i continually rotate the angle of the cutted object so that there is more force concentrated at a smaller impact area.
also when i start reaching the end i progressively slow way down. by the time i reach the nub i am either cutting with conventional knife or just slowly forcing the last bit through.
kinda sucks because its supposed to be fast.
i think what this redd subb is saying is that unless a person is involved in a stateoftheart/research project.. the software isnt really valuable on an everyday basis ( compared to just using professional software that is the product of new research )
kinda demoralizing(in this context).
it would be cool if he could FOSS his way out of this one.
if u havent realized:
lemmy tends to be significantly more appealing/valuable to some niches that have strongly established,enthusiastic, talented userbase (such as tech ppl).
it's a minor satisfaction boost but beneficial. if maybe u dont fullheartedly believe in the lemmy mission(free nonprofit decentralized platform), then it seems, additionaly, less satisfying
to build up other unique /c/'s requires: initiative, light work/time, [and usually..] motivation to post.
i personally [tend to..] only post or comment on things im interested in. sometimes thats only linux and android.
when a site like reddit is ranked top site on the inrernet. everyone can be lazy and contribute once a year and thats still more than enough(when u consider scale). there are also a shitton of negatives to that. but they are ignored and swept under the rug.
reddit is driven by primitive monkey brain attraction as shown through popularity.
perhaps subs make the addiction more finely tuned to similarly minded peeps.
lemmy has less than infinite content and a less mainstream non-[purely]hedonistic culture.
although unfortunately:
"Forward secrecy is designed to prevent the compromise of a long-term secret key from affecting the confidentiality of past conversations. However, forward secrecy cannot defend against a successful cryptanalysis of the underlying ciphers being used, since a cryptanalysis consists of finding a way to decrypt an encrypted message without the key, and forward secrecy only protects keys, not the ciphers themselves.[7] A patient attacker can capture a conversation whose confidentiality is protected through the use of public-key cryptography and wait until the underlying cipher is broken (e.g. large quantum computers could be created which allow the discrete logarithm problem to be computed quickly). This would allow the recovery of old plaintexts even in a system employing forward secrecy. "
too lazy.
i love google.