

I like the ungrounded North American electrical outlet and plug design (NEMA 1-15). It has no safety features, but it’s very compact, and very easy for device manufacturers to create folding plugs for USB power supplies and the like.


I like the ungrounded North American electrical outlet and plug design (NEMA 1-15). It has no safety features, but it’s very compact, and very easy for device manufacturers to create folding plugs for USB power supplies and the like.


I’m against disabling replies entirely, but for disabling notifications. Once a post is out there and other people are participating in the conversation, it’s not just yours anymore.


Not in most states, and some of those that do are unlikely to charge the owner in practice.
I’m going to guess a majority of people wouldn’t file an insurance claim. It would only make sense if


In the USA, it’s not rare for people to have gun manufacturer stickers on their car.
Imagine you’re a thief and you see a Smith&Wesson sticker on a car parked outside a building where carrying guns is forbidden.
The National Crime Victimization Survey is conducted by the Census Bureau by interviewing randomly selected households. It gathers information on crimes not reported to the police, and the reporting rate.
It’s probable that people being afraid to talk to anyone who works for the government will affect its results, but it does have some hedges against that, such as enrolling households for a three year span.
I expect we’ll see that reflected in 2025’s numbers when they come out.
The National Crime Victimization Survey shows crime victimization rates being lower than 20 years ago, and far lower than 30 years ago. The rate is relatively steady from 2022 to 2024. This is similar, but not identical to what the FBI Uniform Crime Report shows. The rate of victims reporting crimes to the police increased a little over that time period.


So, according to the “Fediverse-Observer” (and similar services AFAIK), in terms of software, sorting by user-count, it seems the top four user-bases are
Not relevant to the comment where you posted the following to a Lemmy community from Piefed:
Mastodon is just beginning to rudimentarily connect to PF, but IIRC Lemmy still doesn’t.
Which looks to me like you’re saying “Lemmy still doesn’t connect to Piefed”, but reading it three more times I guess it’s possible you meant “Lemmy still doesn’t connect to Mastodon”.
If you meant the latter, then I do have some idea what you’re talking about. It actually is possible to interact with one from the other with the constraint that Lemmy can only see Mastodon posts that tag communities. It’s not a smooth experience at all to try to consume community-based content from Mastodon.


The comment you linked to says
For example, last time I checked, the top four FV software bases still don’t connect to the Lemmy / PieFed / etc side of things. Mastodon is just beginning to rudimentarily connect to PF, but IIRC Lemmy still doesn’t.
and I’m not sure what you’re talking about. Lemmy and Piefed obviously interoperate; you’re posting to !asklemmy@lemmy.world from a Piefed account right now. It’s a rougher experience trying to interact with forum-like software using blog-like software, but someone wanting that should probably just use two accounts.
That’s DRM, and it only works if everyone is accessing the information on devices they don’t fully control.
If you’re concerned about bots ingesting the content, that’s impossible to prevent in an open federated system.
I have never had a web host ask me to prove my identity, and I would probably pick a different one if they did.
They do have my credit card number though, so I’m far from anonymous.
That has a very high probability of convincing me not to use that app or service.
I’m imagining inserting a face-swap program into the software stack powering the webcam. I know it’s technically feasible with Video4Linux.


I don’t find that commercial social services are free of bumps and difficulties; they’re just different bumps and difficulties. They variously want me to:
And people think picking a server to sign up or using an unpolished UI is a hassle? It’s a small price to pay to avoid that load of crap.
I use Lemmy and Mastodon because independent services that interoperate are how I want the internet to work. I still use some of the big commercial services because people or communities I value are there. It’s not all-or-nothing.


The article has this heading:
No, permanent daylight saving time wouldn’t be better for you
followed by
Weed and her team found that a permanent shift to DST [is] less damaging than the current biannual back-and-forth
which pretty clearly contradicts the heading.
I’m in favor of getting rid of the clock change regardless of which time is permanently adopted. There seems to be some North/South split in preferences which might reasonably be addressed by redrawing time zones.
I am likely to send more texts, but at some point, if someone is not getting back to me in the timeframe I want them to, I will call them to force the issue rather than silently getting mad about their slow response.
For this post let’s assume the people involved are or were in the past friends, and ghosting is leaving someone on “read” for more than 2 days.
This doesn’t match how I’m used to seeing ghosting defined.
That behavior might be unfriendly, but there are a ton of innocuous reasons people do it. People are busy and not every message merits a prompt reply. If someone sends me something that requires more time or attention than I have at that moment like a video or news article, I’m likely to make a mental note to look at it later. I might actually remember, and then remember to send a reply about it. I might not.
It’s maybe a little rude not to respond to something more important or time-sensitive, but I can always ask again or use something more synchronous like a voice call. People are busy, life happens, tech can be unreliable. It’s best not to assume intentional disrespect.
My understanding of the term “ghosting” is permanent or long-term cessation of communication over all channels without explanation. That should be reserved for situations where someone is a physical danger or behaved in a manner so egregious they almost certainly know what they did.
No. ClamAV can, for example scan Linux ELF executables and its database contains signatures for malware that could affect desktop Linux. The most common use case is servers that are distributing files, but it can be used to scan local files.
The local use case is fairly rare because malware targeting desktop Linux is rare. That’s partly because Linux users tend to have a better understanding of computers on average than Windows users, and partly because the sort of attack vectors that work well against Windows users don’t align with Linux workflows (e.g. if you want to execute a file sent as an email attachment, you’ll have to save it and set it executable first).
A quick search suggests all X1 Nano models can run Windows 11, so they won’t be ultra-cheap because of that.