• 0 Posts
  • 8 Comments
Joined 1 year ago
cake
Cake day: July 3rd, 2023

help-circle






  • On one hand it’s a pretty common acronym in consulting-businees work. But on the other you’d think Wired, as a general tech publication, would want to take the two sentence to explain what it is and how it’s generally used.

    It could be a pretty big value to remove humans in this step. A lot of times the rfp contents are known-ish anyway. You’re a tech dev firm, and someone wants a proposal for building an app in a framework you know, you already have language probably you’ve used. In theory this is a great application of AI to speed up the process of building this. The request is “hey we need these things and want this and this”. A consumer facing business might present this information as a FAQ or custom order process anyway, so automating an rfp could be good since it speeds things along.

    In practice, who knows. If it isn’t accurate, if it takes longer to edit than just write from scratch, then that would suck. It’ll likely be another way to “reduce headcount” cause of “efficiencies” regardless of how good it is. I doubt this changes anything for most sales executives job status, for people who work in those departments that support those execs though, probably not good


  • I’m not an expert but I think : The site you visit only sees the VPNs info. Which is how you maintain some anonymity while browsing. However, if your VPN keeps logs, then you can still be tracked, just at a different place. Some say they don’t keep logs, and you’d have to trust that.

    RAM is considered volatile memory, so each time the server turns off, it loses all data. This is compared to disk (hard drives of whatever type) which retain memory even if the server turns off.

    In theory, this ram only server prevents them from keeping logs (like which user went where) since the server wouldn’t even have a place to store it.

    Edit: lustrums post is more accurate and has info that this doesn’t prevent logging per se, but could prevent accidental logging. I.e. they can’t hire a forensic computer specialist to parse through operating system logs to try to find info they didn’t otherwise log elsewhere.