Either phishing (send fake link, get you to enter password), or someone messing with you by signing up with your email
Either phishing (send fake link, get you to enter password), or someone messing with you by signing up with your email
I guess you could look at governmental budget or number of employees, but raw size is quite a bad metric for overreach. The knowledge that one year a lot of money was spent inforcing laws tells you very little about the effects that has on the population as a whole.
To do that you’d need a good definition of what exactly overreach is, and you’d probably have to do a lot of work because I doubt anyone else had the exactl same definition.
Computers can really just do two things: copy data and do math. Anytime your your doing anything but copying data verbatim, there is math involved. Anytime your reformating, filtering or acting on data their will be some math involved.
Take displaying an image: you can’t just copy image data to the screen, because it could have a different resolution, or color space, or be compressed. In all of those cases, you will need to do a lot of math to get things to work right.
The exact math varies, in graphics, CAD or geospatial stuff, expect a lot of geometry. Any sort of statistics or classifier is going to involve a lot of linear algebra. Even simply storing data in s quickly accessable manner involves quite a bit of math.
Just add a delay that pads it out the execute time to 10 seconds. O(1) ez.
I reserve .elf for executables for other platforms, like microcontroller firmware.
Power companies average things out.
Now some customers specifically ask to pay the instantaneous price, and those people just turn things off. This has the advantage that you end up paying less during times if low demand.
It’s just scammers trying to cash out. They know Elon has a large (and gullible) following, many of which see him as as trustworthy and a super good business man, making them easy targets.
It ends up as the usual, a scam investment promising huge returns, but of course they just run away with your money.
It’s fundamentally the same scam they use to hack accounts, posing as a rich sponsor and tricking the youtuber into downloading malware that steals their account.
Doesn’t everything do this? If someone gets access to your hard drive, your fucked anyways. AI chat logs are about the least problematic thing on there.
Na let’s keep timezones, there useful for humans who generally want time to mean something, but lets ditch daylight savings time, all it does is make scheduling a massive pain twice a year, and messes up everyone’s sleep cycle. Without it, timezones would just be a fixed offset from another, minimizing trouble.
Looking at the logs if my Stable horde worker, more then half of requests made were to generate porn. They’d be shooting themselves in the foot regardless of if the filter worked as intended.
Don’t forget the loss of productivity in the hours before the meeting, spent worrying about it.
No one’s gonna talk about how they turned referral links into a piramid scheme?
Get a display case and put a note with the story on it. That way it’s clear its being kept from historical/sentimental value and not because you like Nazis.
Hot take, C is better then C++. It really just has one unique footgun, pointers, which can be avoided most of the time. C++ has lots of (smart)pointer related footguns, each with their own rules.
Fake nudes of real people are generally illegal, regardless of if the nude is real, or photoshopped, or AI generated.
People have been arrested and convicted for AI porn of real people.
For now convictions seem to be confined to people who have already created/used more traditional CSAM (hidden cameras). This could just be because it is hard to catch someone simply generating images, so if someone with no record would be jailed for just fake nudes remains an open question. Fake nudes of fictional people are also very much an open question. Being very new technology, new laws have yet to be made, so feel free to write to lawmakers about where the line should be.
Like a kid trying very hard to sound like everyone else. “Eloquent bullshit generator”
Prevent subprocess from killing itself until finished.
Well first off, how nice/tolerant is your management? Do you have savings? Some companies can fire people over this stuff, other will just ignore it.
The easiest (and least likely to make anyone mad) solution would just be to bring in your own machine and use celular internet. This way your setup will be completly seperate from the company network, and they can hardly claim you were exposing them to malware or anything. On the other hand you might have problems accessing devices like printers without copying files back and forth (are USB drives allowed?).
Making decisions is the whole point of repesentives. If you don’t like their choices, don’t vote for them. Unfortunately, most places use first-past-the-post voting, which tends to result in 2 extreme parties, and people end up having to vote for the one that sucks less.
On the ground, near bus stops, parking lots, gas stations, anywhere people use them.