@golden_zealot@lemmy.ml cover
@golden_zealot@lemmy.ml avatar

golden_zealot

@golden_zealot@lemmy.ml

This profile is from a federated server and may be incomplete. For a complete list of posts, browse on the original instance.

golden_zealot ,
@golden_zealot@lemmy.ml avatar

Television. I cannot understand why anyone would willingly pay money to be advertised to constantly.

golden_zealot ,
@golden_zealot@lemmy.ml avatar

Ads are generally acceptable so long as I'm not paying money to the service I'm using and seeing them anyway.

golden_zealot ,
@golden_zealot@lemmy.ml avatar

I'd go to school and take every course I possibly could for the rest of my life or until I couldn't.

golden_zealot ,
@golden_zealot@lemmy.ml avatar

From when I worked in IT:

-In your ticket, do not give a vague description and a time you want the problem fixed and then expect anything to get fixed. Often times we very much need to work with you directly to understand your problem thoroughly to investigate and fix it thoroughly.

-If you have some weird problem, it might be just as weird to us when we first look at it. We are not omniscient. What we are good at is researching possible fixes, applying them, and measuring the effect they have in actually solving your problem.

-If we didn't install it, don't expect we know anything about it. You might really like to install and use Fusion 360 over AutoCAD or something, but that doesn't mean I know where Fusion 360 is storing its configurations, or that I have a phone number to call to get support from that company as a vendor, or that I have ever troubleshot this application.

-If you're really nice to us, we might be able to offer you suggestions for problems on personal computers, but sorry, we cant usually touch it, especially if we are outsourced IT. The moment we touch your personal computer it opens us to a shitload of liabilities and it could lose me my job.

-We understand very much that typically the only time you're talking to us is when you're mad because some shit is preventing you from working, but we don't want that either so don't be mad at us about it, we would prefer you never had to put in a ticket for anything except configuration change requests.

-Pay attention to our recommendations. If we say you have to have your laptop on at a certain time of day weekly for updates, we aren't just asking for our benefit, we're asking this because if you ignore it, eventually when you power on your laptop, windows is going to force all those updates to push at once and suddenly you'll be without your computer when you're supposed to be doing an important presentation because its going to take 4 hours for a years worth of updates to apply. We have little control over this.

golden_zealot ,
@golden_zealot@lemmy.ml avatar

I kind of imagine it will be the same thing every rockstar game has become. Some pretty ok story with every mission just devolving into a shooting gallery.

Why Assassin's Creed has lost its identity?

Remember those iconic games before 2014? The OG, while dated was really unique for its time, the Ezio Auditore Trilogy that became the standard for the franchise, 3, that was very ambitious (probably too much) with it's setting and story telling. Even 4, although it was the first time AC escaped from the base of what an...

[Thread, post or comment was deleted by the author]

  • Loading...
  • golden_zealot ,
    @golden_zealot@lemmy.ml avatar

    You understand that legally speaking this is approximately the same thing as telling your boss that the front door isn't strong and thieves could easily kick it in, and then when they refuse to fix it, the response you're suggesting is "show up at 3 am and take a sledgehammer to the door, but just dont steal anything from inside" right?

    The point is to cover your ass, not pull your pants down.

    golden_zealot , (edited )
    @golden_zealot@lemmy.ml avatar

    Yes I understand the intention, but in one of these scenario's I've covered my ass legally and if something happens where the company gets ransomware for example, I likely get paid thousands of dollars in overtime restoring backups and the user ends up updating anyway, and in the other I can go to prison, lose my job, and never be able to use my time at that company as a reference on a resume let alone probably easily get a job again because now I have a criminal record.

    I know this because I have lived scenario A probably 6 times in my life.

    golden_zealot ,
    @golden_zealot@lemmy.ml avatar

    Yea I don't trust the opsec of some random 4chan user to cover their tracks and therefore mine in that scenario.

    I'll just take the option that guarantees I can't go to jail and ruin my entire fucking life lol.

    golden_zealot ,
    @golden_zealot@lemmy.ml avatar

    Hmmm yes I suppose that is true.

