this post was submitted on 10 Apr 2025
221 points (85.8% liked)

memes

14306 readers
4424 users here now

Community rules

1. Be civilNo trolling, bigotry or other insulting / annoying behaviour

2. No politicsThis is non-politics community. For political memes please go to [email protected]

3. No recent repostsCheck for reposts when posting a meme, you can only repost after 1 month

4. No botsNo bots without the express approval of the mods or the admins

5. No Spam/AdsNo advertisements or spam. This is an instance rule and the only way to live.

A collection of some classic Lemmy memes for your enjoyment

Sister communities

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 2 points 1 week ago (3 children)
[–] [email protected] 6 points 1 week ago

Me, personally? Nothing. Prefer to go without AI.

[–] [email protected] 3 points 1 week ago (1 children)

I personally use it to make art for my FOSS game I make as a hobby.

[–] [email protected] 1 points 1 week ago (1 children)
[–] [email protected] 2 points 1 week ago (1 children)
[–] [email protected] 1 points 1 week ago (1 children)

Looks like the video on the homepage is broken? But looks awesome!

[–] [email protected] 3 points 1 week ago

It's some itch nonsense with different browsers. Try another browser but the video is not so important

[–] [email protected] 2 points 1 week ago

Not OP that you asked, but I've used ai before to examine netflow data at the head of a medium sized network and identify malicious traffic via netflow anomaly, rather than the signature based methods that are used by current network intrusion detection systems. It's effectiveness is contingent on having good data that contains labeled malicious packets to train on, but it was pretty dope in lab conditions to watch a graduate ethical hacking class try to compromise my testbed network and my best performing ai powered intrusion detection algorithms were able to accurately flag something like 90% of the malicious traffic.

If we had an organization dedicated to creating like a modern version of the NSL-KDD dataset every 6 months or so I think this type of network intrusion detection system would be extremely effective.