Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)SU
Posts
0
Comments
569
Joined
1 yr. ago

  • That's not how the justice system works in most (all?) Europe. Crimes are not a point system where you redeem "prizes", and the sentence is based on the particular crime committed, not the sum of all individual counts.

    Many countries are also very rarely giving life sentences because they have generally very little point (no possibility to re-enter society=no rehabilitation possible) in addition to create other problems (like a complete disincentive to good behavior in prison - since literally nothing worse can happen to you).

  • Why are you assuming that the female relative is a "need" in order to empathize and not just a way to feel closer to the problem? I think it's fair that if you have deep connections with someone, their problems become your problems. It doesn't mean you wouldn't care about that if you didn't have that connection.

  • For the most part I don't think about it at all. I guess you only consider things when they cause extra effort, in this case it mostly doesn't so it's very unconscious. That said, I generally use the few gendered ones I know (I listed in another comment) because it is the way my native language works.

    By the way, from grammar perspective English is a very simple language. Compared to similar languages (French, Italian etc.), for example, verbs are much simpler too. The harder part of English I think has to do with pronounce.

  • Great points. Not only the output cannot be trusted, but also reviewing code is notoriously a much more boring activity than writing it, which means our attention is going to be more challenged, in addition to the risk of underestimating the importance of the review over time (e.g., it got it right last 99 times, I will skim this one).

  • After 2 years it's quite clear that LLMs still don't have any killer feature. The industry marketing was already talking about skyrocketing productivity, but in reality very few jobs have changed in any noticeable way, and LLM are mostly used for boring or bureaucratic tasks, which usually makes them even more boring or useless.

    Personally I have subscribed to kagi Ultimate which gives access to an assistant based on various LLMs, and I use it to generate snippets of code that I use for doing labs (training) - like AWS policies, or to build commands based on CLI flags, small things like that. For code it gets it wrong very quickly and anyway I find it much harder to re-read and unpack verbose code generated by others compared to simply writing my own. I don't use it for anything that has to do communication, I find it unnecessary and disrespectful, since it's quite clear when the output is from a LLM.

    For these reasons, I generally think it's a potentially useful nice-to-have tool, nothing revolutionary at all. Considering the environmental harm it causes, I am really skeptical the value is worth the damage. I am categorically against those people in my company who want to introduce "AI" (currently banned) for anything other than documentation lookup and similar tasks. In particular, I really don't understand how obtuse people can be thinking that email and presentations are good use cases for LLMs. The last thing we need is to have useless communication longer and LLMs on both sides that produce or summarize bullshit. I can totally see though that some people can more easily envision shortcutting bullshit processes via LLMs than simply changing or removing them.

  • Jamf doesn't do anything for this problem, besides costing you a fortune in both license and maintenance/operation. Especially if you are not a Mac shop.

    MDM at most can be used as a reactive tool to do something on the machine - as long as the one with the machine in their hand leaves the network connection on.

    There are much cheaper solution to do that for 1 machine, and -as others correctly pointed out- the only solution (partial) here is not storing the data on a machine you don't control. Period.

  • Many encryption algorithms rely on the assumption that the factorizations of numbers in prime numbers has an exponential cost and not a polynomial cost (I.e. is a NP problem and not P, and we don't know if P != NP although many would bet on it). Whether there are infinite prime numbers or not is really irrelevant in the context you are mentioning, because encryption relies on factorizing finite numbers of relatively fixed sizes.

    The problem is that for big numbers like n=p*q (where p and q are both prime) it's expensive to recover p and q given n.

    Note that actually more modern ciphers don't rely on this (like elliptic curve crypto).

  • Yep, my partner gave one for my birthday, it's basically plug-and-play. It can automatically harvest credentials, spoof captive portals, etc. I bet that in most places nobody would question something like this hanging on the ceiling indeed.