. There are a few exceptions, but they are intentional and critical to the plot. In all the others, it is fully in keeping with his style to update cultural references to set the story in the recent past, the now, or the very near future. He is a contemporary writer of contemporary stories, that is fundamentally the reason. King also seems to feel no loyalty to preserving his past works. He is alive. His stories are more about the lives of the characters than fashion or pop culture. I’m not always a fan of his revisions either (The Gunslinger being a good example), but it’s part of the total package of his writing philosophy.


  • The article is saying that these sharks aren’t really sharking though. The sharks behavior has been changed by environmental factors (regular human feeding and humans raising the local sea temperature by dumping warm water from the desalination plant).

    1. Sharks are attracted by usually warm water from desalination plant.
    2. Tourist guide boats start chumming the waters to keep the sharks around for tourists.
    3. The attraction of so many mostly harmless sharks changes their feeding dynamic. Ever tried eating an ice cream cone near a small child? Ever tried pushing an ice cream cart through a crowd of small kids? Way different dynamic as supply and demand changes as the crowd grows.
    4. Formerly mostly harmless and “shy around humans” sharks start directly approaching humans as a source of food.
    5. Sharks investigate human, beg for food. How do sharks investigate? By biting, nibbles really, or bumping into people swimming.
    6. The first bite generates a predictably violent reaction from the humans, which triggers a feeding frenzy response. Humans aren’t equipped to defend or escape this.

    The point is that at every step of the way, these sharks are acting in a very strange way (for them) as a direct result of human action. We’ve seen this kind of thing before when people feed wild animals, strange and dangerous human seeking behaviors develop: alligators, bears, moose, etc. Dangerous animals? Yes, but the behaviors that result in human deaths are in no way natural.





  • I was just pointing to the simplest answer I had, which didn’t rely on a bunch of circumstantial and vague hunches. Since you take issue with that, I guess I’ll rant a bit.

    Fake photos have been a thing as long a photos have been. Very little has changed in that regard. The various tips and tricks to spot AI fakes will become obsolete a lot faster than the other critical thinking skills needed to decipher fact from fiction in any other medium: news articles, YouTube videos, social media, etc. This will be especially true as the tools used to make these images will evolve. One of those critical thinking skills is tracing a claim, especially a repeated claim, back to it’s source. Another is looking at the timeline of the spread of the meme. These both involve gathering actual evidence and work for a variety of mediums. This is why so many lamented the death of rigorous independent journalism. Suddenly the news becomes so much more trouble to trust and to verify. AI is here just a fungus feeding off the corpse of journalism in the dense jungle of the death of critical thinking in the news consuming public.







  • The line between perfect bacon and overcooked perhaps slightly burnt is a number of seconds.

    This is the biggest reason I bake bacon. I can bake nearly a pound of bacon in the time it takes to make the rest of breakfast and seconds don’t make the difference between perfect and burnt. You can dial that shit in to the perfect level of crispiness.

    Bacon spread out on a cooling rack set inside a sheet pan in a cold oven. Set to bake at 200°C or 400°F. After 20 minutes, check on it every 5 minutes until done to your liking. Thicker bacon takes longer obviously. Drain the grease and save for later cooking use.





  • Next time you tape over it, try this. Cut an old credit card, hotel key card, or something similar to just larger than the switch’s recess. Tape only the top edge to the machine so that the stiff plastic or cardboard covers the switch, but can be lifted up and out of the way when you need to access it. I’ve used a similar trick to protect light switches I wanted to occasionally use, but not accidentally flip along with the other switches in the next gang over.