(The choice between a “daemon in the sheets” or “cronD in your log folder” joke is left as an exercise for the reader.)
(The choice between a “daemon in the sheets” or “cronD in your log folder” joke is left as an exercise for the reader.)
I saw Nick Cutter and wanted to ask this as well. The Troop was such a fantastic book with vile description and really left an impression on me. Fuck you Shelley.
Can someone explain the fourth panel? What’s the significance of the big red X and why is the background a pair of idiot knife ears making out in that wooden hellscape? I know it’s nauseating to look at their weird bald faces for too long but I’d appreciate the help. Probably some human nonsense.
There’s also going to be a stop motion tribute for OtGW released by the folks who make Wallace and Gromit on november third!
If you still have that save file, you might consider tasteful use of an editor to give yourself a chance. If not though I’m sorry to hear that. BG1/2 were a huge part of my childhood and my longtime favorite villain came from the second.
So you took the literal scenario (woman in wheelchair gets insulting comment asking if her disability affects her sexually) and inverted it so that the insultor is disadvantaged against a hypothetical celebrity who causes them social harm. Why? Autism isn’t a fucking pallisade and it shouldn’t be used to counter attack legitimate points. You’re the one doing damage to perceptions of autistic people. Please stop.
Black hat and Defcon just ended and I’ll share my impression from LLM related talks given there. Microsoft VPs charged additional money to CISOs attending the summit talking about how AI will disrupt and be the future and blah blah magical thinking.
Meanwhile Microsoft engineers and others said things like “this is logarithmic regression for people who are bad at math, and is best for cases where 75% accuracy is good enough. Try to break use cases into as many steps as possible and keep the LLM away from any automation that could have any consequences. These systems have no separation between the control plane and user input, which is re-exposing us to problems that were solved 15 years ago.”
I think there are some neat possibilities that are lost in marketing hype as venture capitalist anger grows that they might have been scammed by yet another hammer in search of nails.
“Nut meat” is a common phrase so I would guess the peanut product is closest, but please stop this line of thought for your own safety.
Ok coward
I don’t presume to know your situation or the people you’ve dealt with so I’ll be charitable and imagine you cut your losses and quit similar situations in good faith, but you and I are both ignorant about the lives of others. It seems to me like the behavior you label an abandonment of principle leaves the door open to future redemption of a loved one. That’s worth fighting for. On that ground, I think you should stop sharing this opinion even if it’s true for you. If they don’t want to damn their own mother to a propoganda echo chamber full of malice then I’m rooting for them.
Children render frames incredibly slowly, and usually in crayon. I can’t imagine between that and lack of necessary math skills you wouldn’t get better performance by replacing the family with additional steamdecks of any storage capacity.
You’re doing great lol. Back in my helpdesk days I loved talking to people who overshared to be helpful.
I think that OP is providing all details they think might be relevant, so whether they a little confused or not they got the spirit and I appreciate it.
Confusingly, there’s actually two similar staves that get mixed up. The helix patterned one with two winged snakes I think you have in mind is called the Caduceus, but the the single wingless version I meant is the staff of Aesculapius (multiple spellings out there).
Go check out the alledged link between the snake wrapped staff that’s used to represent medicine and the treatment for guinea worms. Googling puts that theory with the Ebers papyrus from 1500 BC if it’s true!
It’s valid to point out that we have difficulty defining knowledge, but the output from these machines are inconsistent at a conceptual level, and you can easily get them to contradict themselves in the spirit of being helpful.
If someone told you that a wheel can be made entirely of gas do you have confidence that they have a firm grasp of a wheel’s purpose? Tool use is a pretty widely agreed upon marker of intelligence and so not grasping the purpose of a thing that they can describe at great length and exhaustive detail, while also making boldly incorrect claims on occassion should raise an eyebrow.
It seems like you want people to examine their long held beliefs and customs, adopt your view that they are harmful and unethical, and change their behavior to match yours. A change that may have specific hurdles unknown to you for every individual.
Humans, being social animals, don’t typically react with reason to things that they percieve to be antagonistic. They tend to mirror hostility and are most likely to fight or disengage when facing an opponent, and cleave to the safety of the groups that accept them.
Just or not, the act of starting an interaction sets the tone. You’re completely justified in attacking villains and shaming them, but when you throw a devil costume on someone I don’t think you should be surprised when you get pitchforked.
Low effort speculation:
That’s a vodaphone portugal IP, but this is likely traffic routing though their customer cellular network and not their corporate. It’s possible that someone in PT has a similar username for this service and is fat fingering it. It’s also possible that you’re seeing a tiny sliver of a larger attack.
Spur.us tracks that IP as an egress point for openproxy and windscribe ResIP networks so it’s worth considering that the origin of the authentications you’re seeing may not be Portuguese cellphone but someone hiding behind those services.
Here’s a paper describing the difficulties such a service creates for folks trying to secure accounts with traditional IP reputation based rules. “Resident Evil: Understanding Residential IP Proxy as a Dark Service” https://ieeexplore.ieee.org/document/8835239
Shooting in the dark for how a bad actor would monetize account takeover for this service if this is in fact an attack… They could try to sell your invitation to that private tracker. They could also look to scoop up a bunch of folks to try and blackmail based on what victims are download/seeding. Other more creative options I’m not thinking of might be on the table.
If I pushed an albatross down a well and attached a crab to it to harrass it on the way down it would also fall, despite being a fantastic winged flier.
Imagine them with wings ill suited to vertical flight and hovering, but very fast in the sky while soaring, and with the endurance to keep going for hours.
It’s my headcannon, but I give Gandalf points for forcing the fighter jet into a helicopter arena.