![](https://programming.dev/pictrs/image/b81990bc-be00-4002-bfbc-0ea56c57a554.png)
![](https://lemmy.ca/pictrs/image/7b0211f0-7266-4e13-9d26-8c3e6126af62.png)
Just need the Stable Diffusion benchmarks.
Father, Hacker (Information Security Professional), Open Source Software Developer, Inventor, and 3D printing enthusiast
Just need the Stable Diffusion benchmarks.
It’s more that they got sweaty and uncomfortable. Kids need to move around, ya know?
To be fair, carrying a child on your back can be fun for MAX an hour at a time. So maybe perfect for a video game 🤔
I used to carry my kids in a kid backpack for hikes on the weekends and they loved it. Too much, actually. In the Florida heat that’s a good way to sweat your ass off.
Can’t say the thing missing from those fun hikes through the arboretum was fashion 🙄
It’s garbage.
You’re thinking that every Android device is reasonably new. This is not the case.
There’s devices running Android from >12 years ago that can’t get apps any other way than F-Droid because Google Play Services no longer work.
SD3 not being free would be so sad! OMG. It solves all my major issues with Stable Diffusion (which are pretty much the same with all the major competitors).
I just want to have reliable text generation and better control over where subjects are! (Without having to delve into the depths of ControlNet)
Though I suppose if history is a guide, if Stability AI doesn’t release SD3 someone else will release an equivalent… After a delay. The problem is the cost of research in this area is quite prohibitive so that delay could be years 😞
Don’t be too fearful of this kind of thing. Companies have had much worse circumstances with even greater losses of employees/executives and come out stronger as a result.
Example: Apple.
So we can expect a number of bad leaders after this, eventually getting someone with a French accent to take over, run the company further into the ground, then the founder(s) will return (like the prophecy always said) and take over the world for like a decade.
This might not necessarily be the case for much longer with storage costs finally reaching certain thresholds.
2TB SSDs only cost ~$100 and you can cram a lot of SSDs into a tiny space with only a minimal amount of cooling (still need a fan but just a fan).
The next bottleneck to overcome is upload bandwidth. Too many providers offer asynchronous service with weirdly low/slow upload limitations. However, that too might be changing over the next few years as DOCSIS 4.0 supports 10Gbit down/6Gbit up (DOCSIS 3.1 only supported ~1Gbit up). An important note about DOCSIS 4.0 is that in order to take advantage of it’s improved features (on the ISP end) you need to provide more upload bandwidth to the client (well, you can still cap it at the router but at that point the ISP is just being an asshole instead of actually “managing bandwidth”).
Docker containers aren’t running in a virtual machine. They’re running what amounts to a fancy chroot jail… It’s just an isolated environment that takes advantage of several kernel security features to make software running inside the environment think everything is normal despite being locked down.
This is a very important distinction because it means that docker containers are very light weight compared to a VM. They use but a fraction of the resources a VM would and can be brought up and down in milliseconds since there’s no hardware to emulate.
What if I make my own videos with actors and/or voices are entirely imaginary? I don’t have the resources to hire a videographer let alone an actor but I can write a script and use AI (and program/script things).
If I make something cool it’d be sad if no one watched it just because it didn’t use real human actors and voices.
And now we have even better scientific tools that allow us to retroject all the miracles, incorrect dates, absurdly inaccurate numbers/measurements, and the authenticity (very foundation) of it’s stories. Proving that it is all fiction.
Reminder: Until the 1800s no Christian believed that the world was older than about 6000. If you went back in time and spoke to literally any Christian at that time and said you were both Christian and believed that the earth was billions of years old they would definitely say that you’re a liar: You’re not a Christian. You would be declared a heretic.
You’re confused, I get it. You only need one factory factory as long as you sprinkle Inversion of Craziness (IoC) all over everything. Also, for this to work you must spread your code into as many files/directories as possible and also make sure you use really, really strict and verbose XML that doesn’t just define how your code runs but instead generates code itself.
I highly suspect the reason why Java didn’t seem to have as much code is because the authors were using proper enterprise Java which is mostly XML that can only be understood if your IDE takes at least 5 minutes to open and another 5 to open your project.
May they adopt AI and lose their fan base.
Nah. They’ll just worship their new AI overlords. It’s the next evolution of the cargo cult.
I tried using the SharePoint Plugin for TC, but it requires the freaking pope to allow my loggin.
“The power of Microsoft compels you!”
“The power of Microsoft compels you!”
“The power of Microsoft compels you!”
“Please just let me in FFS!”
Error 53003: Your sign-in request was blocked due to a conditional access policy configured on the Tenant where you tried to authenticate.
SharePoint
Oh come on! Everyone knows that SharePoint’s only reason for existing is to act as a black hole for Microsoft Office documents. They go in but they never come out. Nothing intelligent can escape!
Alternative title: Guaranteed Universal Basic Income works fantastically fucking well for Seminole Native Americans
FACEIT is yet another completely useless, doesn’t-actually-work, trust-the-client anti-cheating tool. Basically, it makes it so that cheaters (and the game publisher) can claim cheating isn’t happening because, “there’s an anti-cheat tool” but in reality it doesn’t stop actual cheaters.
The entire purpose of anti-cheat tools appears to be to stop casual Linux gamers from being able to play the game. Microsoft has a big part in it as well because the very same intentional vulnerabilities in Windows that hackers use to install undetectable rootkits are what get used by anti-cheat software.
If Microsoft wanted they could close those vulnerabilities by making all privilege levels above administrator (of which Windows has two which is insane) inaccessible to anyone but Microsoft. Instead they just collect money from 3rd party vendors to sign their driver encryption keys, inherently trusting those vendors not to make software with vulnerabilities. It’s a recipe for insecurity and Microsoft likes it that way. It acts as a form of vendor lock-in.
Anti-cheat tools pretty much all work with the same basic assumption: Trust the client. What’s the first rule of network programming? Never trust the client!
This is a, “it’s turtles all the way down!” problem. An application has to be able to store its encryption keys somewhere. You can encrypt your encryption keys but then where do you store that key? Ultimately any application will need access to the plaintext key in order to function.
On servers the best practice is to store the encryption keys somewhere that isn’t on the server itself. Such as a networked Hardware Security Module (HSM) but literally any location that isn’t physically on/in the server itself is good enough. Some Raspberry Pi attached to the network in the corner of the data center would be nearly as good because the attack you’re protecting against with this kind of encryption is someone walking out of the data center with your server (and then decrypting the data).
With a device like a phone you can’t use a networked HSM since your phone will be carried around with you everywhere. You could store your encryption keys out on the Internet somewhere but that actually increases the attack surface. As such, the encryption keys get stored on the phone itself.
Phone OSes include tools like encrypted storage locations for things like encryption keys but realistically they’re no more secure than storing the keys as plaintext in the application’s app-specific store (which is encrypted on Android by default; not sure about iOS). Only that app and the OS itself have access to that storage location so it’s basically exactly the same as the special “secure” storage features… Except easier to use and less likely to be targeted, exploited, and ultimately compromised because again, it’s a smaller attack surface.
If an attacker gets physical access to your device you must assume they’ll have access to everything on it unless the data is encrypted and the key for that isn’t on the phone itself (e.g. it uses a hash generated from your thumbprint or your PIN). In that case your effective encryption key is your thumb(s) and/or PIN. Because the Signal app’s encryption keys are already encrypted on the filesystem.
Going full circle: You can always further encrypt something or add an extra step to accessing encrypted data but that just adds inconvenience and doesn’t really buy you any more security (realistically). It’s turtles all the way down.