
Isn’t that headline backwards? Isn’t it Moscow saying Russia has occupied the region?
Isn’t that headline backwards? Isn’t it Moscow saying Russia has occupied the region?
All religions, or just officially recognized ones?
Because there’s plenty of modern religions out there that claim to be anti-religion. Groupthink hiding behind ideologies that are fine in and of themselves, but twisted to keep people in line.
The problem isn’t religion; it’s people.
Bridge mode disables the router in the modem; if you have an admin account on the modem you should be able to enable it yourself; otherwise you need to get your ISP to enable it. It will turn off all the firewall and WiFi features on the modem.
You need to use their modem quite often, but you don’t need to use their router. They’re usually “all in one” modem/router things these days, but they’re legally required to provide you with a modem in bridge mode if you ask — at that point, an Ethernet cable attached to their modem is effectively attached to the Internet, and you can put your own hardware inside (firewall, Wifi router, etc.).
While you need to connect to their IP gateway, you don’t need to use their DNS services or anything but their IP gateway service.
It doesn’t really matter… the data is managed by a third party in another country. I have no real control over who gets access to it, intentionally or otherwise. Better that the data just doesn’t exist in the first place.
Well yeah. That’s what their tech does. And it’s why I have my ISP’s WiFi offering disabled and the antennas removed and run their router in bridged mode, hooked up to equipment I own that doesn’t call out to the Internet.
Remember that fingerprinting can be your friend… because it’s much easier to fake an online fingerprint than a real one.
You can generate a unique fingerprint with each online interaction; this means that you will always have a unique identity.
Or, you can ensure you always have the same fingerprint as a large number of other people.
Think of it as the difference between using a different valid loyalty card each time you shop vs using one of the famous numbers that millions of other people are also using.
Of course, in both circumstances, you do give up the benefits of being uniquely identifiable.
My mother goes by mum or grannie, but my wife goes my mom, pronounced “mum”.
That’s because “mom” is a shortening of “mother” which is what she is, but “mum” is a shortening of “ma’am” which is a shortening of “madame” which means “my lady” and is what you call someone of a higher social class than you. And she wanted to get as far away from class hierarchy in the house as possible.
They’re both generally “my mother” when spoken of in the third person by me or my kids.
Exactly. People see “AI” and think LLMs and diffusion models. Those are both probabilistic translation engines. They’re no more intelligent than an AC/DC converter, just a lot more complex.
However, there are neural networks and sense arrays in the field of AI, and those are designed to replicate the process of thought.
The real route to a thinking AI is likely a combination of the two, where a neural network can call on expert systems including translation engines to do the heavy lifting and then run a more nuanced decision tree over the results.
Thing is, modern LLMs and diffusion models are already more complex than a single human mind can fully comprehend, so we default to internally labelling them as either “like us” or “magic”, even when we theoretically know them to be nothing but really deep predictive models.
I’ll second the SQL database here. Especially since most people who use a spreadsheet actually treat it as a database in the first place, and not as a way to lay out data in a 2D table.
But if a hierarchical table is really what’s desired, any visual database interface should do the trick.
Little Snitch on a Mac.
There are an infinite number of programs that could do this. Will they? Probably not.
Best thing is to install a trustworthy personal firewall, and block all outbound network access for all processes, and then enable as needed. This won’t stop Windows itself, but it will give you a heads-up if something else is trying to send data somewhere and you can make an informed choice at the time.
Bards. There were bards.
It’s the answer that came to my mind when I saw the question. I was not disappointed to see someone had already written it 😃
Depends on your local laws. If there are no municipal or regional laws against it and the zoning allows for it, yes, you could do it.
You could also form a corporation that is owned by a lot of people and use that to buy a regular plot of land, and that would usually comply with local regulations. That’s how strata corporations work.
On the other side of this, I once had a co-worker who bought a keystroke recorder and attached it to his own computer.
The person who had been messing with his computer saw the mini camera he had set up but missed the keylogger. He was able to figure out who it was and what they were up to from that.
Why over 11?
In the time it takes for all this to play out, all the farmers could recoup their potential losses and then some by replacing their JD investment with Kubota, who supports independent repair shops.
Of course, with the debt load most farmers carry, that’s easier said than done.
If the federal government set up a replacement program though, and shipped all the JD machinery to Ukraine where hackers know how to modify the software, everyone but JD would win.
I wonder how much of that can be traced back to Broadcom acquiring VMWare?