Forgot your password?
typodupeerror

Comment Re: Wait for the rug-pull (Score 1) 19

That makes no sense at all. If the company is spending $2-3k, for something they charge only $200, then it is an introductory price. To get you hooked. They have to charge you $3-4k at some point of they want to make money. Their suppliers want to get paid, and their investors want to stop losing money eventually. By ask means take advantage while the deal is good, but donâ(TM)t be so naive as to expect the deal to be good forever.

Comment Choose like the first time SSD were expensive (Score 1) 60

When prices change, evaluate priorities.

If a tool costs a thousand dollars but will generate sufficient profit or save time or add convenience to justify the expense, I'd buy the tool. A thousand bucks is quite affordable for many skilled trades machine budgets. Tradespeople are normal people too.

If a thousand bucks is not affordable, choose different parts accordingly, for example using multiple smaller and/or different storage drives.

If a toy costs a thousand dollars and that is too expensive, choose a different toy or save up for one you prefer. It's easy to not buy new hardware which doesn't make one money.

If buying the entire machine at once is unaffordable, buy parts gradually.
If a used machine solves one's problem for less money, buy proven used PCs.

Comment Wait for the rug-pull (Score 3, Interesting) 19

I wonder what they will do when the cost of AI increases?

We all know that AI companies are selling their services at a loss. Often on a cost-of-compute- basis, but even more so when you factor in model training costs incurred with investor cash. And that is even before we account for how the shortages of relevant hardware and server space for running all of this are driving up the costs of memory, chips, etc. Or the fact that the energy crisis is only getting started, and will impact literally every part of the value chain for addressing the current and future demand.

Most of the sunk costs to date, have been funded with investor cash, but those investors are going to start wanting to get paid back with a strong multiple of their investments to date. That means, as companies reorganize around the use of AI - at the current prices - they are creating a potential nightmare of cost forecasting and control when the AI vendors all decide it is time to start generating that pay-back by sticking the screws to their customers. This is CLASSIC ENSHITIFICATION.

Submission + - Chrome silent install of 4GB AI model without consent gets expensive. (thatprivacyguy.com)

couchslug writes: Widespread unasked for downloads devour bandwidth squandering energy:

From the parent article:

"Two weeks ago I wrote about Anthropic silently registering a Native Messaging bridge in seven Chromium-based browsers on every machine where Claude Desktop was installed [1]. The pattern was: install on user launch of product A, write configuration into the user's installs of products B, C, D, E, F, G, H without asking. Reach across vendor trust boundaries. No consent dialog. No opt-out UI. Re-installs itself if the user removes it manually, every time Claude Desktop is launched.

This week I discovered the same pattern, executed by Google. Google Chrome is reaching into users' machines and writing a 4 GB on-device AI model file to disk without asking. The file is named weights.bin. It lives in OptGuideOnDeviceModel. It is the weights for Gemini Nano, Google's on-device LLM. Chrome did not ask. Chrome does not surface it. If the user deletes it, Chrome re-downloads it.

The legal analysis is the same one I gave for the Anthropic case. The environmental analysis is new. At Chrome's scale, the climate bill for one model push, paid in atmospheric CO2 by the entire planet, is between six thousand and sixty thousand tonnes of CO2-equivalent emissions, depending on how many devices receive the push. That is the environmental cost of one company unilaterally deciding that two billion peoples' default browser will mass-distribute a 4 GB binary they did not request."

Submission + - Canvas hacked and down (bleepingcomputer.com)

tphb writes: In the middle of final's season, Instructure Canvas, the widely used learning management system for thousands of schools and universities such as Harvard, Colorado, and Georgia tech has been hacked and is currently down. Per a report from Bleeping Computer, the company reported a breach on May 1. Today, school landing pages were replaced by a message from the hacking consortium ShinyHunters claiming that they would release the data by May 12th unless a ransom is paid. Shortly thereafter all school landing sites went offline for "maintenance".

Submission + - The first segment of the Fehmarnbelt megatunnel project is placed.

Qbertino writes: The Fehrmarnbelt Tunnel is a European construction megaproject building a tunnel between Denmark and Germany, crossing the Fehmarnbelt in the Baltic sea. The first segment of the tunnel has now successfully been placed in its designated spot. This is a yet unseen next-level engineering feat achived by the Danish Sund & Baelt construction company. It took 14 hours and used a massive pontoon ship built specifically for this project. The tunnel segments are 217 meters long, weigh more than 73.000 metric tons and have to be placed within a tolerance of 3mm. The tunnel will eventually consist of 89 of these segments, be 18 km long and connect the Danish city of Rodby with the German island Fehmarn with five individual tunnel tubes, 2 for cars, 2 for trains and one rescue & maintenance tunnel. Crossing time will be reduced from a 45 minute ferry crossing to 7 minutes by train or 10 minutes by car and cut the travel time between the German city of Hamburg and the Danish Capital Kopenhagen down to 2,5 hours. The projects planned completion is set for the year 2029. German news Tagesschau has some details and a neat animation showing details, the German technews site heise.de has some further details.

