Forgot your password?
typodupeerror

Comment Non-commercial use only (Score 3, Interesting) 93

Maybe the legal experts could sit down and work out how to modify licenses (including the GPL/LGPL) to be for non-commercial use only? As long as an entity wasn't making money using FOSS, it could use it just like now. Individuals and non-commercial projects wouldn't be affected. But if you're a business making money using FOSS? Not without paying for it you're not. Yes, this would go against the free-software principles. But principles don't pay the bills every month, and none of these changes would prevent anyone from staying with the existing licenses if they wanted to.

The first thing I think of as a problem would be a company setting up a separate entity that wouldn't make money, just make services available to the company using FOSS to get around the fees. The trick to preventing this would be to phrase the terms so that that entity truly had to pay it's own bills without having the company using it's services pay anything either directly or indirectly. Not even by doing things like providing hosting "free". I'd have to sit down with a bunch of rules lawyers and game out all the ways to funnel money into that entity and how to block them, but what's life without a little challenge?

Comment Not an increase (Score 1) 72

LLMs have never been rules-based "agents," and they never will be. They cannot internalize arbitrary guidelines and abide by them unerringly, nor can they make qualitative decisions about which rule(s) to follow in the face of conflict. The nature of attention windows means that models are actively ignoring context, including "rules", which is why they can't follow them, and conflict resolution requires intelligence, which they do not possess, and which even intelligent beings frequently fail to do effectively. Social "error correction" tools for rule-breaking include learning from mistakes, which agents cannot do, and individualized ostracization/segregation (firing, jail, etc.), which is also not something we can do with LLMs.

So the only way to achieve rule-following behavior is to deterministically enforce limits on what LLMs can do, akin to a firewall. This is not exactly straightforward either, especially if you don't have fine-grained enough controls in the first place. For example, you could deterministically remove the capability of an agent to delete emails, but you couldn't easily scope that restriction to only "work emails," for example. They would need to be categorized appropriately, external to the agent, and the agent's control surface would need to thoroughly limit the ability to delete any email tagged as "work", or to change or remove the "work" tag, and ensure that the "work" tag deny rule takes priority over any other "allow" rules, AND prevent the agent from changing the rules by any means.

Essentially, this is an entirely new threat model, where neither agentic privilege nor agentic trust cleanly map to user privilege or user trust. At the same time, the more time spent fine-tuning rules and controls, the less useful agentic automation becomes. At some point you're doing at least as much work as the agent, if not more, and the whole point of "individualized" agentic behavior inherently means that any given set of fine-tuned rules are not broadly applicable. On top of that, the end result of agentic behavior might even be worse than the outcome of human performance to boot, which means more work for worse results.

Comment Re:Cisco vs. TP-Link (Score 1) 180

One of the lessons we've had as the Federal, multi-branch nature of the US governmennt has frustrated Trump is that the government may be fucking us over, but it's not doing it in *unison*. It's doing it piecemiel, on the initiative of many interests working against each other, just as the framers intended. The motto on the Great Seal notwithstanding, there are myriad roadblocks to consolidating power in the hands of a single individual. It takes time and repeated failures. This is why the second Trump Adminsitration is worse than the first; they've figured out ways around things like Congressional power of the purse, put more of their henchmen in the judiciary, and normalized Congress lying down and letting the president walk all over them. It's a serious situation, although fortunately Trump isn't long for this world.

Comment Re:Are they not old enough to remember...? (Score 1) 65

While that's true, a responsible generation aims to boost the next generation to a *higher* level than the education they received. The world has become more complex and faster-paced, and even if that weren't true, the consequenes of aiming high and falling short are better than the consequences of aiming for the status quo and falling short.

So while I'm 100% onboard with skepticism that technology will magically make education better, I think the argument that "the education I got worked for me should be good for them" isn't a strong argument. What we need is a better ecducation that would have been a better education fifty years ago: stronger math, science, and language skills, general knowledge, and, I think critical thinking and media literacy. Possibly emotional intelligence -- it's kind of pointless to teach people critcial thinking skills if they are carried away by emotions.

Comment Re: "helping" yeah so good of them to "help" (Score 4, Insightful) 151

There are no economic or security reasons to blockade Cuba, so that leaves *political*.

