Skip to content

Bill Gates and Linus Torvalds meet for the first time.

Technology
41 35 0
  • Do you remember Windows 95? How about Windows 96?

    Technology technology
    32
    77 Stimmen
    32 Beiträge
    0 Aufrufe
    M
    Ha, thanks for searching!
  • 92 Stimmen
    5 Beiträge
    4 Aufrufe
    H
    This is interesting to me as I like to say the llms are basically another abstraction of search. Initially it was links with no real weight that had to be gone through and then various algorithms weighted the return, then the results started giving a small blurb so one did not have to follow every link, and now your basically getting a report which should have references to the sources. I would like to see this looking at how folks engage with an llm. Basically my guess is if one treats the llm as a helper and collaborates to create the product that they will remember more than if they treat it as a servant and just instructs them to do it and takes the output as is.
  • Using A Videocard As A Computer Enclosure

    Technology technology
    5
    1
    86 Stimmen
    5 Beiträge
    6 Aufrufe
    T
    Back in the day there was a pic floating about where someone had put a micro atx board and psu into a standard PSU chassis into a standard PC case for a spectacular "empty case" mod
  • 848 Stimmen
    133 Beiträge
    11 Aufrufe
    A
    reminds me of the time when something with Amazon was Indian employees
  • 50 Stimmen
    11 Beiträge
    6 Aufrufe
    G
    Anyone here use XING?
  • 93 Stimmen
    42 Beiträge
    6 Aufrufe
    G
    You don’t understand. The tracking and spying is the entire point of the maneuver. The ‘children are accessing porn’ thing is just a Trojan horse to justify the spying. I understand what are you saying, I simply don't consider to check if a law is applied as a Trojan horse in itself. I would agree if the EU had said to these sites "give us all the the access log, a list of your subscriber, every data you gather and a list of every IP it ever connected to your site", and even this way does not imply that with only the IP you could know who the user is without even asking the telecom company for help. So, is it a Trojan horse ? Maybe, it heavily depend on how the EU want to do it. If they just ask "show me how you try to avoid that a minor access your material", which normally is the fist step, I don't see how it could be a Trojan horse. It could become, I agree on that. As you pointed out, it’s already illegal for them to access it, and parents are legally required to prevent their children from accessing it. No, parents are not legally required to prevent it. The seller (or provider) is legally required. It is a subtle but important difference. But you don’t lock down the entire population, or institute pre-crime surveillance policies, just because some parents are not going to follow the law. True. You simply impose laws that make mandatories for the provider to check if he can sell/serve something to someone. I mean asking that the cashier of mall check if I am an adult when I buy a bottle of wine is no different than asking to Pornhub to check if the viewer is an adult. I agree that in one case is really simple and in the other is really hard (and it is becoming harder by the day). You then charge the guilty parents after the offense. Ok, it would work, but then how do you caught the offendind parents if not checking what everyone do ? Is it not simpler to try to prevent it instead ?
  • Big Tech Wants to Become Its Own Bank

    Technology technology
    33
    1
    246 Stimmen
    33 Beiträge
    4 Aufrufe
    B
    I know, I was just being snarky
  • 221 Stimmen
    99 Beiträge
    21 Aufrufe
    G
    In highrises with lots of stops and users, it uses some more advanced software to schedule the optimal stops, or distribute the load between multiple lifts. A similar concept exists for HDD controllers, where the read write arm must move to different positions to load data stored on different plates and sectors, and Repositioning the head is a slow and expensive process that cuts down the data transfer rate.