Comment Re:Just buy the patent (Score 1) 65
Are any of the profits going to Gila Monster conservation?
Are any of the profits going to Gila Monster conservation?
So every international traveler could be searched to see if their meds contain any patent violations and seized at the border?
This is entirely unworkable.
Didn't they say some rogue VP set up his laptop to torrent all 72TB of Z-Library to feel o-llama?
I wish my laptop had that many drive bays!
Some people so want to believe that a useful information retrieval system is a superintelligence.
The rest of us aren't surprised that an interesting search engine isn't good at chess.
I'm familiar with some organizations that have been feeding their Slack data into a RAG for employee queries.
They're going to be quite pissed if this has been shut down by Slack.
I implemented portsentry feeding fail2ban on edge servers to deal with the unrelenting scans.
It helps, somewhat.
https://ancillary-proxy.atarimworker.io?url=https%3A%2F%2Fgithub.com%2Fportsentry%2F...
If we don't preprogram them in advance, then how will kids learn "Math class is tough!"?
Yup, but now the AI lobby is stronger than the oil lobby.
I guess whichever the military needs more.
There are some videos online with sound.
Do we hear the engines?
Hopefully an airplane enthusiast who is familiar with the expected sound profile can comment.
Selecting office software is not a political statement
That's right, it's not a statement. It's just a position. You either hold the position that it's ok to be dependent on a third party and it's ok to fail if that third party turns against you, or you hold the position that it's not ok and you would prefer to stay up no matter what adversaries want.
It only becomes a statement once you tell someone that security and reliability are among your values.
Scale isn't the main problem, interoperability is. If you've solved interoperability (i.e. you've got SPF, DKIM, etc working so gmail.com and outlook.com will receive emails sent from your system) then you're in good shape.
Not that running large systems is necessarily easy, but it doesn't have enemies the way interoperability has enemies. Scale is a merely conventional problem that Google and Microsoft aren't making worse for Linux users. Nobody's pushing back, trying to make you fail; your only foe is savage reality.
And man-vs-savage-reality is a pretty nice conflict to be involved in, compared to man-vs-man.
That is the question.
I can see if they outsourced something and delegated a subdomain and the contract expired and then somehow the spammers got the IP's (hosting farm?) which had been abandoned and set up DNS.
But I've never been able to request a specific IP when setting up a VPS or colo, so it's kinda a mystery to me.
404 should have included the most basic of details.
How do they measure this? Did all the pirates magically agree to put Google Analytics on their web pages and share reporting with Muso? Or, in accordance with The Pirate Code (?!) do all pirate pages request the browser load http://muso.com/arr-trackme-1x... and (again, in accordance with The Pirate Code, I guess) the visitors configure their browsers to whitelist and load it? I am skeptical of any third parties who claim they "track" pirate site visits.
Our social structures prey on the human animal instinct for convenience and instant gratification.
Higher-level humans are trained to resist these urges by traditional social structures.
The "cultural Marxists" encourage each of the "seven deadly sins" to disarm the people who are being trained in the more frontal-lobe strategies. That makes them much easier to control.
Big Tech is an instrument of this structure. Corporate law makes it trivial to exploit them, and that's the ones not founded by Int-Q-Tel.
Yeah, there's even been an aggregator website for a decade:
It's often broken, but "security researchers"? Come on, now.
You're using a keyboard! How quaint!