• 1 Post
  • 43 Comments
Joined 2 years ago
cake
Cake day: June 17th, 2023

help-circle





  • To be honest, that seems like it should be the one thing they are reliably good at. It requires just looking up info on their database, with no manipulation.

    That’s not how they are designed at all. LLMs are just text predictors. If the user inputs something like “A B C D E F” then the next most likely word would be “G”.

    Companies like OpenAI will try to add context to make things seem smarter, like prime it with the current date so it won’t just respond with some date it was trained on, or look for info on specific people or whatnot, but at its core, they are just really big auto fill text predictors.


  • The network effect is real. You can have the best, most awesomely-designed social media platform ever and it will be useless if you are the only person on it.

    You can try to convince all your contacts to switch away from whatever app is causing the most evil today, but you also have to convince all of your contacts’ contacts and all of theirs as well.











  • Side note. Don’t use hardware acceleration with TDARR. You will get much better encodes with software encoding, which is great for archival and saving storage.

    Use hardware acceleration with Jellyfin for transcoding code on the fly for a client that needs it.

    If you know what your client specs are, you can use TDARR to reencode everything to what they need and then you won’t have to transcode anything with Jellyfin.


  • You have a point that it will be hard to explain this to everyone on why it is better.

    From my understanding, when you use a password manager, the user will enter a pw into it that they remember and the vault will unlock. Then when they go to log into a website, a different, longer, and impossible to remember password will be sent to the site at login. (Assuming they are using the manager well). A week later when they go to log in again, the same long password will be delivered.

    The problem is that if a bad actor gets involved, whether it is the website is attacked or they send the user a phishing url or something and the password from the manager is exposed, it will have to be changed. That scammer can now log into that website as the user whenever they want, and possibly any other website that user used the same password for. Hopefully they didn’t if they are using a manager.

    With passkeys, a user will log into their manager with a password they remember, but when they go to log into a website, a different token will be sent, based on their key, every time. So if a scammer is listening at the router they still can’t log in again because it has expired.

    It is still not a perfect thing, I would imagine that phishing sites could still get a scammer in, who could possibly do bad things or change the login credentials but it is still much more secure than sending a password to the site for the user.