Skip to content

Leading AI Models Are Completely Flunking the Three Laws of Robotics

Technology
37 27 505
  • 232 Stimmen
    71 Beiträge
    67 Aufrufe
    S
    So while Utah punches above its weight in tech, St. Paul area absolutely dwarfs it in population. Surely they have a robust cybersecurity industry there... https://lecbyo.files.cmp.optimizely.com/download/fa9be256b74111efa0ca8e42e80f1a8f?sfvrsn=a8aa5246_2 Utah, #1 projected tech sector growth in the next decade, of all 50 states. Utah, #8 for tech sector % of entire state economy, of all 50 states. Minnesota? Doesn't crack top 10 for any metrics. Utah may not be the biggest or techiest state, but it is way more so than Minnesota. The National Guard just seems like a desperate move. Again, this is my argument, but you are only seeing desperation as due to incompetence, not due to... actual severity. When they're deployed, they take orders from the the federal military, Not actually true unless the Nat Guard has been given a direct command by the Pentagon. and at peace, monitoring foreign threats seems like a federal thing. ... which is why the FBI were called in, in addition to the Nat Guard being able to report up the military CoC. You call in the National Guard to put down a riot or something where you just need bodies, not for anything niche. I mean, you yourself have explained that the Nat Guard does have a CyberSec ability, and I've explained they also have the ability to potentially summon even greater CyberSec ability. I guess you would be surprised how involved the military is / can be in defending against national security threatening, critical infrastructure comprimising kinds of domestic threats. Remember Stuxnet? Yeah other people can do that to us now, we kinda uncorked the genie bottle on that one. Otherwise, just call a local cybersecurity firm to trace the attack and assess damage. It is not everyone's instinct or best practice to immediately hire a contracted firm to do things that government agencies can, and have a responsibility to do. If this was like, Amazon being comprimised, yeah I can see that being a more likely avenue, though if it was serious, they'd probably call in some or multiple forms of 'the Feds' as well. But this was a breach/compromise of a municipal network... thats a government thing. Not a private sector thing. EDIT: Also, you are acting like either you are unaware of the following, or ... don't think its real? https://en.wikipedia.org/wiki/Utah_Data_Center Kind of a really big deal in terms of Utah and the tech sector and the Federal government and... things that were totally illegal before the PATRIOT Act. Exabytes of storage. Exabytes. Utah literally is where the NSA is doing their damndest to make a hardcopy of literally all internet traffic and content. Given how classified this facility is, I wouldn't be surprised if their employees don't exactly show up in standard Utah employment figures.
  • 26 Stimmen
    3 Beiträge
    15 Aufrufe
    swelter_spark@reddthat.comS
    I need to shop on Temu more often. I had no idea what I was missing out on.
  • You should block Censys from scanning your network

    Technology technology
    4
    1
    20 Stimmen
    4 Beiträge
    22 Aufrufe
    S
    I mean, you can, or you can use it to assure your firewall is configured correctly. The entire Internet is scanning you at all times, why would you focus your attention on one of the services who is willing to share their results with you? Believe me, you probably have lower hanging fruit to pick.
  • Why front-end development will persist

    Technology technology
    2
    1
    19 Stimmen
    2 Beiträge
    29 Aufrufe
    H
    An LLM has “zero context” about your project’s specific stack and style guidelines. In other words, an AI might produce a generic <Modal> component, but integrating it into your app’s unique architecture is still a human task. This is very old. Nowadays, in Copilot for example, you add files to context and tell "hey look how I did that thing there, do this new thing following the same structure, with the same naming conventions" and it's enough. And tools like Cursor just throw your whole project into context by default.
  • 0 Stimmen
    1 Beiträge
    18 Aufrufe
    Niemand hat geantwortet
  • 43 Stimmen
    10 Beiträge
    96 Aufrufe
    D
    Deserved it. Shouldn't have beem a racist xenophobe. Hate speech and incitement of violence is not legally protected in the UK. All those far-right rioters deserves prison.
  • 219 Stimmen
    119 Beiträge
    2k Aufrufe
    L
    Okay, I'd be interested to hear what you think is wrong with this, because I'm pretty sure it's more or less correct. Some sources for you to help you understand these concepts a bit better: What DLSS is and how it works as a starter: https://en.wikipedia.org/wiki/Deep_Learning_Super_Sampling Issues with modern "optimization", including DLSS: https://www.youtube.com/watch?v=lJu_DgCHfx4 TAA comparisons (yes, biased, but accurate): https://old.reddit.com/r/FuckTAA/comments/1e7ozv0/rfucktaa_resource/
  • MCP 101: An Introduction to the MCP Standard

    Technology technology
    2
    1
    5 Stimmen
    2 Beiträge
    30 Aufrufe
    H
    Really? [image: 60a7b1c3-946c-4def-92dd-c04169f01892.gif]