Re: Half Life 3
on which note:
Duke Nukem' 5 will be released with AI content, where all dialogue and imagery has been generated by OpenAI, on the fly, based on your browsing history.
186 publicly visible posts • joined 1 Sep 2009
and weirdly; I'm pretty sure that that wouldn't be banned, as it's not a single device ...
I can see the next step being forcing the carriers to identify/triangulate non-moving sims in high numbers in a very localised area, so as to identify potential breaches ... would make the police's job of finding potential ne'er-do-wells, by catching them potentially on the "SIM farm" law, which is an easy Boolean law, rather than cold calling which is harder to prove ...
I'm not 100% sure how stopping sometime buying something from you, so that they run AIs/LLMs slower counts as "national security", but each to their own.
I'm guessing that national security also means that it's not good enough just to do well by yourself, you have to keep the other guy down!
mIsUSE of language models like LLMs IS a SIGNificant CONcern, LEADING to an INFlux of maLIcious AND misleading CONTENT. ReLYING solely ON reSPONsible USER beHAVior isn't SUFFicient, conSIDering THE scale AND speed at WHICH these TECHNOLOGIES operate. DIFFerentiATING between HUMAN-created AND alGOriTHMIC CONTENT becomes CHALlenging, ERODing TRUST. adDRESSing THIS necessitates reSPONsible USE, eTHical GUIDELINES, platform INTERvenTIONS, AND poTENtial REgulation. TRANSpaRENCY, media LITERACY, CRITIcal THINKing, AND colLABoration ARE KEY TO miniMIZING THE NEGative IMpact OF LLMs AND fostering REsponSible USE IN this HYPER-empowered ERA.
(so says ChatGPT ... with a little prompting)
AD integration, SAML connections, GPO functionality, COTS desktop apps with only for Windows, Office and Azure apps (yes I prefer LibreOffice, but we're talking corporate here, and there's lots of Azure connectivity apps not yet ready for Linux), hyper v images (allowing migration to the Azure cloud), user/automated patching ...
Easier to get support staff for Windows, easier access to training, common platform, most likely the same desktop they use on their home computer ...
Don't get me wrong, I'm a UNIX/Linux guy at heart, but there are good solid reasons for running a Windows server and desktop system
While I spent years convincing systems to use pure lp or lpr, cups does have its uses.
In the world of label printers you do need to set the queue up in "raw" mode though, although it's not a standard model, and it's really hard to get it to do it on a Mac ... and don't get me started on Windows printing to labels! Sacrilege!
This is meant to make scrupulous Certificate Authorities not generate a certificate unless it's in an allow list, but could easily be deployed to make sure only the correct authority has authorised a certificate ...
I was told by an old friend of mine who used to work in manufacturing/milling ...
They had a lot of grinding/drilling equipment.
He was on the shop floor drilling as usual, with the "old reliable" (set to "3") when the CEO decided to tour with his young whippersnappers.
One keen eye'd kid saw the machine set to "3" and "instantly realised that if it ran at 10 that the whole system would be more productive and efficiency could be improved".
He informed the CEO, and berated the guy operating the machine about how inefficient he was being
My friend stepped in to replace the guy operating the machine. My friend tried to explain why it was only set to "3", but kept being cut short. The CEO stepped in, and the machine was indeed turned up to "10"
My friend (wearing all the PPE he could) started to use the machine as it destroyed itself in about 3 seconds, with metal bits flying all over the place and drills embedded in the wrong places.
Apparently old machines don't like to be run at their maximum, and the new kid cost the company a couple of months on that machine, and potentially a lawsuit, if my friend hadn't known what would have happened and made sure it was him operating it ...
the red faces were almost worth it ...
You can only hope they "live and learn"
I doubt it's impossible for this to happen in Chrome, I'm guessing that it was just a few steps easier when you can see inside the black box.
If you want a VPN, you need to trust someone, or you need to have your own VPN that you control ...
If you're willing to trust Mozilla, then this is probably as good as any, but it all comes down to how much you trust them now, and also how much you will trust them in the possible future ...
For me, if I'm on a private network that I control I will not use their VPN, if I'm on any other network I'll VPN to my private network ...
*cough* software raid boot disk, with almost no hassle *cough*
Another amazing feature of it on the desktop is the compression out of the box ... The Lz4 compression used has been proven to take less time than not compressing, as the algorithm is so quick ...
Ddrescue or similar to a file and find out that it only takes up the space of the used data, automatically compressing all the blank space.
While most of what you've said is true, dockers are not containers, they are completely different things that appear on the outside to look similar. containers allow resource limitation on a scale that dockers don't ...
And while systemd works, I recall (I can't find the references) that there was a linux guy who reviewed the code from OpenSolaris and referred to it as a "battleship" compared to our "rowing boat" ... (he went on to say that he didn't think that Linux needed or wanted a battleship)
Oracle were porting Dtrace to their Oracle Solaris, but I don't believe they have / certain that they haven't released it to the wider community.
