Skip to main content

VR不是16年就炒过一次吗

 
Supernatural,我儿子玩beat saber, 乒乓球和壁球游戏都不错,钓鱼简单玩玩,疫情
期间,疫情期间有老人闲的在家出不去,网上虚拟钓鱼的。有几个游戏也还不错,star war三集, red matter, down rabhit hole,room vr: dark matter等等

你的是quest吗?不想花钱supernatural有一个月试用,echo vr什么的是免费的


我是疫情前办公室有oculus quest,玩了玩觉得不错,在家时买了一个玩。准备如果3
代出来升级


Comments


  1. FB 是自己迷失了方向,不搞实用的东西,大力投资虚拟的东西。
    虚拟世界 20多年前玩过一阵子。什么 Second Life 之类的
    有人在虚拟世界了成亿万富翁,有人在虚拟世界了碰到不高兴
    的东西,居然还真在实体世界里自杀了,这是让人颓废的东西。
    扎克居然要借这个头盔想让虚拟世界再火起来。让更多人颓废。

    ReplyDelete

Post a Comment

https://gengwg.blogspot.com/

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into /opt/course/1/context_default_no_kubectl.sh , but without the use of k

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checking a shared sec