Comment Is the workstation tool or toy? (Score 1) 68

If the workstation's purpose is your job it may be worth upgrading. That's easily measured with money.

If it's solely a toy, decide how much fun you can effortlessly afford.
Non-bleeding edge PCs still do what they were bought to do.

There are many ways to enjoy computers. Home lab enthusiasts assign roles to their computers to conveniently offload tasks and if so inclined run a variety of OS. Retro gamers often have multiple PCs to suit their OS and software of choice.

Comment Used server boards handle that nicely. (Score 1) 68

Users with leftover RAM modules have ways to use them including used server boards which are plentiful and cheap in complete systems. Not requiring some "ideal" PC is liberating.

The cost-effective way to use ewaste is mixing it with other ewaste which has become quite popular, "home lab" enthusiasts being common examples. Another way is using multiple SFF and tiny PCs so each machine can be optimized by the owner. They don't use many modules, but 8 or 16GB can be useful if loads are reasonably limited.

Comment Re:Do the home owners (Score 1) 159

your dryer might be 50A and your AC 40A, but they rarely go at the same time. Same with the stove which has a 40A plug.

I take it you've never lived anywhere in the US south, or even the US west (AZ, parts of TX, etc)....from about April through start of NOV.

Having all of those on at the same time is quite common....especially any combination you want to make with AC.

My AC has clicked on and pretty much will not click off till first part of November....I'm in New Orleans.

Thankfully, my water heater, stove and oven and dryer are gas....but not everyone has the luxury of gas so yes, all those electrics can easily be on at same time, especially with a family of any size...and especially on weekends.

Submission + - Microsoft Issues Warning About Linux Vulnerability (linux-magazine.com)

joshuark writes: Linux Magazine reports that Microsoft has issued a warning that a vulnerability with a CVSS score of 7.8 has been found in the Linux kernel. The vulnerability in question is tagged CVE-2026-31431 and, according to the Cybersecurity and Infrastructure Security Agency (CISA), "This Linux Kernel Incorrect Resource Transfer Between Spheres Vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise."
The distributions affected are Ubuntu, Red Hat, SUSE, Debian, Fedora, Arch Linux, and Amazon Linux. This could also affect any distribution based on those in the list, which means pretty much every Linux distro that isn't independent.
The flaw is found in the Linux kernel cryptographic subsystem's algif_aead module of AF_ALG. The problem is that a particular optimization has led to the kernel reusing the source memory as the destination during cryptographic operations. What this means is that attackers can take advantage of interactions between the AF_ALG socket interface and a splice() system call.
Currently, active exploitation of the vulnerability is limited to proof-of-concept (PoC) demonstrations. Until patches are released, Microsoft is advising that the affected crypto feature should be disabled, or AF_ALG socket creation should be blocked.

Submission + - No One Can Define 'Ultra-Processed Food.' Why Is RFK Jr. Trying To Regulate It? (reason.com)

fjo3 writes: Health and Human Services Secretary Robert F. Kennedy Jr. has promised to crack down on ultra-processed foods, a key policy priority of the Make America Healthy Again (MAHA) agenda. The biggest obstacle standing in his way? Figuring out what an ultra-processed food is.

"By April, we will have a federal definition of ultra-processed foods," RFK Jr. promised on The Joe Rogan Experience in February. "Every food in your grocery store will have a label on it—it'll have maybe a green light, red light, or yellow light, telling you whether or not it's going to be good for you."

The agency is now weeks behind this deadline, and appears to be no closer to landing on a definition. As The New York Times recently reported, "behind the scenesthe process of defining ultraprocessed foods is still very much in the air. Agencies are struggling to agree, and it is unclear when a definition will be released."

Submission + - Microsoft Edge Stores Passwords in Plaintext in RAM (pcmag.com)

UnknowingFool writes: Security researcher Tom Jøran Sønstebyseter Rønning has found that Microsoft Edge stores passwords in plain text in RAM. After creating a password and storing it using Edge's password manager, Rønning found that he could dump the RAM and recover his password which was stored in plain text. Part of the issue is Edge loads all passwords to all sites upon a single verification check even if the user was not visiting a specific site. This is very different from Chrome which only loads passwords for specific websites when challenged for the site's password. Also Chrome will delete the password from memory once the password has been filled. Edge does not delete the passwords from memory once they are used.

Microsoft downplayed the risk noting access would require control over a user's PC like a malware infection: “Access to browser data as described in the reported scenario would require the device to already be compromised,” Microsoft said. Rønning countered that it was possible to dump passwords for multiple users using administrative privileges for one user to view the passwords for other logged-on users.

Comment Re: If the asset tax passes, he'll owe 1.5B (Score 1) 167

Congress (Article I) has passed many, many laws without veto from the president (Article II) which have withstood challenges in the Supreme Court (Article III) which have established policies of wealth distribution,

Err....exactly which many laws have given us wealth redistribution ?

Slashdot Top Deals

If you push the "extra ice" button on the soft drink vending machine, you won't get any ice. If you push the "no ice" button, you'll get ice, but no cup.

Working...