    Nonetheless I'll always opt for the course of action that has the smallest potential negative impact on my personal life.

    golden_zealot , (edited )
    @golden_zealot@lemmy.ml avatar

    My counterpoint to that is that if you're a good security professional, you wouldn't take such risks because your entire job revolves around mitigating risks.

    If you break into a network, or have someone do it for you, it's very difficult to completely remove all evidence of that having occurred, and because there's just so many variables, there will always be a non-zero percent chance of it being traced back to you.

    Your company can hire an entire security firm of security professionals to look for this evidence. I don't care who someone is or how good they are at their job, very few people, unless they have narcissistic personality disorder, would trust that their individual skill completely outweighs the combined skill of an entire team of people who do that every day as their occupation.

    Furthermore, taking such extreme risks with ones future just screams that they have some mental problem which they should probably be talking to a professional about, because a typical person would consider taking any risk of being imprisoned for years for computer crimes too big of a risk.

    golden_zealot , (edited )
    @golden_zealot@lemmy.ml avatar

    Comparing the allegory of my argument to yours, there is a very wide breadth between not going outside because something bad might happen and going outside and setting your cars driver seat on fire to show your wife that someone could potentially set your entire car on fire, leading to your wife calling the police, the police checking your neighbors security camera you didnt even realize existed to notice that you set the drivers seat on fire, and then charging you with mischief, arson, and public endangerment.

    golden_zealot ,
    @golden_zealot@lemmy.ml avatar

    Truly, what they care a lot more about in the industry is IT certs over a diploma so you're doing just as well as you would have if you graduated anyway.

    golden_zealot ,
    @golden_zealot@lemmy.ml avatar

    Forgive the audio, recommend muting, but I expect it might have been similar to this video of a woman who does not know how to jump:

    https://www.youtube.com/watch?v=k1EVWeek7Kk

    golden_zealot ,
    @golden_zealot@lemmy.ml avatar

    Very much true, made this account last year on June 4.

    golden_zealot ,
    @golden_zealot@lemmy.ml avatar

    Are there any papers or sources on this? Of course it would be very slow, but I'd be interested to see what proposals exist.

    golden_zealot , (edited )
    @golden_zealot@lemmy.ml avatar

    I'm aware of 802.11 lol, But i'm wondering about papers or sources talking about the feasibility/usability of bouncing it off of the ionosphere using something like shortwave to achieve the objective originally stated.

    What makes 802.11 effective is that it exists in the GHz band and as a result it can move a lot of data very quickly, but you need a low frequency to allow a radio signal to be reflected back to earth without escaping into space instead, so speeds would suffer greatly. Just wondering if there are proposals on how to make it usable in the low frequency bands so that you could reflect it back to earth and also not have to wait 7 years for an image to load.

    Furthermore for this to work you would need a relatively high powered radio setup on your end to send messages back to the source youre receiving from if you don't intend to just receive data.

    golden_zealot ,
    @golden_zealot@lemmy.ml avatar

    Awesome, this is just what i was looking for, thanks!

    golden_zealot ,
    @golden_zealot@lemmy.ml avatar

    You did the right thing by getting a second opinion regardless of whether the first person you saw was legitimate because it was the wise decision in the sense that its important to be comfortable with a diagnosis and the person helping you.

    Do your best to be strong and don't let the fear and frustration get the better of you, you can do this.

    Whatever might be up, whether it is schizophrenia or something else, it is treatable.

    It can take time working with a psychiatrist to figure out what works best to help you be the best version of yourself, but a solution does exist for you so don't give up.

    For a lot of treatments for this, it can take time being on treatment for a while before you notice a difference (some times a few weeks of being on treatment). If you still aren't noticing a difference after a few weeks, just continue to keep your psychiatrist up to date on how youre feeling, and if the treatment does not seem to be working, they will alter it to try something else to see if it works for you.

    I can definitely see how this can be frustrating, I myself experienced a long period of anxiety problems where I probably went through 10 different treatments before I found something that worked for me, but in the end it was worth the fight.

