When I convert cbz. files in KCC for my paperwhite, there are white pages (1-3) between each visible page. I've tried resizing, unclicking scaling, removing unused css scripts. I can't even delete the pages, because they're not really there. When opened (both on calibre and kindle) the white pages are part of one of the existing pages, and they don't show up at all on the image lists.
I've been trying to figure this out for days and google gives me fuck all.
Anybody know how to fix this?
Also, bonus questions:
I figured out how to give covers to sideloaded books, but not to [spoiler]fanfiction[/spoiler] I downloaded. Not even Calibre's generated covers show up, which I'd much prefer over Amazon's shitty default cover.
Anyone wanna help me find the graphics card so I can DESTROY the fucker?
How the fuck do I get webm to play in Safari on macOS? Someone has had to have figured this out by now, right? I just want to be able to either automatically view the webm when hovering over it (like in chrome and firefox) or have it open in mpv or IINA when clicking on it and stream without downloading the damn file. All I can find is some old ass article about using VLC web extension but it doesn't work anymore.
How do you share files between your devices?
I currently use pic related to get all my uni stuff synced between laptop and desktop.
It works fine, but I kinda feel that I need to get rid of that botnet. What are you using?
I'm out of school and work stuff stays on work devices, so I don't share or sync files much anymore. But at uni it was Google Drive. To hell with "botnet" getting my homework. It was readily accessible, easy to share/collab and access to it integrated well on all my devices. Just don't overlook local backups.
Is there a serious reason why hackers are not given more credit? It is clear that the entire infrastructure of humanity is built on haywire code and that a hacker's job is not only to build and maintain it but to be able to tear it down like spider's web.
It could all come crashing down and there would be nobody to save us.
>implying your opinion matters
alright give me the scoop, what is the catch for companies that receive money for start-ups? Something doesn't seem right to me about Y Combinator
Depends on the company. Some basically become taken over by reps for the VCs and spun into something which is meant to be gobbled up by Alphabet or Verizon or something. Founders get a healthy cut of the profit and everyone parts ways in 1-3 years.
For others, there is no catch. Investors are willing to lose their shirts, so to speak, 80-90% of the time with the hope of eventually catching a unicorn. They'll lock in preferred shares for themselves and make demands of the executives regarding monetization of the product, of course, but for them it's just a roll of the dice. A few million here and there with the hope that one will become the next Dropbox.
Microsoft already brought Windows to ARM. Why don't they bring it to RISC V so that more than just Intel and AMD can make CPUs? More competition in the CPU space benefits Microsoft, because when hardware is more compelling, more people will buy it. Or why hasn't anybody bought VIA for their x86 license so they can make laptop/desktop CPUs?
Microcontroller thread goyim
What are you working on?
I'm planning on writing a small RTOS for my AVRs. Currently lost on, how
How do I apply a machine learning algorithm to a websites code. I am learning about unsupervised learning but dont know where to find the search engine in Chromes developers tools.
Let me demonstrate with this mustard.
Will there be a day in the near future where the private social interactions between people are leaked online due to a breach on a particular social network (Facebook, Skype, Gmail...)and someone creates a searchable database for it?
Imagine going to a website and entering someone's name and a word or a string of words to search for. It would pull up conversations including those words. So, you could type "nigger" and find out easily if someone is a racist.
Is this even a possibility? The idea of this sometimes keeps me up at night particularly because I have had some pretty fucked up conversations with friends (racism, talking about disabled people, or shit talking family members.)
Am I just being paranoid?
The obstacle to this would be sheer size. That's a lot of data per active user, multiplied by the number of users involved. How the fuck is someone going to pull down THAT MUCH DATA before getting caught? And if they do, where the fuck are they going to put it where it won't get taken down?
This is only realistic for very specific, targeted breaches, and yes it would be paranoid to think that anyone cares quite so much about you in particular.
>it would be paranoid to think that anyone cares quite so much about you in particular.
Yes, I've thought about this. Logically I could understand that all of my dirty shit would only become important if I wanted to be a politician or something like that.
One of the big reasons why I left all social media is because the idea of this freaked me out but now I'm starting to see that maybe my fears are irrational, especially if I have no plans to commit major crimes or plan terrorist attacks.
Do you know how to know what size bezel to pick for a new watch?
I just picked up an Orient Mako (gen 1) black and I'd like to add a black/red bezel to it because I love the colors. I'm aware it's not a GMT watch so I may look like an idiot and I don't care because I like the fashion that much more.
Can you let me know how to know what size (like will this fit my Orient Mako? (link below))
You draw a circle of the appropriate size, cut it out and lay it on your wrist. You should already have a sense of how big your wrists are anyway.
Worst case, go to a jeweler and try on some different sizes.
I may have miscommunicated to you.
I'm trying to mod the thing to have a different bezel (round thingy that surrounds the watch face and has numbers on it like 10, 20, 30, 50). I'd like one which is red/black. Please see links in first post and help if you can!
Stop using VPNs
this should work right /g/?
>HP Z620 Workstation LGA-2011
>XEON E5-2660 8C/16T 2.20Ghz
>8x8GB PC3-12800R DDR3 1600 ECC REG Server Memory