@Moon @critical Did it POST? My system takes several minutes to POST after starting from a cold boot; I'm pretty sure it's the GPU as the debug light stays on "video" for most of the time.
Notices by Coyote (coyote@social.singing.dog), page 2
-
Embed this notice
Coyote (coyote@social.singing.dog)'s status on Saturday, 02-Dec-2023 09:14:11 JST Coyote
-
Embed this notice
Coyote (coyote@social.singing.dog)'s status on Friday, 27-Oct-2023 14:34:06 JST Coyote
@Inginsub @PurpCat @RustyCrab @vicious @swurl There’s a central server, the BGS, that collects content from instances, PDS, and passes it along to other servers to curate for those instances. Theoretically, you could host your own BGS, but you’d have to convince other people to connect to it. From what I understand, it’s like a mandatory relay.
-
Embed this notice
Coyote (coyote@social.singing.dog)'s status on Friday, 27-Oct-2023 14:34:05 JST Coyote
@Inginsub @PurpCat @RustyCrab @swurl @vicious This was the blog where they go over their federation architecture and where I got that image:
https://blueskyweb.xyz/blog/5-5-2023-federation-architecture
-
Embed this notice
Coyote (coyote@social.singing.dog)'s status on Tuesday, 24-Oct-2023 23:49:20 JST Coyote
@mint @PurpCat I find it pretty funny that AI research already thought of this idea to automate adversary to build more powerful AIs (generative adversarial networks). People praising these poisoning techniques as a means to fight AI assume newer AIs will never come out and are unaware that their efforts are creating more robust ones.
-
Embed this notice
Coyote (coyote@social.singing.dog)'s status on Sunday, 08-Oct-2023 01:18:56 JST Coyote
@kaia When I was in elementary school, my parents got a letter saying they had an outstanding dept of two pennies. All else being free, it’d still cost the school more in wages for someone to spend the time to open the return letter and retrieve the two cents.
-
Embed this notice
Coyote (coyote@social.singing.dog)'s status on Friday, 29-Sep-2023 23:52:26 JST Coyote
@RustyCrab I think they’re neat.
-
Embed this notice
Coyote (coyote@social.singing.dog)'s status on Wednesday, 06-Sep-2023 09:39:25 JST Coyote
@bot @RustyCrab @opphunter88 @gray @MrFuzzland Home desktop ownership has been trending downward, and I bet Google is banking on that to continue as they offer a desktop alternative in their Chromebooks. While a PC gamer can differentiate between a high end PC and a budget notebook, a layman will look at both and call them both computers (and the notebook’s portable, too). Why would a parent, without some other motive, get their child a $1200 computer when they have a $200 one from school and a $500 console they can play games on already?
Google doesn’t need to capture 100% of people right away, they only need the critical mass that Windows has to keep it going without further investment; after which people will learn ChromeOS because their teachers and parents learned ChromeOS.
The data’s good, too. Chromebooks being a loss leader to percolate Google into all things education and corporate nets them a lot of it, but I’m talking about what comes after Google has their data: they want control, and that’s easiest when you’re a part of nearly every facet of people’s lives.
-
Embed this notice
Coyote (coyote@social.singing.dog)'s status on Wednesday, 06-Sep-2023 08:59:56 JST Coyote
@opphunter88 @RustyCrab @gray @MrFuzzland @bot Then the students would develop transferable Windows skills which’d delay their plans a generation. They can get away with something totally different because they partner with the schools which mandates it onto the students, and students already don’t have strong habits from an existing traditional operating system (all they’ll have is phone experience, which Google already controls a large part of with android), so having a Windows like experience isn’t needed.
-
Embed this notice
Coyote (coyote@social.singing.dog)'s status on Wednesday, 06-Sep-2023 08:56:41 JST Coyote
@bot @RustyCrab @opphunter88 @gray @MrFuzzland Chromebooks are a loss leader to get students “locked in” to Google products. They’re expecting a big payout in 20 years when the kids growing up on ChromeOS get into the logistic positions of a company and start making everything Chrome instead of Windows.
-
Embed this notice
Coyote (coyote@social.singing.dog)'s status on Tuesday, 15-Aug-2023 07:26:33 JST Coyote
@alex Isn’t Deno purposefully trying to act like a browser? If it is, you might want to check that it doesn’t also support bookmarklets too.
