Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror

Comment Re: FUD is beneath you Linux (Score 1) 123

Still, Linux is long time so close to be sufficient for desktop use, isn't it.
At some point long ago I did like Ubuntu Unity interface, and having checked screenshots right now, they appear to still carry the style, even made more soft - I guess, that would be my bet, given occasion. Do you have different recommendation for the front-end?

It is not a big issue of having two levels of system access - GUI and terminal window, most things can be, and should be, done trough the graphical wrapping. On my latest instances of macOS, I do not even need to fire terminal anymore.Ubuntu and Suse might be championing for similar, but I do not rotate distros to examine as much. This might set Linux as an acceptable desktop, even with some choice.

Comment Re:FUD is beneath you Linux (Score 1) 123

Scenarios and choices can vary widely. There are choices, my clients being part of a solid corporation, were forced to make. Ended in poor profitability and were dismissed to much different owners of late. Glad, I had to leave them in the true technical chaos, that followed partnering with an alternate corporation. While there are other clients, who are focused on utmost economy, and use systems far beyond their support. I do help them to achieve it, too.
Your language is insulting for how little you actually do know.

Comment Re: FUD is beneath you Linux (Score 1) 123

True. It all depends on how critical it is to have system under constant supervision of the makers. It is my point here, however, to get understanding, that resolutions can vary widely, also, that they do not ensure total security in a complicated system. Theoretically, Linux could be fit in the gap, yet for some reason it still lacks in user interface and general integrity/completeness, comparing to popular products.

Comment Re:FUD is beneath you Linux (Score 3, Insightful) 123

In the lesson of realities:
1. It is possible to use older systems with success
2. Newer systems carry newer vulnerabilities
3. Systems are neither secure nor insecure, generally
  3.1. They are only assumed secure until vulnerabilities are discovered
  3.2. The value of their security depends on the value of information contained, backup copies available, efforts and focus on breaking into them in particular
  3.3. The architecture of their deployment has as much to do or more, than version of the software
4. FUD is FUD

Comment RRRRight!! (Score 1) 65

I was taking part in some Honda competition for this purpose, and remember my reconsidered stance was exactly that: we should not fake human. As we should NOT fake AI images for the snapshots of reality or creativity from the person. Falseness of AI must be condemned, closed, and ceased to irritate by misleading. Thanks for all the added intelligence.

Comment Re:Actual presence check can sort it out (Score 1) 131

Then, you can assign several Zoom meetings or so, and put check against the name once you had conversation with an actual student, collected his details and given personalized answers, explanations and instructions.

Still, for a start, I am assuming California colleges do deal with the California students, that is, locally located.
Otherwise - ghost studies, ghost students, unless you condition to have actual contact to qualify at all.

Comment Re:Make it ugly (Score 1) 103

Maybe it's just me, but I find AI generated visuals disgusting - down to the very idea of visual deception. I can stand accumulated intelligence, visual icon assigned to it, as Grok has, but that's it. All visuals in the article discussed were putting me off, while otherwise it was rather intriguing read.

Slashdot Top Deals

The following statement is not true. The previous statement is true.

Working...