No, basically. They would love to be able to do that, but it’s approximately impossible for the generative systems they’re using at the moment
No, basically. They would love to be able to do that, but it’s approximately impossible for the generative systems they’re using at the moment
That’s going to be a problem whatever solution you come up with, because of the federated nature of the lemmy system.
There’s no central authority to hand out usernames, so if two people sign up to different instances with the same username, any design which didn’t attach instance name to each username would fail. The only way around it would be for each instance to contact every other instance which exists, including the ones which haven’t federated yet, and negotiate ownership of the new username, and that’s just not possible
Fair enough, I didn’t consider compute resources
The actual length of the password isn’t the problem. If they were “doing stuff right” then it would make no difference to them whether the password was 20 characters or 200, because once it was hashed both would be stored in the same amount of space.
The fact that they’ve specified a limit is strong evidence that they’renot doing it right
While that sort of analysis probably isn’t impossible, it is computationally unrealistic to do in realtime on a language which wasn’t designed for it.
It’s the sort of thing which is simple in 99% of cases, but the last 1% might well be impossible. Sadly it’s the last 1% you need to worry about, because anyone trying to defeat your system is going to find them
There’s no need to leave earth, just lift it into a medium earth orbit. There are literally thousands of kilometres in between low earth orbit (where there are lots of communications, spy, navigation and weather satellites) and geosynchronous (where there are lots of communications satellites), and outside of those two there’s virtually nothing there
It’s a matter of perspective. To someone who’s job is to write the system which interprets ASM, ASM is high level
I’m pretty sure it means exactly what it says, but you lot are all misreading it.
I interpret it as “all rights, except the right to commit, are reserved” (which doesn’t mean you surrender the right to commit, but rather that it’s the only right you aren’t depriving everyone else of)
In principle they could have pulled out slightly, if there’s jostling and tiny movements in skull then you’d expect them to work loose over time if they’re not securely anchored
Also, it’s probably possible to fix the partition so that it’s as big as it used to be. It’s likely that some of your data is corrupted already, but the repartitioning won’t have erased the old data except here or there where it’s written things like new file tables in space it now considers unused
What they’re suggesting is to back up the whole disk, rather than any single partition. Anything you do to the partition to try and recover it has the potential to make a rescuable situation hopeless. If you have a copy of the exact state of every single bit on the drive, then you can try and fix it safe in the knowledge that you can always get back to exactly where you are now if you make it worse
It might not make him wrong, but he also happens to be wrong.
You can’t compare AI art or literature to AI software, because the former are allowed to be vague or interpretive while the latter has to be precise and formally correct. AI can’t even reliably do art yet, it frequently requires several attempts or considerable support to get something which looks right, but in software “close” frequently isn’t useful at all. In fact, it can easily be close enough to look right at first glance while actually being catastopically wrong once you try to use it for real (see: every bug in any released piece of software ever)
Even when AI gets good enough to reliably produce what it’s asked for first time & every time (which is a long way away for quite a while yet), a sufficiently precise description of what you want is exactly what programmers spend their lives writing. Code is a description of a program which another program (such as a compiler) can convert into instructions for the computer. If someone comes up with a very clever program which can fill in the gaps by using AI to interpret what it’s been given, then what they’ve created is just a new kind of programming language for a new kind of compiler
Perhaps not, but it would make it far easier for any sympathetic brain surgeon you managed to find who was willing to try and fix the problem for you.
The key thing is not needing that specific company to help, but needing generic expert assistance is fine
The story I heard was that charging is taking far longer than usual because of cold batteries, and people are having to change much more frequently for the same reason, and between the two the demand for chargers has shot up
I find it makes my life easier, personally, because I can set up and tear down environments I’m playing with easily.
As for your user & permissions concern, are you aware that docker these days can be configured to map “root” in the container to a different user? Personally I prefer to use podman though, which doesn’t have that problem to begin with
The satellite uplinks these devices use is very bandwidth limited, and quite expensive. I can assure you that it’s not routinely sending anything without telling you.
Source: worked in satellite comms
I’m pretty sure comments get sent back to your instance, so comments from instance B will work just fine.
I have no idea whether instance B will propogate things which have been federated to it though.
It’s also not obvious that an instance you’re not federated with can’t do their half of the federating, if they’re so inclined, and show content from instances which choose to defederate. At the end of the day you’d have to trust all involved to put in some effort to respect the decision to defederate
Podman supports docker compose just fine. You have to run it as a service, so that it can expose a socket like docker does, but it supports doing exactly that
Because a container is only as isolated from the host as you want it to be.
Suppose you run a container and mount the entire filesystem into it. If that container is running as root, it can then read and write anything it likes (including password databases and /etc/sudo)
It is guaranteed, actually. US law imposes requirements on telecoms providers to support wire taps