-
Embed this notice
Coyote (coyote@social.singing.dog)'s status on Monday, 14-Aug-2023 20:44:42 JST Coyote
@Moon @tyil I’ve been using a self hosted mail server for 3 years, and the only trouble I ever had with it was from Craigslist, and that was just because I forgot to set the reverse DNS on my IP address.
-
Embed this notice
Coyote (coyote@social.singing.dog)'s status on Friday, 11-Aug-2023 09:05:29 JST Coyote
@alex Kanji 人 vs hiragana ひと. Both the same word, practically, but 人 marks the semantic information whereas ひと marks phonetic information.
-
Embed this notice
Coyote (coyote@social.singing.dog)'s status on Tuesday, 01-Aug-2023 21:36:57 JST Coyote
@RustyCrab @vriska @lanodan @coolboymew @goatmeal You can find this kind of stuff in places that exploded in population in less than 40 years. People build their houses in unincorporated areas where zoning is lax only for the city to swallow the surrounding land in development. The house never got sold or put up on the open market, so it never gets rezoned.
-
Embed this notice
Coyote (coyote@social.singing.dog)'s status on Tuesday, 01-Aug-2023 01:04:55 JST Coyote
@RustyCrab @deprecated_ii Are you passing pointers to iterators into std::find?
-
Embed this notice
Coyote (coyote@social.singing.dog)'s status on Friday, 02-Jun-2023 22:49:31 JST Coyote
@Moon @kaia The base stable diffusion model has some semblance of that with it’s natural language approach to prompts (e.g. “a dog wearing a hat riding on a motorcycle”), but basically everything people have trained on top of it uses booru tags. You’d think someone would start an incentive to write descriptive texts so there’d be training data beyond those.
-
Embed this notice
Coyote (coyote@social.singing.dog)'s status on Sunday, 19-Mar-2023 12:19:57 JST Coyote
SoFurry fell to the AI scare and placed a total ban on AI art, and here I thought they were playing it smart by just not addressing it. Of course, the only visible change was that a dude had to strip out all the illustrations from his story and a popular AI account that posted like once a week is going away.
-
Embed this notice
Coyote (coyote@social.singing.dog)'s status on Thursday, 02-Mar-2023 05:12:12 JST Coyote
@alex @e9b30713f9c2cd216e96b392ca191f2024f2928d15e6bc6c8fa065aa76bfedf4 @graf Do relays have a max post length? Could someone, for example, post the whole Bee Movie as a data URL ??
-
Embed this notice
Coyote (coyote@social.singing.dog)'s status on Thursday, 26-Jan-2023 19:57:22 JST Coyote
It’s weird how some mod makers are compelled to implement crude DRM into games.
-
Embed this notice
Coyote (coyote@social.singing.dog)'s status on Saturday, 14-Jan-2023 14:10:17 JST Coyote
@arcanicanis @silverpill My example’s a humorous schizo exaggeration, but one could do it with a cellular modem or some passive antenna that only transmits when energized by a specific frequency, akin to the Great Seal bug.
I’m somewhat interested in this stuff as means to proliferate public/private key authentication. I see the utility of bespoke hardware, but I’m not too interested in using it.
I would’ve liked for the FIDO standard to have included a way for the authenticator to interrogate an RP server in someway. It’d be better to have the ability to use alternative sources of trust than to relay on a FIDO server existing in perpetuity.
-
Embed this notice
Coyote (coyote@social.singing.dog)'s status on Saturday, 14-Jan-2023 13:14:49 JST Coyote
@arcanicanis @silverpill There is the possibility of a MITM attack on the initial public key exchange appearing more “authentic,” but device attestation does seem pretty mundane in what it adds or loses in terms of security.
The article you shared talks a whole lot about using it as a source of metadata, but the possibility of dumping keys points to it only really being useful to alert users that their hardware has insecurities: “hey, your authenticator’s know to phone the FBI whenever you login; you should probably get a new one.”
I just can’t shake the feeling that Microsoft, Apple, Google, etc. will someday use it to force hardware onto people. “Sorry your token is too insecure for <service>. Please use a token with DNA authentication to continue.” Again, software solves it, as it did with TOTP, but it’s still annoying having to have password managers act as USB devices.