• 0 Posts
  • 270 Comments
Joined 2 years ago
cake
Cake day: December 29th, 2023

help-circle


  • what’s not how a model works? i didn’t say anything about how a specific thing works… i simply said that emergent behaviours are real things, and separately that consciousness doesn’t look like a human brain to be consciousness

    given we can’t even reliably define it, let alone test for it, if true AGI ever comes along i’m sure there will be plenty of debate about if it “counts”

    who knows: consciousness could just be bootstrapping a particular set of self-sustaining loops, which could happen in something that looks like the underlying technology that LLMs are built on

    but as i said, i tend to think LLMs are not the path towards that (IMO mostly because language is a very leaky abstraction)





  • no, actually, we do know that… things like cycle time, lifetime cycles, their durability < 20% and > 80%, performance in the cold, sustained current

    lots of these are to do with heat and degradation, but these are all problems that can be solved to improve batteries in general… some of them are inherently to lithium chemistry and easily solved with others

    sodium batteries, for example, are better in most categories other than wh/kg making them not useful for portable electronics and cars etc but for stationary applications these benefits can significantly outweigh the major downside because wh/kg is not a useful metric (eg grid storage)… especially true when sodium batteries are able to deal with higher operating temperatures which means you don’t need as much if any extra cooling, which is getting close to making up for even energy density of the system in some situations

    flow batteries are also real things, as are hydrogen fuel cells








  • many enthusiast keyboards are “tenkeyless” precisely because the numpad is too far from the home row to be actually useful when you get efficient typing patterns worked out

    i have a tenkeyless and use programmers dvorak (which is honestly imo pretty brain dead for its use of the num row and still is “fine” for numbers): you get used to it very quickly, and typing numbers with the numpad as an efficiency improvement is more than made up for by using both hands on the num row, and by it being far closer to the home row


  • actually one of my grandparents was a typist at an accounting firm, and apparently num row is far more efficient for numbers in generally because you use 10 fingers and your thumbs are close to your “new home row” (aka the number row while you’re typing numbers), and whilst possible you’d never use both hands in the num pad because it’d be awkward and probably damaging to your wrists, and you’re rarely typing just numbers so having the num row closer to the home row is part of the efficiency calculation

    … if we’re being pedantic, which we absolutely are


  • perhaps, but you still get feature fragmentation… things like custom emojis, stickers, what video codecs to support (heck i reckon they’d probably focus on chat first and video would only be available within the same app until some organisation effort happened), etc

    you can see that a little bit on lemmy with the difference in how blocks work on lemmy vs piefed… piefed blocks on lemmy look like a shadow ban because lemmy doesn’t support the error style piefed uses… i think that’d it anyway

    point being: just because software can exchange data and have the same problem domain and even in many cases use the same basic terminology, there can still be plenty of more advanced features that aren’t interoperable

    re matrix, it can talk to anything… kinda… the matrix protocol has the idea of “bridges” built into it, so they should be able to translate between your client talking to the server via matrix protocol, and other things like XMPP, IRC, etc (at least in theory)





  • it’s absolutely true actually… whatsapp are the key holders and there was a leak a few weeks ago that showed meta staff can access anyone’s messages: they just need to raise a ticket and they get access to an app that allows them to pull up any user they like

    this is always the case unless you’re the keyholder. any app where you can “forgot password” and get your data back you aren’t the key-holder (though recovery phrases are legitimate), or login simply via phone number and an SMS MFA or similar

    it’s also true for apple stuff - despite being similarly encrypted - but they’ve at least on the surface displayed a willingness to protect user data from external threats