I wonder how the two compare in terms of repair-ability.
So long as you have at least two, horses conveniently produce additional horses which makes repair-ability less of an issue. You simply eat the broken horse, if possible.
I wonder how the two compare in terms of repair-ability.
So long as you have at least two, horses conveniently produce additional horses which makes repair-ability less of an issue. You simply eat the broken horse, if possible.
there’s a simple reason for that: You can’t leave your horse for hours on a parking spot. You can tie it up somewhere maybe, but not for a long time, there aren’t many places fit for leaving horses nowadays.
This is why you just need to move somewhere with a significant Amish population first. Like, significant enough that local infrastructure plans around them.
Are they? It literally points out “Who you voted for is secret” on the ad, right above where it says that people will know if you voted.
On my instance you just click “Communities” at the top and it gives you a list of communities with three options at the top Subscribed/Local/All just like the main feed. Click all and you can browse or search the list of all communities, though the search is not great.
Because a carrier’s data on you is not your person or belongings. The companies holding this data are selling access to it, so it’s not being searched, it’s being offered.
In other words, the same reason as why they don’t need a search warrant if there’s a breaking and the business across the street volunteers their security camera footage, even if you’re on that footage.
instead of blocking advertising data, we should embrace it IMO.
imagine a world where users shove so much information at these tools that they can’t even tell what’s real or not. camouflage works better when everyone participates.
There’s an ad blocker that does exactly this. Called Ad Nauseam. Chrome blocked it from their store super fast, then blocked it from being installed in Chrome from 3rd party sites, then blocked known versions of it from being manually installed in developer mode. I used to run it set to a low percentage - if I “clicked” every ad they’d know to throw my data out, but if I click say 3% of them…
To be fair, we achieved flight by copying nature. Once we realized the important part was the shape of a wing more than the flapping.
I have one of those ridge wallets (birthday present, decent wallet) and apparently they had a giveaway for a gold cyber truck. That would be the single most conspicuous vehicle on the road. Like, obnoxiously so. I feel bad for the winner.
That’s easy - they’d come to Lemmy and become Lemmy mods to achieve the same thing.
I can top it - my first desktop PC was an Epson. Come to think of it, my first printer was an Epson dot matrix. Loud as fuck but it was a good little workhorse.
They are. They just aren’t the only one.
With the introduction of protected mode it became possible for programs to run in isolated memory spaces where they are unable to impact other programs running on the same CPU. These programs were said to be running “in a jail” that limited their access to the rest of the computer. A software exploit that allowed a program running inside the “jail” to gain root access / run code outside of protected mode was a “jailbreak”.
I still miss the narrow window in which you could make use of paging without technically being in protected mode. Basically there was like one revision of the 386 where you could set the paging bit but not protected mode and remain in real mode but with access to paging meaning you got access to paging without the additional processor overhead of protected mode. Not terribly useful since it was removed in short order, but neat to know about. Kinda like how there were a few instructions that had multiple opcodes and there was one commercially distributed assembler that used the alternative opcodes as a way to identify code assembled by it. Or POP CS - easily the most useless 80086 instruction, so useless that the opcode for it got repurposed in the next x86 processor.
It’s to point out that Isreal is capable of causing less collateral damage in Gaza but chooses not to.
That comes down to how often Hamas orders things that can reasonably have small bombs put inside them on a large scale and that Hamas are expected to have on their person’s most of the time, how secure their supply lines are, how paranoid they are about looking for that kind of thing, that sort of thing. It involves a lot more moving parts and rare opportunities than just dropping some bombs.
Yeah dude. “Only.”’ You’re right though, I guess Israel really has raised the bar when it comes to indiscriminate murder of civilians. Those are rookie numbers.
When your enemy disperses themselves among the civilian population?
This killed way less civilians than a traditional bombing that would have got the same Hezbollah fighters would have.
Ironically given their skillset, training an ML model on known and properly tagged AI generated and non-AI-generated stuff might actually work.
He’s got the wrong date.
To quote late musician Peter Steele:
April 2029, the final time The end my friends is not near, the hour in fact is quite here … It’s a Friday 13th of course you won’t live, to see noon. … Are you paranoid what’s on the asteroid has got your name tattooed on it? This stone’s called Apophis And it brings apocalypse.
They care about companies they have less control over and a foreign adversary has more control over invading privacy, for reasons unrelated to seeing privacy as a good in itself.
It may or may not be. I can’t speak to that post, but I’ve seen others pull the same bit with other posts (wait a week or two and repost with a gender swap, then point to the radical difference in response) and usually the gender swapped version gets deleted and the poster banned when it comes out.
The only times I’ve had it be remotely helpful is when you want something specific that’s going to appear near the top of search results and is also likely to be buried in a bunch of irrelevant faff. Which is to say that occasionally “search for X and summarize the top result” is a useful tool but not often enough for them to front and center it like they do.
For example recipes. You can’t copyright a recipe, so recipes tend to be buried in a lot of crap that isn’t the actual recipe.
I think nowadays they just use Facebook groups to shame men they don’t like. Are We Dating the Same Guy is the usual name for them.