

Could you explain how it doesn’t undermine your argument?
Could you explain how it doesn’t undermine your argument?
I think the term you are looking for is “Deep Net”, although it originally meant websites that weren’t indexed by web searches.
The only issues I had with Laptops so far were the WIFI drivers, as some distros, such as Debian, don’t have them OOTB. I think especially the major players with a focus on recent patches however, such as fedora, OpenSUSE, Arch and many others can install them rather easily during the installation.
Not only that, but they are crucial for network security. VPNs allow all network traffic (with a few necessary exceptions) to be routed through the company’s network and benefit from its security measures, mainly monitoring traffic for suspicious and malicious behaviour. Without it, finding compromised PCs is much harder and enforcing company policies regarding web use would be impossible outside the office.
One company that I can recommend is Withings. They do have an companion app, but a lot of devices do work on their own, and when not, they work with Google Fit or HomeAssistant, though probably due to that fact the products are pricier.
I had this problem at work a week ago or so, at least with Fujitsu PCs. For them, the main cause isn’t an empty CMOS battery, but rather that Fujitsu generally had too little BIOS cache, since there is nothing about it in the UEFI standard. The update basically overfilled that cache, rendering the BIOS completely unusable. The POST doesn’t even go through fully.
The PC are sort of bricked, you gotta put the mainboard into recovery mode, put the ROM file on a freeBSD formatted stick and wait until you see instructions on the screen. Follow them, restart the PC. I recommend setting the BIOS to the optimized default settings, as not doing that might make the boot of Windows pretty slow in some cases. I did hear that it can delete the keys from the TPM, but I haven’t seen that with my PCs at work.
Well, there are some theories of CWD causing Creutzfeldt-Jakob-Disease in unusually young patients and there are some concerns/doubts about the actual barrier believed to protect us, so that’s fun.
I’d argue most people just aren’t parasitic enough to willingly exploit both their sellers, workers and customers in the scale of how Amazon did and still does.
You should do that anyways. Bed frames exost for a reason: it helps to stop moisture building up on the underside of the mattress, and thus prevents mold.
Sphinx cats are also notorious for skin conditions, making them high maintenance in terms of vet visits, sadly.
But yeah, it would be cool to meet one in person.
But do you also sometimes leave out AI for steps the AI often does for you, like the conceptualisation or the implementation? Would it be possible for you to do these steps as efficiently as before the use of AI? Would you be able to spot the mistakes the AI makes in these steps, even months or years along those lines?
The main issue I have with AI being used in tasks is that it deprives you from using logic by applying it to real life scenarios, the thing we excel at. It would be better to use AI in the opposite direction you are currently use it as: develop methods to view the works critically. After all, if there is one thing a lot of people are bad at, it’s thorough critical thinking. We just suck at knowing of all edge cases and how we test for them.
Let the AI come up with unit tests, let it be the one that questions your work, in order to get a better perspective on it.
I mean, Theranos was less classic ethical nightmare as it was just a grift, separating suckers from their money. A possible more fitting example in the same vein would be Roger Wakefield’s “studies” on how the MMR vaccines cause autism., where actual children got harmed and spurred on the antivax movement.
Honestly, that’s news to me. Mind linking it? Might be interesting to read about it.
Funnily enough, the Stanford Prison experiment was pretty much just an act, with both parties encouraged to act the way they did. It’s been discredited nowadays.
A better analogy would be the Milgram experiment(s). Often repeated, breaking certain ethical rules (e.g. not telling your test subjects the whole truth about the experiment), with the result of some test subjects taking their own life from the sheer realisation of what they did, and yet the experiment still stands uncontested in its results.
I think it can be both. However they are no justification as to why one should buy and like a game they clearly won’t like for various reasons. Even more, trying to “fix” a game can alter the game’s impact on the player. There’s a reason why roguelikes/roguelites are so hard, and taking away the difficulty will lessen the experience. That’s why most people also, for example, won’t use cheating tools for their single player games apart from screwing around.
I haven’t watched the video yet, but I think TADC has unwillingly joined the “kids” content mill, which is probably what might be referenced.
Even Gooseworx dislikes how those content mill channels have abused TADC’s popularity for their own profit while neither she nor Glitch can do much about it.
Funnily enough, Signal has circumvented the issue by marking their chat window as DRM content, making it invisible to Recall.
I’m not the one who you asked, but I’d still give some feedback of my own. Musk as a person is a difficult character. I would even go as far as calling him narcissistic.
I generally can’t trust someone who seems to put himself first at everything to handle anything related to security when the role allows him to exploit it for his own gains. And I do not trust someone who supports political groups known for trying to oppress minorities to defend actual rights for free speech.
Though this solution also seems to be very flawed, doesn’t it? You basically trust another company to manage your child’s smartphone and granting it full access to it. Furthermore, that doesn’t stop predators, as they could still arrange meetups with their unknowing victims. And even if it captures text messages, kids would be discouraged to use their phone due to their fear of their parents disproving of their friends or their communication to them. Instead, they’d more likely learn the use of “burner phones” by getting a factory-reset phone and using that one instead.
It’s the sort of ham-fisted attempt expected by parents that blame their kids for their mistakes instead of their parenting.