That is how it works, infinite budget and student resources
Even intel is using TSMC for their latest 200 series chips. Technology is one thing, doing it at scale is another. Samsung is close but still behind.
https://www.tomshardware.com/news/samsung-says-it-will-beat-tsmc-to-4nm-production-in-the-us
Linux is really good at sandboxing and containerizing things. Not to mention the display manager/server changes from system to system and is optional.
+1 to laser for light usage. I have an HP cheapo laser setup with a cups server; everyone just hits the print server instead of needing to install drivers.
Article also says to root the phone to install custom OS rather than an unlocked bootloader.
Yes, this has been a thing for a while, just lots of old or out of date projects.
This is old but there are a number of ways to do this
https://github.com/meefik/linuxdeploy
https://computingforgeeks.com/how-to-run-linux-on-android-devices-using-andronix-app/
Copilot and ads taking up development cycles
Passkeys are a replacement for passwords, not a second factor like requiring a physical key.
Why would I reduce the number of factors and also entrust what should be something I know to a vulnerable key store.
Do I need a subscription service for this passkey supported password manager? Or I can just buy a hardware key that can be used on my phone or any device, password manager supported or not. Seems like the freedom and portability of a physical key, like a key to your home or car makes a ton of sense.
Passkeys are based on and supported by the FIDO alliance.
What options are there for migrating passkeys to a new device? Easy to lock you into that iPhone and you must use their migration tool when you upgrade. Or I just carry it on my keychain, no vendor lock in.
Tying a password to a browser or device isn’t going to make it any easier. Use a password manager and set unique string passwords for everything. If the app supports it, use FIDO physical keys instead of Passkeys
QSV is a very good product, high-quality and efficient. It’s also very mature, lots of signage in large deployments. I’ve tried AMD’s AMF streaming and at lower bit-rates you get a lot more blocking. It’s fine but QSV has an edge.
https://www.pcworld.com/article/827992/tested-intel-arc-av1-video-encoder-vs-nvidia-amd.html
If your uni asks you to install a certificate or any software on your devices, they would have access to your device. When you connect to a network they own, you can assume they’re inspecting the traffic that crosses those services. A VPN like WireGuard or OpenVPN can help to mask it.
Citation needed
ChudGPT
Your response clearly states publicly accessible DNS. A CA does not require anything public for local SSL and can work in conjunction with whatever service they want for that which is public.