- 8 Posts
- 290 Comments
just_another_person@lemmy.worldto
Technology@lemmy.world•No AI* Here - A Response to Mozilla's Next Chapter - Waterfox BlogEnglish
112·2 days agoLLMs aren’t going to make you good at your job.
If you lacked coming in and relied on this bullshit, you’ll suck even more going out when they figure out you can’t have a conversation about the thing you were hired to be an expert on, buddy.
Good luck to you.
just_another_person@lemmy.worldto
Technology@lemmy.world•No AI* Here - A Response to Mozilla's Next Chapter - Waterfox BlogEnglish
93·2 days agoLLMs are useful for summarization. That is it.
How often are you needing a summary of the thing that you’re browsing at the moment?
just_another_person@lemmy.worldto
Technology@lemmy.world•No AI* Here - A Response to Mozilla's Next Chapter - Waterfox BlogEnglish
1754·2 days agoAm engineer. Know zero professional people in the engineering community who use AI browsers, and very few who even touch AI for anything aside from docs or stats.
In my personal life I know zero people who use these browsers. I think this is just panic from the higher ups at Mozilla who have no idea what in the fuck the company should be doing or is about, even.
Start making tools to give to people to combat this bullshit from the EU. Build a USABLE and decentralized chat app that people can actually use FFS. Build something like Proton and ACTUALLY BECOME SELF-SUFFICIENT.
Others have eaten your lunch because of this exact thing. Do better.
just_another_person@lemmy.worldto
Technology@lemmy.world•I Went All-In on AI. The MIT Study Is Right.English
162·12 days agoNo shit
Just like all the rest, it’s a remotely operated pile of garbage that can’t do a damn thing.
Oh wait…they made it jog for some reason. Battery lasts for 20 minutes while walking, so jogging it’s going to get a few doors down and fall over.
just_another_person@lemmy.worldto
Technology@lemmy.world•Sam Altman’s Dirty DRAM DealEnglish
271·14 days ago
just_another_person@lemmy.worldto
Technology@lemmy.world•The threats from AI are real | Sen. Bernie Sanders [15:02]English
82·15 days agoWhat in the world are you talking about? You’re not making any sense between comments.
just_another_person@lemmy.worldto
Technology@lemmy.world•The threats from AI are real | Sen. Bernie Sanders [15:02]English
18·15 days agoIt’s not about their actual effectiveness, it’s about the justification people use to force more “AI” reasons to fire people, reduce pay, eliminate jobs, and so on, and so on…
Literally the first point in this speech, though broad, is making that case. A very small number of people are forcing this shit down people’s throats, and using it to justify the loss of monumental numbers of jobs.
Feel free to look up Amazon’s upcoming waves of layoffs, Salesforce, Google, HP…etc. Amazon alone claims they will be replacing 150k jobs in the US alone in the next year with robots. Again, first point brought up by Bernie.
just_another_person@lemmy.worldto
Technology@lemmy.world•The threats from AI are real | Sen. Bernie Sanders [15:02]English
251·15 days agoMkay. I work in the industry, and everything he said is quite on point.
Unless you want to clarify, it seems you have zero clue as to what you are talking about about.
just_another_person@lemmy.worldto
Technology@lemmy.world•How Hackers Use NPMSCan.com to Hack Web Apps (Next.js, Nuxt.js, React, Bun)English
71·17 days ago(typing quickly, excuse errors)
Title: The title is both confusing and misleading to the actual topic being discussed, which is CVEs being used to identify vulnerabilities to be exploited. The tool is irrelevant, and the tool in the headline is actually mentioned very little in the content.
Staying on topic: the title sets out a few things as the topics: 1) NPMScan 2) Vulnerabilities 3) Frameworks being exploited.
It then shifts in the first details to middleware exploits, and how routes are mishandled. So a reader might be asking "Wait, is this a post about middleware attacks, or something specific to NPMScan/CVE exploits?
A title or headline should be a simple summarization of the topics discussed, and the content should stick to what those topics are. A more accurate title to this piece would be “How Hackers use CVE information to craft exploits in X, Y and Z”
Diversion from topics: While keeping the meat of an article as close to the main topic thread, it’s important explain the when/where/why you are diverting from that thread for context. When doing so, you’re explaining the relationship between your main topic, and this new information being pertinent and important to the discussion overall.
Just adding a bunch of unrelated information leaves the reader confused about what those ties to the main thread are, and usually will be forgotten or skipped if they came to your content based on the headline and looking for specific information.
An example of this being used horribly all over the place is recipe sites. You go looking for a Holiday Cookie recipe, and are presented with with pages of journal entries about the authors childhood cookie memories. It’s not pertinent to the actual content being requested, and people will skip it.
just_another_person@lemmy.worldto
Technology@lemmy.world•How Hackers Use NPMSCan.com to Hack Web Apps (Next.js, Nuxt.js, React, Bun)English
31·17 days agoIf this is your content, I have some pointers.
just_another_person@lemmy.worldto
Technology@lemmy.world•Monotype font licencing shake-down — Insanity WorksEnglish
10·18 days agoJust putting it here because they will spam the shit out of any domain registrar emails not hidden as well.
In this particular case, they were smart enough to actually have business emails on hand for the threat, knowing they’d never actually attempt to actually email this threat to any mail server as they would get filtered immediately.
just_another_person@lemmy.worldto
Technology@lemmy.world•Monotype font licencing shake-down — Insanity WorksEnglish
51·18 days agoNEVER EVER EVER pay anything to anyone if they are making claims like this.
Simply respond with “Our legal team’s process requires a filed Cease and Desist to be sent directly to them with specific references to infringements based on your claims. Once they have received this, the offending content will be immediately rectified.”
Even if it’s your personal website. Don’t even fucking bother with these people and waste your time and money worrying about it, be sure this is the very first step in any legal action over public content. They can’t just jump to suing you or demanding money.
Scammers will fuck right off.
just_another_person@lemmy.worldto
Technology@lemmy.world•OpenAI says dead teen violated TOS when he used ChatGPT to plan suicide - Ars TechnicaEnglish
341·22 days agoFucking.WOW.
Sam Altman just LOVES answering stupid questions. People should be asking him about this in those PR sprints.
Etsy has honestly become a terrible front for selling cheap overseas goods now. There’s no quality control at all, and no direct guardrails to ensure what you’re receiving isn’t just proxied junk from elsewhere.






If you’ve not been paying attention to their other random products, it would seem this is unlikely.
They just jump from random thing to random thing and collect money along the way, draining the coffers with their C-level titles. Absolutely bullshit.