![](/static/253f0d9b/assets/icons/icon-96x96.png)
![](https://fry.gs/pictrs/image/c6832070-8625-4688-b9e5-5d519541e092.png)
So the article repeats, several times, “waymo relies on remote operators”. I don’t think the author knows what “self-driving” means.
So the article repeats, several times, “waymo relies on remote operators”. I don’t think the author knows what “self-driving” means.
So if ISPs are once again Title II common carriers, how can they enforce the TikTok ban? 🤔
deleted by creator
What’s worrying about this report is that it’s coming from Google itself.
Google just bought Mandiant, one of the leading cybersecurity and threat intelligence firms. Therefore, Google is one of the leading cybersecurity and threat intelligence firms.
It’s now expected that Google would release this kind of report, seeing as they sell this as an enterprise service.
Mandiant has previously released this type of report regularly; for instance, they were the firm that disclosed the SolarWinds hack.
Agreed, the echo chamber is real on Reddit/Lemmy. Easy to hate on Elon, but people are acting as if the old men leading most other Fortune 100 companies think any differently than he does. You can find the rare exception, but you’ll have a hard time living in modern society without your money filtering up to a bigot somewhere.
Elon just lacks the filter to keep himself from saying it.
Don’t bother with the cert if it’s not your job, but at least look into CCNA Routing and Switching. There are tons of courses available, both in person and online, as well as numerous YouTube videos on the subject.
See if your local library or community college has an adult education center that provides a course. At some point, you will need to learn subnetting, which is just math, but practice makes perfect, and your life is easier if you have it committed to memory.
Proper written work is still one of the most effective ways to do this.
Why do you think they all opposed right to repair?
And specifically, right to open repair? They’ll happily send you a $600 TPM-locked biometric sensor, because they would control the market and ROI, but won’t let you buy a $90 alternative from someone else.
Isn’t there a filter set for this in uBlock already? Annoyances filter?
While true, it’s pretty asinine to hold companies operating in China accountable for complying with Chinese law. It sucks, but they aren’t just going to abandon the Chinese ~cash cow~ market.
Or, the real sign of gentrification is that the Google Maps car drives by your neighborhood more than once every five years. Guarantee that’s not happening in the projects.
Who cares if the code is open source, or pre-training weights are released? Virtually every Masters in CS student in 2024 is building this from scratch. The differentiator is the training dataset, or at worst, the weights after fine tuning the model.
Sorry if I’m about 10 years behind Linux development, but how does Docker compare with the latest FlatPak trend in application distribution? How you have described it sounds somewhat similar, outside of also getting segmented access to data and networks.
Reddit is not a “big corporation”.
How big is big? They’re working on a 6.5 billion dollar valuation. Sure, that’s not S&P 500, but that’s not your mom and pop coffee shop.
https://www.cnbc.com/2024/03/01/reddit-seeking-a-valuation-of-up-to-6point5-billion-in-ipo.html
Linked List Array Node Key Value Pair Attribute
Source, please.
Bingo. If, at the limit, the purpose of a generative AI is to be indistinguishable from human content, then watermarking and AI detection algorithms are absolutely useless.
The ONLY means to do this is to have creators verify their human-generated (or vetted) content at the time of publication (providing positive proof), as opposed to attempting to retroactively trying to determine if content was generated by a human (proving a negative).
There are other videos that will hash to the same value
This concept is known as ‘collision’ in cryptography. While technically true for weaker key sizes, there are entire fields of mathematics dedicated to probably ensuring collisions are cosmically unlikely. MD5 and SHA-1 have a small enough key space for collisions to be intentionally generated in a reasonable timeframe, which is why they have been deprecated for several years.
To my knowledge, SHA-2 with sufficiently large key size (2048) is still okay within the scope of modern computing, but beyond that, you’ll want to use Dilithium or Kyber CRYSTALS for quantum resistance.
Digital signature as a means of non repudiation is exactly the way this should be done. Any official docs or releases should be signed and easily verifiable by any public official.
When using an external TPM. Which next to no one does.
Only the cyber truck. Model S and 3 refreshes are still on the legacy platform, with a lithium ion 12V.