I’ve been using and reasonably satisfied with A.R.M. https://github.com/automatic-ripping-machine/automatic-ripping-machine
It uses MakeMKV and Handbrake, but streamlines the whole process.
I’ve been using and reasonably satisfied with A.R.M. https://github.com/automatic-ripping-machine/automatic-ripping-machine
It uses MakeMKV and Handbrake, but streamlines the whole process.
Reminds me of StumbleUpon. An old way of sharing and finding content.
I also think people discount the power of advertising when they think Facebook or Amazon is listening to them. They don’t think that maybe why they were talking about xyz was because they saw an ad for it. Then they saw another ad for it after they talked about it and got confused on cause and effect.
I don’t know, but I’m a big fan of cowboy and mafia planets.
Well, in the case of Ender’s Game, that was the point. Trick kids into thinking they were playing a game and they wouldn’t think twice about being as brutal as necessary to win. So if your goal is to have cars murder people, having people control them with their dreams is a pretty good idea.
I’m not diagreeing with that. Although it could be useful, I often forget where I saved things, and something that let’s my search my worn history would be rad, but there’s zero chance this won’t be abused by a large list of people, including but not limited to Microsoft, spouses, bosses, malware, governments, every random application, Facebook, and Microsoft.
Shadow copy is a completely different thing. Shadow copy creates snapshots(used for version history, among other uses) of files. Recall is a screen recording software, that includes OCR and maybe some AI stuff. At this time, at least, it too is all local. It just isn’t secure in the least.
Generate images with self hosted models, or integrate it with art programs? Because yes to both.
Hopefully this time NC’s gridscale battery factory wont go bankrupt when the Russian oligarchs founders take the money and run. https://www.charlotteobserver.com/news/business/article167970747.html
In this case the person you were responding to was right. It is where they put their news and weather widget. Which only exists to push people onto Bing. It is annoying, and by default pops up on rollover, not click, so it is trivially easy to accidentally pull up, pumping those Bing engagement numbers.
Congress. Impeachment isn’t a judgicial function.
Meshtastic is a great one. People are making all kinds of software for it. I saw someone developing a BBS for it. For those who want a summary: Meshtastic is a very low bandwidth radio system for creating mesh networks. The speed of data transfer is similar to the modems of the 80s, so you aren’t transferring anything but text. But the range is good and the hardware is cheap, and it is completely stand alone. It can normally pair with something like a phone for ease of access, but has its own dedicated device for a radio.
Kaspersky has caused BSODs because of updates in the past as well. Hardly an AV maker hasn’t. The problem here is that Crowd Strike has captured the enterprise market in a large portion of the globe.
It’s overhead is more subtle than task manager can tell. Because of all its watching and monitoring, it slows down applications themselves. Task take longer. Sometime it is by a trivial amount, but I’ve been able to measure a notable difference in some task with and without S1, even if task manager says all is well.
The Danes have already thought about it. https://en.m.wikipedia.org/wiki/John_Dillermand
SentinelOne. They are more reseller/MSP friendly, but the product is very similar to CrowdStrike.
I know there is a lot of marketing fluff, but yes, it is an EDR. Which means instead of just checking file signatures against a database if known bad stuff, it actually examines what applications do and makes a sort of judgement on if it is acting maliciously or not. I use a similar product. Although the false positives can sometimes be baffling, it honestly can catch a legit program misbehaving.
On top of that, everything is logged. Every file, network connection, or registry key that every process on the computer touches is logged. That means when something happens, you can see the full and complete list of actions taken by the malicious system. Thus can actually be a drain on the computer, but modern systems handle it well enough.
Financially? Yeah, AI is a bubble for sure. Gobs of money are being poured in with few results to show for it. That bubble will burst. But just like the dotcom bubble, that doesn’t mean the technology is useless or won’t change the world, just not instantly over night with a single investment, which is what the investment groups expect.
Its usable for much now… Just not as a daily driver laptop. It is good for embedded applications now, but not quire there for phone or laptop use. Maybe one day.
Yeah, the genie is out of the bottle on this one. I can do voice cloning with consumer hardware and available models. That can’t be undone, but good legal protections would be nice.
That said, the Johanson case is a bad example because it really didn’t sound much like her at all. It was a chipper yound white lady sound, but to my ear sounded nothing like Johanson. It did sound kinda like a character she voiced, but I would not gave confused the two. They cloned the voice of someone they paid to give a similar inflection as the voice from Her. That’s far removed from cloning Johanson herself. It is closer to people making music “in the style of”.