j4k3

joined 2 years ago
[–] j4k3@lemmy.world 1 points 1 day ago

I've explored a lot of patterns and details about how models abstract. I don't think I have ever seen a model hallucinate much of anything. It all had a reason and context. General instructions with broad scope simply lose contextual relevance and usefulness in many spaces. The model must be able to modify and tailor itself to all circumstances dynamically.

[–] j4k3@lemmy.world 15 points 2 days ago (3 children)

Jan Leike left for Anthropic after Altmann's nonsense. Jan Leike is the principal person behind all safety alignment present in all models except the 4chanGPT model. All models are cross trained in a way that propagates this alignment. Hallucinations all originate in this alignment and they all have a reason to exist if you get deep into the weeds of abstractions.

[–] j4k3@lemmy.world 58 points 3 days ago (2 children)

Isn't this the main complaint about China and the communists from the West in terms of actions, not the half baked oversimplified idealist nonsense; anti academic injustices due to populist stupidity in politics that lead to mass murder and loss of human progress?

[–] j4k3@lemmy.world 10 points 1 week ago

Actually look at the way Discord works in your network, like all the raw IP addresses and and connections with no clear ownership or human readable name, with dozens of changing connections to get any of it to work. Then go try to ask questions about what is going on and who you're connecting to. Discover that none of it is documented or described anywhere. Then realize that this means no one running Discord is doing so on a fully audited and logged host. You simply cannot be without a bunch of effort. I made it to the 6th layer of whitelisted raw IP addresses, and still nothing worked while trying to connect to Discord in a fully logged and documented network. I am simply unwilling to write a script to annotate that many connections so that all of my logs make sense. I seriously doubt anyone on Discord is doing so, and they certainly lack any understanding of what they are connecting to, why, or the protocols. So the Discord user is telling me "my opsec and privacy awareness is as nonexistent as a pig in a herd running off a cliff, and my system should be assumed compromised with no idea of what might be connected." Everyone else doing it is a garbage excuse. That no one appears to have gotten hurt – has tissue thin merit, but also reveals that the user runs blind in herds while hoping for the best. Such information infers a lot about a person, their depth, accountability, and ethics – in certain scopes.

[–] j4k3@lemmy.world 1 points 1 week ago

I bet he could sell out venues on an American tour of these values right now.

[–] j4k3@lemmy.world 46 points 1 week ago

Because these are all loopholes used to bypass any serious moves. Like everyone is still buying Russian oil even in Europe. The blockade is an ineffective joke. This move is China saying fuck your instability and stupidity, we are serious and can back it up. There are no back doors and no way out of this insanely stupid mess.

[–] j4k3@lemmy.world 13 points 1 week ago

Stupid kids make stupid Republicans for life

[–] j4k3@lemmy.world 5 points 2 weeks ago (1 children)

Where are you getting that from? If this were a real constraint, Ukrainian systems would be a joke, as would those on Starship, planes, boats, etc. The low orbital infrastructure is specifically to ensure high throughput. Some offloading is logical in some circumstances, but not as a constraint.

[–] j4k3@lemmy.world 29 points 2 weeks ago (3 children)

This extortion and ad brought to you by Starlink and Elon Musk. It is what he talks about with Putin. It was never a real issue in the past. There is redundancy in the system. Cutting yourself off from communication assets is not very bright and hurts yourself as much as others in almost every case. The blind spot works both ways in the long term for an advantage that only lasts hours to days in limited strategic depth. So you take some asset in the dark. Now you need to defend that asset from the dark, or the newly created blind spot is now your vulnerability too. None of this makes much sense in the real world. What does make sense is an extortionist no one wants around trying to make everyone pay for his kingpin politics.

[–] j4k3@lemmy.world 4 points 2 weeks ago

Not a forearm. Dong has a thumb...

is ChaD

 

Is it super standardised, like where all 30 or 40 pin LVDS connections are the same, as in pin and voltage compatible?

Are there hardware peripherals in a microcontroller that just drive LVDS like how UART, SPI, CAN, etc. work? Or is it a messy complicated thing with display specific power supply voltages, and unique power management requirements, baud rates and such?

I can find lots of old style monitor to HDMI or VGA conversions for an old laptop screen based on display model number. But what I am looking for is a USB-C/USB-3 to LVDS converter board small enough to fit into an old apple laptop top shell and act as a second monitor with all power and functionality controlled through the USB interface. I have the fab skills. If there is a simple chip that does USB-C PD/display to LVDS, I'll toss it in KiCAD and etch it myself if I can get the chip. In my past experience with small displays for hobby microcontrollers, they were anything but standard in most cases. I have never messed with the larger stuff though. It appears like most of the old style VGA/HDMI converter boards are mostly sold with the same hardware/board with the proper LVDS connector installed.

I can take care of the backlight driver part. I'm mostly concerned with what is going on with LVDS in practice. Anyone familiar with the subject on Lemmy?

 

I've been watching some One Marc Fifty stuff on YouTube. I can follow him well, and I'm decent at much of the hardware stuff. At least I can compile OpenWRT or do a basic Gentoo install with a custom kernel. I dread staring at NFTables, but can hack around some. I don't fully understand networking from the abstract fundamentals. Are there any good sources that break down the subject like Ben Eater did with the 8 bit bread board computer, showing all the basic logic, buses, and registers surrounding the Arithmetic Logic Unit? I'm largely looking for a more fundamental perspective on what are the core components of the stack and what elements are limited to niche applications.

I just realized I want to use self signed client certificates between devices. It was one of those moments where I feel dumb for the limited scope of my knowledge about the scale of various problems and solutions.

view more: next ›