Forgot your password?
typodupeerror

Comment Re:Herbert was right (Score 1) 76

Not only have I seen that, but I have experienced it.

My socket set and ratchet isn't trying to convince me to be in a relationship with it, to be in love with it, to be something of an equal to it.

Even our pets as living beings capable of expressing themselves are not able to communicate at our level.

Large language model AI is attempting to spoof being human, to mimic being us. There are already examples of people becoming very, VERY upset when their AI-boyfriend or AI-girlfriend is taken away by companies revising the AI standards and interaction rules. This is unhealthy. The relationship needs to remain that of tool user and tool, because anything more than that is one-sided and subject to terrible abuse by anyone that managed to co-opt that system.

Comment Re:Windows is crashing because? (Score 1) 114

The most recent crashes I've had were all due to external hardware. (usually a dock being unplugged) I haven't seen that recently though so maybe that was addressed.

I've also had issues in the past with not going to sleep / waking back up properly, but again haven't really seen that recently so maybe that too was addressed.

Pretty much 100% of my recent related issues have simply been "system's getting slow, and no my memory hasn't all leaked away, it just wants a restart", and so I DO restart it, and I get all my performance back. It's annoying, but not impactful. Not sure what's getting gummed up under the hood, I don't see anything getting logged or showing up in any monitoring tool.

I tend to push my machine pretty regularly though, and end up being coerced into rebooting about once a month.

I do a lot of photo manipulation, and I HAVE ran into a problem with Finder's QuickLook gradually getting slower after tens of thousands (yes really) of videos and images being quick-looked, but I can just kill the Finder's QuickLook process and it automatically bounces back fresh as a baby. So whatever "general slowness" issue I've been encountering after weeks of uptime could probably be fixed if I knew what needed to be bounced, but nothing is making itself obvious with high cpu time or memory use, so I just have to reboot to get it back.

A bit OT but I do find it a bit sad that windows has decided to do away with the traditional BSoD, not by making the OS more stable, but by hiding it when it happens. "Nothing to see here, everything's fine!" (NakedGun)

Comment Re: Mac Studio is a redesigned Mac Pro (Score 1) 86

maybe not? Look at cache for example, there's L1, L2, and L3, each getting bigger and slower. Just because L2 is slower doesn't mean it doesn't get used.

Or look at some of the older storage techniques like hybrid drives. (such as 1tb of spinning platters, with 32gb of ssd)

Modern SSDs are even doing that. Watch the IO speed when you write a large file, see how it's fast to a point and then gets slow? that's a write buffer getting filled up.

Maybe the same technique could be used with ram, basically on the same lines as the VM files that unix systems (including Mac OS) use?

So there's plenty of precedent for adding higher latency storage, simply because the big increase in capacity is worth a little added latency. Carefully managing what you use it for greatly reduces the impact of the latency.

Comment Re:Why is this even a critricism? (Score 1) 77

Legally speaking, threats fall under "assault". If I raise my fist to you and step up and punch you, I'll probably be charged with "assault and battery". Where "assault" is the "imminent, credible threat of physical violence" of raising my fist and approaching you, and "battery" is my actually hitting you, (and if I miss or you dodge, that trades n the Battery for a second Assault charge) It's an important distinction because the laws and consequences differ

A threat of physical violence must be credible to be assault. That usually places the bar at "a reasonable person would genuinely fear for their safety as a result of the words and actions".

"Remote threats" are handled a bit differently. They used to go through the US Mail and so were addressed with "mailing threatening communications" (part of 18 U.S. Code) although that requires a lot more investment and consideration. Get out pen and paper, think about what you're going to write, draft the threat, stuffit in an envelope, add a stamp, take it to a mail box. That involves lots of time to reconsider, plus the investment of time, paper, envelope, stamp, and finally time to go mail it. (all while reconsidering and being able to change your mind) Most threats never made it into the mailbox as tempers cooled and emotion gave way to reason. But if it made it all the way through that process, a reasonable person would more easily be able to conclude the threat was credible

Now, it's fifteen seconds of "furiously type a line or two of rage and click Send." And it's handled by the FCC now since it's using an interstate communications network. There's a separate "legal bar" for it to pass, but it's essentially the same thing. The laws are much more recently authored, and so require a bit more since courts now rely more on letter of the law than interpretation by a judge. They're looking for Intent (specifically, are you venting, intimidating, or announcing your intentions), does the message describe a credible threat to the victim, and is it specific about what's being threatened.

