Just put Dot as GM, she can keep the brothers in line.
I’m David. I live in Tacoma, Washington. I do square foot gardening, home automation with Home Assistant, and have too many cats.
You think you saw me behind some ferns? You just might have!
Just put Dot as GM, she can keep the brothers in line.
There are a couple ‘Other - Please Specify’ fields I definitely filled out with ‘Do not do AI’.
I get the joke, but with no prior context it’s kind of a jerk move to assume the player already opened it if they asked for a perception OR an investigation. A Mimic would normally just ambush you OR attack when the player opens them. If it was opened it’s probably already attacking, and if it was closed then performing a perception shouldn’t cause initiative until rolled (if the mimic noticed you noticing it, for instance).
I’ll…I’ll crawl back into my dingy nerd tavern now…
Supply chains are literally chains of suppliers, e.g. vendors. Your ‘simplest electronic product’ could absolutely be constrained by whom you choose to work with.
If your vendor locks you into buying from a certain source, and their vendor requires the same, and so on up the chain, how would you describe that dynamic to differentiate from a single vendor being the point of restriction?
To your point that the phrase didn’t exist, here are three supply-chain oriented papers that directly reference the phrase: This paper is exploring the social dynamics of buyers and sellers:
Lock-in situations in supply chains: A social exchange theoretic study of sourcing arrangements
Specifically, we believe that the examination of lock-in situations between a manufacturer and its supplier, i.e., instances where for all intent and purposes, one party is heavily dependent upon the other party, with few alternatives, under social exchange theory, can provide new insights into controlled self-interest behaviors (e.g., strategies) in on-going supply chain relationships.
This paper is about supply chains in plastic management, but the phrase is here:
Business models and sustainable plastic management: A systematic review of the literature
Barriers frequently mentioned were high costs, complexity of new systems, supply chain lock-in and low customer buy-in.
And here’s a paper about optimizing your supply chain where it is referenced as something to avoid:
Orchestrating cradle-to-cradle innovation across the value chain
This one even has a handy definition:
Supply chain lock-in:
Contracts and strong dependencies with suppliers not supporting circularity (e.g., either due to non-willingness or lock-in in production facilities optimized for linear concepts).
I suppose if you would like to be super extra pendantic Wikipedia does have you covered with “Collective Monopolistic Vendor Lock-in”.
Try another search engine: https://xo.wtf/search?q=what+is+supply-chain+lock-in
Can you share what the final desired goal is? It sounds like your goal is actually to provide your services to Bob securely over the internet, is that a fair description? You mentioned eventually grabbing a domain, how do you feel about publicly exposed services with authentication? For instance, I use authentik in front of Jellyfin and paperless myself for a little extra authentication juice.
It sucks, but as someone who hosts their own services and supports business clients: If they have a budget, Office365 all the way. Does it suck paying money to M$? Oh hell yeah. But it’s a ‘cost of doing business’. Don’t screw around if they can afford it, just go O365 :(
This particular ‘elder god’ is more of a mantle, you see. This entity does wield great powers, but is also beholden to a horrible and cursed collection of duties. During the summoning, they accidentally, somehow, kill this elder god; due to the nature of the summoning they must now assume his mantle and fulfill his obligations, with all that entails, lest the cosmos fall. A Satan Clause, if you will.
try pfizer/poppy-lrud-normal-128, run it straight offff your neural chip and feed it 1 GB RAM you’ll be gud2go
Don’t worry, the authorities already have the slightly less convenient way to backdoor things. Why make a fake release when you can just include it in the real release for the price of just a little coercion?
You may be interested in https://github.com/blastbeng/subtify Disclaimer: I’ve never tried it, just saw it recently on The Forbidden Site
Yeah, you might need some combination of fail2ban for rude AI and cloudflare caching or something.
I feel very positive about this, Mongoose seems to have done a good job with their Traveller stewardship so far.
I imagine Autumnal Damage would be similar to winter arriving in Bone, but with falling leaves.
Looks really cool. I’ve been working on implementing SSO through Authentik for every home lab service that supports it (Like Proxmox!) Do you think you’ll add SSO/SAML? If you do, I recommend not locking it behind the enterprise plan to encourage adoption.
Symfonium can create playlists and push them to Navidrome. It’s got great import/sync options.
That was an enjoyable read!
Well mySQL certainly is not, I judge this to be a correct statement!