Great American humorist. C# developer. Open source enthusiast.
XMPP: wagesj45@chat.thebreadsticks.com
Mastodon: wagesj45@mastodon.jordanwages.com
Blog: jordanwages.com
Let’s be honest here: they want a human to abuse. They want to be shitty to and verbally assault someone that they view as being “lower” than them. If the AI works well (a different conversation) then people will get over any trepidation they have rather quickly. The people that are legitimately upset will just miss having someone to put down for “only” working customer service.
Both definitely are true. I don’t mean to indicate that one view is right. One feeds into the other. This is just he natural outcome when one sex is a sexual selector and one is not. I don’t envy either group online dating, but for different reasons.
I remember online dating looking more like this from a male perspective.
I’m gonna be real. I dont think home directory files should handled by something named tmpfiles.
But… but… it was in the documentation! /s
What killed me about the whole thing was how defensive the dev was about the whole thing, basically calling the reporter a moron for running a command without extensive knowledge of the entire system. I don’t care how good the documentation is, if open file
proceeds to format your hard drive in some circumstances, you done goofed as a dev.
You’ll have to forgive me, as I haven’t tested this personally on Linux yet, but this webcam is a USB 3 device and doesn’t have any special drivers. It should work plug-n-play.
The reason I bring it to your attention is that it has a nice physical lens for focusing, aperture, and zoom; all separate. It’s 4k 30 fps and I can confirm that the picture is really nice.
His body has put all its resources toward growing neurons. There’s simply not enough left for hair. Good trade off, imo.
Because I don’t know why it is closed source. Is it a personal project? A private project? A sensitive project? I don’t see a moral imperative for any of those to be free and open to all users.
If I release something free of restrictions to the world as a gift, that is my prerogative. And a third party’s actions don’t affect my ability to do whatever I want with the original code, nor the users of their product’s ability to do what they want with my code. And the idea of “property” here is pretty abstract. What is it you own when you purchase software? Certainly not everything. Probably not nothing. But there is a wide swath in between in which reasonable people can disagree.
If you are an intellectual property abolitionist, I doubt there is much I can say to change your mind.
I’m not sure what you are referring to about ontologically bad. Has someone said this?
I’m going by the vibe of the comments of people here who are generally anti-MIT. That the very nature of allowing someone to use your code in a closed-source project without attribution is bad. Phrasing it as “hiding their copyright infringement”, for example, implies that it is copyright infringement per se regardless of the license or the spirit in which it was released.
Not all of us write code simply for monetary gain and some of us have philosophical differences on what you can and should own as far as the public commons goes. And not all of us view closed derivatives as a ontologically bad.
I don’t know off the top of my head. I think that Clonezilla can modify images in such a way as they can be booted on a different type of device. My knowledge of the black magic of boot sectors and partition stuff is lacking. Also, you’d have to make sure the motherboard/BIOS is properly configured for reading the device in the same way that the original device was read. UEFI/BIOS stuff can be a pain in the ass to get right.
So my short answer is probably, but I wouldn’t be able to walk you through something like that. Wish I could be more helpful.
Would this work
Yes.
or would I have problems
Also yes.
I used to do this backing up my “servers”. By that I mean some Raspberry Pis and random old PCs running Debian. I even did so successfully when needing to restore the images. But it was fragile and also failed at times, sometimes to great inconvenience when it was a machine serving something important.
I’ve since moved to a different backup strategy for servers, but if I were to do this with a bare-metal machine I want to preserve, I’d use something like Clonezilla. The maintainers of that project know a whole heck of a lot more than I do of the ins and outs of disk management, backup, and restoration than I do with my simple dd
commands. If it is something you’re just wanting to do for fun and experience, dd
can work. If you’re concerned with the security of your data/image, I’d use Clonezilla.
Looking at the documentation it looks like it relies on Mistral’s python tooling to work. I’m fairly dumb, so I don’t know if the tool suggestion coming from Mistral is from some kind of separate neural net or as some kind of special response you have to parse (or that their client parses for you?).
Mistral Instruct v0.3 added in function calling, but I don’t know if its method for implementation is the same/compatible. Also, it is fairly new and wasn’t released all that long ago. Hopefully we’ll get there soon. :)
Not even completely removing Windows from your life will help. Anyone you interact with through email or instant message or social media will have screen-scraped copies of the entire interaction. And that would be bad enough if only a single person gets hacked and has their Recall data hijacked. There will be huge databases available that people will be able to freely cross reference. They’ll still be able to build a quite extensive profile on you just through all of your interactions that get scraped from others.
Oh yeah. I can remember back in the day it could take quite a bit to compile and start these things, especially if you were running at higher resolution and detail values.
Doesn’t that apply to every project hosted in America, too, though? Every project is subject to the jurisdiction in which it is hosted. And I know they’re not the only project that accepts error reports and in-app updates. Unless there is more telemetry involved or tracking of out-of-app activity, I’m not seeing cause for alarm here. Though I’m open to evidence that there is.
Just because an idea is old, doesn’t mean its a bad idea. And we do have mechanisms for modifying the constitution. We just don’t do it often because it requires a lot of agreement.
It is much easier to buy one “hefty” physical machine and run ProxMox with virtual machines for servers than it is to run multiple Raspberry Pis. After living that life for years, I’m a ProxMox shill now. Backups are important (read the other comments), and ProxMox makes backup/restore easy. Because eventually you will fuck a server up beyond repair, you will lose data, and you will feel terrible about it. Learn from my mistakes.