Just another guy abandoning the old internet.

  • 0 Posts
  • 44 Comments
Joined 1 year ago
cake
Cake day: June 28th, 2023

help-circle



  • Android? It’s not wholly closed source similar to RedHat they’ve got closed source elements while using open source elements.

    Linux and its kernel are based on GPL and so to distribute something using it would require a compatible license. That means a full distro can’t be anything but open source and actually be distributed in free or paid versions. That doesn’t mean there aren’t closed source interfaces being used personally or undistributed.


  • We had to walk a delicate line with our kids (2005-2017) when it came to interaction online. Never wanted them to feel like we were keeping them from experiencing the knowledge or social interaction the internet provided. But we also kept close tabs and paid special attention to specific behaviors. So if they were in their netbooks we’d make it a habit to walk behind them not to look but just to see what their reaction would be. Kids mostly know right from wrong and when they feel it “might” be wrong they try and hide it from their parents. If you pay attention you’ll see them “hiding” and that’s a sign to dig deeper. This way they maintain their privacy and any issues can be brought to light with them directly.

    (Understand that the following will have specific details changed just for anonymity’s sake) Grooveshark was the first interaction we saw was troublesome. So we sat our daughter down and asked her direct why she was trying to hide her netbook from us seeing it and what had she been doing she felt she needed to hide? The alternative was to relinquish the netbook until she told us. Come to find out a friend of hers from school (female 2 years older) was trying to slowly convince her to lie to her parents and sneak off with her. Our daughter told us this because it scared her not because she would lose her access. We also stayed open and active with our kids indulging in the same things they were interested in (Minecraft, Guitar Hero, etc) regardless if it was explicitly something we enjoyed. So she didn’t lose access to Grooveshark because she really loved listening to music. We just kept an eye on it and she removed her friend from communication. We explained what she was likely attempting and her friend admitted to it. They’re not friends now but it never happened again.

    Don’t get me wrong, we made tons of bad calls before we learned what worked. But the key to all of it is paying attention. Not hovering over them and stopping them from making mistakes. But watching the nuance of their interactions with everyone around them. If they start to get secretive then there is usually a reason. And it’s best to just talk to them about it. And if one conversation doesn’t do it then have multiple conversations. Listen to what they have to say and why they were being secretive. Works best when they’re not expecting it too (like in the middle of playing Minecraft together). Anyway that’s just IMHO.









  • The F Windows posts are great and can be very therapeutic. But guaranteed those users haven’t issued a command that accidentally wipes out their entire drive accidentally. Or they haven’t had their Window Manager just up and decide it doesn’t feel like working anymore because of an update.

    I work with Linux a lot simply because of my 3D printers and I love it. But being on a community driven edge can be a nightmare sometimes when something updates and you’ve got to track down the problem. For me that’s half the fun since I usually get to help someone else out with the same issue.







  • While GPT was trained on the material it does not produce plagiarizing results. It can have reused phrases but only because those phrases are reused across multiple examples and not from a specific work. It learns like b comes after a, c comes after b, d comes after c and then will sometimes reproduce ABCD because it’s normal for that to be used within the context. It is not plagiarism but more akin to the human capability of guiltless probability. If it’s plagiarizing then it’s doing so by coincidence due to context.


  • So a company that makes lock picking tools is liable for when a burglar uses them to steal? Or a car manufacturer is liable when some uses their car to kill? How about knives, guns, tools, chemicals, restraints, belts, rope, and I could go on and nearly use every single word in the English language yet none of those manufacturers can be sued for someone misusing their products. They’d have to show intent of maliciousness which I just don’t see is possible in the context they’re seeking.