@j4k3@lemmy.ml avatar

j4k3

@j4k3@lemmy.ml

This profile is from a federated server and may be incomplete. Browse more on the original instance.

j4k3,
@j4k3@lemmy.ml avatar

Any word on the next generation of matrix math acceleration hardware? Is anything currently getting integrated into the kernel? Where are the gource branches looking interesting for hardware pulls and merges?

j4k3,
@j4k3@lemmy.ml avatar

The offline AI that I tried a few months ago probably needed training on the noise environment to get decent results. I forget which ones I tried but likely the ones with extensions already in Oobabooga Textgen. I was messing with text to speech mostly, but some of the ones that do TTS also have packages and examples for STT. Nothing I tried for offline generation was good enough to speak as an AI prompt without manual corrections.

j4k3,
@j4k3@lemmy.ml avatar

What is the story on all the porn shorts attributed to RE?

j4k3,
@j4k3@lemmy.ml avatar

Roku just announced they are going out of business the slow way.

j4k3,
@j4k3@lemmy.ml avatar

You likely have secure boot and a Microsoft package key installed in UEFI. They likely did what they are supposed to do and removed the unsigned software.

You must either sign your own UEFI keys using the options in your bootloader that may or may not be present, or you must use a distro that has the m$ signed secure boot shim key. These are the only ways for both m$ and Linux to coexist. Indeed, with a shim key (Fedora/Ubuntu) you can easily have a windows partition on the same drive without issues.

Secure boot is a scheme to steal hardware ownership. Of course they say it is not because the standard specifies a mechanism to sign your own keys. However the standard specification is only a guideline and most consumer grade implementations do not allow custom key generation and signing.

If you need to do your own keys, search for the US defense department’s guide on the subject. It is by far the most comprehensive explanation of the system and how to set it up correctly. They have a big motivation to prevent corporate data stalking type nonsense and make this kind of documentation accessible publicly.

If your bootloader does not allow custom keys, there is a little known tool called Keytool that allows you to boot directly into UEFI and supposedly change the keys regardless of the implemented utility in the bootloader. I have never tried this myself. The only documentation I have found was from Gentoo, but their documentation assumes a very high level of competence.

j4k3,
@j4k3@lemmy.ml avatar

I would use OpenWRT documentation to get an idea of low level mechanisms and paths. This looks like a rabbit hole but your answer is probably somewhere around here and is just setting an alias somewhere:

openwrt.org/docs/guide-developer/mac.addressgithub.com/openwrt/openwrt/pull/2159

  • All
  • Subscribed
  • Moderated
  • Favorites
  • fightinggames
  • All magazines