• 3 Posts
  • 541 Comments
Joined 4 years ago
cake
Cake day: January 17th, 2022

help-circle
  • Honestly it’s trickier than most think.

    There are plenty of theoretical use cases, sure, especially for AI because it’s basically just either statistics on very large datasets or heuristics. Most of us, if not all of us, use that pretty much daily.

    LLM though is a lot of less obvious but one can easily imagine public research on language, namely being able to study how language evolved.

    GenAI… also, in itself honestly it might even be the most interesting of all because it’s makes us pragmatically ask what it’s like to be creative.

    Yet… all that is so SO different from the commercialization and the capture of it.

    So public research in AI, I’m 100% behind it. It can be useful. VC backed for-profit systems that extract and capture value, no, nearly nothing legitimate can come out of this… but to be fair it’s not limited to AI, AI just happens to be the last thing they try to capture.










  • Few seem to address the issue here : it does not work 100% of the time for you.

    It might work for everybody else but that doesn’t help you much. You have your setup, no theirs.

    So… you need to investigate. When it works, great, nothing to learn from. When it fails though… can you find a pattern? Does it always fail after you have use something specific? Check https://lemmy.ml/post/46800646/25494455 which gives examples of potential failure point and journalctl logs. You can then check what failed and if not you can at least know when then backtrack to others logs, e.g. dmesg.

    They key take away is that when things do not behave as expected you need to put a detective hat on and you investigate :

    • what’s your crime scene? Your laptop and it’s log files
    • what’s the crime? It didn’t suspend properly
    • where are the traces? In the logs
    • where are the logs? Using journalctl or dmesg and typically in /var/log/
    • what would a good detective do? Search for specific clues, e.g. places where fingerprints do stick, e.g metal or glass, which here would be error messages. That can be found using grep and other tools

    You also have limited times because the logs will, just like on a real crime scene, get contaminated or rotated or deleted. So… if you do encounter the problem do not rush to the next tasks at hand because you are wasting an opportunity to learn and there is vanishing window.

    TL;DR : grep logs



  • A lot of already great advice here, often clarifying that a computer that is not yours… is not yours.

    What I would still add though is that you are NOT, and I’m very confident in saying this, the only one there, in your very school, to ask that question. In fact I would argue MOST users have the exact same concerns but they might even be aware that alternatives exist.

    So… do not push back, or even just avoid, all this alone. Find others who have similar problems and solve them together.

    There might be a Linux User Group already, join them. If there isn’t one, consider making it. It might just be you for few weeks, even month, but at least you will dedicate time and space to improve YOUR situation. Chances are though that others, even if only curious at first, might check what you are up to, if they can replicate that, etc.

    Don’t feel isolate, move the needle for yourself first, in your corner, but be welcoming to others who are eager to contribute.

    It’s a challenge, but it’s a fun challenge while trying to tackle it with others.





  • IMHO the question depends on :

    • who you are (boring, rando, political dissident, journalist, etc)
    • who you talk to (family, friends, work, etc)
    • what alternatives actually exist

    So… sure Signal is not perfect but if you can’t convince your family members to move to DeltaChat it sure beats using WhatsApp, Telegram, etc.