split tunneling is not 100% secure
This keeps being said and I don’t understand why people keep saying it. Split tunneling should be exactly as secure as your route table makes it, shouldn’t it?
split tunneling is not 100% secure
This keeps being said and I don’t understand why people keep saying it. Split tunneling should be exactly as secure as your route table makes it, shouldn’t it?
Flip-flops for the house are great, especially for the kitchen
This is why I wish those micropayment systems took off. I would be happy to pay 20 bucks a month for ‘ad free’ browsing if most of it actually supported the creators of the content i’m accessing.
10x their cpm is still fractions of a cent for me as a user on a per page view basis, there’s space for winning here if one of the big tech ad companies gets behind it and pushes.
Death of the author only applies if she’s dead.
So unless there’s been some good news in the last day, those people are just coping
Can’t believe there’s this many comments with Technology Connections being listed.
Both kbin and mbin function very well as progressive web apps, and shouldn’t /require/ a discreet app like, imo, lemmy does.
Not just stores, but inventory of goods in general. The thought is that resources spent on inventory are resources which could have otherwise been spent elsewhere. This line of thinking and fixation on Just-In-Time goods deliveries was one of the most important factors in the supply chain fuckery around covid, which only began to stabilize last year.
excess inventory is waste. Always have a buffer to handle shenanigans and/or be able to source the next thing,and avoid being up shit creek the next time the TP truck is a week late.
I’ve seen the payment processor argument a lot about this regarding twitch specifically, but I really don’t think it holds any weight in this one specific case. This is Amazon we are talking about. They are one of the 3 entities in the whole goddamn world who could dictate terms to Visa, not the other way around.
A lot of that range anxiety will start to evaporate as charging (both slow and fast) becomes more ubiquitous. If I can charge to 80% in 15 minutes I don’t need a lot more than 2-3 hours of drive time on a single charge, so long as there’s a charging station at that interval.
Fellas, is it petty to refuse to support Nazis?
In a similar vein i would add Unsighted to this list.
*most instinctively position. This will vary by body size.
Yeah, CC doesn’t cover it in any case. Any attempt would probably need some sort of bespoke license to specifically target the training use case while still allowing comments to be used like normal.
And a Microsoft-sized pile of money to fight it out in court.
I think a lot of the concern here, for me if noone else, is them taking the data and then turning it around into a closed for-sale product. If AI is going to be trained, it should be trained well, but if the result of doing so is them turning around and charging [me/us/everyone, as applicable] an ass load for the privilege of its use then I want no part of it.
AI trained on public data should be public. So if adding boilerplate is the solution to this problem, let it be infectious licensing which forces opening of the resultant model to the public.
I think there might be something to be said here for some potential selection bias. Are Tesla drivers like ram drivers, overly aggressive idiots but with the added layer of being relatively new tech?
I’m convinced that Trekkies and open source tech are concentric circles.
Happily, Lucy Lawless (Xena) is almost exactly opposite, so those shows don’t have to be all bad.
It’s also profitable for long-duration early access games where most of your users and potential purchasers already have already bought it. Good cash injection right at the end of development from an audience that probably wasn’t going to buy it anyway.
There’s blueprints now if that helps.
While its nice when a program let’s you pick the egress interface for its network traffic, split tunneling is still on the host os for handling its route table and making sure that’s set up correctly. Like, were people setting up split tunnel networks where they were treating the vpn interface as a proxy, pointing the software at it, and just hoping for the best?