What is it? Here’s a little pet-project I put together just for fun. It’s called CIPH-R.com (pronounced like “cipher”) It is for when you want to say a certain thing online but you know the word will get flagged and get your comment deleted. The solution is to create a ciph-r...
Technology
I use Bing to search from time to time. It’s a decent alternative to Google, which I avoid entirely. Overall, I appreciate Bing’s results but the everchanging page drives me insane. Things are constantly moving. If I click a link and then press “back” to return to the Bing page,...
If you plug in your headphones and nothing happens, and you need to reboot your computer to get your headphones working, this post might be just for you! The problem is with the Realtek service that runs on your computer. No, don’t try to update the driver, like all the...
Right now, artificial intelligence a mysterious realm that lawmakers think is magic and when murderers leverage it to kill people, they will prey on the ignorance of the courts to exonerate themselves. They’ll say “we could not have known”, “it wasn’t our fault”, “it had a mind of its own”,...
Artificial intelligence is totally fake. A computer cannot do anything except what it was programmed to do. Sure, there are variables in code, and different actions can be taken based on values of variables, but it cannot have a mind of its own. If a computer system “runs off” and...
Allow me to explain…
Handy time-saving PowerShell script to run a batch of scripts easily.
These are the published weather modification attempts, from http://noaa.gov. According to US Code Title 15 Section 9a: The Secretary shall maintain a record of weather modification activities, including attempts, which take place in the United States and shall publish summaries thereof from time to time as he determines. https://library.noaa.gov/Collections/Digital-Collections/Weather-Modification-Project-Reports https://library.noaa.gov/weather-climate/weather-modification-project-reports...
I’m not too keen on this creepy idea. It’s bad enough that your phone has to “look at you”, but then to tie it to your logins makes it worse. That makes your phone the controlling device of any login, even on your computer. People mistake this for security because...