I think car automation peaked at adaptive cruise control. It’s a simple tractable problem that’s generally well confined and improves the drivers ability to concentrate on other road risks.
FLOSS virtualization hacker, occasional brewer
I think car automation peaked at adaptive cruise control. It’s a simple tractable problem that’s generally well confined and improves the drivers ability to concentrate on other road risks.
It depends what they want to do. They can fork and take on the burden of maintaining the whole tree in which case good luck with that, linux is too much of a fire hose to enable a 3rd party to assemble something similar making different choices about what they merge. Otherwise they can maintain a re-based fork that tracks the Torvalds tree and then congratulations you’ve just invented a feature tree that can do contribution with extra steps.
I don’t think algorithms themselves are to blame but what they are tuned for. While engagement/eyeball hours for the adserver is the prime metric the quality of experience will be subservient to it. If the algorithms could better measure your mood and stimulation levels and maximise for that the effect would be less toxic. Ideally if it realised you were just mindlessly consuming it could suggest maybe you’ve done enough today and to try something else. But that I fear that is not something the owners of the various ecosystems want.
He has certainly been weirdly selective in the data he quotes while trying not to come across as complete loon.
So this is like extending mastodon replies into your blog post, but with more syndication options?
In all DRM devices there are private signed certificates that can be used to establish a secure authenticated connection. To get at them you need to crack/hack/file the top of the chip to exfiltrate the certificate. More modern “Trusted Computing” like platforms include verified boot chains so even if you extract the certificate you couldn’t use it because you also need to sign the boot chain to ensure no code has been altered.
Absolutely - modern pirates are extracting the digital streams with the DRM removed. However they closely guard the methods of operation because once the exploits or compromised keys are known they can be revoked and they have to start cracking again. They likely have hardware with reverse engineered firmware which won’t honour key revocation but still needs to be kept upto date with recent-ish keys.
For example the Blu-Ray encryption protocols are well enough known you can get things working if you have the volume keys. However getting hold of them is tricky and you have to be careful your Blu-Ray doesn’t read a disk that revokes the old keys.
For streaming things are a little easier because if you get the right side of the DRM you can simply copy the stream. However things like HDCP and moving DRM into secure enclaves are trying to ensure that the decryption process cannot be watched from the outside. I’m sure their are compromised HDCP devices but again once their keys get leaked they will no longer be able to accept a digital stream of data (or may negotiate down to a sub-HD rate).
Church of England? They are pretty vanilla and low key in my experience.
Lemmy really needs to support post combining somehow so you can see the story once (and maybe even combine the threads in the UI?).
I think it’s often used with younger kids because parents don’t understand why their kids are acting up and can’t work out how to “get through” to them. As kids get older they become a lot better at understanding and really words should be the only tool you need.
The dreaded phrase “I’m not angry just disappointed” should cut deep when (rarely) used because the kids understand their parents have their interests at heart. If they don’t then something has gone wrong building that relationship of trust and respect.
ETA: forgot to say of course positive reinforcement is also key. Kids need to know when they get things right so they are not walking on eggshells worried about getting things wrong.
Ok I fail to see how battering kids helps them develop a bond of trust with the carers.
I’m not sure how assaulting children is ever going to build an effective relationship between kids and their parents. Parents should represent safety and unconditional love because then the educational message will have an easier time being accepted by the kids.
As I understand it is to operate the defensive missile battery they have just shipped.
They are pretty focused on reducing the cost of launches by aggressively re-using components that would normally crash into the sea. Previous launches landed on floating sea platforms but yesterday’s heavy was so big it needed a more stable landing zone. So after boosting the Star Liner the rocket returned down the trajectory it had followed up and then hovered briefly before being caught by two pincers on the very launch pad it had left five minutes before. That’s pretty cool.
How can Google vet an app store without vetting everything it could serve?
We still have a lot of slag heaps in the top of some of our local hills. They make for some interesting mountain bike runs but they aren’t exactly diverse in floor coverage. Some pits are now tourist attractions but I don’t know what ongoing work is done to maintain the abandoned ones.
Nice to see the Celtic languages referenced by smbc. Da iawn.
What do people expect? Those servers aren’t free to run and they’re is only so much VC money to burn. That said I wouldn’t pay the various subscription levels that are currently being asked for. I pay for API use which is basically pay as you go. It also makes you think “does this task really need the non-free tier to complete?”.
I assume that is too cover the intelligence officers monitoring the Russian milbloggers.
I just want to buy home automation gadgets that don’t need a bloody cloud account to work.