    I wish you the best of luck, always remember that you can do this and that you are a strong person.

    fathermcgruder , to Asklemmy
    @fathermcgruder@jorts.horse avatar

    What is it about the text messages and emails sent by older people that make me feel like I'm having a stroke?

    Maybe they're used to various shortcuts in their writing that they picked up before autocorrect became common, but these habits are too idiosyncratic for autocorrect to handle properly. However, that doesn't explain the emails I've had to decipher that were typed on desktop keyboards. Has anyone else younger than 45 or so felt similarly frustrated with geriatrics' messages?

    @asklemmy

    golden_zealot ,
    @golden_zealot@lemmy.ml avatar

    In my experience, younger people who grew up with the internet write their texts and emails as if they are instant messaging, because they grew up with AOL and MSN messenger etc when it comes to text based communication.

    Older people who communicated over text before the internet only did this in one way - writing letters.

    As a result their style of texting or emailing is often very long form in comparison.

    When writing letters you are limited by how much room there is on a piece of paper.

    This leads to using some shorthand which used to be fairly common, but has fallen out of public knowledge for younger people.

    You could argue that some of the stuff that younger people email or text informally can be just as cryptic because there is entirely different shorthand that millenials and generations Y and Z use.

    If you closely examine how you casually communicate with your peers of a similar age, you will notice it can be just as odd as what you experience from communicating with generations on either side of you.

    golden_zealot , (edited )
    @golden_zealot@lemmy.ml avatar

    I'm over a decade away from 40 and I grew up with it.

    Furthermore the context of the use of younger is in:

    "In my experience, younger people who grew up with the internet write their texts and emails as if they are instant messaging, because they grew up with AOL and MSN messenger etc when it comes to text based communication."

    Which is replying to a post titled:

    "What is it about the text messages and emails sent by older people that make me feel like I'm having a stroke?"

    The use of "Younger" here is not an absolute term, it is a relative term, meaning it refers to people younger than the older people the original poster is referring to, who are in my estimation likely to be anyone under the age of 60 based on what OP describes and my informed experiences having worked in the IT industry supporting users of all ages.

    golden_zealot ,
    @golden_zealot@lemmy.ml avatar

    There are many resources to research for inspiration here as similar concepts exists outside of science fiction.

    Read up on the concept of the astral plane and by extension, astral projection.

    https://en.wikipedia.org/wiki/Astral_plane

    https://en.wikipedia.org/wiki/Astral_projection

    golden_zealot , (edited )
    @golden_zealot@lemmy.ml avatar

    Grab my always packed camping pack and rifle case + ammunition, get in car, drive to airport, call 911 on the way and inform them that armed individuals are breaking into my house providing the address and hang up immediately, park car at airport parking lot and pay with card, take taxi back into city with cash, get bus ticket with cash which takes me out to the woods/mountains, camp there until I can't.

    It would also be wise to immediately book a one way ticket to anywhere on the way to the airport and then not use it.

    Even if they have access to my payment details, the last things they would see are parking for the airport and buying a plane ticket.

    They would need access to the airports CCTV to determine that I did not actually board the flight.

    If they had access to this, and were able to get access to the city CCTV as well, the best they could possibly determine after many hours or days is that I was last seen taking a bus west.

    golden_zealot ,
    @golden_zealot@lemmy.ml avatar

    Valid point, good thinking.

    golden_zealot , (edited )
    @golden_zealot@lemmy.ml avatar

    I would agree if it were domestic agents, but if airlines will comply if a foreign agent just asks for it, then that is somewhat concerning since its a multinational corporation freely handing over information on private individuals to authorities that don't have local jurisdiction without so much as a warrant.

    Like unless the foreign agents are working in cooperation with the local government, I don't think for example, an agent of CSIS could walk into an airport in Tokyo and just ask them where Marcus D. Walton flew to or to see their security tapes and expect to get an answer from Japan Airlines without a shit load of red tape.

    More likely, that would get them arrested and questioned as to why they're conducting an illegal investigation of a private individual on foreign soil and probably be seen as an international incident creating a lot of friction between the two nations.

