

They just assumed a constant draw I think.
They just assumed a constant draw I think.
No, but I don’t think you’re appreciating how difficult it would be to fill that 3%. It’s not just about having 3% more power from something. It’s having it at the right time. It needs to be on demand. Having something on demand that has to cover all it’s costs selling just 3% isn’t easy.
It’s more resilient to have mixed supply where multiple types of generation take a proportion. Then when one falls short another can scale up a little.
If somebody has to keep that gas generator serviced only to run it on winter mornings, that electricity is going to be very pricey.
I’ve tried this a few times. I don’t think it works.
Basically the way you want to explain a piece of reasoning , and the order in which things need to be defined for a program, are different. You end up either making the document match the code structures, or the code structure match the document. Both are bad.
there’s just no market demand for it
Oh… There’s demand for it for sure.
The image generation models that exist are unquestionable proof of demand for penises. I think what’s missing is the kahunas required to make a business around it. There are places even pornographers fear to tread.
You know how when you look at a picture of someone and you cover up the clothed bits, they look naked. Your brain fills in the gaps with what it knows of general human anatomy.
It’s like that.
That could be a socially healthy place to end up at. I don’t see it anytime soon though. Just look at the other response I got.
Disagree. Not CSAM when no abuse has taken place.
That’s my point.
Honestly I think we need to understand that this is no different to sticking a photo of someone’s head on a porn magazine photo. It’s not real. It’s just less janky.
I would categorise it as sexual harassment, not abuse. Still serious, but a different level
I’d be interested on a study there.
I lot of therapy is taking emotions and verbalising them so that the rational part of the brain can help in dealing with things. Even a journal can help with that, so talking to an inanimate machine doesn’t seem stupid to me.
However therapists guide the conversation to challenge the patient, break reinforcing cycles, but in a way that doesn’t cause trauma. A chatbot isn’t going to be the same.
You need to meet it’s bigger brother, the swan.
Where I live we get white swans, Canadian geese, and Egyptian geese. Egyptian are smaller and absolutely fine. Canadian will get angry and tell you to fuck off Swans are 50% bigger and will run you out of the county.
Not some people.
At university I had an introductory C course where one assignment was to write a program that searched a 4x4 array of booleans for groups of cells set to true. Groups had to be rectangles, powers of 2 in width and height, and could wrap (i.e. they could go off the right edge and back on the left edge). We had to submit our programs by e-mail and printed form one week later. The prof. marked the paper versions and the TA ran and tested the digital. One slight problem, if you used the university owned printers, they charged for print outs. A few pence per page to cover costs and stop people abusing the rather nice high quality printers the computer faculty had.
I’d always enjoyed programming and whilst C was new to me, using another language wasn’t a big problem. As I worked on it I realised the problem wasn’t as straightforward as I first thought, but I spent a few hours on it that evening and had a solution I was happy with.
Penny was a student on the course whose approach to academia was memorization. She didn’t consume, process, and apply concepts. She just remembered them. Her favourite subject was maths. While the rest of us were struggling to derive some formula, she’d have just committed the process to memory.
Penny was complaining a lot on this programming assignment. She didn’t understand why the assignment was so hard for an introductory class. I didn’t judge. I know some people find programming hard, but I didn’t feel I could help her much without jeopardising my own mark. There’s only so much uniqueness in a small program and if she just copied my solution we’d both get penalised for plagiarism. I did mention to her the cases I’d found tricky to get right was when two groups overlapped. If one group completely covered a smaller one you’d only report the bigger one, but if not you’d report both groups.
I heard, through her boyfriend, that that week had involved many long evenings working on this assignment, but she turned up at the next class solution in hand. Obviously stressed, she carried a pile of paper of several hundred pages. She had written a program that consisted of an if-statement for every possible group size and location. About a hundred different possible groups. Each condition written with constant value indices into the array. To cope with the overlapping groups problem, checks for smaller groups also checked that no larger group also covered this area. No loops. No search algorithm. Just a linear program of if-statements.
Apparently debugging this has been a nightmare. Cut and paste errors everywhere, but when I’d told her about overlapping groups aspect it had blown her mind. There always seemed to be a combination she hadn’t accounted for. Multiple times she thought she was done, only to find a corner case she’d missed. And just to kick her when she was down, she’d paid for multiple printouts, each one costing about £10 only to find a problem afterwards.
This consistent A grade student who sailed through everything by relying on her memory had been broken by being asked to create an algorithm rather than remember one. She got credit for submitting a solution that compiled and solved some cases, but I doubt the professor got past the first page of that huge printout.
Penny had worked really hard for that D.
So I think, but I’m not sure, this is for group chats. Group chats are only encrypted to/from the server because the server broadcasts the message to each recipient. As the messages are unencrypted on the server, they can feed them to LLMs.
This is different to Signal. On Signal it’s your phone encrypting each copy of the message before sending to each recipient individually.
…the ruling stopped short of ordering the government to recover past messages that may already have been lost.
How would somebody be meant to comply with an order to recover a message that has been deleted? Or is that the point? Can’t comply and you’re in contempt of court.
So at one point Macs were the developer laptop. They gave a nice desktop experience but with UNIX underneath that was very close to the Linux servers you’d deploy on to.
The direction of travel has been to bring the UI closer and closer to touch devices, often at the detriment to the developer experience (IMO). Snow Leopard / Lion was Mac OS at it’s best. Once we left the cats behind it started going wrong.
Intel has become Arm - moving things further from those deployment servers. I’ve come to the realisation that I actually need x86 Linux adjacency more than anything else and nothing does that better than x86 Linux.
Hardly. Honda have just replicated what Falcon 9 has been doing every week for years.
Comparing an engine out where the mission went on without issue and a huge fireball on the pad is apples and oranges.
…and it’s turned them into the state with the highest standard of living in the US…right?