With a large form factor phone in my pocket, I have access to millions of books right away. When I’m not reading an ebook I’m probably listening to the audio version instead, because I need my hands and/or eyes for something else.
With a large form factor phone in my pocket, I have access to millions of books right away. When I’m not reading an ebook I’m probably listening to the audio version instead, because I need my hands and/or eyes for something else.
I had to look up Blinding Lights, and I don’t recognize it. I know the others from that list (whether they fit the criteria or not).
IIRC people with older devices have found that replacing their battery does not significantly help, becathe replacement battery was manufactured at roughly the same time as the device it goes into, and has degraded over time even without use. This is anecdotal of course, but seems reasonable to me.
Some short browsing appears to indicate that batteries can last for years of stored properly, but how does one verify if the replacement battery in their phone was really stored appropriately?
Amazi-girl!
It does work on anything but “everything” as far as I can tell, however. If I’m looking at an instance, filtering communities does nothing.
I haven’t been able to find a way of viewing where filters work at all. Are they broken, or do they only work in specific circumstances?
I got the reference, and it amused me.
I miss what’s wrong with your dog. And dogberg.
Great comment. I ran dd-wrt for years, but finally picked up a used Ubiquiti router and purchased the Eero Pros for wifi. Software does the security now.
That helps, thank you. I am thinking pancreatic cancer would be in this category. That’s horrible stuff.
Somebody explain what solid tumors are.
Authentication methods in Entra ID (which is presumably what we are talking about as the identity provider) include Microsoft Authenticator and software otp.
Authenticator is push authentication, as described elsewhere here. If for some reason you’re not getting push notifications, you can use an OTP code instead, but this still requires that you have push authentication configured in Microsoft Authenticator.
You can only use Software OTP in other applications if your administrator has explicitly allowed use of Software OTP as an authentication method, and also excluded you from being required to use Authenticatior - otherwise Authenticatior would always ‘win’ as choice of mechanisms because it is more secure.
Several states in the USA require that employees who are made to use their personal phone for business purposes be compensated. The enforcement method and process for requesting same is naturally very obscure.