

Please don’t tell me they’re moving them into ai facilities.


Please don’t tell me they’re moving them into ai facilities.


Little bit by myself, mainly some puzzle stuff in the browser. Turns out I really enjoy writing code than making games.


I don’t think this is a good answer but a funny anecdote. I was pretty obsessed with video games starting with the NES. I got really good with computers, programming, etc and more than 10 years into being a professional software developer, I figured it was time to actually look at making a game, arguably the reason I got into coding to begin with. Turns out that so little about game development is actually coding these days, been that way for decades now.
There are so many parts to making a video game, as you mentioned. If you want to do everything yourself and from scratch, yeah you will need to understand code and physics/math formulas, etc. Maybe some graphic design for the world you’re creating, maybe some music and audio effects knowledge. But there are also game engines out there that will do virtually or literally all of this for you.
I guess my real point is, figure out what you enjoy doing, and how you can contribute that to making games. It doesn’t matter if you’re good at it or don’t even know where to start, the important part is that you do start and stick with it.


My first thought is, that’s why it’s only $100 million. But my second thought is remembering how cheap it actually is to buy our representative, negating the first.


Democratic cities or cities in democratic states? Memphis is very blue but Tennessee is very red.


Whoever posted should be fired impeached


These get out of scale pretty fast. I mean, maybe they are drawn to scale but kind of pointless to see from a human-on-the-ground perspective.


NOW GET THE FUCK OUT OF MEMPHIS
Headline is bullshit, reads like the police pulled up and stopped kidnappers in the act.
Article reads much more like a friend of a friend intervening, which is a much more privileged situation.


Responsibility flows up the chain of command. Literally whoever is next up on that list is just as responsible for pulling the trigger so long as they are protecting the ones who did.


I’m getting tired of these pressers and headlines making it sound like the shit got flushed when it’s obviously still smeared across the walls.
If the Minneapolis Police Department didn’t kill anyone in a year of active policing, and my combat unit didn’t kill anyone in over a year of war, Minnesotans — and all Americans — are right to ask why ICE and the Border Patrol have killed two people in my state in two weeks.


I don’t consider an app deployable until I can run a single script and watch it run. For instance I do not run docker/podman containers raw, always with a compose and/or other orchestration. Not consciously but I probably kill and restart it several times just to be sure it’s reproducible.


Yeah I kind of feel the same. For convergence I still think Android app compatibility is necessary, but It sounds like Waydroid has made some great advances since I last tried it.


Is really weird to me that people would be considered for a cabinet position but not a specific one. Like, if you are really good at cooking then you be considered for cooking positions, and it would be really weird for someone to say “I want to hire you, what position would you like?” And you can just say “oh, architecture sounds nice.”


My entire music library must pass through beets first. If it’s not automatically tagged I will manually search, and finally (esp for locals’ or friends’ music) I will manually tag it using eyeD3 and import through beets as l-is.


I think most home lab/shelf hosters start off because they want to learn something. I think (generally, philosophically) many people never start something new even if it interests them because they are afraid. To this point, it sounds like you can either let the fear prevent you from doing what you want, or you can use the fear as a learning tool.
Start simple. Build something very easy and isolated, air gap it if you need to. Figure out how logs and monitoring work, maybe even try attacking it yourself, so you have confidence that even if it’s compromised you will see how and why. Then you can connect it to the internet, isolated from the rest of your network, and then you will learn how well- or un-founded those fears are. Learn even more about monitoring and defending, then start looking for a job as a cybersecurity professional because you are already well underway.


They don’t have to succeed once.
Use antivirus and other endpoint security measures. Rotate your passwords and keys. Use Everything as Code, and for goodness sake make backups.
If you find yourself compromised, rotate and burn the keys, wipe and redeploy.


The US apparently doesn’t even know what regime change is, looking at Venezuela.
I don’t think the durability of data is affected in your examples. All of my external USB disks are kinda old but they run on type-B; the ones with additional power will probably have a faster spin. If running on USB type-C then that may not be an issue either.