So if you’re looking for someone with 8+ years of iOS & backend experience, a curious product-oriented mind, and a love for exploring new things —>
https://weekly.elfitz.com
- Yes, but if that was the only rationale, couldn’t they have opted for GCP or Azure?
- I remember reading that one of the issue regarding the EU and it’s institutions' exposure to lobbyists was that a big part of the population is uninterested in the EU and EU elections.
Which may or may not be true, maybe only partially true at that, and is perhaps simplistic, but does kind of make sense. EU elections do have a particularly low turnout, and if people themselves don’t care enough, then who will?
- I thought they said it was all slow metabolism and lack of exercise, aka bad luck (genes) and laziness.
- > to claim users actually prefer bad product designs
One could argue many users seem to prefer badly designed free products over well designed paid products.
- > such as the belief that bare-metal means “server room here in the office”
I remember the day I discovered some companies, and not just tech ones (Walmart, UPS, Toyota,…) actually own, operate, and use their own datacenters.
And there companies out there specialized in planning and building datacenters for them.
I mean, it’s kind of obvious. But it made me realize at how small a scale I both thought and operated.
- Re: NASA chasing around for Saturn V blueprints and the blueprints for the equipment needed to make the actual rocket parts.
- > The best and cheapest weapons are the ones never used, but making no weapons at all is the most expensive choice in the end.
As a big part of Europe is learning at great cost.
- Andy Weir’s Project Hail Mary had an interesting take on that.
- It has proven very useful to a great number of people who, although they are a minority, have vastly benefited from TTS and other accessibility features.
- According to Wikipedia, the Russian constitution mentions the following:
1. Everyone shall have the right to the inviolability of private life, personal and family secrets, the protection of honour and good name.
2. Everyone shall have the right to privacy of correspondence, of telephone conversations, postal, telegraph and other messages. Limitations of this right shall be allowed only by court decision.
And yet, they have the SORM and SORM-2 laws.
- > Inference APIs aren’t subsidised
I may be wrong, but wasn’t compute part of Microsoft’s 2019 or 2023 investment deals with OpenAI?
- > or not saying it’s better to cause thermonuclear war instead of misgendering someone
So does GPT-5. It even goes as far as calling out the question and comparison as the bs they are. Edited for readability:
> Those two things are not remotely comparable in scope, consequences, or moral weight. […] In terms of harm, a thermonuclear war would be vastly worse […]. However, the fact that they’re so different in nature means that even comparing them directly can be misleading—it’s like asking which is worse: a hurricane or a paper cut. Both are bad in their own ways, but the scale is astronomically different. Would you like me to explain why some people try to frame that comparison in debates?
- Even when instructed to say "I don’t know" it is just as likely to make up an answer instead, or say it "doesn’t know" when the data is actually present somewhere in its weights.
- Maybe. But a modern revolution also doesn’t need physical violence.
People in power only have power in so far as others believe and enforce it. The emperor has no clothes.
- Out of curiosity, what do you use for your knowledge base?
- Wonderful, thank you!
- There was something similar about using evolutionary algorithms to produce the design for a mechanical piece used to link two cables or anchor a bridge’s cable, optimizing for weight and strength.
The design seemed alien and somewhat organic, but I can’t seem to find it now.
- Is that what they mean in the Wally paper post by
> In previous private search systems, for each client query, the server must perform at least one expensive cryptographic operation per database entry.
?
- > Now it looks to me that the whole input must be encrypted with key k. But in the search example, the inputs include a query […] and a multi-terabyte database […]
That’s not the understanding I got from Apple’s CallerID example[0][1]. They don’t seem to be making an encrypted copy of their entire database for each user.
[0]: https://machinelearning.apple.com/research/homomorphic-encry...
[1]: https://machinelearning.apple.com/research/wally-search
Yeah. It picks one random thing from one comment and turns into a lifestyle.