I’m David. I live in Tacoma, Washington. I do square foot gardening, home automation with Home Assistant, and have too many cats.
You think you saw me behind some ferns? You just might have!
It is…I would like a Fediverse video platform, but this one ain’t very cash money.
A reminder that Loops has a TOS that effectively grants them an unlimited license to use your likeness for whatever purpose they desire. Including AI generation. https://loops.video/legal/terms-of-service#7
There are a couple ‘Other - Please Specify’ fields I definitely filled out with ‘Do not do AI’.
I haven’t seen that before, sounds like a bug report may be in order; maybe first look under the ‘Encryption’ section.
Under ‘Encryption’, check to make sure it shows your password is valid, and see if the number of decrypted items matches your other devices? Also, at one time I managed to have several encryption keys, see if it only lists the one or multiple.
“I’m sorry, we won’t be able to hand out annual bonuses this year due to the CEO’S new yacht economic downturn”
≡(ಠ ェ ಠ)≡
I get the joke, but with no prior context it’s kind of a jerk move to assume the player already opened it if they asked for a perception OR an investigation. A Mimic would normally just ambush you OR attack when the player opens them. If it was opened it’s probably already attacking, and if it was closed then performing a perception shouldn’t cause initiative until rolled (if the mimic noticed you noticing it, for instance).
I’ll…I’ll crawl back into my dingy nerd tavern now…
Ah, this looks like it’s a snap to use.
Supply chains are literally chains of suppliers, e.g. vendors. Your ‘simplest electronic product’ could absolutely be constrained by whom you choose to work with.
If your vendor locks you into buying from a certain source, and their vendor requires the same, and so on up the chain, how would you describe that dynamic to differentiate from a single vendor being the point of restriction?
To your point that the phrase didn’t exist, here are three supply-chain oriented papers that directly reference the phrase: This paper is exploring the social dynamics of buyers and sellers:
Lock-in situations in supply chains: A social exchange theoretic study of sourcing arrangements
Specifically, we believe that the examination of lock-in situations between a manufacturer and its supplier, i.e., instances where for all intent and purposes, one party is heavily dependent upon the other party, with few alternatives, under social exchange theory, can provide new insights into controlled self-interest behaviors (e.g., strategies) in on-going supply chain relationships.
This paper is about supply chains in plastic management, but the phrase is here:
Business models and sustainable plastic management: A systematic review of the literature
Barriers frequently mentioned were high costs, complexity of new systems, supply chain lock-in and low customer buy-in.
And here’s a paper about optimizing your supply chain where it is referenced as something to avoid:
Orchestrating cradle-to-cradle innovation across the value chain
This one even has a handy definition:
Supply chain lock-in:
Contracts and strong dependencies with suppliers not supporting circularity (e.g., either due to non-willingness or lock-in in production facilities optimized for linear concepts).
I suppose if you would like to be super extra pendantic Wikipedia does have you covered with “Collective Monopolistic Vendor Lock-in”.
Try another search engine: https://xo.wtf/search?q=what+is+supply-chain+lock-in
In case you needed to look it up like I did:
Impact of gravity on fluid dynamics, gravity waves: https://en.wikipedia.org/wiki/Gravity_wave
Impact of gravitational fields in astrophysics, gravitational waves: https://en.wikipedia.org/wiki/Gravitational_wave
Can you share what the final desired goal is? It sounds like your goal is actually to provide your services to Bob securely over the internet, is that a fair description? You mentioned eventually grabbing a domain, how do you feel about publicly exposed services with authentication? For instance, I use authentik in front of Jellyfin and paperless myself for a little extra authentication juice.
Also Firefox on Linux, it loaded for me.
unrepentant nano gang rise up
I’ve passed through my GPU for acceleration purposes which has worked pretty well. I don’t see a passed-through GPU in your screenshot. I’ll assume you turned on the correct IOMMU and SR-IOV settings, added the PCI:E hardware to that VM, and made sure it showed up inside the guest OS?
It’s true, at least there’s a great backlog to explore. We can always be nostalgic for AI-less nostalgia…
I’m a big fan of a vodka Paloma!
4 parts grapefruit vodka
2 parts soda or a sparkling water.
1 part lime juice
optional - agave or simple syrup to taste.
You can rim the glass with salt and garnish with lime, serve over ice! You can also add various chopped fruits or other juices for a nice visual/taste mixup, like that cranberry.
Universe would die before monkey with keyboard writes Shakespeare, study finds
Maybe the monkey can be a little less of a dick, for science?!
I’m only having the most basic of vodka margaritas, but I’m pretending it’s extra haunted.
…coho on the blowho’?
…I got nothing…