aranym

joined 2 years ago
MODERATOR OF
[–] [email protected] 3 points 2 years ago (1 children)

It's worth noting that KaiOS, a fork of Firefox OS, has been successful - particularly in developing markets.

[–] [email protected] 10 points 2 years ago* (last edited 2 years ago)

You're correct, I mistakenly copied the wrong section. (Posted this from my phone)

Fixed!

[–] [email protected] 12 points 2 years ago* (last edited 2 years ago) (1 children)

We've already seen this play out in several countries where web blocking is widely implemented (eg Russia, China.) People (generally) flock to state-endorsed alternatives rather than going through the effort of finding bypasses.

(As an aside, Chrome would probably comply with it. It'd be a lot more damaging for them than smaller browsers to block the entirety of France.)

[–] [email protected] 22 points 2 years ago* (last edited 2 years ago) (3 children)

Do you genuinely believe an average computer user, when presented with a block page, would attempt to circumvent it?

Maybe a small minority would, but overall I find it extremely unlikely. It takes a lot less effort to just download an alternative.

[–] [email protected] 16 points 2 years ago (6 children)

Theoretically yes, but I'd think that would just result in users switching to browsers which do comply with the law (Chrome, probably)

[–] [email protected] 19 points 2 years ago (10 children)

This does not prove your point. You said "most countries", not "countries I arbitrarily deem to be important."

[–] [email protected] 20 points 2 years ago* (last edited 2 years ago)

The bill still leaves enforcement of specific content up to the platforms.. so it seems they're implying their own posts on these topics would be generally considered misinformation? I respect the honesty lol

[–] [email protected] 13 points 2 years ago* (last edited 2 years ago)

e621.net

🤨

[–] [email protected] 3 points 2 years ago

Negatives help, you can also specify hands be concealed behind objects or whatnot. There really is no reliable method except training larger models, (eg SDXL gets it right a lot more often than standard SD models) or manually editing the image afterwards.

[–] [email protected] 6 points 2 years ago (1 children)

Musk uses that term in his own way - the "free speech absolutist" line came from him talking in reference to Twitter moderation. He consistently claims to allow his critics to say whatever they wish without consequences.

[–] [email protected] 0 points 2 years ago* (last edited 2 years ago) (2 children)

I've heard that statement nearly verbatim from people who were entirely serious - and judging from my upvote count (and the original comment downvotes), several others thought you were serious as well.

Edit - Wait, I thought you were the creator of the original comment - you aren't. There's still a very good chance this isn't sarcasm.

[–] [email protected] 3 points 2 years ago

Section 702 should either not be renewed at all, or renewed with restrictions to require a warrant for US person searches. The FBI has shown they cannot handle this power as is.

 

Chipmaker TSMC said on Friday that one of its hardware suppliers experienced a “security incident” that allowed the attackers to obtain configurations and settings for some of the servers the company uses in its corporate network. The disclosure came a day after the LockBit ransomware crime syndicate listed TSMC on its extortion site and threatened to publish the data unless it received a payment of $70 million.

The hardware supplier, Kinmax Technology, confirmed that one of its test environments had been attacked by an external group, which was then able to retrieve configuration files and other parameter information. The company said it learned of the breach on Thursday and immediately shut down the compromised systems and notified the affected customer.

1
Code of Conduct (lemmy.name)
submitted 2 years ago* (last edited 2 years ago) by [email protected] to c/[email protected]
 

Introduction

This is a place where we work to foster a welcoming and inclusive environment for everyone, irrespective of their background. This code of conduct applies to everyone participating in our Lemmy instance, including moderators and admins.

This Code of Conduct only applies to local content.

Our Expectations

All participants in our instance are expected to:

  • Respect others: Use respectful language. Treat others the way you would want to be treated.
  • Be open-minded: Embrace different perspectives and opinions. Encourage healthy, constructive discussions.
  • Respect others’ privacy: Do not disclose personal information of any other user.
  • Follow the rules of external instances you participate in.
  • Mark NSFW content appropriately and post it only in communities which explicitly allow it.

Unacceptable Behavior

Unacceptable behavior will not be tolerated, this includes but is not limited to:

  • Hate speech: Any speech promoting violence, discrimination or hate against individuals or groups, based on factors such as race, religion, gender, age, nationality, or sexual orientation is strictly prohibited.
  • Harassment: No form of harassment, bullying, or intimidation will be tolerated.
  • Spamming or advertising: Do not spam. All promotional content must be relevant and visibly disclosed.
  • Any attempt to interrupt the normal functioning of the instance.

Reporting & Enforcement

Moderators have a responsibility to make sure their communities follow this Code of Conduct.

If you witness or become a target of unacceptable behavior, report it using the "Create Report" button under every post.

Changes to the Code of Conduct

We may revise this Code of Conduct from time to time, and the new versions will be posted here. By accessing this instance, you agree to abide by the current version of this Code of Conduct.

We hope that this Lemmy instance will be a safe, friendly, and welcoming place for all participants. Let’s work together to make it that way.

132
Child Labou(rule) (lemmy.name)
submitted 2 years ago* (last edited 2 years ago) by [email protected] to c/[email protected]
 
 

A superficially modest blog post from a senior Hatter announces that going forward, the company will only publish the source code of its CentOS Stream product to the world. In other words, only paying customers will be able to obtain the source code to Red Hat Enterprise Linux… And under the terms of their contracts with the Hat, that means that they can't publish it.

 

AI programs such as TensorFlow, PyTorch, and Hugging Face Hub work well under their open source licenses. The new AI artifacts are another story. Datasets, models, weights, etc. don't fit squarely into the traditional copyright model. (OSI director) Maffulli argued that the tech community should devise something new that aligns better with our objectives, rather than relying on "hacks."

Specifically, open source licenses designed for software, Maffulli noted, might not be the best fit for AI artifacts. For instance, while MIT License's broad freedoms could potentially apply to a model, questions arise for more complex licenses like Apache or the GPL. Maffulli also addressed the challenges of applying open source principles to sensitive fields like healthcare, where regulations around data access pose unique hurdles.

 

As Biden noted, the FCC "proposed a new rule that would require cable and satellite TV providers to give consumers the all-in price for the service they're offering up front." The proposed rule would force companies like Comcast, Charter Spectrum, and DirecTV to publish more accurate prices.

 

Judge Kevin Castel on Thursday issued an opinion and order on sanctions that found Peter LoDuca, Steven A. Schwartz, and the law firm of Levidow, Levidow & Oberman P.C. had "abandoned their responsibilities when they submitted non-existent judicial opinions with fake quotes and citations created by the artificial intelligence tool ChatGPT, then continued to stand by the fake opinions after judicial orders called their existence into question."

To punish the attorneys, the judge directed each to pay a $5,000 fine to the court, to notify their client, and to notify each real judge falsely identified as the author of the cited fake cases.

view more: ‹ prev next ›