• 0 Posts
  • 41 Comments
Joined 1 year ago
cake
Cake day: July 12th, 2023

help-circle



  • They could create a new flag for Abandoned Early Access games. If an Early Access game hasn’t been updated in a long time, that could trigger an automatic email to the publisher saying “Hey your game hasn’t been updated in a long time and could be changed from Early Access to Abandoned Early Access. Consider updating the game or store page to keep Early Access status. If you would like to switch to Abandoned Early Access, you can ignore this message and it will automatically update in two weeks or you can manually change the status on your game’s Steam page.” Wouldn’t really need more employees to handle this unless the current employees are all too busy to implement something like it.




  • The thing is in this case, it’s only human suffering. People don’t actually work nonstop all week. Giving them fewer hours over four days means they’re more productive for those days because they’re not dragging out their work to fill the arbitrary 40 hours they have to work for. So companies pay workers the same, but can save money in amenities and office space or whatever by using it less AND have more productive workers. Longer work weeks don’t actually make companies more money (oversimplifying and speaking broadly).


  • I imagine the largest mobile phone operating system on the planet has a few more downloads than one of the several available package managers for the comparatively very small desktop Linux audience, yeah. This is the Linux community, not the Android or Google community, so I’m not sure what you’re yapping away about or why.

    edit: i wanted to know how many devices run android and according to this it’s three billion so you’re wrong anyway lmao


  • paris@lemmy.blahaj.zonetoLinux@lemmy.mlDeduplication tool
    link
    fedilink
    arrow-up
    2
    ·
    edit-2
    5 months ago

    I was using Radarr/Sonarr to download files via qBittorrent and then hardlink them to an organized directory for Jellyfin, but I set up my container volume mappings incorrectly and it was only copying the files over, not hardlinking them. When I realized this, I fixed the volume mappings and ended up using fclones to deduplicate the existing files and it was amazing. It did exactly what I needed it to and it did it fast. Highly recommend fclones.

    I’ve used it on Windows as well, but I’ve had much more trouble there since I like to write the output to a file first to double check it before catting the information back into fclones to actually deduplicate the files it found. I think running everything as admin works but I don’t remember.




  • It’s probably not a bluff. They’ve pretty much saturated the U.S. market; there’s not much room left to grow here. It would make more sense to focus their efforts on growing in other regions where they have plenty of headroom to increase their userbase and monetization. Depending on how things play out, they could match their current revenue in a matter of years and still have room left to grow. There’s also the potential to re-enter the U.S. market down the line. Why would they throw that all away and essentially create their own competitor by selling their core technology and diluting/confusing their brand with whatever U.S. company they sell to?








  • While we’re talking about asymmetric encryption, can someone explain to me why you can’t decrypt information with the same public key that encrypted it? I understand the analogies (locks on a briefcase, unmixing paint, etc), but I can’t “un-analogize” them to understand what’s actually going on. Encryption keys aren’t physical locks or paint. They’re numbers(?). So why can I encrypt something by multiplying by a known public encryption key, but I can’t decrypt it by dividing by that same known public key?