• 1 Post
  • 360 Comments
Joined 2 years ago
cake
Cake day: December 25th, 2023

help-circle


  • Copy/paste instead of linking because Lemmy doesn’t like me>

    I can shad a light on that! […]

    When we’re in a fast paces dialogue with a high level of rapport I start speaking my thoughts before they’re finished - and it happens that a thought starts out as “my opinion is …” And in the middle transfers to “oh it would be way more interesting what your thoughts on this are!”.

    Or I’m mentally distracted and fall back to the monologue voice …

    Either way: the flow of the sentence already started as a statement and now I want to make sure that it’s clear that your input is wanted and appreciated - and instead of saying “and perhaps that sounded like a statement but please treat it as a question” I fall back to “question mark.”


  • Oh I can shad a light on that! Hope it’s not en pair with the shelter animal hunting though.

    When we’re in a fast paces dialogue with a high level of rapport I start speaking my thoughts before they’re finished - and it happens that a thought starts out as “my opinion is …” And in the middle transfers to “oh it would be way more interesting what your thoughts on this are!”. Or I’m mentally distracted and fall back to the monologue voice …

    Either way: the flow of the sentence already started as a statement and now I want to make sure that it’s clear that your input is wanted and appreciated - and instead of saying “and perhaps that sounded like a statement but please treat it as a question” I fall back to “question mark.”



  • In the sense of okhams razor it’s also possible that you’re just more sensibilized to the term.

    It would be a fun experiment to next time first check YouTube before looking it up elsewhere, just to eliminate the chance that the information vector is before the search.

    From there then come various other possibilities (from behaviour based prediction to Lemmy profe linking).

    Just to widen the search area!


  • I’m with what @BCsven@lemmy.ca said: get s mixed box if unsure.

    That said: highly depending on her age and interests as well there is no need to go deeper into specific bricks.

    After all the only thing that prevents a couple of 4x2 to become an airplane is imagination. Or a fire, a house, an animal.

    So I suggest depending on age and interest to just talk with her and adjust accordingly.

    And: especially Lego can be sometimes sniped used in big mixed boxes at flea markets and the likes - something that would bring s but of lootbox excitement in your lifes without the downsides;)



  • I can’t argue about the historic relevance; The article you linked is from 2020, the issues from early 2019. The original matrix developing company seems to have deep ties as described, yes.

    But:

    If you follow the very first link I. The article you can read the history of the matrix protocol itself. It shows where and when the matrix protocol was separated from this company and what the status quo seems to be:

    https://en.m.wikipedia.org/wiki/Matrix_(protocol)#History

    From this it seems clear to me that the information from this article are by now obviously outdated with KDE and Mozilla two big mentioned community projects that are involved.

    Wikipedia as primary source is not well suited, but the fact that the article linked to it themselves seem to show that they relied on the back then status quo.

    In short: in 2017 they would be absolutely right, in 2020 there were still huge issues - but by now those are mostly addressed or are unknown.



  • For the non link clickers. I give it interesting enough:

    On 05/10/2017 07:40, Jay R. Ashworth wrote:

    Does anyone have a pointer to an authoritative source on why

    10/8 172.16/12 and 192.168/16

    were the ranges chosen to enshrine in the RFC? …

    The RFC explains the reason why we chose three ranges from “Class A,B & C” respectively: CIDR had been specified but had not been widely implemented. There was a significant amount of equipment out there that still was “classful”.

    As far as I recall the choice of the particular ranges were as follows:

    10/8: the ARPANET had just been turned off. One of us suggested it and Jon considered this a good re-use of this “historical” address block. We also suspected that “net 10” might have been hard coded in some places, so re-using it for private address space rather than in inter-AS routing might have the slight advantage of keeping such silliness local.

    172.16/12: the lowest unallocated /12 in class B space.

    192.168/16: the lowest unallocated /16 in class C block 192/8.

    In summary: IANA allocated this space just as it would have for any other purpose. As the IANA, Jon was very consistent unless there was a really good reason to be creative.

    Daniel (co-author of RFC1918)





  • I see your point but there is one major difference between adults and children: adults are by default fully responsible for themselves z children are not.

    As for your question: I won’t blame the parents here in the slightest because they will likely put more than enough blame on themselves. Instead I’ll try to keep it general:

    Independent of technology, what a parent can do is learn behavior and communication patterns that can be signs of mental illness.

    That’s independent of the technology.

    This is a big task because the border between normal puberty and behavior that warrants action is slim to non-existent.

    Overall I wish for way better education for parents both in terms of age appropriate patterns as well as what kind of help is available to them depending on their country and culture.


  • Sadly there is no answer for you available because many of the processes around this are hidden.

    I can only chime in from my own amateur experiments and there are answer is a clear “depends”. Most adjustments are made either via additional training data. This simply means that you take more data and feed it indi an already trained LLM. The result is again an LLM black box with all its stochastic magic.

    The other big way are system prompts. Those are simply instructions that already get interpreted as a part of te request and provide limitations.

    These can get white fancy by now, in the sense of “when the following query asks you to count something run this python script with whatever you’re supposed to count as input, the result will be a json that you can take then and do XYZ with it.”

    Or more simple: you tell the model to use other programs and how to use them.

    For both approaches I don’t need to maintain list: For the first one I have no way of knowing what it’s doing in detail and I just need to keep the documents themselves.

    For the second one it’s literally a human readable text.



  • The first part is a technical question and the second part a definition one.

    For the how to: the most common approach is to simply blacklist their IPs on a provider basis. This leads to no provider that obeys your blacklists to allow their users traffic to that target. Usually all providers in a nation obey that nations law (I assume, I only know that for my own :D)

    For the censorship: I don’t like that word because it’s implications fan be used against any and all laws. A shitload of content is made inaccessible because it breaks laws from active coordination of attacks to human trafficking. All of this can be described as censorship.

    Forthe UK law it’s… I’m not British and to me it appears to be a vague tool to silence and control all types of content under the guise of protecting children. Not with the intention to protect or prevent something but with the intent to control. I would fully understand and emphasize with using the word censorship in this context.