Pretty much the title. I’ve been watching more realistic super hero shows like The Boys and Invincible. The reoccurring themes is that with great power comes great immorality....
There is a trade off i guess if you put it that way. Would you rather tinker and make your software work for you, or would you install a shitty bloated operating system that routinely trades your data like pokemon cards just so you can install a handful of programs comfortably.
Is it that top of the line software truly doesn’t exist for linux, that it’s impossible to the work done, or is it possible BUT you have to spend more time tinkering and learning the quirks of quite admittedly rough around the edges open source software? That yes, it’s less efficient, but actually more rewarding knowing that the software you worked on was open source. And one you actually learn how to use open source software, nobody can take it away from you.
Look at unity! They gutted the program through its egregious licensing structure and now people are scrambling for alternatives. People that sticked with Godot didn’t have the same trouble. It was just another Wednesday
Of course open source can’t play on the same level as proprietary software right now. It doesn’t have the same money thrown at it than proprietary software! But the appeal of open source is that every change is guaranteed to benefit you, not some arbitrary bottom line. Proprietary software is polished, but you are at the whims of a big tech company.
If i were to base my profession on software, spend literal years of my life depending on code, i really would fucking like to look inside that shit sometimes. Anything else is like building a skyscraper out of quicksand
LOL wait till the company your proprietary software relies on tanks or makes a shitty change for their benefit.
It’s sad you built a career out of black box code lmao. I guess 20 years isn’t enough to read the writing on the wall: proprietary code is shit. Black boxes are shit. I piss on your profession
Microsoft has built a proprietary moat around their operating system. The reason why it’s hard to switch from Windows is by corporate design. A mix of early adoption, network effects, and just plain cold hard cash makes them dominate the operating system market. Of course it’s infeasible for your 60yo coworker to switch; but KDE presents an alternate reality, an opportunity, for people fed up with big tech’s bullshit. Yes, figure out how to run and use alternatives you fucking nut. Way to go disparaging countless volunteer hours spent on open source projects so that people like me can switch to linux.
Comments like these make me irrationally angry. Why complain about open source software and give bad PR? It’s open source; contribute.
Dengue has been killing people in the tropics since the beginning of time. I’m Filipino and dengue is a scourge in my home country. Now that it’s killing Europeans and westerners people are taking notice, although i hoped they had just helped us with this problem sooner.
I’m now waiting to see what greedy play big pharma will take to squeeze the most amount of profits for this one. I’m popping some popcorn rn, be right back.
If you are a pirate VPN is an essential tool. I am trying to ascertain the popularity of various VPNs in piracy community. In this excerise, I will list several Popular VPNs in the comment if you use one of them just upvote that comment and reply the reason. If you don’t find your VPN listed add a comment with just their name....
Prowlarr can connect through an http proxy. Theoretically, you can use the http proxy used to access i2p, and then add postman.i2p as your tracker. But i have not tried this yet.
I want to be a developer and help out the jellyfin community. I started with plex but it felt wrong trusting a corpo with my movie collection, and on top of that I am allergic to paywalls, so I switched to jellyfin and never looked back.
I have someee programming experience, but i’ve never had a real job as a programmer. Where can I start?
I have a network-wide pi hole and I noticed that it requested activity.windows.com, a url blocked by my pi hole, even while my pc is suspended. I pinged 10.0.0.217 and it is currently unreachable. So, somehow, windows pc’s turn on networking, phones home, and turns off even while suspended....
Oh, my daily driver is a linux, i just have a spare surface book 3 i use occasionally for gaming (the thing is surprisingly powerful)
Idk how well linux would support detaching and touchscreen with pen. But I’ll definitely switch the os to linux sometime in the future when i get a new gaming rig.
Yeah mb. I realized my error after their posts and edited my post to be more informative, but that made the original commenters who pointed out my mistake look bad. I’ll make another edit.
It feels like we’re just a dot in a complex scatterplot, the way statistics can measure and index an employee’s motivation. Maybe they can even use the same math to measure your own motivation. Imagine getting fired because you “lacked motivation” according to a computer. Maybe that’s not how we should cooperate as a species.
Mateys! We have plundered the shores of tv shows and movies as these corporations flounder in stopping us seed and spread their files without regard for the flag of copyright. We have long plundered the shores of gaming and broke DRM that have been plaguing modern games, and allowing accessibility to games in countries where a...
This has the same vibe as Github (owned by microsoft) training its AI Copilot on repositories under the GPL license, which specifically forbids any work based on it not be made proprietary. Literally a blatant disregard for the license, but it’s ok because it’s a mega-corporation doing it
I was thinking the same thing. Would you think there’d be a way to take an existing model and pool our computational resources to produce a result?
All the AI models right now assume there is one beefy computer doing the inference, instead of multiple computers working in parallel. I wonder if there’s a way to “hack” existing models right now so it can be used to infer with multiple computers working in parallel.
Or maybe, a new type of AI should specifically be developed to be able to achieve this. But yes, getting the models is half the battle. The other half will be to figure out how to pool our computation to run the thing.
0.79 dollars per hour is still $568 a month if you’re running it 24/7 as a service.
Which open source models have you used? I’ve heard that open source image generation with stable diffusion is on par with closed source models, but it’s different with large language models because of the sheer size and type of data they need to train it.
I’m fairly new to piracy overall, but I feel like I understand the basics of how to avoid my ISP and such. A family member who’s in college texted me the other day asking how she could pirate textbooks and I realized I’d never thought about it. Any tips for pirating textbooks? Safe sites?
