Skip to content

Operation Narnia: Iran’s nuclear scientists reportedly killed simultaneously using special weapon

Technology
355 166 0
  • 1 Stimmen
    9 Beiträge
    0 Aufrufe
    R
    Ye-es, and if you call your automation "industrial planning\programming\optimization" the way I've seen it first in a student book, you won't be understood at all, despite that literally describing what you are doing. Probably making every piece of progress part of popular culture wasn't a good idea. But that started in the middle of XX century, with various new materials based on oil products being regularly invented. Events analogous to a "new material" with computers are a bit rare and very removed from the customer. Yet the popular culture demands some show of progress. They don't see a lot of real progress in UI\UX\web - monopolies and stuff. So - new applications become subjects of such hype. I remember the P2P hype, that was kinda real. Torrents felt like magic. I remember the "metaverse" hype, that's rather old, I didn't find any satisfaction for that, but probably a group of friends and a Second Life instance could be nice. Minecraft suffices for people today, it's easier and cool enough. I also remember "dynamic web" hype in my childhood, webpages were static, you'd press F5 to check new posts on a roleplaying forum. But there were nice-looking, dynamic, cool, and very inconvenient Flash applications here and there. You wanted to have both the cleanness and interop of the Web and the power and wow-factor of such applications. I wanted that too. Now I understand how dumb I was. The cryptocurrencies hype - it was a legitimate subject of discussions for intelligent people, how do you use cryptography to create a value exchange resilient to oppression, because without exchanging real value freedom is not achievable. That was, unfortunately, in the narrow understanding of the rules where the government can demand something from you, but can't force you or torture you or steal from you. Thus BTC is not anonymous, intentionally. There was simultaneously the big data hype, it was discussed as if it's not Google's and FB's pathway to power, but the opposite - finding systemic traits in human societies, probably using that analysis to build a better web, yadda-yadda. Then that mutated to the AI hype. But that also wasn't about yelling "we found AI, give us money", that was about neural nets yielding funny texts and discussions as to whether good enough imitation is real intelligence. Almost like fashion.
  • 17 Stimmen
    1 Beiträge
    0 Aufrufe
    Niemand hat geantwortet
  • Army gives shady offer to tech bros so they can play soldier

    Technology technology
    11
    1
    97 Stimmen
    11 Beiträge
    3 Aufrufe
    P
    It is common in the military to give commissioned rank to certain positions for the higher pay grade. The fast tracking takes away from the belief everyone serving with you went through (roughly) the same basic training as you.
  • 40 Stimmen
    10 Beiträge
    7 Aufrufe
    T
    Clearly the author doesn't understand how capitalism works. If Apple can pick you up by the neck, turn you upside down, and shake whatever extra money it can from you then it absolutely will do so. The problem is that one indie developer doesn't have any power over Apple... so they can go fuck themselves. The developer is granted the opportunity to grovel at the feet of their betters (richers) and pray that they are allowed to keep enough of their own crop to survive the winter. If they don't survive... then some other dev will probably jump at the chance to take part in the "free market" and demonstrate their worth.
  • 580 Stimmen
    278 Beiträge
    28 Aufrufe
    V
    The main difference being the consequences that might result from the surveillance.
  • 209 Stimmen
    30 Beiträge
    7 Aufrufe
    L
    people do get desensitized down there from watching alot of porn, and there were other forums discussing thier "ED" from decade of porn watching.
  • 163 Stimmen
    15 Beiträge
    8 Aufrufe
    L
    Online group started by a 15 year old in Texas playing Minecraft and watching extreme gore they said in this article. Were they also involved in said sexual exploiting of other kids, or was that just the spin offs that came from other people/countries? It all sounds terrible but I wonder if this was just a kid who did something for attention and then other perpetrators got involved and kept taking it further and down other rabbit holes. Definitely seems like a know what your kid is doing online scenario, but also yikes on all the 18+ members who joined and participated in such.
  • Microsoft's AI Secretly Copying All Your Private Messages

    Technology technology
    4
    1
    0 Stimmen
    4 Beiträge
    7 Aufrufe
    S
    Forgive me for not explaining better. Here are the terms potentially needing explanation. Provisioning in this case is initial system setup, the kind of stuff you would do manually after a fresh install, but usually implies a regimented and repeatable process. Virtual Machine (VM) snapshots are like a save state in a game, and are often used to reset a virtual machine to a particular known-working condition. Preboot Execution Environment (PXE, aka ‘network boot’) is a network adapter feature that lets you boot a physical machine from a hosted network image rather than the usual installation on locally attached storage. It’s probably tucked away in your BIOS settings, but many computers have the feature since it’s a common requirement in commercial deployments. As with the VM snapshot described above, a PXE image is typically a known-working state that resets on each boot. Non-virtualized means not using hardware virtualization, and I meant specifically not running inside a virtual machine. Local-only means without a network or just not booting from a network-hosted image. Telemetry refers to data collecting functionality. Most software has it. Windows has a lot. Telemetry isn’t necessarily bad since it can, for example, help reveal and resolve bugs and usability problems, but it is easily (and has often been) abused by data-hungry corporations like MS, so disabling it is an advisable precaution. MS = Microsoft OSS = Open Source Software Group policies are administrative settings in Windows that control standards (for stuff like security, power management, licensing, file system and settings access, etc.) for user groups on a machine or network. Most users stick with the defaults but you can edit these yourself for a greater degree of control. Docker lets you run software inside “containers” to isolate them from the rest of the environment, exposing and/or virtualizing just the resources they need to run, and Compose is a related tool for defining one or more of these containers, how they interact, etc. To my knowledge there is no one-to-one equivalent for Windows. Obviously, many of these concepts relate to IT work, as are the use-cases I had in mind, but the software is simple enough for the average user if you just pick one of the premade playbooks. (The Atlas playbook is popular among gamers, for example.) Edit: added explanations for docker and telemetry