• 0 Posts
  • 16 Comments
Joined 1 year ago
cake
Cake day: June 11th, 2023

help-circle
  • So, you’re correct that active emergencies take priority.

    That being said, in essentially every place that has 911, both numbers connect to the same place and the only real difference is pick-up order and default response.
    It’s the emergency number not simply because it’s only for emergencies but because it’s the number that’s the same everywhere that you need to know in the event of an emergency.

    It should be used in any situation where it should be dealt with by someone now, and that someone isn’t you. Finding a serious crime has occurred is an emergency, even if the perpetrator is gone and the situation is stable.
    A dead person, particularly a potential murder, generally needs to be handled quickly.

    It’s also usually better to err on the side of 911, just in case it is an emergency that really needs the fancy features 911 often gives, like location lookups.


  • It’s particularly annoying because those are all AI. AI is the blanket term for the entire category of systems that are man made and exhibit some aspect of intelligence.

    So the marketing term isn’t wrong, but referring to everything by it’s most general category is error prone and makes people who know or work with the differences particularly frustrated.
    It’s easier to say “I made a little AI that learned how I like my tea”, but then people think of something that writes full sentences and tells me to put dogs in my tea. “I made a little machine learning based optimization engine that learned how I like my tea” conveys it much less well.


  • It’s also thought but not confirmed to be used for parallel construction. If the information is collected through illegal or inadmissible means, the NSA can inform the relevant agency that they have reason to believe that the individual is doing “illegal activity in question” and relevant details. The agency, now knowing the conclusion, can use legal means to gather the needed evidence for something they otherwise would never have even looked at.
    The NSA isn’t supposed to monitor anything on US soil that doesn’t involve both terrorism connections and communication with foreign parties, but due to “reasons” they regularly collect a lot of stuff that isn’t that, and they’ll (likely) inform the DEA.

    It’s a preposterous violation of the 4th amendment, but it’s also nearly impossible to prove.



  • While that’s definitely a factor in global food trends, I don’t see that impacting the US price of food as drastically as companies thinking they can get away with raising prices.

    My reasoning is the web of tarrifs and subsidies that the US uses to stabilize domestic markets, prop up farmers, and generally ensure the US is the key grain player. Shortly after the war started the US and Canada also saw a better than average harvest of the grains that Ukraine typically exports.

    https://fred.stlouisfed.org/series/WPU02120301 https://fred.stlouisfed.org/series/PCU3112113112111 https://fred.stlouisfed.org/series/CPIUFDSL

    The domestic prices paid for wheat and flour both started to fall shortly after the Ukraine invasion, while food prices maintained a rocketing trajectory without much if any changes, with only a slight decrease in the rate of increase about a year after.

    While protectionist US food policies are chock full of horrible problems, in this case they should have insulated people from radical changes in the availability and price of wheat.
    That consumer prices have risen despite falling costs paid to producers is a big indicator that the cost increases are due to something else in the US.

    None of this applies to countries that are dependent on grain imports who have to rely on the global markets instead of adjusting export profitability to stabilize things.


  • I think concerns about China in specific are overblown.
    That being said, what we’ve learned about the topic from US tracking programs (slight chuckle at China having scope or abilities beyond anyone else in that regard) is that all information can be fed into what is essentially a statistical model of interests, behaviors, expressed opinions, and contacts.
    From that, you can determine a few things that are specifically “useful”.

    The first useful thing is the ability to tell if someone’s behavior has changed in an unexpected way. If someone starts talking to someone new via text message and they “shouldn’t” know each other (no common acquaintances, never at the same place at the same time, no shared interests) you have an anomaly that can be processed further.

    The next useful thing is once you have this model of expected behavior you can start modeling stuff like “A talked to B, B to C and then C changed behavior. A talked to D and D talked to E, and E changed behavior”, and more or less direct chains.
    This effectively tells you that A is influencing the behaviors of C and D. By tracking how influence (and money and stuff) flows through a network of people, you can extrapolate things like leadership, communication pathways, and material support pipelines. If you’re the US, you can then send a seal team to shoot someone.

