It’s a server that hosts map data for the whole world, and sends map fragments (tiles)as pictures for the coordinates and zoom levels that clients request from them
It’s a server that hosts map data for the whole world, and sends map fragments (tiles)as pictures for the coordinates and zoom levels that clients request from them
Are you talking about Nginx Plus ? It seems to be a commercial product built on top of Nginx
According to the Wikipedia article, “Nginx is free and open-source software, released under the terms of the 2-clause BSD license”
Do you have any source about it going proprietary ?
It’s still available in Debian’s default repositories, so it must still be open source (at least the version that’s packaged for Debian)
There have been some changes in a few recent releases related to the concerns I raised :
In my experience, OnlyOffice has the best compatibility with M$ Office. You should try it if you haven’t
Why do you trust NordVPN more than your ISP ? Is your ISP known to be especially bad ?
2 years ago was already amazing for someone who tried to play CS 1.6 and trackmania using wine 18 years ago
I started working on a PR right after cross posting this.
Since I believe this is mainly a documentation issue, I’m trying to gather some feedback on this guide in parallel of submitting the pull request in order to have it merged into the official documentation
The closing parenthesis got caught into the link (at least with my client), turning it into a 404. You should add a space
I don’t game that much on pc anymore, but this reminded me of this post about Linux gamers providing good bug reports.
The worst thing about eclipse I’ve had to deal with is its git integration. The conflict resolution tool is awful and half the terminology diverges from plain git.
The fact that it has a “Push & Commit” button also drives me mad far more than it should
As usual, I subscribed for the giggles and I keep getting dragged into unsolicited rabbit holes of useful knowledge. Thanks for being an awesome community
From what I understand, TPM is “trusted” because of the fact the secrets it contains are supposed to be safe from an attacker with hardware access.
This is what makes it good at protecting data in case of a stolen laptop. This is also what makes it good at enforcing offline DRM or any kind of system where manufacturers can restrict the kind of software users can run on their hardware.
I did not read the link, but two of my biggest concerns do not appear in the summary you provided :
(Edit: typo)