Skip to content

VMware’s rivals ramp efforts to create alternative stacks

Technology
4 4 0
  • 47 Stimmen
    4 Beiträge
    5 Aufrufe
    T
    Very interesting paper, and grade A irony to begin the title with “delving” while finding that “delve” is one of the top excess words/markers of LLM writing. Moreover, the authors highlight a few excerpts that “illustrate the LLM-style flowery language” including By meticulously delving into the intricate web connecting […] and […], this comprehensive chapter takes a deep dive into their involvement as significant risk factors for […]. …and then they clearly intentionally conclude the discussion section thus We hope that future work will meticulously delve into tracking LLM usage more accurately and assess which policy changes are crucial to tackle the intricate challenges posed by the rise of LLMs in scientific publishing. Great work.
  • The Decline of Usability: Revisited | datagubbe.se

    Technology technology
    2
    0 Stimmen
    2 Beiträge
    11 Aufrufe
    2xsaiko@discuss.tchncs.de2
    Just saw this article linked in a ThePrimeagen video. I didn't watch the video, but I did read the article, and all of this article is exactly what I'm always saying when I'm complaining about current UI trends and why I'm so picky about the software I use and also the tools I use to write software. I shouldn't have to be picky, but it seems like developers (professional and hobbyist alike) don't care anymore and users don't have standards.
  • Pornhub is Back in France.

    Technology technology
    33
    1
    311 Stimmen
    33 Beiträge
    125 Aufrufe
    D
    Nordé VPN
  • 17 Stimmen
    10 Beiträge
    39 Aufrufe
    T
    That's why it's not brute force anymore.
  • 103 Stimmen
    39 Beiträge
    132 Aufrufe
    P
    This “study” is biased by design. But also even if it weren’t , one study does not prove anything. You’d need a lot more evidence than that.
  • Building a slow web

    Technology technology
    37
    1
    175 Stimmen
    37 Beiträge
    73 Aufrufe
    I
    Realistically, you don't need security, NAT alone is enough since the packets have nowhere to go without port forwarding. But IF you really want to build front end security here is my plan. ISP bridge -> WAN port of openwrt capable router with DSA supported switch (that is almost all of them) Set all ports of the switch to VLAN mirroring mode bridge WAN and LAN sides Fail2Ban IP block list in the bridge LAN PORT 1 toward -> OpenWRT running inside Proxmox LXC (NAT lives here) -> top of rack switch LAN PORT 2 toward -> Snort IDS LAN PORT 3 toward -> combined honeypot and traffic analyzer Port 2&3 detect malicious internet hosts and add them to the block list (and then multiple other openwrt LXCs running many many VPN ports as alternative gateways, I switch LAN host's internet address by changing their default gateway) I run no internal VLAN, all one LAN because convenience is more important than security in my case.
  • uBlockOrigin is porting uBOL to iOS and macOS

    Technology technology
    30
    325 Stimmen
    30 Beiträge
    115 Aufrufe
    C
    Will never happen unfortunately
  • 317 Stimmen
    45 Beiträge
    141 Aufrufe
    F
    By giving us the choice of whether someone else should profit by our data. Same as I don't want someone looking over my shoulder and copying off my test answers.