Forgot your password?
typodupeerror

Comment Re:What's the problem? (Score 1) 47

Exactly. I've never heard of this person or this film. If you don't like it, don't watch it. IDK why everything has to be a "controversy" now.

Everything that is divisive has to be a controversy. It's kind of the definition.

What you're really asking is, "why is this divisive?" It's divisive because some people want AI everywhere in art (the corporations that bankroll and profit from art) and some people do not want AI everywhere in art (most artists, many consumers of art). Nearly nobody is demanding AI to be nowhere in art, just that its use is constrained to where it makes sense. But different people have different tolerances and that makes the topic divisive.

As for your (and the OP's) delightful suggestion that "if you don't like it, don't watch it", disclosure and publicity are precisely, exactly, and solely how such a decision can be made. If you don't know a cosmetic company is testing on bunnies, you can't boycott them. If you don't know a food product contains nuts, you can't act upon your allergies wisely. Point is: publicity and talking about it is literally the first, omitted step in your plan.

For every question "why don't they just", there is usually at least one good answer.

Comment Re:Overland cables, anyone? (Score 1) 354

I wonder when it's gonna start making more sense to start opting for land routes for new cables, when possible. The bad actors can still try to attack them, of course, but they'll be easier to monitor and repair. When conflict erupts, you could probably protect a land cable reasonably well with drones.

It'll start making more sense when it starts making more sense.

What I mean is that companies do whatever is the most profitable, and you can therefore judge what is most profitable by what they do. Undersea cables will be used where they're used until they're less profitable than overland cables with longer routes. Yes, sabotage plays into that. But so far that inflection point hasn't been reached.

Comment Re:For crying out loud, stop using that term. (Score 1) 40

I don't care where the term originated, but calling it "jailbreaking" just makes it sound like you're doing something illicit. No one would think twice about it if you said you were going to "enable expanded functionality mode" on their Kindle, since it's out of support now. Implying you're going to get in trouble for freely using hardware you paid for outright for is such a corpo psyop.

When you're wrongfully imprisoned, jailbreak may be your only recourse.

Comment Meanwhile, at Carnegie Mellon... (Score 4, Interesting) 193

Jensen Huang to college grads: "Run. Don't walk" toward AI

https://www.axios.com/2026/05/...

Nvidia founder and CEO Jensen Huang told graduates at Carnegie Mellon University in Pittsburgh yesterday that demand for AI infrastructure is creating a "once-in-a-generation opportunity to reindustrialize America and restore the nation's capacity to build."

Why it matters: With many college grads fearing AI could obliterate their career dreams, Huang pointed to boundless opportunity as a "new industry is being born. A new era of science and discovery is beginning ... I cannot imagine a more exciting time to begin your life's work."

Nvidia, which makes AI chips, is the world's most valuable company. Huang told 5,800 recipients of undergraduate and graduate degrees that the AI buildout will require plumbers, electricians, ironworkers, and builders for chip factories, data centers and advanced manufacturing facilities.

"No generation has entered the world with more powerful tools â" or greater opportunities â" than you," he said. "We are all standing at the same starting line. This is your moment to help shape what comes next. So run. Don't walk."

"Every major technological revolution in history created fear alongside opportunity," Huang added. "When society engages technology openly, responsibly, and optimistically, we expand human potential far more than we diminish it."

Full speech: https://www.youtube.com/watch?...

Comment Re:Just what we need (Score 2) 98

So we're taking a superior, simpler power source and drive chain and adding a fake clutch to make it simulate an older, inferior power source and drive chain. Brilliant. In 25 years people will look at these and wonder "what the hell were they thinking?"

Frankly I'm thinking... whatever it takes to sell bikers on replacing their painfully noisy kill-me machines with silent kill-me machines is worth it.

As for the "it's loud so car drivers know I'm there", sorry but the only times I've ever not known a bike was near me is when they were doing something illegal, unsafe, and unpredictable. People who refuse to wear high-vis reflective clothing don't get to pick how loud their vehicles are.

Comment Re:MFA (Score 1) 106

If the desktop/laptop/phone isn't registered in the client's MDM

We gotta have your cell phone number. Because security, you know.

