The Mind's I: Fantasies and Reflections on Self and Soul by Douglas R. Hofstadter & Daniel Clement Dennett, 2001
With contributions from Jorge Luis Borges, Richard Dawkins, John Searle, and Robert Nozick, The Mind's I explores the meaning of self and consciousness through the perspectives of literature, artificial intelligence, psychology, and other disciplines.
The social norm is constructed: not naturally occurring but created by the society in which it is found.
Hence there are no actions which in themselves are inherently #abnormal or universally condemned by all societies at all times. Deviance is thus situational and contextual.
The social norm is constructed: not naturally occurring but created by the society in which it is found.
Hence there are no actions which in themselves are inherently #abnormal or universally condemned by all societies at all times. Deviance is thus situational and contextual.
So....I want to migrate from Mastodon to Sharkey. The catch is, I would LIKE to end up back on my current domain....is this possible at all?
I have a domain I could park a Sharkey instance to migrate to, but if I make a new Sharkey instance on my current domain after I shut the Mastodon instance down, will I be able to migrate back with little issue?🤔
Richard Rohr's contemplation inspired me to write about my own difficulty facing reality as my dog approaches the end of her life. Find my blog post here: https://www.spiritualbnr.org/living-in-reality
Richard Rohr reminds us that the self is a small, petty product of the ego, but the Self is everything. "People with a distorted image of self, world, or God will be largely incapable of experiencing what is Really Real in the world." You can find his meditation here: https://cac.org/daily-meditations/our-limited-perspectives/
I'm looking for advice on how to get started with a NAS, probably Synology since it's beginner friendly and often well recommended. I'm thinking of a 2 bay case with 2x4TB HDDs in RAID1 setup. What do I have to look out for in a device to get the best bang for my bucks?...
Però non è vero: se la chiudete a modino, ovvero da SSH sul server su cui sta, con il comando "tootctl self-destruct", viene mandata una notifica di chiusura di nebbia a tutte le istanze note a nebbia (che sono tutte quelle che ospitano account con cui tutti gli account di nebbia hanno interagito da quando è nata), e tutte queste istanze cancellano tutti i post di tutt* le utent* nebbia che hanno ricevuto: https://docs.joinmastodon.org/admin/tootctl/#self-destruct 🙂
New #introduction post! I am a chill person just looking for a void to scream into and engage in an occasional conversation with random strangers. I have one too many profiles, but I'll put those in a different post and pin it. I'm #Black, #Transmasculine#Genderqueer, and #Queer. I'm a #Self-published #author. A huge #MusicLover. I'm serious I will listen to anything. I occasionally delve into #politics but it's most vague posts, and #USPol since I'm in the US. Feel free to say hi!
No, I don't think we would have #Perl in our web browsers (and possibly everywhere else). But #JavaScript might have started less #Self-ish and a little more Perl-ish.
Do you still the have the link to news article where it was reported?
Earlier I was using Pi-Hole on my network then switched to AdGuard Home (not same as AdGuard DNS) as it is an open source product with in-built DOH support (yes, I can setup Pi-Hole to do the same, but that’s an extra manual configuration) and Privacy Guide seems to recommend it over Pi-hole. After reading your post, I tried to lookup more about it. Nothing on Wiki. Closest thing is this. If the allegations are true then I need to switch back to Pi-Hole.
#CyberSecurity#TrustedComputing: "After all, a system that treats the device's owner as an adversary is a natural ally for the owner's other, human adversaries. The rubric for treating the owner as an adversary focuses on the way that users can be fooled by bad people with bad programs. If your computer gets taken over by malicious software, that malware might intercept queries from your antivirus program and send it false data that lulls it into thinking your computer is fine, even as your private data is being plundered and your system is being used to launch malware attacks on others.
These separate, non-user-accessible, non-updateable secure systems serve a nubs of certainty, a remote fortress that observes and faithfully reports on the interior workings of your computer. This separate system can't be user-modifiable or field-updateable, because then malicious software could impersonate the user and disable the security chip.
It's true that compromised computers are a real and terrifying problem. Your computer is privy to your most intimate secrets and an attacker who can turn it against you can harm you in untold ways. But the widespread redesign of out computers to treat us as their enemies gives rise to a range of completely predictable and – I would argue – even worse harms. Building computers that treat their owners as untrusted parties is a system that works well, but fails badly." https://pluralistic.net/2024/01/18/descartes-delenda-est/#self-destruct-sequence-initiated
Beginner looking for NAS advice
I'm looking for advice on how to get started with a NAS, probably Synology since it's beginner friendly and often well recommended. I'm thinking of a 2 bay case with 2x4TB HDDs in RAID1 setup. What do I have to look out for in a device to get the best bang for my bucks?...
AdGuard Temp Mail: new temporary email service launched - gHacks Tech News (www.ghacks.net)
AdGuard Temp Mail’s addresses are temporary and aren’t stored long by design:...