![](/static/253f0d9b/assets/icons/icon-96x96.png)
![](https://lemmy.ml/pictrs/image/5BtVGv92v6.png)
models including GPT-4V and Gemini Pro
What a joke, a few generic LLMs making a judgement call about all AI models.
models including GPT-4V and Gemini Pro
What a joke, a few generic LLMs making a judgement call about all AI models.
It’s like Dwight printing IOUs for Schrutebucks
What tech field though? Software? Cloud? AI/ML? Security?
In all those scenarios though, the cert in question would be listed as something else. It’s not that I’m against Coursera or think it’s a bad platform.
There are a lot of certs out there and most of them are worthless, and a lot of them happen to be on Coursera, I guess. I’ve talked to people who had AWS certs and couldn’t explain the difference between S3 and EBS. Certs just don’t mean much.
Once you get your first job, the certs of all kinds just become resume fluff, but since you are pursuing your first job, they might be useful.
As an interviewer, I think that certs are only useful if you take the test with a different company than you studied with. So I don’t think I’d care if you have a coursera cert, because I’d assume it just meant you finished the course that you paid for.
What certs are you thinking about doing, and more importantly, what are you looking to get out of them? I know “a job”, but what kind of job are you looking for?
I think you should understand that if you are opening ports to the wide internet, you are putting yourself and anyone else on your network at risk. You’re playing with fire here.
I have this setup with Tailscale so that I can watch plex from anywhere, without exposing ports to devices that I don’t trust and I can help you if you want. But don’t expose 80 to the internet.
I do Tailscale on every device, but they also have a Funnel service that might work for you
Maybe look into Tailscale. At the end of the day, someone needs to open up the ports, but Tailscale does it strictly to negotiate a VPN connection between two devices, so they don’t see the traffic that goes over the tunnel.
It actually doesn’t, because the drive won’t “let” you overwrite the reserve space. That’s why they introduced SSD secure erase, so the firmware knows that you mean to overwrite everything.
Alternatively you could just use full disk encryption and burn the key when you are done.
Page 36 of NIST 800-18r1
https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-88r1.pdf
Yeah, I think this would be the right thing to do. Give them the physical parameters of the battery, but not the capacity. Let them innovate.
It would also be interesting to do something with charging. Like fix the tires so they don’t require a tire swap, but they must recharge for 20 seconds or something. Not enough to charge the whole battery by any means, but the first team to figure out how to dump a meaningful amount of power in would have an advantage.
For anyone wondering what a document should look like, the DoD publishes that for anyone to read. Just search Derivative Classifier Training. Spoiler alert: this ain’t what a top secret document looks like.
Just do it. It’s not hard, it just takes time to learn all the pieces and how they fit together.
How have I never seen that before. It’s perfection
Don’t you go and reinstall, learn how to fix this
Do you have location tracking turned on? I feel like a few times when people looked into this, it came down to the Taxi app having location sharing on (so the app can show you fairs, of course) and that the fact that you wrote something about needing a taxi is irrelevant because the app knows you are someplace where you might need a taxi.
And maybe someone nearby you who also had the same Taxi app had just booked a trip. They can correlate your location and people around you.
My team runs an async standup on Slack where you just respond to a bot with all the usual stuff. We also do a slightly longer meeting on Tuesday morning where we go into more details, but never more than a half-hour.
Can you easily switch drives in your system? I’ll often do that on my computer because little m.2 SSDs are so darn cheap now. It’s easier and cheaper to pick up a little 64GB drive for one off projects than it is to do a proper backup and restore.
Also, I’d just go with Tumbleweed. I don’t distro hop like I used to, but that’s because as everyone else is saying, most of the distros have gotten really good. Most of the time, my little projects are trying out specific features of a different distros. So I’ll just pop a new drive in, test drive it, then either switch back or not.
Also, all of us have done things because we didn’t know better. The only dumb thing to do here is to not learn how to fix this. Try and fail, so next time you know how it works and can do better.
Unless it was encrypted, it prob doesn’t matter. The partition table is just the road map that points to the houses (files). A tool like FTK or PhotoRec goes byte by byte to find the files and figure out what they are. You won’t have file names, but the data might still be there.
I was trying to think of a way to trick him into planting bamboo in his yard, but those are good.