    I expect you probably missed that the question denotes foreign agents so no worries.

    golden_zealot , (edited )
    @golden_zealot@lemmy.ml avatar

    But then why buy the ticket at all? How are foreign agents going to get your credit card purchase? Just leaving the car in the airport should be enough

    This is an excellent point and someone else also pointed out that it wouldn't be necessary.

    golden_zealot , (edited )
    @golden_zealot@lemmy.ml avatar

    I'm still so lost on what the use case for chatGPT is unless its like, learning a language (considering it's a language model as i understand it).

    It does not reliably source accurate information.

    It does not create nuanced artistic writing.

    It does not produce reliable code.

    I'm certain 90% of its value is in everyone wanting very badly for it to be something that its not, but it just isn't.

    It's like if someone invented a claw hammer and people bought into it because "Oh wow, this could be used as a door stop! This could be used to cook my stir fry! This could be used to play a piano!" and yes, you could use it for those things, but really the thing was built for hammering nails and thats about all its actually good at.

    This is why I think there is hype, but little usage, because no one wants to use it for what it might actually be good at, and they don't even market it as such because its more profitable to pretend its an "everything" tool.

    It's like going to a coffee shop, but for some reason there's pizza on the menu, and of course when you order it, the pizza is dog shit.

    golden_zealot ,
    @golden_zealot@lemmy.ml avatar

    I agree but only partially. Lemmy is a collection of echo chambers, everyone has the choice to jerk off in all directions.

    golden_zealot ,
    @golden_zealot@lemmy.ml avatar

    Ahh yes, formatting/styling makes sense as a use case, that is pretty neat.

    golden_zealot ,
    @golden_zealot@lemmy.ml avatar

    hiring a real designer who can create actually original content

    You're doing it right IMO, shaking out the idea with generative AI before hiring a designer probably saves the designer a lot of headaches.

    golden_zealot ,
    @golden_zealot@lemmy.ml avatar

    It would be great if it cited its information for sure.

    golden_zealot ,
    @golden_zealot@lemmy.ml avatar

    Yea, having worked in the IT field and knowing a few languages myself, I think that as far as code goes, it can be ok for basically laying out the structure of what you are trying to do. It's typically the details that it misses in my experience. In that sense, it definitely can be used similarly to an IDE.

    golden_zealot ,
    @golden_zealot@lemmy.ml avatar

    Because they don't want to face that their multi million/billion dollar investments are not going to pay off.

    golden_zealot ,
    @golden_zealot@lemmy.ml avatar

    Ok but hear me out, what happens if you inject it into your feet?

    golden_zealot ,
    @golden_zealot@lemmy.ml avatar

    "I only took a bite out of the bread, therefore I didnt eat any bread."

    golden_zealot ,
    @golden_zealot@lemmy.ml avatar

    Wow, I didn't realize ActivityPub or Federated platforms went back that far. What platform/s were you on back then?

    golden_zealot ,
    @golden_zealot@lemmy.ml avatar

    Neat, thanks!

    golden_zealot ,
    @golden_zealot@lemmy.ml avatar

    Wow, I've never heard of that, but that's really smart.

    golden_zealot ,
    @golden_zealot@lemmy.ml avatar

    They actually made the load time worse with their update. Not by a little, by a fucking tonne. Going from any interior to outside now takes like a full minute and 30 seconds, its ridiculous.

    golden_zealot ,
    @golden_zealot@lemmy.ml avatar

    Perhaps a different perspective, but I am gearing up to switch at the moment.

    While I have previously used Linux (I have been running Debian 12 on my laptop for about a year), I bought windows 11 for my Desktop as I was still under the impression that is was the only real way to play games.

    I recently learned about what Proton has done for games on Linux and also noticed how many games are truly playable on Linux now with the ever increasing market share.

    Even though I am using NVIDIA hardware, I have looked up the process for installing the NVIDIA drivers on Linux and while not as easy as AMD, it appears to be quite easy anyway (I am an IT graduate so it seems pretty straightforward to me).

    It really was only games that was holding me back I think.

