More like a self-obsessed AI with an eating disorders, obsessed with food and conspiracy theories, and a knack for grooming kids.
angelsomething
Perpetually in a state of emotional superposition.
- 0 Posts
- 40 Comments
Tmux for life
I also don’t get the same results. I also have tracking and fingerprinting disabled everywhere.
angelsomething@lemmy.oneto Programmer Humor@lemmy.ml•Where do you see yourself in 5 years?6·2 years agoStill looking for someone else’s solution to solve a problem I haven’t yet encountered, I reckon.
angelsomething@lemmy.oneto Open Source@lemmy.ml•How was your start into the open source community?51·2 years agoIt was back in the early 2000s. There was a monthly magazine on Linux and my first issue included the complete install for suse Linux. I was hooked. It’s been a journey since.
angelsomething@lemmy.oneto Programmer Humor@lemmy.ml•I hope Google invents the first general AI18·2 years agolol. Harsh, but very fair.
Been using pi-hole since 2016 and I’ve had to make but a handful of exceptions over he years. I guess it’s a case by case thing.
I agree with 100% of this and can confirm with my experience in working with user support.
angelsomething@lemmy.oneto Open Source@lemmy.ml•Stirling PDF, the Self Hosted PDF Swiss Army Knife4·2 years agoThis is truly awesome. Took 1 min to Sinatra. Crazy fast and good.
angelsomething@lemmy.oneto Asklemmy@lemmy.ml•Is there a good collection of survival knowledge compiled somewhere?15·2 years agoI found this book to be a good start: https://www.howtoinventeverything.com
angelsomething@lemmy.oneto Technology@beehaw.org•They Literally Don't make Things Like They Used To - SOME MORE NEWS11·2 years agoSome more news is gold.
angelsomething@lemmy.oneto Privacy@lemmy.ml•Does someone know the organizational structure of Proton and Tutanota? How democratic is it? How hierarchical is it? How are decisions made? How are tasks determined and distributed?76·2 years agoI think prolly because of this https://www.swissinfo.ch/eng/business/protonmail-scandal-tarnishes-swiss-privacy-reputation-/46952640
angelsomething@lemmy.oneto Fediverse@lemmy.ml•Do you think opensource + Fediverse will develop into some kind of political force/movement in the next years?7·2 years agoWasn’t there a pirate party some time ago?
Agreed. This must be kept in mind. There will be people who enjoy being part of corporate more than they enjoy being good colleagues.
This sounds like what HR wants you to think about your colleagues. Can’t organise if can’t trust your colleagues.
“Man’s search for meaning” is both profound and a must read imo. “Gödel, Esther, Bach” is a tome that I love to say I’ve read but it’s been 5yrs and I’ve only got to 60%. The follow up, however, “I am strange loop” is much more digestible.
angelsomething@lemmy.oneto Fediverse@lemmy.ml•Should we decide to have a main fediverse community or should we keep posting everything twice?6·2 years agoI agree with you completely and kinda assumed this was already in place tbh.
angelsomething@lemmy.oneto Privacy@lemmy.ml•Not that you guys need the reminder, but your work sees all your browser history and you may not even be able to delete it if you wanted to3·2 years agoYou’re not wrong. It really comes down to how ethical the IT/company is. And we are, purposely so. Also we have dns-over-https and No other identifier is parsed through. So we can see and block someone browsing porn on the guest Wi-Fi, but we’d never know who it was. Look, I’m not saying things are perfect, but there are people like me who look out for both the user and the company. The goal is ensure that users privacy is respected and that the company is protected agains misuse, malicious intent or just plain bad-luck. This is the “code” I was referring to. As IT people we have to behave ethically for business we operate in. It’s not perfect but nobody is trying to be. This is all best effort from all parties.
angelsomething@lemmy.oneto Privacy@lemmy.ml•Not that you guys need the reminder, but your work sees all your browser history and you may not even be able to delete it if you wanted to41·2 years agoI hear you, and fully get where you’re coming from. I work in the finance industry and we have auditors to answer to as well as a ridiculous number of compliance regulations we have to abide by. Not every business is the same. I’m personally on the no-trust policy when you have more than 50 users to manage but it also depend on company policy. No one is saying you can’t use your personal device at work. We don’t monitor the guest Wi-Fi in any way specifically because that would be an invasion of privacy. I was referring specifically to using a work device, managed by the business, for personal use. The employee is protected by being briefed during first day induction of he does and don’t with regards to the equipment that is provided to them to do their job. Their personal privacy is not infringed upon as there is a clear agreement about what is expected from them. By the way, I’m in the uk (not sure if relevant).
We gave our kid their first proper smartphone when they had to do a bit of travel to get to school. However, I’ve fully embraced the parental controls of Google family link and Microsoft safety and it’s been great so far. The combination of both provides incredibly granular controls to what they can see on the web, how long they use specific apps and what apps they’re allowed to install.