you gotta indoctrinate them while they’re young & impressionable so that they will more easily accept your biases as reality;
Lol and social media companies are just such complete white knights too and would never engage in such tactics.
I’m a technical kinda guy, doing technical kinda stuff.
you gotta indoctrinate them while they’re young & impressionable so that they will more easily accept your biases as reality;
Lol and social media companies are just such complete white knights too and would never engage in such tactics.
Train your LLM better.
You didn’t go to the library in the '80s and watch a DVD of a documentary to get the information you wanted.
So this is the concern I have with letting LLMs do all the heavy lifting. You’ve put in a nice summary of how we should be using LLMs and then here’s a glaring anachronism. So now that I’ve spotted that, should I take any credence in whatever else you’ve said?
Not really, it’s just phrased differently to the usual signup pitch, they’re putting in a middle ground between full “premium” subscribers (whatever that is) and public access with tracking and ad metrics.
Companies need revenue to operate. They get that revenue from advertising data and selling ad slots, or subscriptions. Whether they actually cease all tracking and ad metrics when you subscribe is something I’d doubt though, and that could be a case for the legal system if they didn’t do what they claim.
Personally, this behaviour is the point where I would not consider the site to be valuable enough to bother with.
“ChatGPT, write a letter to the community that says I am looking after this issue with untrusted BLOBs and it is of high importance but do not be specific about anything.”
Mainly the issues are about providing ~600 kilowatts for 8 minutes to charge your typical size EV battery.
A row of 5 chargers of that size soaks up 3MW if they’re all in use, and that’s not something that can be quickly or easily shoehorned into a suburban electricity grid.
It’s about 500 houses worth of electricity usage, for comparison. For just 5 fast chargers.
Not to say it’s impossible, but infrastructure doesn’t come cheap, and so it’ll cost quite a bit to cram that 80 percent charge into your car’s battery.
Well this seems to go against all sorts of disaster recovery practices, so I’m torn between believing they are truly incompetent or they are just lying.
Something like a raspberry pi or equivalent, and use reverse SSH set up to connect to a server with a known address on your end.
This means that ports don’t need to be opened on their end.
Also if you go with a gateway host, shift SSH to a randomised port like 37465, and install fail2ban.
I want a music playing alarm app that’s permanently locked to Sonny and Cher’s , “I got you babe”.
What I’m asking is how tf did text messages and whatever in the walkie talkies ignite a spark strong enough to ignite the PETN?
Pager with firmware that activates an output on date/time X/Y and triggers an ignition signal. That signal is sent o an actual detonator in the device, which sets off the explosive.
Radio with DTMF receiver that activates an output when, for example, touchtone 4 is received over the air, or alternatively if the radio has GPS, another date/time activation via firmware.
Both of these things are relatively trivial for a nation-state to pull off.
So yes, in both cases it’s possible that faulty devices are still around. However, if all the rest of your group has had exploding pagers and radios, most people in the same group would have dropped their still-working pager or radio into a bucket of water by now. There’s probably a few, and they’re probably being carefully taken apart right now to see how it was done.
Afaik such an idea was nonsense previously.
It’s not nonsense, it just takes planning and resources. And now that people know it is possible, buying and using any sort of equipment for your group without having the nagging concern there might be a bomb in it is impossible. And that’s a pretty powerful limiter.
There’s a lot to be said for “http://yourISP.com/~username” being available 24/7 at no particular effort to you.
90% of users when they are presented with the UAC popup when they do something:
“Yes yes whateverrr” <click>
I’ve got photos in Flickr dating from 1999 onwards. Ten thousand or so of them, and a couple of the early ones are now corrupted.
But they are my “other backup” for Google photos so I don’t mind too much. I also have a USB Blu-ray drive at home that I use to periodically burn M-Discs that I hand out to a few relatives.
That’s about as good as I can conveniently do for backup, and it’s probably better than the single-point-of-failure box of negatives that my parents have in their cupboard.
when they’re powered down.
There’s no periodic cell refresh in flash memory like there is in DRAM. When USB sticks are plugged in, all you are doing is powering up the flash chip and interface ICs.
You’d have to read a block then write it back to actually refresh the stored charges in the cells.
I don’t think there’s anything commercially available that can do it.
However, as an experiment, you could:
You could probably/eventually script this kind of operation if you have software that can automatically identify and group images.
There was a series of books in the '80s where a systems programmer gets pulled through a portal into your typical magical world, good vs evil, etc.
They subsequently look at the magical spells in use and realise they can apply Good Systems Programming Practices™ to them. And thus, with their knowledge of subroutines and parallel processing, they amplify their tiny innate magical abilities up to become a Pretty Good Magician™. So while all the rest of the magicians basically have to construct their spells to execute in a linear fashion, they’re making magical subroutines and utility functions and spawning recursive spells without halting checks and generally causing havoc.
It’s quite a good allegory for modern times, where a select few build all the magic and the rest just have useful artefacts they use on a day to day basis with no idea how they work
Yeah , it’s really a little strange in OPs case, I can’t really recall changing a CMOS battery in ages, like decades of computer use.
Conclusion: just replace the CMOS battery on a yearly basis during planned system downtime.
I work in OT. The number of “best practice” IT mantras that companies mindlessly pick up and then slavishly follow to the detriment of their mainly-OT business is alarming.
Make your own damn best practice that suits your business best, don’t copy and paste something from a megacorp. Sure, include elements from megacorp’s best practice if they are applicable, but don’t be a slave to the entirety of it.
Send them a letter via registered mail stating that upon receipt of said letter they waive their right to waive your rights.
Windows with auto login? Not really. That is, anyone with a mouse + keyboard locally can get in there.
You can set up jellyfin to run as a windows service and then it should auto start and run as a particular user without you having to log in. Have a look in the “advanced” section in the jellyfin docs.