![](/static/253f0d9b/assets/icons/icon-96x96.png)
![](https://lemmy.world/pictrs/image/eb9cfeb5-4eb5-4b1b-a75c-8d9e04c3f856.png)
The current assumption made by these companies is that AI training is fair use, and is therefore legal regardless of license. There are still many ongoing court cases over this, but one case was already resolved in favor or the fair use position.
The current assumption made by these companies is that AI training is fair use, and is therefore legal regardless of license. There are still many ongoing court cases over this, but one case was already resolved in favor or the fair use position.
I thought both of these were actually impossible for Columbia. IIRC the rescue mission was impossible because there were no available vehicles, and the EVA equipment onboard would let them inspect the tiles but they couldn’t actually fix them.
You’re not idolizing Tyler Durden, are you? Because you shouldn’t idolize Tyler Durden.
Additionally, there’s the usability hurdle of interacting with non-home instances from outside mastodon. If I pull up someone’s blog and click the little mastodon social media icon, it may very well link to mastodon.world. If my home instance is mastodon.social, now I have to launch into my own server, search up the account, and then begin interacting.
It’s trivial to do but it is an extra step, but for your less-tech-literate friends and family it can be a point of confusion. Mastodon handles federation great in-ecosystem, but the broader web is still going to treat each instance as a different site.
Several of the [former] board members are affiliated with the movement. EA is concerned with existential risk, AI being perceived as a big one. OpenAI’s nonprofit was founded with the intent to perform research AI safely, and those members of the board still reflected that interest.
Adding: TLS is actually a pretty apt analogy here.
You could make a chat server that just accepts plain text messages over a TLS link, and that’s basically the same security topology as with this Beeper bridge.
But no one would call that a E2EE chat.
Sticking two E2EE tunnels together with a plaintext middleman doesn’t result in a single E2EE tunnel.
The reason the distinction is important is because the security profile is vastly different—a compromised server leads to a compromised message—which isn’t true for actual E2EE services like a pure Matrix link.
Side note: the first thing you should ask of a “end-to-end encrypted” product to you is “which ‘ends’ do you mean?” I’ve seen TLS advertised as E2EE before.
Official software support for the FF5 is 8 years, I believe
I have seen you comment in several comment chains. Please just understand that there is risk even if by the letter of the law everything is legal. There are plenty of cases with copyright / fair use where very expensive and long lawsuits were made against parties who did nothing illegal.
LW mods are clearly not comfortable with the risk with their current situation. Respect that, and don’t expect them to take risks beyond their comfort on your behalf. If you want someone who is willing to serve you content at that level of risk, you can create an account with one of the other communities.
If an instance is merely blocked, does that mean all content produced by that instance, or by a Lemmy.World user using that instance, is strictly not stored on Lemmy.World servers?
Otherwise there might still be liability. Also, in the US you don’t even have to do anything illegal to be the target of a lawsuit—distancing from piracy is a practical defense against the cost of legal proceedings, even if it’s technically legal.
Amdahl’s isn’t the only scaling law in the books.
Gustafson’s scaling law looks at how the hypothetical maximum work a computer could perform scales with parallelism—idea being for certain tasks like simulations (or, to your point, even consumer devices to some extent) which can scale to fully utilize, this is a real improvement.
Amdahl’s takes a fixed program, considers what portion is parallelizable, and tells you the speed up from additional parallelism in your hardware.
One tells you how much a processor might do, the only tells you how fast a program might run. Neither is wrong, but both are incomplete picture of the colloquial “performance” of a modern device.
Amdahl’s is the one you find emphasized by a Comp Arch 101 course, because it corrects the intuitive error of assuming you can double the cores and get half the runtime. I only encountered Gustafson’s law in a high performance architecture course, and it really only holds for certain types of workloads.
ABSOLUTELY. I just recently capped off the Diff Eq, Signals, and Controls courses for my undergrad, and truly by the end you feel like a wizard. It’s crazy how much problem-solving/system modeling power there is in such a (relatively) simple, easy to apply, and beautifully elegant mathematical tool.
Sites that rely on ad revenue would have every business reason to switch to WebDRM-only.
Chameleon is another good plugin for this
404media is doing excellent work on tracking the non-consentual porn market and technology. Unfortunately, you don’t really see the larger, more mainstream outlets giving it the same attention beyond its effect on Taylor Swift.