    Windows, especially lately has been growing more and more and more and more invasive. I feel like in the last 6 weeks I have read tens of articles on how Microsoft is trying to insert ads into the OS, watermark the OS, install AI into the OS, force the use of MS accounts instead of local accounts etc, and it is completely disgusting. At this point given the recent activity, I would not at all be surprised if they started to try to enforce the OS as a "subscription service".

    The moment I installed windows 11 I knew it was going to be a poor experience, considering I had to create registry keys and manually relaunch the OOBE with flags in order to use a local account.

    For all these reasons (Gaming becoming ever more accessible on linux, and MS consistently making their product less valuable), I will be switching to either Debian 12 on my desktop or Arch in the near future.

    It is a disgusting corporate world we find ourselves in right now, but while this is in many ways a bad thing, I have never in my life noticed more people taking notice of that, becoming interested in FOSS, in Linux, in even considering no longer putting up with this kind of thing, and that gives me hope.

    What was your most recent dream?

    This post was inspired by a dream misadventure I had last night where I was just minding my own business getting gophers out of the rice field, then suddenly on the intercom/announcements (which I did not expect to have in my dream, since I was outside, not in a building), a voice said "attention, this is a representative of the...

    golden_zealot , (edited )
    @golden_zealot@lemmy.ml avatar

    I walked down a path like an alleyway or large aqueduct. It was the middle of the night and water rolled down the slope in the direction I was walking. Walls on either side of me, several stories high, were made of immense sandstone blocks. I entered an underground chamber through a barred gateway in the wall on the right, already open, waiting for me.

    A few twists and turns and down a flight of stairs, and I could see a room beyond with 3 walls. The side farthest would open up to me if not for the large rusted bars that separated the space, save for yet another gate to the right. Just past this gateway on the left there was a stairwell with its first steps in the corner forward and to the left.

    In front of the bars on the side of the entry way, there seemed to be a mound of dirt or trash. Nearest the corner to my immediate left after walking through the gateway, an old wooden door stood closed. A guardian stood to the left of the door in the corner with the head of a jackal. The guardian of the door spoke to me and said "Open the door. There is no going back." in a low doubled voice that I seemed to hear in the air, but also in my head. I hesitated and turned my head to the left to look back one more time in the direction I came from.

    Just past the bars now, atop the mound of refuse and filth, I saw the dirty white skeleton of a deer resting with its head upright, both living and dead. As my gaze turned to the left revealing it, I seemed to glimpse that it's skull was turning to its left at an identical cadence to mine to look right at me, like a mirror with left and right reversed. When our gazes stopped squarely looking at each other it felt jarring.

    It looked right into me with its gaping black eye sockets and rotting meat festering and falling from its ribs, legs, and neck. It looked at me expectantly, and after looking at me for a moment longer, it turned its gaze away from me and turned to black dust which itself seemed to dissipate into nothing on the mound.

    I turned to face the door, turned it's handle, and stepped through into a pure tar black which seemed to consume my memory and consciousness entirely.

    golden_zealot ,
    @golden_zealot@lemmy.ml avatar

    That's ok I don't really want spyware anyway.

    golden_zealot ,
    @golden_zealot@lemmy.ml avatar

    Similar in some ways different in others, actually surprisingly fast for what it does though and I find the user experience a lot nicer than tor.

    golden_zealot , (edited )
    @golden_zealot@lemmy.ml avatar

    Sure, i2p or the invisible internet project is a FOSS project which acts as an anonymous network anyone can potentially access, and host on.

    It does this by creating end to end encrypted peer to peer tunnels between its users and then sending data through itself via a path between some of the 50,000+ volunteers that make up the project. The path data takes is random so a third party seeing any communication in full is highly unlikely, and even at that, its still encrypted.

    The software that implements this is the i2p router, and when using the i2p router you become a node on the network like everyone else using it, allowing pieces of anyone's data to move through your router, just as your data moves through theirs.

    The UX/UI is very good for new users and makes it easy to access, or host. Particularly, to my understanding, i2p is also very popular for torrenting due to the nature of how it works (in comparison to similar projects such as tor, there is an entire built in solution for torrenting included with i2p).

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • test
  • worldmews
  • mews
  • All magazines