an option is to use docker pytorch/rocm, which works pretty much out of the box with a1111
edit: https://rocm.docs.amd.com/en/docs-5.6.1/how_to/pytorch_install/pytorch_install.html
came from reddit and haven’t looked back
an option is to use docker pytorch/rocm, which works pretty much out of the box with a1111
edit: https://rocm.docs.amd.com/en/docs-5.6.1/how_to/pytorch_install/pytorch_install.html
VMware went to the shitter, try with virtualbox
konsole with tmux
what’s c: ?
yeah, everybody should use them. I usually write my own kernel mods tailored for my hardware and certain needs, I don’t know why not everyone is doing that. admittedly is a bit janky maintaining a separate kernel fork, but you get used to it, everyone should do it
I disagree with your interpretation, that it seems complicated
clickbait title. basically, if your machine is already compromised in a severe way, here is another way how to compromise it further (for whatever reason)
apparently you are unaware of how much monitoring goes on in corporate IT. you’re lucky they haven’t already found the mac address yet booted with a different os, or maybe they’re already onto you.
I would stop doing what you’re doing immediately and hope it’s not too late
either docker pull pytorch/rocm:latest, or yay -S rocm-hip-runtime, works reliably for me
The number of papers that subscribers are allowed to print…
hahaha
frankly though, if the data is that much worth to me, the last place I’d rely keeping it safe is big tech
Garuda or endeavourOS
7900xtx all the way
get jumped on by Manjaro fans
nah, we appreciate the nuance instead of mAnJARo bAd. I agree the AUR can be a problem and in the past so has, but for me hasn’t in a while and never severe
the good old I have nothing to hide
now compare that to Chrome, which basically puts your house in the middle of a city full of leeches and scammers but no way to close the curtains
but you wouldn’t have to
I don’t agree with this take. the warning seems totally reasonable to me
who uses Chrome on Linux