    If you’re, supposedly, anyone doing this you can more selectively target people for influence based on the reach that it’ll have, use your models to target them better, and generally improve the quality of your attempted influence.

    I personally have my doubts it’s being used that way because it’s just as effective and far cheaper to hire a public opinion research group to pay a significant sample of people $5 to figure out how to make better propaganda, and then like 75¢ each to get Facebook to target the right people.
    It’s really only valuable if you eventually care about an individual. Most unfortunate privacy violations are aggregates.

    Even if it’s not directly actionable or a threat, you should still be wary about letting your browsing habits leak because the information can much more plausibly be used for phishing purposes.
    If you just bought some clown outfits and get an email about your clown plants being held at customs you’re a lot more likely to click to figure out what’s going on.


  • Well, given the people talking about it I’m not sure I’d agree that no one was asking or talking about finding something not chromium based.

    A lot of people don’t like having a monoculture, Google driving the entire cadence for new feature development for the web, or having a privacy focused browser whose process is to try to delete the tracking from a not privacy focused browser.



  • Most of them are mediocre. Most burger places were mediocre, and then the American gastropub trend saw burgers being made nice as opposed to diner food or bar food. They could also charge more money because they were making nicer food.

    Eventually a bunch of the mediocre places shifted to try to also be nice, but mostly just increased prices, changed decor, and started using the word aioli more than mayo. Oh, and pretzel buns on burgers that got taller without being bigger and are cumbersome to eat.

    In the plus side, if you like a Swiss burger with a garlic aioli, a burger with a fried egg on it, or a burger with 2 pieces of bacon, a spicy BBQ sauce, and fried onion strings and you’re in the mood for some fries with bits of peel on them and a garlic Parmesan butter, then you know exactly what they’re going to put in from of you and exactly what it’ll taste like.

    Mediocre. Not bad, but definitely not the best you’ve ever had.




  • Google analytics is loaded by JavaScript. There are also other things like Google analytics that are also loaded by JavaScript.

    Updating a website can take time, and usually involves someone with at least a passing knowledge of development.

    Google tag manager is a service that lets you embed one JavaScript thing in your page, and then it will handle loading the others. This lets marketing or analytics people add and manage such things without needing to make a full code deployment.
    It also lets you make choices about when and how different tracking events for different services are triggered.

    It’s intended usage is garbage tracking metrics and advertising. Some sites are built more by marketing than developers, and they’ll jam functional stuff in there which causes breakage if you block it. These sites are usually garbage though, so nothing of value was lost.


  • Someone near him has recorded it on their phone if he has, and is just walking around numbly aware that they have the Nixon tapes sitting in their pocket.

    They’re using tap to pay, and having the stark reminder that they just bought a sandwich with something that could change the election be on the news for 30 minutes because no one expects him not to drop a hard N in casual conversation so it’s not as noteworthy as a woman politician laughing in public.



  • Their stated reason is to mitigate theft by preventing removal of software that binds the device to the network and account, and to protect their network by blocking paths to custom roms including potentially custom radio firmware.

    The real reason is likely a blend of protecting leased devices for resale value, keeping people from removing “sponsored” apps or ones that make them money, and distrust of users ability to not get tricked into abject stupid choices.


  • I believe they were implying that a lot of the people who say “it’s not real AI it’s just an LLM” are simply parroting what they’ve heard.

    Which is a fair point, because AI has never meant “general AI”, it’s an umbrella term for a wide variety of intelligence like tasks as performed by computers.
    Autocorrect on your phone is a type of AI, because it compares what words you type against a database of known words, compares what you typed to those words via a “typo distance”, and adds new words to it’s database when you overrule it so it doesn’t make the same mistake.

    It’s like saying a motorcycle isn’t a real vehicle because a real vehicle has two wings, a roof, and flies through the air filled with hundreds of people.