Forgot your password?
typodupeerror

Comment Re:The question to ask (Score 1) 199

There's a good site with multiple studies on this question: https://transitcosts.com/

Basically there are a lot of reasons, but a few key ones are:

- The US doesn't have centralized organizations for planning and designing rail systems. We mostly have small regional systems and each stretch of rail and each station is bespoke requiring an outside (expensive) company to design and built it.

- Bidding process along with accountability is a bit broken. Contractors aren't required to show line items and penalties for overruns and delays cause them to submit higher bids. The desgin/build process is also poor in part due to the previous point.

- Environmental restrictions cause massive delays, don't have proper coordination to expedite, and are easy for people against a project (or even sometimes for) to submit complaints that cause everything to become later and more expensive.

Comment Re:And the Death Spiral (Score 1) 348

I think you've got it mixed up. When tax rates go down, tax revenues goes down. It's pretty obvious and we've seen the extremes in places like Kansas where they reduced taxes dramatically and had massive budget shortfalls.

Likewise, states and municipalities frequently raise money via raising taxes.

You lumped politicians into one category, but it should really be two: Those that run functional governments, and Republicans/libertarians who think lowering taxes will result in greater income

Comment Re:We need humility, not arrogance (Score 1) 172

Sounds like you have a very academic view of the situation.

It's unlikely you could write software to find *all vulnerabilities* except in very basic cases, but it's very likely you could write software or train a model to find lots of vulnerabilities.

Yes it would require context in some cases - solution: Provide context!

LLMs can even deduce some of the intent automatically. There's plenty of data in the training explaining how a browser should work and previous vulnerabilities

Comment Re:We need humility, not arrogance (Score 1) 172

LLMs are good at matching patterns - they produce output based on inputs. You might have some weird warped definition of "capable of insight" that this doesn't fit, but in reality the results are insightful. They don't do natively do math (these days they'll usually offload that to a different model), but that's not what we're looking at here.

There's lots of research on vulnerabilities in software. For example, in general, if a user input allows you to read data from the stack through a buffer overflow, that's a vulnerability. I could list dozens of similar examples and LLMs are trained on data including these. No formal specification is needed and remember that you can feed in enough code for the LLM to have the context needed to determine if it's a valid vulnerability.

This recent report from Mozilla proves that the results can be good, they are real world use cases, and are finding vulnerabilities. Continuing to pretend that it's not a viable technology just makes you look like you're plugging your ears going "la la la"

Slashdot Top Deals

The only person who always got his work done by Friday was Robinson Crusoe.

Working...