"I'm gonna dance a jig the day someone ends you!" - lacks intent
"if I get my hands on you l'm going to launch you into space and watch you suffocate!" - not credible
"you're going to regret the day you pissed me off!" - not specific

(Law Abiding Citizen demonstrates masterful avoidance of legal classifications by careful choice of words)

Although as mentioned above, power and money can press a thumb down on the scales of justice and get an investigation launched regardless of established legal standards.

Comment Re:Why is this even a critricism? (Score 1) 77

To be fair, you don't have to DO anything criminal, you just have to be a suspect, or piss off someone with power and money. (like Patel) Then they get a court order, and then information is legally required to be handed over for investigation.

And so as long as you didn't actually do anything criminal, your identity should stay private and only visible to the investigators, and get swallowed by the system as the investigation gets closed. (unless above power/money pushes for a public arrest/hearing, regardless of merit)

Comment Re:Mac Studio is a redesigned Mac Pro (Score 1) 86

Thunderbolt (4 etc) has been leading to things like external graphics cards and external PCI slot boxes hitting the market. This may end up taking a significant share of the "expandability" crowd away from the "internal upgrades" market.

I see this as especially significant with laptops. For years I've been using a large thunderbolt dock with my laptop at home, making it a pretty good desktop machine when I'm at home. It adds a 24" display, big external speakers and bass, camera, conference mic, external storage, gig ethernet, etc. And yet I can pull a single plug, stuff it in the bag, and hit the road with it, something not easy to do with a desktop computer. (not that it stopped us from hauling towers, monitors, keyboards, etc to LAN games in the 90s!)

I'm a little surprised I haven't seen performance CPUs or additional ram available via thunderbolt 4 yet. (or does it exist and I've just missed it?)

Maybe the next "mac pro" won't be a stand-alone computer, but instead it'll be a plug-in accessory that turns ANY mac into a mac pro?

Comment Why we don't polygraph people anymore (Score 2) 116

I can think of a few things leading to Voight-Kampff-style polygraph tests being phased out in this timeline

1. Several U.S. states have banned reliance on polygraph test results by employers. "Polygraph" on Wikipedia lists Rhode Island, Massachusetts, Maryland, New Jersey, Oregon, Delaware and Iowa. In addition, the federal Employee Polygraph Protection Act 1998 generally bans polygraphing by employers outside the rent-a-cop industry.
2. Autism advocacy organizations raised a stink about false positive results on autistic or otherwise neurodivergent human beings.
3. The LLM training set probably picked up answers from someone's cheat sheet, such as "The turtle was dragging its hind leg, and I was waiting for it to stop squirming so I could see if it needed to go to the vet."

Comment Re:You're Absolutely Right! (Score 2) 116

This debate has been going on for at least a couple of decades. I remember back in the Usenet days, when AOL and other early ISP users first started showing up in droves with whacked out untraceable bang paths that people were trying to sort out technical solutions, usually involving some servers tarpitting some domains, with the inevitable consequence that valid users (by whatever definition any given Usenet group had) were blocked.

In a way, AI bots aren't any different than the spam problem on fax machines and email; universal low-barrier delivery meets large scale programmatic swill. AI allows complexity that earlier spambots couldn't dream of, when the most sophisticated way of defeating filters was spelling "porn" as "pr0n" and a bit of header fuckery. In the end there is only two ways to go; either do what filtering you can and accept some degree of false positives, or go to identification systems that will, one way or the other, compromise anonymity, because make no mistake, once you start storing any kind of data linking an account to an actual human being; biometric, picture ID, phone number, mailing address or whatever, it won't take long for the court order to show up demanding you hand over all the de-anonymized account data to find the person distributing child porn, drugs, or calling their local political representative dirty names.

Slashdot Top Deals

About the time we think we can make ends meet, somebody moves the ends. -- Herbert Hoover

Working...