Forgot your password?
typodupeerror

Comment Not every hobby should be a career (Score 1) 148

Arts and Humanities are fine....as pursuits of the leisure class who don't need to make living from them, or for people who work for a living to enjoy as hobbies.

Everyone is free to enjoy arts and humanities, but it's cruel to encourage expectations of gainful employment and silly to expect to
make a living from them. Confusing jobs and careers with hobbies can be financially deadly, so I didn't.

Careers fund hobbies so you can enjoy both. For example I can afford to collect and restore classic motorcycles because I did not try to make it a business. In consequence I easily afforded a well equipped personal workshop instead of starving for years to establish a financially vulnerable business. Fixing fighters paid much better.

Comment Re:Stop purchasing Bambu products (Score 1, Flamebait) 96

I like their products. I just want printing without fuss and without having to learn every detail about leveling, etc. Their product works for me and I do not care about its openness, it is about as important for what I need it as my headphones being open sourced (not at all). So this product is for my use case, not for people who want to control every aspect of their printer and every software feature.

IF they decide to make it prohibitively expensive to operate their hardware, then I will go back to a less capable hardware kit.

Comment Trust is a vulnerability. (Score 2) 95

It's silly to trust other nations with one's data because the nation one made friendly arrangements with can replace the administration you trusted and purge its appointees.

Europe should not want any but FOSS because proprietary software only belongs to its creator. To use it is submission to its owners. The cost to European governments to code any software required is a trifle compared to relying on the kindness of their enemies.

No non-corrupt reasons exist to want the shackles of proprietary software. That's like wanting proprietary speech.

Submission + - Data factories dump costs to citizens (tomshardware.com)

noshellswill writes: Rather than pay for build-out of supporting electric power infrastructure, data-centers try passing that cost off to taxpayers. And the pass-off cost is not proportional to use as Maryland taxpayers discover.

Comment Choose like the first time SSD were expensive (Score 1) 70

When prices change, evaluate priorities.

If a tool costs a thousand dollars but will generate sufficient profit or save time or add convenience to justify the expense, I'd buy the tool. A thousand bucks is quite affordable for many skilled trades machine budgets. Tradespeople are normal people too.

If a thousand bucks is not affordable, choose different parts accordingly, for example using multiple smaller and/or different storage drives.

If a toy costs a thousand dollars and that is too expensive, choose a different toy or save up for one you prefer. It's easy to not buy new hardware which doesn't make one money.

If buying the entire machine at once is unaffordable, buy parts gradually.
If a used machine solves one's problem for less money, buy proven used PCs.

Submission + - Chrome silent install of 4GB AI model without consent gets expensive. (thatprivacyguy.com)

couchslug writes: Widespread unasked for downloads devour bandwidth squandering energy:

From the parent article:

"Two weeks ago I wrote about Anthropic silently registering a Native Messaging bridge in seven Chromium-based browsers on every machine where Claude Desktop was installed [1]. The pattern was: install on user launch of product A, write configuration into the user's installs of products B, C, D, E, F, G, H without asking. Reach across vendor trust boundaries. No consent dialog. No opt-out UI. Re-installs itself if the user removes it manually, every time Claude Desktop is launched.

This week I discovered the same pattern, executed by Google. Google Chrome is reaching into users' machines and writing a 4 GB on-device AI model file to disk without asking. The file is named weights.bin. It lives in OptGuideOnDeviceModel. It is the weights for Gemini Nano, Google's on-device LLM. Chrome did not ask. Chrome does not surface it. If the user deletes it, Chrome re-downloads it.

The legal analysis is the same one I gave for the Anthropic case. The environmental analysis is new. At Chrome's scale, the climate bill for one model push, paid in atmospheric CO2 by the entire planet, is between six thousand and sixty thousand tonnes of CO2-equivalent emissions, depending on how many devices receive the push. That is the environmental cost of one company unilaterally deciding that two billion peoples' default browser will mass-distribute a 4 GB binary they did not request."

