サクサク読めて、アプリ限定の機能も多数!
トップへ戻る
どうなる?Twitter
www.reddit.com
Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcuts
NMKD Stable Diffusion GUI v1.1.0 - BETA TEST Download: https://nmkd.itch.io/t2i-gui Installation: Extract anywhere (not a protected folder - NOT Program Files - preferrably a short custom path like D:/Apps/AI/), run StableDiffusionGui.exe, follow instructions. Important: An Nvidia GPU with at least 10 GB is recommended. You can use 6-8 GB too but you'll need to use lower resolutions than 512px whi
Now that's some next level creative thinking. I'd use this incessantly. I have a couple of questions though, is this using the GPU of the pc with the photoshop install or using some kind of connected service to run the SD output? I wonder because if it's using the local GPU it would limit images to 512x512 for most people, having photoshop open and running SD locally is like 100% utilization of an
[Tutorial] "Fine Tuning" Stable Diffusion using only 5 Images Using Textual Inversion. Credits: textual_inversion website. Hello everyone! I see img2img getting a lot of attention, and deservedly so, but textual_inversion is an amazing way to better get what you want represented in your prompts. Whether it's an artistic style, some scenery, a fighting pose, representing a character/person, or redu
Hey there, First of all, I am not affiliated with or employed by Stability. Simply being a mod here has falsely labeled me as such. I do want to point to the fact that I am on very good terms with Stability, they have done a lot for me. I just don't see why I would hide what I know for any longer. I found out about Stable Diffusion very early on. This subreddit had maybe 50 subscribers, I contacte
I see a lot of people asking the same questions. This is just an attempt to get some info in one place for newbies, anyone else is welcome to contribute or make an actual FAQ. Please comment additional help! This thread won't be updated anymore, check out the wiki instead!. Feel free to keep discussion going below! Thanks for the great response everyone (and the awards kind strangers) How do I run
Over the past while, I’ve worked on-and-off in my free time patching the arm64 Linux kernel to run Nintendo Switch games natively, i.e. by taking many of the Switch’s “Horizon” OS system calls and implementing their behavior using Linux’s existing facilities for memory management, scheduling, synchronization, etc. Well my original thought was merely that I wanted to run Switch games on my MacBook—
是真的,这个作者在他的发布源里贴了部分样本和索引集 我下载解包之后导入了excel,发现了三个各含25万条数据的手机号+姓名+地址+身份证号,有效数据总计74万6800多行,最老的数据居然有1930年代生人,某些数据还注明了这些数据来自某某人口办单位,可能是核算或人口普查时留痕的。之后我随机抽取了15行数据,把他们的手机号用“支付宝转账”的姓名校验功能作了验证,结果每一个注册的支付宝实名账号都是真实存在的,每一个人都能被验证(即样本里数据真实)。数据非常杂,地域分布全国,地址也看不出来是快递地址还是备案住址。目前看不出来实用价值,除非是虚假注册账号之类需要这种,但是10BTC的售价成本显然高昂,真搞诈骗的买不起这么贵而且还没经过处理加工的数据。 在第二个包里我找到了“设法联系车主将车撤离”、“报警处理不立案”等字眼,初步判断这是110报警调度台、12345热线或其他应急服务电话调度的数据库
Another update now that I've built my new vSphere ESXi 7.0u3d Alder Lake based host. Parts list: 1 x Intel Core i7 12700 12 Core Alder Lake CPU 1 x ASUS Intel Z690 PRIME Z690-PLUS D4 PCIe 5.0 ATX MB 2 x Patriot Memory Viper Steel 64 GB 2 x 32 GB DDR4 3600 MHz 1 x Noctua NH-D9L, Premium CPU Cooler with NF-A9 92mm Fan (Brown) 1 x Silverstone Grandia HTPC Desktop PC Case 1 x Silverstone RA02B Durable
Late 1990s: write to stdout Java applications are composed of multiple dependencies. These dependencies tend to want to log things. Application authors in turn want to collect all that log information via one API, and want to consistently format it (e.g. with leading timestamps, thread names, log levels, etc). The combination of these things drove a desire to use a logging API, rather than just us
UPDATE: There has been confusion about ongoing risks and speculation about the number of victims of this domain. VShojo believes with a high degree of confidence that there were only 2 victims by the time it shut down the phishing domain, and the bad actors behind this were using completely different tactics outside of this. VShojo will not publicize the methodology behind this conclusion. No addi
