an option is to use docker pytorch/rocm, which works pretty much out of the box with a1111
edit: https://rocm.docs.amd.com/en/docs-5.6.1/how_to/pytorch_install/pytorch_install.html
came from reddit and haven’t looked back
an option is to use docker pytorch/rocm, which works pretty much out of the box with a1111
edit: https://rocm.docs.amd.com/en/docs-5.6.1/how_to/pytorch_install/pytorch_install.html
VMware went to the shitter, try with virtualbox
konsole with tmux
what’s c: ?
yeah, everybody should use them. I usually write my own kernel mods tailored for my hardware and certain needs, I don’t know why not everyone is doing that. admittedly is a bit janky maintaining a separate kernel fork, but you get used to it, everyone should do it
I disagree with your interpretation, that it seems complicated
clickbait title. basically, if your machine is already compromised in a severe way, here is another way how to compromise it further (for whatever reason)
apparently you are unaware of how much monitoring goes on in corporate IT. you’re lucky they haven’t already found the mac address yet booted with a different os, or maybe they’re already onto you.
I would stop doing what you’re doing immediately and hope it’s not too late
either docker pull pytorch/rocm:latest, or yay -S rocm-hip-runtime, works reliably for me
Garuda or endeavourOS
that’s exactly why this is the right answer
ah, like yahoo early 2000s!
who uses Chrome on Linux