The fact that they don’t go for any of the ways to manage access to porn that are more effective and less invasive of privacy suggests that the point is, as always, surveillance and not protecting children from porn.
The fact that they don’t go for any of the ways to manage access to porn that are more effective and less invasive of privacy suggests that the point is, as always, surveillance and not protecting children from porn.
Used Pixel 6, 6 Pro, 7 and 7 Pro can be found for reasonable prices these days. One of those in good condition would be a better buy because you’ll still get security patches for a while. Last time I looked, the third party OSs for Pixel phones only supported them for as long as Google did.
There’s more information about the components of this system here:
There really isn’t much to this Holesail project - it’s a little convenience wrapper around Hyper DHT and that’s a part of this Pear project it seems. That site has a list of the various components and links to each one’s GitHub.
Pear looks like an interesting project but I haven’t looked through the details of how it works.
Great that they’re using the GPLv3 license too.
I wouldn’t expect it to benchmark well, but it’s good that they’re making this available so developers can explore RISC-V on a good quality platform.
The last Windows that had any MS-DOS in it was Windows ME, a quarter of a century ago. Everything since then has run on the NT kernel.
I guess they say it each time they’re caught not prioritizing security. Then back to management as usual, prioritizing bullshit new features and marketing over security and bug fixes.
I think the main take on this is to learn the lesson that it is not safe to install random software you come across online. Is this lesson new, though?
I think people often have a vaguely formed assumption that plugins are somehow sandboxed and less dangerous. But that all depends on the software hosting the plugin. There was a recent issue with a KDE theme wiping a user’s files which brought this to light. We can’t assume plugins or themes are any less dangerous than random executables.
Why does it have a picture of Google’s CEO?
The fans will lap it up and all those Apple YouTubers will gush about how Apple’s new invention is the best invention ever. Apple has the advantage of owning a cult.
All malicious extensions detected by the researchers were responsibly reported to Microsoft for removal. However, as of writing this, the vast majority remains available for download via the VSCode Marketplace.
Ah, the Microsoft tradition of always having the wrong priorities.
Because they’ll add it to the list of coercively and deceptively worded questions they force you to answer before you can use a WIndows account, phrase it so as to sound useful and harmless, and have a big friendly “Sounds great!” button and a tiny “No thanks, I prefer my life to be shit” link.
It’s hilarious – and also a bit sad – that Tan and his ilk assume that someone must be paying me to write. They apparently cannot imagine any human motivation beyond money. It does not occur to them that a person could simply be inspired to action because they care about things like community, democracy and truth.
See also: “if people weren’t under threat of unemployment ruining their lives, they wouldn’t be motivated to work.” Many right-wingers seem to have no conception of being motivated to do something because it’s good to do.
On the other hand you can just call wherever you end up the destination, and no one can prove you wrong. 100% success rate.
I’m using GitHub Copilot and haven’t dug into the license. It’s possible I’m technically handing all my code over to Microsoft.
I hear Pluto’s nice at this time of year.
These things cost money to run, so how are they offering it for free? Who’s paying for it? How do they profit from our using it? What’s the catch?
Edit: Someone else here found that the license basically means all the code you write with it becomes theirs. Seems like we found the catch.
Neuronal firing is often understood as a fundamentally binary process, because a neuron either fires an action potential or it does not. This is often referred to as the “all-or-none” principle.
Isn’t this true of standard multi-bit neural networks too? This seems to be what a nonlinear activation function achieves: translating the input values into an all-or-nothing activation.
The characteristic of a 1-bit model is not that its activations are recorded in a single but but that its weights are. There are no gradations of connection weights: they are just on or off. As far as I know, that’s different from both standard neural nets and from how the brain works.
The trick with Android phones, I’ve found, is to charge wirelessly whenever you can. Otherwise the USB port does wear out quickly.
That one depends on the company installing it. When I got it installed they asked me exactly where I wanted the fiber to terminate and ran it through the house to an outlet under my desk. So let them know and they might put it where you need it.
As for the router, I recommend buying a mini PC with at least 2 Ethernet ports and 4GB of RAM and running OPNsense. It’s great and will give you all the control you need. Or you can repurpose any old PC you have lying around and just add some Ethernet ports on a PCIE card.