Either phishing (send fake link, get you to enter password), or someone messing with you by signing up with your email
Either phishing (send fake link, get you to enter password), or someone messing with you by signing up with your email
Using Linux with obscure hardware (CNC mills, chromatographs, etc) is a bit like punching yourself in the nuts, but still free.
Computers can really just do two things: copy data and do math. Anytime your your doing anything but copying data verbatim, there is math involved. Anytime your reformating, filtering or acting on data their will be some math involved.
Take displaying an image: you can’t just copy image data to the screen, because it could have a different resolution, or color space, or be compressed. In all of those cases, you will need to do a lot of math to get things to work right.
The exact math varies, in graphics, CAD or geospatial stuff, expect a lot of geometry. Any sort of statistics or classifier is going to involve a lot of linear algebra. Even simply storing data in s quickly accessable manner involves quite a bit of math.
Just add a delay that pads it out the execute time to 10 seconds. O(1) ez.
It’s just scammers trying to cash out. They know Elon has a large (and gullible) following, many of which see him as as trustworthy and a super good business man, making them easy targets.
It ends up as the usual, a scam investment promising huge returns, but of course they just run away with your money.
It’s fundamentally the same scam they use to hack accounts, posing as a rich sponsor and tricking the youtuber into downloading malware that steals their account.
Doesn’t everything do this? If someone gets access to your hard drive, your fucked anyways. AI chat logs are about the least problematic thing on there.
Looking at the logs if my Stable horde worker, more then half of requests made were to generate porn. They’d be shooting themselves in the foot regardless of if the filter worked as intended.
Randall did the math on this one: https://what-if.xkcd.com/31/
He assumes 64 GB microsd cards, if you use 1 TB ones, you could send 16 times more.
Easiest and most secure way? Mail (or hand deliver) a flash drive. That’s how they transfer data between super computers and data centers. (AWS even has dedicated trucks to do it)
No one’s gonna talk about how they turned referral links into a piramid scheme?
Get a display case and put a note with the story on it. That way it’s clear its being kept from historical/sentimental value and not because you like Nazis.
Hot take, C is better then C++. It really just has one unique footgun, pointers, which can be avoided most of the time. C++ has lots of (smart)pointer related footguns, each with their own rules.
Fake nudes of real people are generally illegal, regardless of if the nude is real, or photoshopped, or AI generated.
People have been arrested and convicted for AI porn of real people.
For now convictions seem to be confined to people who have already created/used more traditional CSAM (hidden cameras). This could just be because it is hard to catch someone simply generating images, so if someone with no record would be jailed for just fake nudes remains an open question. Fake nudes of fictional people are also very much an open question. Being very new technology, new laws have yet to be made, so feel free to write to lawmakers about where the line should be.
Seriously, what did he expect? The first thing you learn before getting a gun is to never assume a gun is unloaded or safe, even if you just checked it. Never point a gun at anything you do not want to shoot. As always, safety rules are writen in the blood.
I think it is highly unlikely someone gave him a gun without going over the basics of or of him intentionaly ignoring safety rules for the video.
Like a kid trying very hard to sound like everyone else. “Eloquent bullshit generator”
Well first off, how nice/tolerant is your management? Do you have savings? Some companies can fire people over this stuff, other will just ignore it.
The easiest (and least likely to make anyone mad) solution would just be to bring in your own machine and use celular internet. This way your setup will be completly seperate from the company network, and they can hardly claim you were exposing them to malware or anything. On the other hand you might have problems accessing devices like printers without copying files back and forth (are USB drives allowed?).
Making decisions is the whole point of repesentives. If you don’t like their choices, don’t vote for them. Unfortunately, most places use first-past-the-post voting, which tends to result in 2 extreme parties, and people end up having to vote for the one that sucks less.
Making decisions is the whole point of repesentives. If you don’t like their choices, don’t vote for them. Unfortunately, most places use first-past-the-post voting, which tends to result in 2 extreme parties, and people end up having to vote for the one that sucks less.
The TV will try and amplify and display any signal. Without a station, it will end up amplifying random radio noise and tiny fluctuations in the amplifier circuits themselves.
The momentary signal strength is interpreted as brightness of a spot which is rapidly scanned over the display. In this case the signal is random so every spot on the screen will be a random brightness, changing every frame.
Modern digital TVs won’t do this, because with compressed video recognizable data is needed to even attempt displaying a picture.
As for the sources of the radio noise, most of it is from electrons being jostled by heat, some from space. (Including the cosmic microwave background others have mentioned)
The electron jostling (thermal noise) is the reason the receivers on radio telescope as cooled to insanely low temperatures often with liquid helium.
On the ground, near bus stops, parking lots, gas stations, anywhere people use them.