That said, Linux USB support is much better and more resilient, and support for hardware means that I can run it on this laptop ...
almost every transaction I have had with them went along the lines of:
Me) I have a problem, here is the problem.
Them) I don't think you have a problem, are you sure?
Me) yes, here is even more supporting information
Them) yes you do seem to have a problem
Me) Hmm ... I've just been checking and I've found this work around
Them) that's good
Me) Okay you may as well close this ticket, as it's been 3 months already, and you've not provided me with any more information.
Absolutely, low hanging fruit and all that.
It's the same reason you shred all your financial documents (and letters from school, and Virgin, etc) so that it's hard to get information from them ... you can't stop a really determined person getting data back from shredded paper, but if someone else has non-shredded paper with all the details you want on it they will go there first.
1 month to transfer to Unix just won't cut it, and certain applications and protocols cannot be replaced by Linux counterparts.
Our accounts department uses windows software (does anyone know an accounts department that uses non windows software? Seriously if we can find a good package to work with I'll suggest it to the board!) We replaced their desktop computers with "SunRays" using RDP to connect to a windows server (2008 R2) running the Windows software for the TAS system. We have ripped apart the TAS system so that it works on a Linux server with a PervasiveDB Linux installation ...
anyway I'm not sure where I was going with this, but suffice it to say, we're a big unix/linux house and even then there are applications that we cannot get off of Windows, even with all the time available to us.
It isn't licensed for product evaluation, and it's valid to run it inside a company.
their terms for the extension pack are pretty good, in this case it's personal use if it wasn't installed by an administrator, or installed by default on lots of machines.
So if you run it at a company, get the users to install it themselves and you're quite legit.
If you're a big company then you can afford the small price for it if you need it :)
It wouldn't surprise me if the figures were related to how much/how often the systems were patched.
I know for myself that in general we don't patch the Solaris systems we're using, we firewall the f*ck out of them, and only start services we know are going to be used. We have Solaris systems that have been untouched for over 10 years, but they're still doing the job they were supposed to, and aren't facing the outside world.
If a system is inherently more secure, with very low visibility and very low attack vectors, on an operating system that few use, is it not unexpected that the hackers will be going for the lower hanging fruit?
I remember the time when my boss was running Windows 98 (windows xp had recently come out), and there was a virus/security warning put out that Microsoft released a "test" for.
We downloaded the test and ran it ... it said something like "Congratulations you are not susceptible to the threat, have you considered upgrading to one that is?"
Agreed ... When I can get the source, compile it, run it on my own trusted systems, develop on it and run my apps from it then I will consider moving them to the AWS if I don't want to worry about them running in the future, and have no concerns over the information stored in them.
I won't be happy using this system for anything enterprise until I can do all of that.
History and Evolution seem to point to the fact that it's not the animals/objects that are ideally suited to their environment that improve ... you need to take a step back and look at it from a different angle, from a small branch of the tree/code and look at making it better, while leaving the original intact ...
If there is no champion of the Labs, it will not succeed, if they bring labs in house it might be quicker at reacting, but it will not be able to produce things that are not seen as core to the browser, at least not core at the time that they are thought up ...
just my 2cents.
In the days long ago when we used to use "Pegasus Mail" almost all of the icons in our company were labelled "Horsey" ...
I forgot about this for a long time, when one day I was helping someone on a support call and I asked them what email system they were using (we were transitioning to Thunderbird at the time) ... there was a pause at the other end of the line and then a very sheepish "Horsey" was announced ... I have to say that that really made my day :)
I set up a facebook account to see pictures my family uploaded online. I turned off all notifications and all emails, I don't want that stuff
My brother invited me to his sons christening on facebook.
I didn't log in to facebook until the day after the christening, missing the entire event.
He didn't get it when I told him that I have email, 3 phones and a physical address that he could have sent the invite to; why did he have to use facebook as the only medium ...
He's my younger brother, so I guess I'll just have to leave it at that ...
It looks like this is an activate each time type of thing, the power it uses to give out the drug appears to come from the wifi signal ...
The 2 problems I can see with it:
1) if it's manually delivered (or automatically delivered by a specific device) you have the chance of it not being delivered, or not getting the signal from the device, and therefore not activating.
2) You could receive a major dose (problematic?), and then not have any of the drug available in the future ...
"Foolish to compare sw based, all flash, and "select" hybrid arrays"
maybe so, but looking at the Nexenta Blog (that shows the IOPS in it's graph) they appear to be performing at least as well per desktop ... only Violin and Sanbolic scored higher (the Gartner post shows different numbers in the IOPS in which GreenBytes also does well)
As for the Nexenta SW based RAID, I know they're using ZFS, which if placed on systems with enough memory can outperform hardware RAID based systems, especially if they're using SSD ZIL.