This article was originally printed in 2600 The Hacker Quarterly Volume 38, Number 3 The release of Windows 95 (and later Windows 98) was such a great time for pranksters. The addition of features such as Active Desktop, multi-user accounts, Internet explorer – all of these areas were just rife for exploitation… I mean exploration. […]
Introduction From Sony’s metallic marvel Aibo, the robot dog that barks in binary, to the questionably edible Chia Pet – a glorified house plant, nothing screams “21st-century ennui” more than our love affair with artificial pets. These impersonal, battery-operated furballs and clay-covered critters provide an avenue for the millennial, Gen Z, and boomer alike to […]
Introduction Before we dive into the project, we should at least provide a brief explanation of Stable Diffusion. Since it’s already been the subject of mass interweb hysteria for quite some time, I’m not going to go into any great detail. Stable Diffusion is a generative art modal algorithm that was originally put forth by […]
At this point, a lot of people have probably seen the Cthulhu-style dread horror series Stranger Things. Even if you haven’t, you will still be able to follow the gist of this blog post. As I was catching up on the second season of Stranger Things, there was a brief scene involving Sean Astin’s character, […]
With blood, sweat and tears, this company is finally off the ground. Now let the money start rolling in baby because I have the combined business acumen of the underpants gnomes combined with Sam the Eagle.