This feels like a personal attack
RonSijm
Programming.dev is hosting Iceshrimp: https://bytes.programming.dev
You could host your own instance, or if your opinion-pieces are programming related, post them there
It probably depends on the level of the criminals and organized crime groups. I saw this Youtube video a couple weeks ago that talks about the history of how organized crime groups were using encrypted communication https://www.youtube.com/watch?v=gigIOc_0PKo (And how they were honey-potted by the FBI to use an FBI-hosted service, lol)
Organized crime groups that make 100s of millions should be capable enough to hire skilled developers and sysops to host self-managed services. At some point if they make enough money, investing in self-managed communication becomes preferable over using telegram or signal.
No one's questioning why he's sorting it twice?
It's called embeddings in other models as well:
https://huggingface.co/blog/getting-started-with-embeddings
https://ollama.com/blog/embedding-models
Also some feedback, a bit more technical, since I was trying to see how it works, more of a suggestion I suppose
It looks like you're looping through the documents and asking it for known tags, right? ({str(db.current_library.tags)}.
)
I don't know if I would do this through a chat completion and a chat response, there are special functions for keyword-like searching, like embeddings. It's a lot faster, and also probably way cheaper, since you're paying barely anything for embeddings compared to chat tokens
So the common way to do something like this in AI would be to use Vectors and embeddings: https://platform.openai.com/docs/guides/embeddings
So - you'd ask for an embedding (A vector) for all your tags first. Then you ask for embeddings of your document.
Then you can do a Nearest Neighbor Search for the tags, and see how closely they match
I'm a bit of a noob in hardware design, so maybe this is a stupid question, but why is a FPGA scary?
It would seem scarier to me if they actually fabbed an FPGA into an ASIC right? That could maybe indicate they have some kinda plan to mass-produce them, no?
Although I agree with the sentiment - the article mentions that it's "only" regarding about 1 mil people. (Probably South Korean users)
So it's still a $15 fine per violation. Could have been much higher, sure, but I don't know if that's a good return of investment for Facebook.
Maybe this case sets an example for other countries or regulatory bodies to start issuing fines to Facebook as well
I haven't used json(b) in a Spring app, so I can't say much about that.
Json vs Jsonb depends on the use-case. Inserting json is faster than inserting Jsonb. Reading json (based on searching for specific json properties) Jsonb is faster, because Jsonb is parsed into a more optimized tree.
From my experience, I don't really like doing selects based on json properties. If I know I'll be selecting a certain property, I usually add an additional column next to the json with the data, and insert that property there (At least in c#/dotnet, with EF) The frameworks don't have that much support for selecting within json (you can do it, it's just a lot more natively supported to use proper columns)
Nice. Does that mean I can take my 1980s computer case back off the shelve, and finally get to use a Turbo button again?
I'm not entirely sure what you hope to achieve: have a GPG encrypted subject, and have ThunderBird automatically understand that it's encrypted, so it can be automatically decrypted?
Since you're saying you're building software to support this, what are you building? A ThunderBird plugin that can do this? Or just standalone software that you want to make compatible with ThunderBird default way of handling encryption?
"It's against the law to export to china, but they're doing it anyways."
"What if we prevent it by making it even more against the law?"
Right...