Yes, torbrowser should get you around it and i know libgen has a tor mirror download link on books
If you don’t want to use tor and still want to download (tor can be slow) you can also change your dns server if your wifi blocks it through dns. No need for a vpn
I torrent (on the same PC that I run a Plex server from), but also auto connect on my devices whenever I’m on public wifi, so speed and avoiding blocks/captchas is also important. From what I understand having port forwarding will make a big difference in my torrent transfer speeds and ability to connect to peers....
Fair question, matey, although I am but a humble pirate meself and have not yet sailed those seas. Those waters still need to be charted by a swashbuckling pirate. Here’s a lead that I found: reddit.com/…/how_to_setup_radarr_and_sonarr_for_a…
Sure thing matey! I am happy to chart a course as you sail through these waters.
In short, i2p is a network within a network. Think of it as being it’s own seedy town within the larger city of the internet. Any information that enters this town is end-to-end encrypted. Now, in this town, to preserve anonymity, people pass along information in paper notes. Each person accepts notes from different sources, encrypts a bundle of it, and passes it along in a chain. (hence the name “garlic routing”. When it hits your “inbound tunnel,” or a set of (usually 2-3) people that have been assigned to pass messages to you, they incrementally un-bundle that message until it hits you, and since you have the private key you can unencrypt the message.
Information that stays within this network are automatically anonymous. These people in your inbound tunnel do not know that the messages are being sent to you, nor do they know any information about the source. They only know that they’re passing these messages along.
One way companies figure out that you’ve been torrenting is that they would torrent a public pirated movie file. Then, they would target the ip addresses that would actually send them that information, because they know they are seeders. These companies cannot do that in i2p, because everybody in i2p is just passing along information!
There are different options for installing i2p:
For windows, there’s the i2p easy install bundle that bundles a firefox profile and automatically installs the i2p router. This uses the java implementation of i2p.
For linux, there’s a java (i2p) or c++ (i2pd) implementation of the i2p router. Basically the same program but in different languages, and i2p routers can still communicate with i2pd routers and vice versa. I recommend starting with java i2p, and after trying it for a while try i2pd. There’s more GUI in the java implementation, but the i2pd version is faster because cryptographic functions run faster in c++. Mental Outlaw has a good video on running i2pd on linux
Th(rule)eads (lemmy.dbzer0.com)
Alt text: Mark Zuckerberg staring creepily into a window with a caption “Let me…get some of that activitypub”
lighter rule (lemmy.blahaj.zone)
Magnet rule (lemmy.world)
Be honest: if you had the power to stop time, your morals would go out the window. (lemmy.zip)
Pretty much the title. I’ve been watching more realistic super hero shows like The Boys and Invincible. The reoccurring themes is that with great power comes great immorality....
What communities, online or offline, have made you feel most like you've entered/found a parallel dimension in a positive way?
Excluding, say, here or the fediverse more broadly....
Get Bread Get Dead (lemmy.ml)
enough said. (lemmy.dbzer0.com)
Screenshotted from this post:...
Based KDE 🗿 (lemmy.ml)
choose... (feddit.de)
Sha(rule)holders (lemmy.dbzer0.com)
Text: man on balcony with meme text: I bring a sort of “let’s unionize” vibe to the office meeting that the shareholders don’t really like
what are some phrases that you use in your hobby or work that would make no sense to outsiders?
Dengue is spreading. Can new vaccines and antivirals halt its rise? (www.nature.com)
What VPN do you use and why?
If you are a pirate VPN is an essential tool. I am trying to ascertain the popularity of various VPNs in piracy community. In this excerise, I will list several Popular VPNs in the comment if you use one of them just upvote that comment and reply the reason. If you don’t find your VPN listed add a comment with just their name....
is it possible to use the Arr apps with I2P?
Hello ya all!...
The complete guide to building your personal self hosted server for streaming and ad-blocking powered by Plex, Jellyfin, Adguard Home and Docker.
The complete guide to building your personal self hosted server for streaming and ad-blocking....
Call for Volunteers - Jellyfin (jellyfin.org)
Exploitation, exploitation everywhere (lemmy.dbzer0.com)
Image: the american dream is to escape exploitation by becoming the exploiter
My friend and I discussing how long memes will last (lemmy.world)
Windows pc calling home (even while asleep) (lemmy.dbzer0.com)
I have a network-wide pi hole and I noticed that it requested activity.windows.com, a url blocked by my pi hole, even while my pc is suspended. I pinged 10.0.0.217 and it is currently unreachable. So, somehow, windows pc’s turn on networking, phones home, and turns off even while suspended....
Freeway Widening: The Gift That Keeps on Giving (More Traffic) (www.youtube.com)
first they push for us to get icloud storage and now this. (lemmy.dbzer0.com)
uninstall Apple Store, which comes pre-installed in iOS, to stop getting these notifications...
Americans Are Less Motivated to Work This Year Compared to Last, New Data Shows (www.bloomberg.com)
My Name rule (files.catbox.moe)
Visions of a larger plunder
Mateys! We have plundered the shores of tv shows and movies as these corporations flounder in stopping us seed and spread their files without regard for the flag of copyright. We have long plundered the shores of gaming and broke DRM that have been plaguing modern games, and allowing accessibility to games in countries where a...
Pirating textbooks for an inexperienced sailor
I’m fairly new to piracy overall, but I feel like I understand the basics of how to avoid my ISP and such. A family member who’s in college texted me the other day asking how she could pirate textbooks and I realized I’d never thought about it. Any tips for pirating textbooks? Safe sites?
Having a hard time settling on a VPN
I torrent (on the same PC that I run a Plex server from), but also auto connect on my devices whenever I’m on public wifi, so speed and avoiding blocks/captchas is also important. From what I understand having port forwarding will make a big difference in my torrent transfer speeds and ability to connect to peers....