Submission + - Canvas hacked and down (bleepingcomputer.com)

tphb writes: In the middle of final's season, Instructure Canvas, the widely used learning management system for thousands of schools and universities such as Harvard, Colorado, and Georgia tech has been hacked and is currently down. Per a report from Bleeping Computer, the company reported a breach on May 1. Today, school landing pages were replaced by a message from the hacking consortium ShinyHunters claiming that they would release the data by May 12th unless a ransom is paid. Shortly thereafter all school landing sites went offline for "maintenance".

Submission + - The first segment of the Fehmarnbelt megatunnel project is placed.

Qbertino writes: The Fehrmarnbelt Tunnel is a European construction megaproject building a tunnel between Denmark and Germany, crossing the Fehmarnbelt in the Baltic sea. The first segment of the tunnel has now successfully been placed in its designated spot. This is a yet unseen next-level engineering feat achived by the Danish Sund & Baelt construction company. It took 14 hours and used a massive pontoon ship built specifically for this project. The tunnel segments are 217 meters long, weigh more than 73.000 metric tons and have to be placed within a tolerance of 3mm. The tunnel will eventually consist of 89 of these segments, be 18 km long and connect the Danish city of Rodby with the German island Fehmarn with five individual tunnel tubes, 2 for cars, 2 for trains and one rescue & maintenance tunnel. Crossing time will be reduced from a 45 minute ferry crossing to 7 minutes by train or 10 minutes by car and cut the travel time between the German city of Hamburg and the Danish Capital Kopenhagen down to 2,5 hours. The projects planned completion is set for the year 2029. German news Tagesschau has some details and a neat animation showing details, the German technews site heise.de has some further details.

Comment Is the workstation tool or toy? (Score 1) 70

If the workstation's purpose is your job it may be worth upgrading. That's easily measured with money.

If it's solely a toy, decide how much fun you can effortlessly afford.
Non-bleeding edge PCs still do what they were bought to do.

There are many ways to enjoy computers. Home lab enthusiasts assign roles to their computers to conveniently offload tasks and if so inclined run a variety of OS. Retro gamers often have multiple PCs to suit their OS and software of choice.

Comment Used server boards handle that nicely. (Score 1) 70

Users with leftover RAM modules have ways to use them including used server boards which are plentiful and cheap in complete systems. Not requiring some "ideal" PC is liberating.

The cost-effective way to use ewaste is mixing it with other ewaste which has become quite popular, "home lab" enthusiasts being common examples. Another way is using multiple SFF and tiny PCs so each machine can be optimized by the owner. They don't use many modules, but 8 or 16GB can be useful if loads are reasonably limited.

Submission + - Microsoft Issues Warning About Linux Vulnerability (linux-magazine.com)

joshuark writes: Linux Magazine reports that Microsoft has issued a warning that a vulnerability with a CVSS score of 7.8 has been found in the Linux kernel. The vulnerability in question is tagged CVE-2026-31431 and, according to the Cybersecurity and Infrastructure Security Agency (CISA), "This Linux Kernel Incorrect Resource Transfer Between Spheres Vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise."
The distributions affected are Ubuntu, Red Hat, SUSE, Debian, Fedora, Arch Linux, and Amazon Linux. This could also affect any distribution based on those in the list, which means pretty much every Linux distro that isn't independent.
The flaw is found in the Linux kernel cryptographic subsystem's algif_aead module of AF_ALG. The problem is that a particular optimization has led to the kernel reusing the source memory as the destination during cryptographic operations. What this means is that attackers can take advantage of interactions between the AF_ALG socket interface and a splice() system call.
Currently, active exploitation of the vulnerability is limited to proof-of-concept (PoC) demonstrations. Until patches are released, Microsoft is advising that the affected crypto feature should be disabled, or AF_ALG socket creation should be blocked.

Slashdot Top Deals

It is not for me to attempt to fathom the inscrutable workings of Providence. -- The Earl of Birkenhead

Working...