• 0 Posts
  • 158 Comments
Joined 1 year ago
cake
Cake day: June 23rd, 2023

help-circle





  • It won’t work, it will try, then inspect the battery for its voltage and other stats via i2c, decide the battery is unsafe, and shut itself off.

    I might be wrong, but systems I’ve worked with do this because they want to make sure the battery won’t explode, they have a battery management chip, either on the motherboard or in the battery, and this tells it whether the battery is safe to use or you should shut down, and if it can’t communicate it will probably assume it should shut down.

    Personally I’d solder a new barrel connector on, or figure out where the dc-dc converter is and either replace it or backfeed.



  • That’s absolutely the opposite of what it says.

    It says the states, specifically, must have armed citizens to prevent a tyrannical federal government:

    . It is, therefore, with the most evident propriety, that the plan of the convention proposes to empower the Union "to provide for organizing, arming, and disciplining the militia, and for governing such part of them as may be employed in the service of the United States, RESERVING TO THE STATES RESPECTIVELY THE APPOINTMENT OF THE OFFICERS, AND THE AUTHORITY OF TRAINING THE MILITIA ACCORDING TO THE DISCIPLINE PRESCRIBED BY CONGRESS.‘’

    https://avalon.law.yale.edu/18th_century/fed29.asp

    By keeping the army, or ‘militia’ under the sole control of the states, it guaranteed the states were never disarmed and could effectively resist or even attempt secession if they saw fit. Which, in fact, was later tried.

    Until the 14th amendment incorporated the bill of rights, the 2nd amendment only applied to the federal government, and in fact strict gun laws and bans were common throughout the 18th century.




  • Unix has had a long running convention of separation between “operating system” and other files, so you can blow away something like /opt or /home without making your system unbeatable.

    If you stick stuff under /usr/bin then you have to track the files especially if there are any conflicts.

    Best to just add another path, I use ~/bin because it’s easy to get to and it’s a symlink from the git repo that holds my portable environment, just clone it and run a script and I’m home.







  • This has been a problem forever, the googleization of CS where everything is assumed to scale to gigabytes and therefore all that matters is big-O.

    In systems that’s meaningless, what really matters is memory locality, loop placement, caching/lookaside and other features.

    The JDk is an excellent example of both large scale and small scale optimization, the GC systems and much of the low-level features like locking use microoptimizations while the higher order data structure features use algorithmic optimizations.