
I don’t miss spending hours trying to get a slot on the modem pool.
But I’m still happy to while away a few hours on mume.org or some random Diku server.
I don’t miss spending hours trying to get a slot on the modem pool.
But I’m still happy to while away a few hours on mume.org or some random Diku server.
Facebook was never fine; it just wasn’t a silo effect at first—but it was still a privacy and security nightmare.
I remember cliques and a lack of online monoculture on Usenet and IRC before the World Wide Web even existed; the web exploded things even further, as did the privatization of DNS and takeover of funding by VCs and ad conglomerates. All that had happened by 1998.
When was this?
Asking as someone who’s been on the Internet since 1989.
For decades, many computer scientists have presumed that for practical purposes, the outputs of good hash functions are generally indistinguishable from genuine randomness — an assumption they call the random oracle model.
Er, no. The falsity of this is taught in virtually all first year CS courses.
Computer programmers and other IT workers? Sure… but hash functions have never been considered a substitute fore pure randomness.
That’s why we have a random generator in each computer based on thermal variance, I/O input, and other actually random features. And even then, we have to be careful not to hash the randomness out of the source data.
And those status reports will be generated by AI, because that’s where the real savings is.
So you treated it like a junior developer and did a thorough review of its output.
I think the only disagreement here is on the semantics.
Yeah, I’ve added AI to my review process. Sure, things take a bit longer, but the end result has been reviewed by me AND compared against a large body of code in the training data.
It regularly catches stuff I miss or ignore on a first review based on ignoring context that shouldn’t matter (eg, how reliable the person is who wrote the code).
I’ve had success with:
Essentially, all the stuff that I’d need to review anyway, but use of AI means that actually generating the content can be done in a consistent manner that I don’t have to think about. I don’t let it create anything, just transform things in blocks that I can quickly review for correctness and appropriateness. Kind of like getting a junior programmer to do something for me.
Security isn’t the size of the app, it’s how you use it :)
Those circumstances include immediate threats to national security and situations where a person is in danger of death or serious injury.
Well I see a problem there. It doesn’t specify the cause of the danger or the reason the person is in danger in the first place.
EFF missed a fun opportunity to call the Rayhunter “DeCSS”.
There’s only one way to solve all diseases.
Did they test this on Mars first?
Most major content producers have agreements with YouTube such that as their content is discovered, monetization all goes to the rights holders. In general, this seems like a pretty good idea, and better than copyright maximalism.
However, I’ve had original works of my own “monetized by rights holder” because they used my work (with permission) in one of their products, and so now have co-opted all expressions of my work on YouTube. So the system isn’t perfect.
May??? They’ve been targeting them for years!
I wonder how much of that can be traced back to Broadcom acquiring VMWare?
Bridge mode disables the router in the modem; if you have an admin account on the modem you should be able to enable it yourself; otherwise you need to get your ISP to enable it. It will turn off all the firewall and WiFi features on the modem.
You need to use their modem quite often, but you don’t need to use their router. They’re usually “all in one” modem/router things these days, but they’re legally required to provide you with a modem in bridge mode if you ask — at that point, an Ethernet cable attached to their modem is effectively attached to the Internet, and you can put your own hardware inside (firewall, Wifi router, etc.).
While you need to connect to their IP gateway, you don’t need to use their DNS services or anything but their IP gateway service.
It doesn’t really matter… the data is managed by a third party in another country. I have no real control over who gets access to it, intentionally or otherwise. Better that the data just doesn’t exist in the first place.
There’s also the fact that
Now, these things could both change over time, but humans are much more efficient to train than current state of the art probability sieves we call GenAI.