

When you ask for a refund under Steam’s 2h/14d policy, it’s Steam offering the refund. Past that, the request is passed on the developer
At least that’s how I’ve heard it described, idk for sure
When you ask for a refund under Steam’s 2h/14d policy, it’s Steam offering the refund. Past that, the request is passed on the developer
At least that’s how I’ve heard it described, idk for sure
How do you get anything done at all??
It’s a very good teacher when you’re a dev learning a new language
Yeah lol, a lot of “I need to do X” and I often get “use functionThatDoesX then” and sometimes it’s a wonderful discovery, most often though it just doesn’t exist lol
Which is why they mentionned the nasdaq
They only implemented those in bedrock edition, available in the MS store… I’d rather they add it into Java edition so us Linux gamers can use them, and not tie them exclusively with NVidia
Mojang’s “stealing” started from at least the pistons in 2011, 3 years before the acquisition. Credit was given to the original mod author under “Additional programming”, and they did reuse the actual code from the mod
I don’t think it’s fair to call that stealing, for multiple reason:
What happened with CS2 for you not to want TF3? I feel like I’ve seen nothing but praise for CS2
If lemmy did this you’d see forks ripping this out, not to mention anything other than lemmy would not have it, so only a very small subset of the fediverse would be subject to this at all, making it perfectly useless
12 is pretty bad, modern games are made with consoles in mind and those have 16GB unified memory
Well yes, but newer CPU models such as 13th and 14th gen Intel CPUs are also susceptible to these attacks, my points is that Apple is no exception to this vulnerability and should not be singled out for it
Side channel attacks are as old as computing, and the specific CPU variants exploiting speculative execution have not simply occurred on 2018 hardware and stopped since; pretty much all CPU architecture is susceptible to some form of speculative execution exploit, Apple simply is not an exception to the rule, and I think it’s unfair to call them out as somehow incompetent for making the same mistake as literally everyone
We can laugh all we want but this issue was present on x86 hardware first
https://thehackernews.com/2024/10/new-research-reveals-spectre.html?m=1
You do realize this kind of attack first appeared on x86 hardware, right?
https://thehackernews.com/2024/10/new-research-reveals-spectre.html?m=1
It’s a hidden file created by Apple devices whenever you open a folder
It is a form of machine learning
It’s actually from mistranslations that made it appear like Sven was saying wukong is a cash grab
How is the PFLP a hate symbol LMAO
I was surprised to have a fairly unusual setup with fairly unusual peripherals, and everything pretty much worked out of the box, except for one software (philips hue sync) for which there is an open source alternative (huenicorn, and it wasn’t built-in as Linux drivers are, because it’s specialized and requires a special interface)