

It’s a bit of a stretch calling it a plastic, as it’s not petroleum based from what I’ve read.
It’s a bit of a stretch calling it a plastic, as it’s not petroleum based from what I’ve read.
You cannot meaningfully delete your posts or comments. That’s not because of any issue with lemmy, but because you posted them publicly. They will be archived and indexed in other services.It is always best to remember that all your activity here is public, and will be linked to your username. Given that, you may wish to minimise any personally identifying information you post, and use several accounts to split up your activities by topic.
I don’t believe other instances will receive any sort of deletion request from lemm.ee, it’ll just go away. Any instances that have a copy of your posts or comments will keep them for as long as they wish. Even if you manually delete the comments and lemm.ee federates that action out, there is no guarantee that any other server will actually act on it, and you can be certain that archiving services will not.
Ultimately it comes down to the fact that you posted, commented or voted in public, and that will remain public indefinitely. That’s as much down to howpublic data is captured by other entities as it is to the concept of federation.
It might, possibly, be a viable use case if the LLM produced the summary for an editor, who then confirmed it’s veracity and appropriateness to the article and posted it themselves.
Do not respond by playing loud noises back, no matter how tempting, that’ll just give him the chance to say “see, they’re the ones doing it”. Going away for a break might be a great idea though, just to get some rest and relax a bit. I’d suggest putting up external cameras covering the whole property, and internals covering doirs and windows first though, just in case he does anything harmful. I know you said he was frail, but you don’t want to take chances.
Not at all, but I’d say we don’t really remember ancient kings either. We might remember the effect they had on the world, or some particularly unusual characteristic that was recorded for posterity, but I’d say that once the last person who knew them dies, we can no longer remember ‘them’, so much as witness a sort of ‘shell’ of ideas about them.
We don’t remember what they sounded like, or smelt like, how they smiled or what they said to their nearest and dearest. We don’t really know much about them as people compared to the king that became their shell. The things that made them unique people are gone when the last person who experienced them dies, so I’d say we really don’t remember them as people, even if we do remember the ‘king’ or ‘copper merchant’.
If the details aren’t specific to your server, could you post the body of the message? They might not stop there, and I’d like to know what’s going on before they hit my server.
Do we actuall remember Ea-Nasir, or do we just recall a modern meme about one aspect of his life?
Walked across a room and pulled a muscle in my shoulder. It was painful enough that I could barely lift it for a week or so.
There are certainly better ways, but I suspect this way is cheaper as the only need to stock one connector type.
My kids have a pile of cardboard screws that they use to turn boxes into all sorts of things; rockets, forts, cars and you could probably make organizers, shelves and the like too. The screws grip the cardboard surprisingly well, and it’s easy to make even quite large structures robust.
Could you let me know what sort of models you’re using? Everything I’ve tried has basically been so bad it was quicker and more reliable to to the job myself. Most of the models can barely write boilerplate code accurately and securely, let alone anything even moderately complex.
I’ve tried to get them to analyse code too, and that’s hit and miss at best, even with small programs. I’d have no faith at all that they could handle anything larger; the answers they give would be confident and wrong, which is easy to spot with something small, but much harder to catch with a large, multi process system spread over a network. It’s hard enough for humans, who have actual context, understanding and domain knowledge, to do it well, and I’ve, personally, not seen any evidence that an LLM (which is what I’m assuming you’re referring to) could do anywhere near as well. I don’t doubt that they flag some issues, but without a comprehensive, human, review of the system architecture, implementation and code, you can’t be sure what they’ve missed, and if you’re going to do that anyway, you’ve done the job yourself!
Having said that, I’ve no doubt that things will improve, programming languages have well defined syntaxes and so they should be some of the easiest types of text for an LLM to parse and build a context from. If that can be combined with enough domain knowledge, a description of the deployment environment and a model that’s actually trained for and tuned for code analysis and security auditing, it might be possible to get similar results to humans.
I’m unlikely to do a full code audit, unless something about it doesn’t pass the ‘sniff test’. I will often go over the main code flows, the issue tracker, mailing lists and comments, positive or negative, from users on other forums.
I mean, if you’re not doing that, what are you doing, just installing it and using it??!? Where’s the fun in that? (I mean this at least semi seriously, you learn a lot about the software you’re running if you put in some effort to learn about it)
‘AI’ as we currently know it, is terrible at this sort of task. It’s not capable of understanding the flow of the code in any meaningful way, and tends to raise entirely spurious issues (see the problems the curl author has with being overwhealmed for example). It also wont spot actually malicious code that’s been included with any sort of care, nor would it find intentional behaviour that would be harmful or counterproductive in the particular scenario you want to use the program.
Thanks for the comment, it rather made my day.
Actually, you have that backwards, you see, the act was known as ‘shagging’, from the old english ‘shagadelic’ meaning excellent or enjoyable, long before the carpet existed. The style of carpet was found to be ideal for ‘shagging’ on, especially in groups, as the long fibres reduced slipping. Thus it became known as ‘shag pile’ due to the piles of ‘shaggers’ often using them.
This post is brought to you by the letters B, S, and insufficient sleep.
Edit the config was useful if you were trying to hook up a more unusual monitor that had odd timings or more overscan than a normal one, but it was definitely arcane magic.
It’s an interesting observation. We observe the world in landscape because our eyes are positioned to give us a goid balance between binocular vision and seeing predators in our peripheral vision, but most of our interactions are portrait, I suspect due to our upright posture. Most of the instances you mentioned are with things that either are, or are evolutiobs if things that were, designed around the fact we are talker than we are wide.
It would be interesting to observe whether animals with a different posture interact differently.
A valid point, trackers often give you a certain amount of upload credit for free, and there are often other ways to earn those credits too, so all users’ ratios would be above 1.0, but that should have read “A closed group of users can all have a seed ratio of 1.0” if we’re looking at just the data transfer itself.
A closed group of users can all have a seed ratio above 1.0, but it’s a bit of a contrived set up. For simplicity, in the following examples we assume that each file is the same size, but this also works for other combinations.
Consider the smallest group, two users. If user A seeds a file and user B downloads it, whilst B seeds a different file, which A downloads, both users will have a ratio of 1.0 as they’ve up and down loaded the same amount.
For three users, A seeds a file, B and C then download a different half each, which they then share with each other. A has a total (upload, download) of (1,0), whilst B and C have (0.5,1). If you repeat this with B seeding and A and C downloading, then C seeding to A and B, you get each peer uploading 2 files worth of data, and downloading 2 files worth, for a ratio of 1.0 each.
You can keep adding peers and keep the ratios balanced, so it is possible for all the users on a private tracker to have a 1.0 ratio, but it’s very unlikely to work out like that in real life, which is why you have other ways to boost your ratio.
Help