If only there were other things that a person could do outside of voting once every four years to participate in the political process.
If only there were other things that a person could do outside of voting once every four years to participate in the political process.
Hey, look at that. It’s the inevitable consequence of the game theory of first past the post voting. Voting system reform is my #1 issue, and if you actually care about the fact that “99% of voters” are locked into voting for someone they dislike to avert disaster every 4 years, it should be yours as well.
There is no meaningful future for third parties until and unless this occurs. IRV is a good first step, but Score voting is better. Multimember districts are also important. Getting rid of the electoral college is a no-brainer.
I would be impressed if they risk it. Literally half of Mongolia’s population resides in their capital city Ulaanbaatar. If a country bordering Russia were to arrest the sitting Russian president and turn him over to Copenhagen then there’s a non-zero possibility of a retaliatory airstrike on the capital, destroying their only major city and killing a significant percentage of the entire country’s population.
Too bad you’ll never receive that option from any manufacturer.
The scam is that they are actually doing the work, getting paid well
Listen. I know that there are some really shitty stuff going on in North Korea, and very real threats that their government is capable of, and it sucks for the people living there who have to do this work under threat of death.
But if you say that “the scam” is they’re doing work and receiving full pay for work done, I’m going to make fun of you. Oh no, someone outside of the West did work and was slightly less exploited by capital than usual in the process. Horror upon horror.
Not quite. Their “malicious” extension only got a few hundred installs. Using the data gathered by that extension and via other means they were able to locate other actually malicious extensions. Those total in the millions of installations.
Through this process, they have found the following:
1,283 with known malicious code (229 million installs).
8,161 communicating with hardcoded IP addresses.
1,452 running unknown executables.
2,304 that are using another publisher's Github repo, indicating they are a copycat.
To add, let’s do some math!
Let s be the total annual salary of every employee using Adobe. Our goal is to find the productivity ratio r such that changing to Gimp and open source more generally is a net positive from the standpoint of productivity and labor.
s/r will be the total annual salary after changing over, because (for instance) if r = 0.8 then LTT will need to either hire or work his existing hires 1/0.8 times longer, giving (at best, ignoring overtime and so on) s/r as the new labor cost.
We then subtract the current labor cost to get the switching cost s/r - s, and if this is greater than $10,000 then the switch is not worth it.
For instance, let’s say LTT employs 1 person at $50k/year. He’s a bit of a skinflint. We solve for r and arrive at a ratio of 5/6 or 83.33%.
If we have a different world where LTT hires 10 people and pays each of them $100k, we solve for r and get about 99%.
In other words, the switch is worth it only if the labor cost is small, so the extra labor is not very expensive, or the difference between the two software is negligible.
What about Elisa? I was under the (potentially mistaken) assumption that Elisa was the successor of Amarok.
A human made the graph
I’m not going to weigh in on the specifics of Flatpak vs AppImage, because I don’t know enough about the particulars.
However, I think the “user choice” argument is often deployed in situations where it probably shouldn’t be.
For instance, in this case, it’s not the user’s choice at all, but a developer’s choice, as a normal user would not be packaging their own software. They would be merely downloading one of a number of options of precompiled packages. And this is the thrust of the argument. If we take the GitHub rant at face value, some developers seem to be distributing software using AppImage, to the exclusion of other options. And then listing ways in which this is problematic.
I, for one, would be rather annoyed if my only option were either AppImage or Flatpak, as I typically prefer use software packaged for my package manager. That is user choice, give me the option to package it myself; hopefully it’s already been done for me.
There are some good things to be said about trust and verification, and I’m generally receptive to those arguments way more than “user choice.”
in fact I just asked that exact same question to chatgpt4 and it also replied 1/365
Yes, you can get different answers because of different phrasing and also because random vector input
I spent an hour and a half arguing with my brother about probability, because he asked ChatGPT what the probability that he and his daughter were born on the same day.
ChatGPT said 1/113465 which it claimed was 1/365^2 (this value is actually 1/133225) because there’s a 1/365 chance he was born on such and such day, and a 1/365 chance his daughter was too.
But anyone with even a rudimentary understanding of probability would know that it’s just 1/365, because it doesn’t actually matter on which day they both happened to be born.
He wanted to feel special, and ChatGPT confirmed his biases hard, and I got to be the dickhead and say it is special, but it’s 1/400 special not 1/100000. I don’t believe he’s completely forgiven me over disillusioning him.
So yeah, I’ve had a minor family falling out over ChatGPT hallucinations.
Be careful, the small partitions might be UEFI partitions (/boot and /boot/efi) and are required for booting your computer.
Well, the problem is you don’t know what you don’t know. One of the first example tasks in the paper was regarding implementing a symmetric cipher. Using a weak cipher was recommended by AI tools sometimes, these developers didn’t know that some ciphers were weak. Additionally, even when the AI tool recommended a strong cipher, such as AES, it generated code that screwed up an implementation detail (failing to return the authentication tag), making the result insecure. And the user didn’t know it was wrong because they didn’t know it was incomplete.
There’s no substitution for domain specific knowledge. Users who were forced to use traditional tools got the answer correct significantly more often because they had to read, process, and understand the documentation for the libraries, which meant they understood why the symmetric cipher was the way it is, and what additional information needed to be reported and why.
It seemed obvious to me as well, but studies like this are important, so that I have something to point to other than vibes.
So it’s su then, not sudo.
So please forgive me if this is a rather naive question. I haven’t seriously used Windows in nearly 15 years.
I seem to recall runas being a lot like su, in that you enter the target user’s credentials, rather than your own as in sudo. This works because sudo is a setuid executable, and reads from configuration to find out what you’re allowed to do as the switched user.
Is the behavior of windows sudo like unix su or unix sudo with regard to the credentials you enter? Can you limit the user to only certain commands?
LLMs are bad for the uses they’ve been recently pushed for, yes. But this is legitimately a very good use of them. This is natural language processing, within a narrow scope with a specific intention. This is exactly what it can be good at. Even if does have a high false negative rate, that’s still thousands and thousands of true positive cases that were addressed quickly and cheaply, and that a human auditor no longer needs to touch.