[-] vk6flab@lemmy.radio -4 points 22 hours ago

Not sure how I feel about such a bot. I can see potential security issues arising in relation to stored relationships between users and posts.

[-] vk6flab@lemmy.radio 11 points 1 day ago

I'm fairly sure that the price information shown on a Google Search result page is advertising that comes from a different source than the results do.

As far as I know, you could write a plugin for SearXNG to query suppliers and format the output as required.

I think that Google Shopping might be queried in the same way, but I've never looked into it deeply.

[-] vk6flab@lemmy.radio 1 points 1 day ago

No, you didn't "edit" your mistake, you completely changed the meaning of your response which makes anything after it look absurd.

You originally stated that an algorithm was intelligence, the implication being that using your logic, you thought that a calculator was intelligent.

As far as the meaning of AI, you clearly don't understand the landscape surrounding the hyperbolic assertions made by ignorant journalism about the topic.

Machine learning is one aspect of the landscape, useful as it is, intelligence it is not.

LLM emissions on the other hand appear to emulate enough grammatically correct language to fool many people some of the time, leading to their mistaken belief that what is happening is intelligence rather than, at least from their perspective, magic.

(Any sufficiently advanced technology is indistinguishable from magic. -- Arthur C. Clarke)

So, intelligence it is not, Assumed Intelligence is what it is, or autocorrect gone uppity if you prefer, an algorithm either way.

[-] vk6flab@lemmy.radio 7 points 2 days ago

There is nothing new about this phenomenon.

For example, I grew up in the beginning of the home computer boom in the 1980's. Much of that history has completely disappeared because it was thought to be safely stored on audio cassettes and floppy discs.

Because we learnt nothing from that, the next popular storage medium, CD, lost much of the 1990's because as it turns out, they too are not indistructible.

In case you think that this is limited to home computers, today we couldn't build, let alone launch a Saturn V rocket and send it to the moon, even though we know that this happened many times. Why? Because we don't have the tapes and those that we do, can't be read by any equipment we have, not to mention undocumented skills, knowledge, experience and processes.

History has always been written by the survivors.

So .. write it down and survive!

[-] vk6flab@lemmy.radio 8 points 2 days ago

Ignorance is bliss..

A.I. means Assumed Intelligence, despite what you might have read elsewhere. Using it to do "research" is how you're going to get first hand experience with so-called "hallucinations".

But you do you..

[-] vk6flab@lemmy.radio 11 points 3 days ago

As opposed to Arabic speakers in the other party?

[-] vk6flab@lemmy.radio 19 points 4 days ago

I'm an industry professional in ICT with 40 years experience.

I've come to form the view that industry certification is a vendor lock-in process created solely for the purpose of generating a guaranteed income stream for that vendor.

If your employer wants to spend its money on certification, by all means go for it as a learning experience.

If you have to pay for it yourself, I've yet to see any evidence that they represent a return on investment of any kind in your career.

That's not to say that learning should be abandoned, quite the opposite. In this industry, if you're not learning, you're going backwards.

Stay curious, read verociosly and try to figure out how stuff works and more importantly, how it breaks.

[-] vk6flab@lemmy.radio 5 points 4 days ago

Also, make this app hide the 14 page story at the beginning of the recipe and give it the ability to translate between units for weight, volume and temperature.

[-] vk6flab@lemmy.radio 28 points 5 days ago* (last edited 4 days ago)

Mathematics and Politics.

There are many more people who are "working class" than rich. The argument is that if you take some money from a lot of people, you get more money than if you take a lot of money from some people.

There's also the argument that if everyone pitches in, the overall burden for each individual is less.

What this fails to address is that the richer you are, the more you can play with your money and end up with nothing to tax. This is why the rich get richer and the rest of us don't.

Running through all that is a thing called "trickle down economics" which claims that the money from the rich ends up in society, but recent reviews of this have proven this to be nonsense. Politicians use this as an argument for the status quo.

Finally, the rich shape the narrative. Politicians are essentially elected by the rich through their manipulation of the story through their media empires and social media platforms.

[-] vk6flab@lemmy.radio 33 points 5 days ago

How is this infuriating?

Would you like to sleep in a bed with clean sheets and have a shower in a clean cubicle?

How do you think that this happens?

[-] vk6flab@lemmy.radio 31 points 5 days ago

Yeah, good luck with that. The Facebook bots are so bad, they literally hammer sites into the ground, to the point where they're actively being blocked.

[-] vk6flab@lemmy.radio 11 points 5 days ago

Where is this "community" you speak of?

11
submitted 2 weeks ago* (last edited 2 weeks ago) by vk6flab@lemmy.radio to c/sysadmin@lemmy.world

Anyone here have any experience with a Datto Backup Appliance?

