cultural reviewer and dabbler in stylistic premonitions
I really don’t get how its different than a search engine
Neither did this guy.
The difference is that LLM output is (in the formal sense) bullshit.
deleted by creator
also: The Oyster was an erotic magazine published in London in 1883
Upload bandwidth doesn’t magically turn into download bandwidth
Actually, it does. Various Cable and DSL standards involve splitting up a big (eg, measured in MHz) band of the spectrum into many small (eg, around 4 or 8 kHz wide) channels which are each used unidirectionally. By allocating more of these channels to one direction, it is possible to (literally) devote more band width - both the kinds measured in kilohertz and megabits - to one of the directions than is possible in a symmetric configuration.
Of course, since the combined up and down maximum throughput configured to be allowed for most plans is nowhere near the limit of what is physically available, the cynical answer that it is actually just capitalism doing value-based pricing to maximize revenue is also a correct explanation.
The tone which comes across in the video (linked from the other post I linked to in this post’s description) is unfortunately much less amicable than this article conveys.
the guy speaking off camera in the linked 3min 30s of the video is Ted Ts’o, according to this report about the session.
That label is there because I’m subscribed to XBlock Screenshot Labeller and it misclassified this image. (You can find here and here more info about how labelers in ATP work…)
i hope you’re joking but if you’re not i assume you live in the bay area? if you want to go to their pitch tonight, here’s its eventbrite.
That pin can be found for $30 or $35 on on ebay here and here, where it is described as being from the 80s and as an “employee pin”.
I was thinking that this might have been something aimed specifically at technology buyers in US schools in the 80s or 90s, to whom Apple offered substantial institutional discounts in a (relatively successful) effort to dominate that sector. However searching the phrase “does more costs less” i found this TV spot advertising the Quadra 605 which at $1000 was the cheapest computer Apple sold when it was introduced in October 1993 (and allegedly cheaper than something else they refer to as “PC Leading Brand” 😂). That system was sold under the LC and Performa brands up to 1996, but it was only sold as a Quadra until October 1994, so, to answer OP’s question: that slogan was in use at least sometime in that year.
If copyright holders want to take action, their complaints will go to the ISP subscriber.
So, that would either be the entity operating the public wifi, or yourself (if your mobile data plan is associated with your name).
If you’re in a country where downloading copyrighted material can have legal consequences (eg, the USA and many EU countries), in my opinion doing it on public wifi can be rather anti-social: if it’s a small business offering you free wifi, you risk causing them actual harm, and if it is a big business with open wifi you could be contributing to them deciding to stop having open wifi in the future.
So, use a VPN, or use wifi provided by a large entity you don’t mind causing potential legal hassles for.
Note that if your name is somehow associated with your use of a wifi network, that can come back to haunt you: for example, at big hotels it is common that each customer gets a unique password; in cases like that your copyright-infringing network activity could potentially be linked to you even months or years later.
Note also that for more serious privacy threat models than copyright enforcement, your other network activities on even a completely open network can also be linked to identify you, but for the copyright case you probably don’t need to worry about that (currently).
democracy dies in dark mode
adding all compiled file types including .pyc to .gitignore would fix it
But in this case they didn’t accidentally put the token in git; the place where they forgot to put *.pyc
was .dockerignore
.
At my workplace, we use the string @nocommit to designate code that shouldn’t be checked in
That approach seems useful but it wouldn’t have prevented the PyPI incident OP links to: the access token was temporarily entered in a .py
python source file, but it was not committed to git. The leak was via .pyc
compiled python files which made it into a published docker build.
wikipedia articles about him have been deleted twice:
python -c 'print((61966753*385408813*916167677<<2).to_bytes(11).decode())'
$ python
>>> b"Hello World".hex()
'48656c6c6f20576f726c64'
>>> 0x48656c6c6f20576f726c64
87521618088882533792115812
$ factor 87521618088882533792115812
87521618088882533792115812: 2 2 61966753 385408813 916167677
i guess maybe if you’re using a device with a tiny screen and a lemmy client that doesn’t let you zoom in on images
This video is full of jarring edits which initially made me wonder if someone had cut out words or phrases to create an abbreviated version. But, then I realized there are way too many of them to have been done manually. I checked the full original video and from the few edits i manually checked it seems like it is just inconsequential pauses etc that were removed: for instance, when Linus says “the other side of that picture” in the original there is an extra “p” sound which is removed here.
Yet another irritating and unnecessary application of neural networks, I guess.