That says you cannot replace individual broken cells in a Tesla pack. That doesn’t say you can’t replace the pack
Aren’t all the cells worn in a ten year old battery?
Pronouns: any. You can’t get it wrong
That says you cannot replace individual broken cells in a Tesla pack. That doesn’t say you can’t replace the pack
Aren’t all the cells worn in a ten year old battery?
My car wouldn’t have done that. Had I fallen unconscious it would either follow the road or stop
But that’s also not because it’s electric.
No, you could be doomed both ways, or safe both ways, or there may be more or fewer than two doors, more or fewer than two brothers, they may not be brothers, maybe none of them are truthful etc
When your conversation partner is chaotic/* you can’t trust what they say
Get custom tips
This might even provide cover for those with real nude photos circulating
It uses Google’s speech to text. As far as you can tell it is a recorded message saying that it’s Google’s call screening system and to give your name and why you’re calling and voice to text to tell you what they say
Then when you hang up it says goodbye to them.
I think the product that was supposed to be AI was the booking assistant
On pixel phones the Android assistant can filter calls for you
It’s surprising when people follow the machine’s instructions and state who they are and why they are calling. It’s not a menu system, but it gets maybe the best 30% of the effect
However, I would say when talking about Linux specifically, there is a high chance that people talking about stuff being broken are people breaking stuff.
I’m sure you’re right. It used to be complicated to set up printers, bluetooth, audio, but even then once set up they were fine. Now all those and just about anything else you need to manage on the machine has an easy GUI
My wife’s computer runs Linux and she’s never had to use a terminal (she’s not a techie type)
For the UDP broadcast, you should be able to catch and change them with simple firewall rules, you’d catch packets with a destination address of the broadcast address and send them to a chain that rewrites the destination
There is nothing you can’t uninstall on Linux. Linux distros, let alone desktop environments, really can’t qualify as bloat
There are even enough mainstream distros to let you choose one that meets your needs with little or nothing you need to trim
Lots of people will spend a few hours then several tens of minutes monthly or so finding out how and then disabling the ads after each update
Win+L to immediately lock a windows machine. You can get the logout dialogue with alt+F4
Now that Linux can run pretty much all the games I play on the PC I don’t think I’m going to have much use for windows at home anymore
I use it and find it’s the fastest way to type on glass
It appears to work by matching the path your finger traces to likely words, it also works if you’re slightly off the letters
The biggest problems are errors like “if” and “of” that start right next to each other and finish the same, it also capitalises anything that is also a name and you need to select the uncapitalised version from the suggestions row
So throw an error at runtime on that macro, most workbooks aren’t the target of a macro
Fine for me too
They said ~/
I don’t think there’s any protection for the current user’s home directory
Surely one could use the same exploit to restore the original boot code as the malware used to corrupt it