I have just been told that they've never run a full restoration in the six years that it's been in service, deployed for the backup of four mission critical virtual Windows Servers, four Windows Workstation and a (physical?) Linux PABX server.

The actual appliance is apparently a "Datto S3-2000 BCDR"

Edit: The anal retentive in me is going WTF in a tight loop. The industry professional with 40 years experience in the field is going, different day, same old...

I realised that I didn't actually ask the pertinent question, the hamster wheel was running full tilt, but is this normal, or is this WTF, or somewhere in-between?

7
submitted 3 weeks ago by vk6flab@lemmy.radio to c/movies@hexbear.net

Just watched the movie Argylle

Can someone please explain the phone call in the bathroom scene that causes Elly to run away and make a collect call?

10
submitted 2 months ago by vk6flab@lemmy.radio to c/lemmyconnect@lemmy.ca

Starting yesterday, Connect hard crashes when you attempt to click on the Inbox and the same happens if you click on the notification bell showing that there are messages.

As of this morning, the Inbox sidebar label is coloured Red instead of Blue.

Connect Version 1.0.190 Android v13 with latest security patches

669
submitted 2 months ago by vk6flab@lemmy.radio to c/privacy@lemmy.ml

A cookie notice that seeks permission to share your details with "848 of our partners" and "actively scan device details for identification".

41
submitted 3 months ago by vk6flab@lemmy.radio to c/privacy@lemmy.ml

How are you storing passwords and 2FA keys that proliferate across every conceivable online service these days?

What made you choose that solution and have you considered what would happen in life altering situations like, hardware failure, theft, fire, divorce, death?

If you're using an online solution, has it been hacked and how did that impact you?

20

My search has been without results.

My "new" model remote with a Siri button keeps needing to be reset to control my infrared amplifier. Press and hold the Volume Down and TV button works, but it's annoying when you want to change the volume whilst watching something and it doesn't respond.

Firmware version is 0x83.

Anyone got any ideas what might be causing this?

32
submitted 4 months ago by vk6flab@lemmy.radio to c/linux@programming.dev

I've been using VMware for about two decades. I'm moving elsewhere. KVM appears to be the solution for me.

I cannot discover how a guest display is supposed to work.

On VMware workstation/Fusion the application provides the display interface and puts it into a window on the host. This can be resized to full screen. It's how I've been running my Debian desktop and probably hundreds of other virtual machines (mostly Linux) inside a guest on my MacOS iMac.

If I install Linux or BSD onto the bare metal iMac, how do KVM guests show their screen?

I really don't want to run VNC or RDP inside the guest.

I've been looking for documentation on this but Google search is now so bad that technical documents are completely hidden behind marketing blurbs or LLM generated rubbish.

Anyone?

37
submitted 4 months ago by vk6flab@lemmy.radio to c/privacy@lemmy.ml

There is a growing trend where organisations are strictly limiting the amount of information that they disclose in relation to a data breach. Linked is an ongoing example of such a drip feed of PR friendly motherhood statements.

As an ICT professional with 40 years experience, I'm aware that there's a massive gap between disclosing how something was compromised, versus what data was exfiltrated.

For example, the fact that the linked organisation disclosed that their VoIP phone system was affected points to a significant breach, but there is no disclosure in relation to what personal information was affected.

For example, that particular organisation also has the global headquarters of a different organisation in their building, and has, at least in the past, had common office bearers. Was any data in that organisation affected?

My question is this:

What should be disclosed and what might come as a post mortem after systems have been secured restored?

15
submitted 6 months ago by vk6flab@lemmy.radio to c/opensource@lemmy.ml

Anyone know of any scriptable asynchronous communication tools?

The closest so-far appears to be Kermit. It's been around since CP/M, but apparently there's still no centralised language reference and the syntax predates Perl.

26
submitted 6 months ago* (last edited 6 months ago) by vk6flab@lemmy.radio to c/privacy@lemmy.ml

U2F keys can be purchased online for the price of a cup of coffee. They're being touted as the next best thing in online security authentication.

How do you know that the key that arrives at your doorstep is unique and doesn't produce predictable or known output?

There's plenty of opportunities for this to occur with online repositories with source code and build instructions.

Price of manufacturing is so low that anyone can make a key for a couple of dollars. Sending out the same key to everyone seems like a viable attack vector for anyone who wants to spend some effort into getting access to places protected by a U2F key.

Why, or how, do you trust such a key?

The recent XZ experience shows us that the long game is clearly not an issue for some of this activity.

2
submitted 6 months ago by vk6flab@lemmy.radio to c/jokes@lemmy.world

Genie: There are 3 rules... no wishing for death, no falling in love, no bringing back dead people.

Me: I wish envelopes would moan when you lick them.

Genie: There are 4 rules...

view more: next ›

vk6flab

joined 8 months ago