If your fiduciary duty is to "humanity" or whatever this board's is/was, then it could make sense to conclude that duty is better fulfilled by keeping Altman under your watch, even with your powers much diminished, than by letting him go to Microsoft.
My problem with this approach is that the stuff I want to look at in 10 yrs time is never the stuff I think of saving right now.
In the 2000s there were browser extensions I've forgotten the names of (shelf? slogger?) that would automatically save local copies of every webpage on page load. But I don't think they're around anymore and have no idea how you could achieve similar functionality with dynamic pages anyway.
> But I don't think they're around anymore and have no idea how you could achieve similar functionality with dynamic pages anyway.
Chromium's MHTML "Save as…" and the SingleFile WebExtension should both save copies of the rendered DOM.
Apparently Safari has WebArchive and Mozilla had MAFF for similar use cases.
I think WARC is supposed to save enough data about network streams for dynamic pages to work. At least on the Wayback Machine, infinite scrolling and "Load More" buttons do kinda work sometimes. You may have to load the archived pages in a browser and try to use each dynamic feature at least once, to trigger requests for needed resources.
I can remember this, scrolling through page after page of the same release since only 3 or 4 big "PWA" or "FLT" logos could fit on a page. I remember more or less the same visual style as graffiti from the era. I had no idea this stuff was still happening in 2015.
Why not then publish the strategies once outmoded, or are they in fact published? Can I go see somewhere what strategies big funds used in the 90s to make bank, which presumably no longer offer a competitive advantage? The way I can go see what computer exploits/hacks used to work when they were still secret?
Maybe it's just what I know, but I can't help but think the "strategies" are a lot like security exploits--some cleverness, some technical facility, but mainly the result of staring at the system for a really long time and stumbling on things.
Why not? Because you won't know what of your strategies is outmoded by something new because that group is not publishing their strategy, which is like yours but on steroids, either.
And then everything regresses to the Dark Forest game theory.
Spell the assembly backwards out loud with no prior notes while juggling knives (shows boldness in the way you approach problems!) and standing on a gymnastics ball (shows flexibility and well-roundedness)...
Very plausible. I'm pretty sure the vast majority of purchasers have only a dim notion of what RAM beyond more==better is, let alone "Copilot". Especially if it is marketed as a feature, which it is.
This is true, I don't even really know what this fuss is about or even what this "DRM" thing is except it's something the .nfo file says has been removed
I don't work there but I imagine when this happens it's because the employee needs access to the resource for some legit reasons, but accessing it for illegitimate reason is what amounts to the violation. So access controls here would amount to reviewing the reasons for the access.
Solution would then be to ask for and log the reason for the access. Possibly with an approval needed by a second person. You can still lie about why you need access, but at least it is logged then.
reply