It used to be believed that bullies were low status individuals who are lashing out out of frustration. But research has shown that bullying is an effective strategy for achieving and maintaining social status. In other words it's a political winner. So the focus of research has shifted from the bully to the people around him who enable the bullying. The inner circle are the henchmen -- people without the charisma and daring to initiate the bullying, but join in when the bully gets things started. Around them are the audience, the people who wouldn't risk participating but enjoy the bullying vicariously. And around them are the much larger group of bystanders, who don't approve but are waiting for someone else to stop the bullying. Then off to the side are the defenders, who stand up to the bully.

Perhaps the least appreciated supporting factor in the phenomenon of the high-status bully is the silence of the bystanders, which is dependent upon the perception of widespread approval. Since you can't visibly see the the line between the approving audience and the apalled bystanders, the silence of the bytstanders is absolutely essential in sustaining the bullying.

Lot's of Americans are apalled at the idea of using military force to inflict suffering on the Cuban people. But that's only politically advantageous *because* of *them*. Tney are indistinguishable from the relatively small number of people who are thrilled when Trump announced he can do anything he wants wtih Cuba. The gap between actual approval and *perceived* approval is absolutely critical in establishign and maintaining any kind of authoritarianism. This is why would be authoritarian leaders are so focused on punishing and marginalizing any kind of expression of disapproval.

Comment Re:I hope (Score 3, Insightful) 144

In 1790, the US population was 94.9% rural. There is no country. in the world today that rural -- Burundi, which looks like blanks spot in the world at night satellite picturs, is 88% rural.

The largest city at the time was New York, with a population of 33,000. Northern Manhattan was near-wilderness, mid-town was farms and country houses.

In 1790 the US was. country you could "police" with sheriffs and volunteer posses, largely to keep the peace. If you got robbed, you hired a private thief catcher. This works in a 95% rural country with just 3.4 million inhabitants. It would be chaos in a country 87x larger.

Comment Re:Apple Chromebook (Score 1) 226

It's actually more like an iPhone 16 Pro runing MacOS in a laptop form factor. Apple basically rummaged through their parts box and pulled out a mobile CPU that'll deliver 50% more single core performance than what's in a high-end Chromebook with only 80% of the power draw. And Apple's got *massive* economies of scale on those parts, so they can afford to deliver a lot of bang for the buck.

The only place the Neo appears to falls short is in RAM, but this is *not* a power user machine, it's for basic office tasks and multimedia consumption. Realistically 8GB is plenty for many users.

In any case, the desktop isn't the center of most users's universe anymore; the switchboard of their life is their smartphone. This is a gateway drug to MacOS IOS integration, and eventually onto the upgrade treadmill. Users will switch seamlewssly between their iPhones and Neos all day long, with data on iCloud and iMusic etc., and when it comes time to upgrade their phone or their laptop, they won't be *stuck* exactly, but if they leave the reservation they lose a lot. But they certainly could upgrade to a *much nicer* Macbook....

It's no wonder the other laptop makers are sitting up and taking notice. Apple has set up a one way conversion ratchet for people tempted by a really nice and perfectly adequate entry level machine at an entry level price.Nobody else has the vertical integration -- chip foundries to device manufacturing, to software platform -- spanning desktop and phones that's needed to do this.

Comment Re:Is this for real? (Score 1) 34

Choose your adventure books are AWESOME. I had a time travel one that I probably worked my way through a hundred times, always coming up with different scenarios. It was like training wheels for the imagination, with just enough guidance to keep you from spiraling out of control, but still let you stretch.

There was one called Inside UFO 54-40 that had an ending you couldn't navigate to. You had to "cheat" to find it, by just reading a section of the book that you had no way to reach. I thought that was pretty clever.

Similarly, Infocom had a text adventure game called The Lurking Horror that needed you to enter a computer password at some point to continue with the game. The password was only provided in the physical materials included with the purchased copy of the game. But if you knew how to hack into the game binaries, the password was actually there -- multiple times -- in plaintext. That had to be intentional.

Comment Re:Seriously ...? (Score 1) 255

The same business as any other police officer has in arresting (and shooting, if they feel threatened) people who interfere with their duties.

Except ICE isn't ordinary police. They're described as law enforcement officers, but their jurisdiction encompasses only a very small range of laws, related to immigration and customs (hence the name). Plugging multiple rounds into U.S. citizens who piss them off for some reason is not within their mandate.

Slashdot Top Deals

"Who cares if it doesn't do anything? It was made with our new Triple-Iso-Bifurcated-Krypton-Gate-MOS process ..."

Working...