As it happens, MDM doesn't (necessarily) need that. AFAIK you can use a tablet or a phone with Wifi only. And I mentioned MDM-managed desktops and laptops.

While yes, situations like your anecdote exist, MDM isn't some excuse for capturing employee data.

Comment Re:MFA (Score 4, Interesting) 106

With MFA, it should not be a catastrophe if someone obtains your password. That's the point of it.

MFA is - to a certain degree - compromised.

There are real-world exploits for - for instance M365 - that work like this:

A user gets a malicious, disposable link via e-mail.
The user clicks the link.
The link takes them to a carefully crafted web site, and asks for their username & password.
The user has been partially phished.
The web site initiates an logon call back to M365 in the background and harvests the two-digit code that the end-user needs.
The web site displays the two-digit code.
The user's authenticator app is asking the user for the code... for the bad guy's login session.
The user enters the two-digit code they're seeing.
The bad guys are now in, add their own MFA device and exploit everything they can.

The same thing can happen with TOTP. Anything that an end-user can do can be repeated in near real-time. The phishing site asking for your OTP just re-uses it and feeds it into the real place.

We've been shifting our clients to a "compliant device" position. If the desktop/laptop/phone isn't registered in the client's MDM, it isn't allowed to log on. Yes it's got some overhead to it and yes, getting client buy-in is a struggle. But the days of allowing logons from anywhere, any device are dwindling.

Here's a video about how this works: https://www.youtube.com/watch?...

Comment Communists demand Communism (Score 0) 82

So yeah your AI can outperform a doctor that gets 5 minutes with the patient before having to move on to the next one in order to keep their private equity Masters satisfied.

So, suppose, we stick it to the "private equity Masters", compel them to double the number of doctors — forget for a second, who is going to pay for them — and afford them a whopping 10 minutes with the patient.

ChatGPT will still beat humans... And it will be getting better with every month, whereas the humans will not...

Comment Don't seek an ideal (Score 0) 82

A new study from Harvard Medical School and Beth Israel Deaconess found that an OpenAI reasoning model outperformed experienced ER doctors at diagnosing and managing patient cases

AI is sufficiently anthropomorphic to be capable of making mistakes. Demanding perfection from it is stupid. It does not need to be error-free. It just needs to be better than humans...

Comment Re:and an exploit will be published in 3, 2, 1 ... (Score 1) 89

As a friend of mine in an uncharacteristic fit of insight once said, as long as there is a decision point that can be discovered, yes and the code goes this way, no and the code goes that way, it is in principle possible to write a patch to circumvent any DRM.

Not to disparage your friend but... that a thing is possible in principle does not necessitate it being possible in practicality.

Worse, it is unhelpful to adopt a position of "yet another restriction will inevitably" be circumvented. Side-loading is more difficult on Android than it has ever been. Jailbreaking on iOS is more difficult on Apple than it has ever been. Piracy is more difficult than it has ever been (since the inception of the Internet). Every time a convenient torrent indexer is shut down, sure, three more may pop up but they tend to be less convenient, have less content, and have more malware and fakes. When a manufacturer does something unpleasant, it is not useful to say "it's going to be okay... it is always going to be okay." It's not.

Comment Re: Nice data center ya got there! (Score 0) 110

because only a few at every level of government liked them *and* their legal status is very dubious

There, there. With enough of China-sponsored whipping up, the liking of a nuclear weapons research lab can be sunk overnight just as well. Indeed, this very story describes a symptom of that happening.

the rule of law is excruciatingly imperiled atm

"At the moment"? Laughing out loud...

Comment Re:Nice data center ya got there! (Score 0) 110

This effectively is a fight between two branches of government, one federal, the other municipal

Federal government is at quite a disadvantage on local level — as ICE have found out dealing with other (or the same) anti-Americans.

David just might defeat Goliath

David was neither an insurrectionist, nor given aid or comfort to the enemies of his government.

Slashdot Top Deals

Do you suffer painful elimination? -- Don Knuth, "Structured Programming with Gotos"

Working...