@danie10 if you start using a new google service or a new feature of an older service, remember not to fall in love with it. There’s a good chance it will be discontinued within two years. Can you imagine writing lots of stuff in google wave or spending time making annotations to YouTube videos. All of that’s gone now.
How Accurate is our #TensorFlow Lite Model on #BL602? Can we do better?
https://lupyuen.github.io/articles/tflite?5#how-accurate-is-it
@wolf480pl @izaya @2ck Having studies a little bit of calligraphy and the history of writing, I’m pretty sure some of these odd conventions came from necessity. Nowadays, in the age of infinite screen space, there’s no need to combine separate letters into ligatures or collapse multiple closing symbols into one. In the age of expensive vellum things were very different. However, that still doesn’t explain silent letters though. That’s just wasted space IMO.
@wolf480pl @izaya @2ck I have to say, that structure is very unusual, but to me it still looks perfectly coherent.
@tripu This might not be exactly what you want, but it’s a step in the right direction. https://wiki.lineageos.org/devices/lt02ltespr
@codeHaiku I’m using it on a touch screen laptop, and I don’t have any real complaints besides the fact that the default orientation happens to be portrait. Haven’t found a solution yet, but eventually I will. But on a desktop with a normal keyboard and mouse, I prefer to use KDE or Cinnamon. In an environment like that, I can’t really see myself using Gnome.
@codeHaiku Out of curiosity, which part of Gnome 40 bothers you? Does something go against your workflow?
@kelbot I actually know someone who uses a Raspberry Pi as a desktop replacement. He must really believe in this law.
@fribbledom
I use a password hasher
@fribbledom
On paper can also be a password manager. Physical access thieves are more likely to steal a high value item like a phone or a laptop than a paper notebook.
@fribbledom I rely on a hybrid solution. Some of them are in a password manager, but I also use passwordmaker for some. The beauty of it is, that there's nothing to hack in a system like that, because nothing is stored anywhere. It's sort of like a hash function that's given two inputs: your master password and the domain you're tyring to log into.
Speaking of generating passwords, I also have a few (not very important) passwords that are generated in my head with some rules I've decided earlier. This way you don't need to remember anything other than the rules. Just look at the name of the site you're at, and run that through the algorithm you've got in your head and there's the password you can't be bothered to memorize.
@dansup probably pay for it if they didn't steal all my information and use it against me.
@anon_known Look for interesting conversations and participate in them. When you find interesting people, start following them.
@boilingsteam Sure, these installation scripts have been around the quite some time. I just find it very suspicious that #arch would recommend using one on the first of April.
I’m interested in science and technology. Free and open source software are important to me.