It’s more like “idiot billionaire builds bigger shiny gadget for a non specific purpose”
Like what’s the problem being solved here?
It’s more like “idiot billionaire builds bigger shiny gadget for a non specific purpose”
Like what’s the problem being solved here?
Alright thanks I’ll work on it
I wonder what it would take to run a hostile lemmy instance, just designed to drag people you dislike via putting words in their mouth.
I like that double entendre good job
When we said give the people what they want, we got this, and we do.
you don’t talk about salary within earshot of the boss, you don’t badmouth company decisions within earshot of the boss
Or, do these things all the time if you can base your working hours around making your company more money.
Yeah same re: purchasing convenience vs pirating.
Pirating is a juicy prospect once again.
But your premise is bad
Prior to launch, we agreed to a comprehensive set of rules to govern image creation, including that people in images be fully clothed.
Apparently they thought about it, but neglected to think that some “vacation” images in the training data might not be tagged with the clothing worn or that the model might sometimes consider only pants to be fully clothed because some of the training data might show topless women in public and not be tagged. Or topless men.
Yeah it does… Epic doesn’t have a big stick like the whole court system to punish Apple.
The prosecutor does.
Epic wasn’t prosecuting.
Yeah don’t do that
Basically collecting information on the movement of documents is a security risk in itself.
Papers in a flaming trash can are secured. Not much else.
I deal with consumer data analytics, and the scheme that you are positing does expose the frequency and density of specific actors and their access to classified information. This is really valuable, you can tell when someone gets a promotion and maybe has access to more info then they are used to or some other exploitable paradigm.
If it’s just a printed barcode sure, it could be tracked like this without exposing information. Trouble is that classified documents are living documents, and the information only becomes classified when it’s collected by some operative or officer, who may or may not register the documents with this central tracking authority.
The next issue is the capability of the central tracking authority to review, access, curate all of the reports that it has received, and their confidence that their internal staff do not breach the access rules on these documents hello Snowden.
You might have shot somebody’s last wishes, you Ponce
Basically tryhard PI job. Public or semi public info is fair game for collection.
If this is about the concept of investigators being heavily siloed into independent investigations about the same crime… No this is the opposite. There are no investigators, because there is basically zero information about the activities.
He ate papers he has been intentionally obscuring the information he’s had access to the entire time that he’s been receiving privileged information.
I like that book, but it’s been long enough you will have to lead me into the parallel you are making.
🙄 this is interesting? Is there no new application or topology here?
If it’s just “more power vroom” this is only valuable for entertainment.