Might be factoring in more than just state income tax. There's also sales tax, property tax, etc.
Renegade
Purely speculation but, I wonder if this is a case of having some old, very low quality photos and trying to enhance and upscale them for the show.
Kinda buried the headline
A Royal Mail executive does admit that its "overly sensitive" machines can sometimes wrongly flag genuine stamps as fake
They are charging £5 (to the recipient) for these false positives!
When asked why the machine might be wrongly flagging a legitimate stamp, the executive replied: “I mean who knows ..."
Richard Trinder, the chairman of a campaign group that represents those wrongly convicted in the Horizon IT scandal, said: “It goes without saying that postmasters do not want to have to deal with false accusations about something else.”
Article takes a long time to say very little.
*Ten things that will pad out my list of generic rpg book topics. I definitely didn't start with a clickable title and then fumble coming up with the ten things.
You can generate your own tracks using bing chat.
All the Suno tracks I've heard have a similar style. Very procedural and formulaic. Calling it AI seams like a stretch.
Relevant article: https://lemmy.ml/post/12857742
Prompt engineering is a thing, but I wouldn't say it's much of a job title. There are people doing it: optimizing system prompts, preprocessing and postprocessing, llms are just one piece of a complex pipeline and someone has to build all that. Prompt engineering is part the boot strapping for making better llms but this work is largely being done by data scientists who are on the forefront of understanding how AI works.
So is prompt engineering just typing questions? IDK. Who knows what those people mean when they say that but whatever it's called there is a specialized field around improving AI tech and prompt engineering is certainly a part.
Containers are a really cool part of security. The security provided will depend on how the container is configured. For example if you give the container bridged networking permissions (or whatever equivalent term is used by your solution) then you're giving the container access to communicate with other devices on your local network. This would be the opposite of what you want to do to prevent an attacker from pivoting through your LAN.
Other threats just aren't within the set of protections that can be provided by a container. For example if you wish to protect your Minecraft world from being griefed the container won't have any affect on this. Another example is hiding your IP.
Basically what I'm saying is that whenever you are looking at a security technology think about what guarantees it provides and realize that no single security measure provides protection against all threats.
You're basically relying on the security of minecraft, and your ability to quickly patch. The Log4j exploit is one good example of the kind of threats you might face.
Another is just that revealing your ip can open an opportunity for various forms of harassment. Lots of us skate by on obscurity and luck without to many issues, but that's not a very robust solution.
Nothing in the article corroborated the claim in the title that human intervention made things worse, just that the problem goes deeper.
That makes a lot of sense!