Spending 20k to unchain yourself from a clearly ill-meaning vendor can be seen as a good investment in itself. 5k saved in (recurring) fees is a bonus.
Windows and DOS games started working well later, as WINE and DOS emulator were evolving.
But Linux had a thriving gaming scene of its own:
- You've already mentioned Loki who made native ports.
- Another type of "ports" were game engines made from scratch that used the level files of the original, games like Doom, Transport Tycoon, Caesar III, Panzer General, Stunts, ReVolt etc. You had to own the game files but the executable was FOSS.
- There were lots of cool native games, many shooters (Warsow , Nexuiz, Cube, Tremulous), strategy games, cool arcade games (Tux Racer, Atomic Worm, H-Craft, Droid Assault), the rogue genre which debuted on UNIX and had tons of variants and so on.
I'm only a casual gamer so this is just stuff I ran across occasionally, there was probably more.
What would they use Word for? This is about submitting data in their own standard formats in tiny files.
The real crime is that they're not switching to online. Using optical discs is going to be even more ridiculous for those tiny files.
Why do you want to use Shouko? Yeah it can bulk-tag anime but it doesn't necessarily do a better job than Jellyfin with AniDB plugin. Also, it tends to hammer their API like an idiot and will get your user temp-banned or even perma-banned (depending on the size of your collection), while the Jellyfin plugin has rate limits.
I used it once when I was moving my collection to Jellyfin and I barely got my account back.
I would strongly suggest using just the regular Jellyfin plugins and adding titles to the directory in small batches and taking breaks if it stops recognizing them because it means the API is throttling you.
Yeah that's about what I had figured too, 400-600 kWh/mo per house during summer. Double that is more likely to be estimated capacity rather than actual use.
I still have Loki's port of Rune around somewhere.
For me, educational stuff was all windows with a small amount of macs and I don't think I ever saw a Linux system in actual use anywhere.
Linux systems started being common in CompSci schools around mid-90s, around the time LAMP took off (fun fact, Apache, MySQL and PHP were all launched in 1995).
Previously in CompSci you'd get to use all kinds of UNIX servers. My uni still had Solaris servers with dumb terminals, and I got my first sysadmin certification on SCO.UNIX / OpenServer.
It's obviously someone who forgot their gmail password and is trying a bunch of words to see if they remember it.
Um, why does the average Chinese home consume 1 MWh/mo? Or do they mean the battery capacity would account for one home consuming up to 1 MWh?
Many people have a warped understanding of what "two factor" means.
They conflate it with devices and they think it means that one of the factors (why one? which one? who knows) needs to be restricted to exactly one device.
What "two factor" really means is that you should have more than one required factor of authentication so that if one is compromised the attackers still can't get in.
Ideally the factors should be spread across the "something you know" / "something you own" / "something you are" categories to complicate the manner in which they can be compromised.
We can only reliably rememeber a limited amount of passwords, so like it or not we have to use some devices at least some of the time.
The trouble with "something you own" is that it can be lost or damaged or stolen, and if you only have one of it then you're fucked. So adding some redundancy is not a bad idea.
The larger issue is that everybody is stuck into extremely rigid and outdated mindsets that date back decades. "Two factors" don't have to be exactly two, and they don't have to include exactly one password, and so on. It should be fine if you wanted to secure your account with 3 passwords, and should be up to you if one of those password is a barcode tattooed on your taint so you need a mirror and to bend upside down to scan it.
Bottom line, use whatever you want and use your best judgment as to how secure is each factor. If you want to use something that syncs to multiple devices, go ahead. What you should consider is who has access to those devices and how it would affect you if they're lost or stolen.
Last I read about it it required connecting for 6-7 hours continuously on 32bit systems, and it's unknown how long it would take on 64bit.
Would be rather short-sided of them. They rely on the free tier of their services for upscaling and word of mouth. People are already wary of the fact CF can snoop on what's supposed to be private connections, but so far they've used that only for good.