He / They

  • 9 Posts
  • 180 Comments
Joined 3 years ago
cake
Cake day: June 16th, 2023

help-circle

  • First off, this article is about the growth scaffold, and the entire breakthrough was achieved by not using an animal-based one:

    Recent research has yielded a promising advance in cultivated meat production that could materially improve scalability and cost-efficiency. Scientists at University College London have developed a method to convert yeast left over from brewing into edible scaffold material on which animal cells can grow, offering a potential alternative to expensive synthetic or plant-derived scaffolds and helping address one of the biggest bottlenecks in cultivated meat manufacturing.

    Secondly, there are a bunch of plant-based, FBS-alternative cell feeds (‘nutrients and growth factors’) on the market, and pretty much every lab-grown meat company out there is either already using them or moving as much of their production to them as possible, for a number of reasons.

    The world is never going to stop eating meat, but the sooner we move to cultured meats instead of slaughtered farm animals, the sooner we significantly lower the amount of animal suffering and environmental impact.



  • You can’t be sure, but you can use providers and exit nodes that are based in places hostile to whoever you are trying to protect against.

    Also, functional anonymity can exist by different entities having different pieces of data that together would de-anonymize you, but who are unlikely to ever intersect. A good example of this is DMCA requests: if a copyright holder sees a US IP address on a residential Comcast IP range, they’re going to file a court case and get a subpoena for the subscriber info.

    If they see a Hong Kong IP from a co-lo datacenter who would need to cooperate to tell them who owned that IP at that time, they’re not going to even bother because they don’t know how to even start filing a court case in China, and if your VPN has too much data it won’t even matter because no one will even have contacted them.

    It all depends on your threat model.



  • This absolutely did not kill them. I’ve been dealing with federal procurement, including ATOs for DoD, for years, and 99% of companies never even remotely interact with it. Yes, there’s a large number that do, especially among Fortune 500s and up, but the actual percentage of companies who have military contracts is tiny. This was meant to intimidate them into compliance, but this doesn’t make them any less viable than AIaaS already is or isn’t.

    no company wants to become a supply chain risk to potential customers who might have a DoD supplier somewhere down the supply chain

    The order is actually much narrow than that; it only applies to companies who directly have contracts with the military.

    Anthropic software just can’t be used to process federal data, but if e.g. Lockheed uses ADP to process internal payroll, and ADP uses a third-party developer to build some software, and that developer uses Claude, that doesn’t snake it’s way back up the chain and invalidate Lockheed’s contracts.






  • I’m not sure if you’re being sarcastic, but given that this is an anti-firearms bill, they will probably do the same thing they do when you purchase a firearm magazine cross-state; they’ll open the box and check that it is ‘compliant’ with the 10-round limit (or in this case, has compliant firmware). If it is, they’ll ship it on to you. If it’s not, they’ll ship you the empty box with a notice of seizure. You may also be contacted by CADOJ later, depending how much free time they have.