"We are also excited to make our 2026 sponsorship packages available in May for organizations interested in enhancing their visibility with event attendees."
California is not anywhere near 83% renewable for total electricity generation. [1] Are you just adding up nameplace capacities without capacity factors?
One thing about power generation stats like these is they are incredibly sensitive to examination dates given the rapid growth of (especially) solar.
That EIA site cuts off in August. The same EIA report shows solar grew 17% from 2024-2025. You can plug in your own assumptions to the solar growth curve since then, as well as your assumptions about the natural gas curve given the ride natgas has been on since August.
EIA also produces live status on the daily generation mix[1]. 69% today was wind, solar, geothermal, and hydro. 12% nuclear, so some of this is whether you consider nuclear renewable or not.
CA's power generation may cost more, but the pricing (for raw power at least) should be a lot more predictable than those of us dependent on fossil fuels. Natural gas, for example, has undergone a ~100% price round-trip in the last 12 months.
Cox Communications used to do it in California to inject JS into sites. I remember seeing little Cox popup/toast messages in the corner of other sites.
I've said it before, but Zero Trust is such a misnomer. It implies less trust in firewalls, VPNs, and other network controls, but much more trust in the ability of end-user devices to securely store and use private keys. Also, the server side has has to trust all incoming connections from the Internet enough to verify the certificates, and run a complicated TLS implementation, which can be a huge attack surface. We're sticking with WireGuard for all our internal users.
Unless you're storing your wireguard keys in your TPM somehow, what stops malware from just copying the keys out and connecting? Are you IP whitelisting every employee's house or what?
I'm using Firefox on a Linux workstation (without Tor) and I still got the CAPTCHA. The statement "blog.adafruit.com needs to review the security of your connection before proceeding" is misleading at best. Shame on Cloudflare, this kind of dishonesty makes me not want to trust your RCA marketing pieces.
In addition to Cloudflare's usual nonsense (e.g., give us all the cleartext because reasons, and also unblock our bad-UX code that doubles as an additional tracker), it looks like Cloudflare here might also be blocking Tor exit nodes (either proactively, or in response to detected abuses from those addresses).
reply