stsquad

joined 1 year ago
[–] [email protected] 4 points 23 hours ago (3 children)

That's mostly accounting for the resolution and motion sensitivity in different parts of the eye. With enough cameras a car should be able too "see" more than we could at any one time.

[–] [email protected] 77 points 1 day ago (10 children)

I think car automation peaked at adaptive cruise control. It's a simple tractable problem that's generally well confined and improves the drivers ability to concentrate on other road risks.

[–] [email protected] 29 points 1 day ago (23 children)

I can see the argument that visible light should be enough given we humans can drive with just two eyes and a few mirrors. However that argument probably misses the millions of years of evolution of our neural networks have gone through while hunting and tracking threats that happens to make predicting where other cars might be mostly fine.

I have a feeling regulators aren't going to be happy with a claim of driving better than the average human. FSD should be aiming to be at least 10x better than the best human drivers and we're a long way off from that.

[–] [email protected] 3 points 3 days ago

For portability Vulkan is the way (it also gets you GPU compute for free without needing vendor libraries). That said the ruttabaga encapsulation is useful for things like Wayland over virtio-gpu which is useful for some use cases.

[–] [email protected] 11 points 3 days ago

I should note for even closer to native performance you want virtio-gpu with native context. Patches for that are currently being reviewed on the mailing list: https://patchew.org/QEMU/[email protected]/

[–] [email protected] 19 points 4 days ago

It depends what they want to do. They can fork and take on the burden of maintaining the whole tree in which case good luck with that, linux is too much of a fire hose to enable a 3rd party to assemble something similar making different choices about what they merge. Otherwise they can maintain a re-based fork that tracks the Torvalds tree and then congratulations you've just invented a feature tree that can do contribution with extra steps.

[–] [email protected] 2 points 1 week ago* (last edited 1 week ago)

I don't think algorithms themselves are to blame but what they are tuned for. While engagement/eyeball hours for the adserver is the prime metric the quality of experience will be subservient to it. If the algorithms could better measure your mood and stimulation levels and maximise for that the effect would be less toxic. Ideally if it realised you were just mindlessly consuming it could suggest maybe you've done enough today and to try something else. But that I fear that is not something the owners of the various ecosystems want.

[–] [email protected] 2 points 1 week ago

He has certainly been weirdly selective in the data he quotes while trying not to come across as complete loon.

[–] [email protected] 2 points 1 week ago (1 children)

So this is like extending mastodon replies into your blog post, but with more syndication options?

[–] [email protected] 5 points 1 week ago* (last edited 1 week ago)

I met a man who's focus was on making ASIC fabrication accessible to students and hobbyists. The audacity of the ambition made me smile and the fact they have succeeded using an open source workflow made me happy.

[–] [email protected] 3 points 1 week ago

In all DRM devices there are private signed certificates that can be used to establish a secure authenticated connection. To get at them you need to crack/hack/file the top of the chip to exfiltrate the certificate. More modern "Trusted Computing" like platforms include verified boot chains so even if you extract the certificate you couldn't use it because you also need to sign the boot chain to ensure no code has been altered.

[–] [email protected] 17 points 1 week ago (2 children)

Absolutely - modern pirates are extracting the digital streams with the DRM removed. However they closely guard the methods of operation because once the exploits or compromised keys are known they can be revoked and they have to start cracking again. They likely have hardware with reverse engineered firmware which won't honour key revocation but still needs to be kept upto date with recent-ish keys.

For example the Blu-Ray encryption protocols are well enough known you can get things working if you have the volume keys. However getting hold of them is tricky and you have to be careful your Blu-Ray doesn't read a disk that revokes the old keys.

For streaming things are a little easier because if you get the right side of the DRM you can simply copy the stream. However things like HDCP and moving DRM into secure enclaves are trying to ensure that the decryption process cannot be watched from the outside. I'm sure their are compromised HDCP devices but again once their keys get leaked they will no longer be able to accept a digital stream of data (or may negotiate down to a sub-HD rate).

 

The long awaited Cass report has been published looking at gender affirming care in the NHS.

 
 

Are there any good recommendations for water control valves? I want to control a automatic watering system and need something to attach to the garden tap. Open firmware would be a bonus.

 

I found this post interesting for my layman's understanding of LLMs and some of the underlying architecture choices that are made.

 

I wrote this as a layman's primer to the basics of LLMs and other generative AI. I'm still early on in my journey but hopefully it helps explain things to other newcomers even if it glosses over the details.

 

They covered a number of topics but for me the most terrifying was the examples of deep fakery that had already been used in elections.

I wanted to ask the community if they had had any experience with deep fake media online? If so did you notice or did your need to be told it was? How much effort do you take to verify things you see online?

view more: next ›