Actual 19 years old console
#meme #time #noughties
Actual 19 years old console
#meme #time #noughties
A stupid man shares his problems
@
A wise man shares memes
Summer Babe is actually name of a song by Pavement, check it out. It has been my nickname since teen years and IRC chat rooms :3
Big MAC please
#meme #network #broadcast
Yes!
Me when I get home
#meme #cat #procrastination
Remove my password from lists so hackers wont be able to hack me ...
#screenshot #infosec #hackers
Link: github.com/danielmiessl...
Dog's dream
#meme #shiba #dream
Do not make it too obvious
#meme #lotr #monomyth
There are many things to improve in our world, but the most important one IMO is taking attention of the masses away from major corporate propaganda tools, so oligarchies owning those tools stop hacking our democracy. Bluesky is a good tool for making steps in that direction at the moment.
Carrying their young
#meme #cat #kitten
Interesting! Not all software is client-server though. I imagine in case of custom hw like Therac-25 the faulty code produced for firmware AI would be scoped to liability of hw provider who used that code. But, there could be harder to categorize cases, ie AI induced errors in critical mobile apps
This is Koะฏn dubstep album
#meme #necromancy #music #politics
My view on this is that IT cables are layed out so thick because IT guys made them align in that way. If IT cables were part of large sentient being like cat or other animal, they would very likely choose another layout that is more convenient to them not to the IT guys.
Haha thank you for liking yeah I was laughing like crazy when saw it too
Better at cable management
#meme #cables #entropy
Interesting problem to think about: if AI generated code triggers real life disaster, who is in charge of facing the liability?
www.zdnet.com/article/if-y...
Using for measurement
#meme #imperial #metric #system
In any form
#meme #potato #nightshades
Hello from ...
#meme #anime #games
Unseen Cookies
I am the main character
Aphex Twin
How would we know the cause?
Uwaga Kot
DJB exposes NIST manipulations within Kyber encryption standard proposals.
blog.cr.yp.to/20231003-cou...
Leave after second lesson
Courier transform
Filosofem