As in Margaret Thatcher was an Englishman?
Pronouns: any. You can’t get it wrong
As in Margaret Thatcher was an Englishman?
That says you cannot replace individual broken cells in a Tesla pack. That doesn’t say you can’t replace the pack
Aren’t all the cells worn in a ten year old battery?
My car wouldn’t have done that. Had I fallen unconscious it would either follow the road or stop
But that’s also not because it’s electric.
The best thing to do with a tarball is to bzip it
My government agency when hiring all the roles in an IT team put those sort of stupid ranges in the headline, but if you drill down to a specific role you see the actual range
So about 1d8 con damage instantly then 1d2 con daily.
Melee area effect weapons. There’s a wand of fireball in Balders Gate 3 that is bent and has melee range. This is like that, but the fire is only analogous to fire and the effect lasts longer and does damage slower
@AtariDump@lemmy.world is a nice guy (/girl/whatever) but about as sharp as a sack of wet mice when it comes to spotting users’ instances
(You were replying to psud@aussie.zone, not at lemmy.world, though both are me)
Get custom tips
People also look at it as an example of how identifiable people are right now.
This might even provide cover for those with real nude photos circulating
It uses Google’s speech to text. As far as you can tell it is a recorded message saying that it’s Google’s call screening system and to give your name and why you’re calling and voice to text to tell you what they say
Then when you hang up it says goodbye to them.
I think the product that was supposed to be AI was the booking assistant
On pixel phones the Android assistant can filter calls for you
It’s surprising when people follow the machine’s instructions and state who they are and why they are calling. It’s not a menu system, but it gets maybe the best 30% of the effect
I don’t think the “us” in that furrie’s statement is inclusive of everyone
There is nothing you can’t uninstall on Linux. Linux distros, let alone desktop environments, really can’t qualify as bloat
There are even enough mainstream distros to let you choose one that meets your needs with little or nothing you need to trim
Lots of people will spend a few hours then several tens of minutes monthly or so finding out how and then disabling the ads after each update
Surely one could use the same exploit to restore the original boot code as the malware used to corrupt it