My game - ΔV: Rings of Saturn (shameless plug) - is out in Early Access for two years now, and as you can expect, there are bugs. But I did find that a disproportionally big amount of these bugs was reported by players using Linux to play. I started to investigate, and my findings did surprise me. Percentages are easy to talk about, but when I read just them, I always wonder - what is the sample s
I don't have a lot of the optimization experience when might need to answer this question full deep full way, but I do understand generally that in order to do get enough entropy for the operating system to give you a cryptographically unique (slightly different concept than random, but related) it takes a little bit of time. While I don't know a lot of the specifics, the is needs to determine tha
I'm gonna make a video about it, but what I used was a pico, a multiplexer (74HC4051), 4 buttons and 4 ssd1306 screens who use i2c. Everything is written in circuitpython :D EDIT: here's a link to the github with code and parts list, no schematic just yet. https://github.com/BlueHippoGithub/Pico-stream-deck-v1
In this analogy I have a model train and lots of friends. The model train represents the variable that my function owns, and my friends represent other functions. It came to me in the shower. Default: move By default in rust, everything is move. I simply give my train to my friend. Now it's his train. I don't have a train anymore :( Read-only borrow: Many functions can read-only borrow my data. No
Data source: Data compiled from How Secure is My Password Tool used: Illustrator and Excel This table is an updated table based on this article by Mike Halsey, Microsoft MVP, from 2012. It outlines the time it takes a computer to brute force your password, and isn’t indicative of how fast a hacker can crack your password. It’s a good visual to show people not in the industry why better passwords c
I was just going to write an in-Slack terminal next week, and I even had the same idea on the way it would look. That’s awesome, I’ll definitely be using it as a reference. Thanks man :)
初めまして。 ObsidianのiPad版とBluetoothキーボードを組み合わせた際の挙動について、質問させてください。 上記の組み合わせで日本語入力を行うと、 - 入力確定前の文字列が勝手に確定され、更にそれを保持したまま行頭にカーソルが移動する - 入力確定前の文字列とカーソルが突然非表示になり、タップでカーソルを再設置しないと入力を受け付けなくなる といった問題が発生します。 発生頻度はかなりバラツキがあります。体感では、長文を未確定のまま入力しているとよく発生するイメージです。 以下が原因ではないかとアタリをつけて試してみましたが、解消には至りませんでした。 - 片手キーボードPRO(キーボードアプリ)の使用…設定→一般→キーボードから削除しても解消せず。 - ライブ変換…無効にしても解消せず。
The themes of the Opening Ceremony are "Moving Forward" and "United by Emotion." According to the organizers, the goal of the Ceremony is to "bring the world together as one through the power of sport and a sense of hope for the future" by showcasing a "series of moments that give each and every one of us the strength to look towards the future, and that also serve as opportunities to create a bet
Cornelius, one of composers for Tokyo Olympics ceremonies has shockingly infamous track records for bullying: forcing his schoolmate with disabilities to eat his own excrement
When sending an e-mail through Office 365 without a To address, but multiple Bcc addresses, the domain of the first Bcc recipient is included in every e-mail to all the Bcc recipients. Take for example this e-mail: From: me@myoffice365domain.com To: [empty] Cc: [empty] Bcc: someone@amnesty.com, someoneelse@newyorktimes.com Subject: Some information you'd be interested in... The e-mail received by
Google Sheets Link Based on Metascore and the Main Story time on howlongtobeat. It's not meant to be an exhaustive list. I'm sure I missed some games, plus not every game has a score/time, so please mention them in comments. This is more like a bunch of recommendations for people who like shorter games. I originally made the list for myself but I thought some here might be interested. I was gonna
次のページ
このページを最初にブックマークしてみませんか?
『reddit: the front page of the internet』の新着エントリーを見る
j次のブックマーク
k前のブックマーク
lあとで読む
eコメント一覧を開く
oページを開く