Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)I
Posts
3
Comments
35
Joined
3 yr. ago

  • could you elaborate? or is there a link for this?

  • Wonder how the survey was sent out and whether that affected sampling.

    Regardless, with -3-4k responses, that’s disappointing, if not concerning.

    I only have a more personal sense for Lemmy. Do you have a source for Lemmy gender diversity?

    Anyway, what do you think are the underlying issues? And what would be some suggestions to the community to address them?

  • Just a quick check, is this location based or something, or maybe the meme was very old? Not to say that these things don’t happen anymore, but I can access this one specifically just fine.

  • I’ve never had an account with these. Do I need to create an account with them to freeze my credits? And what kinds of information should I give / not give when I do?

  • thanks for clarifying! that’s really helpful!

  • haha nice. I’ll try that next time

  • gotcha, thanks for clarifying :)

  • “NOPE” as in “not a dark pattern” or as in “I’m not touching this site”? if former, can you clarify on the reason?

  • can you clarify on the 7?

  • thanks for confirming my suspicion. as for your question, conda in general is good for installing non-python binaries when needed, and managing env. I don’t use anaconda but it provides a good enough interface for beginners and folks without much coding experience. It’s usually the easiest to use that than other variants for them, or the python route of setting up environments

  • Privacy @lemmy.ml

    Is anaconda download page considered dark pattern?

  • Privacy@Lemmy.ml: Can Google access your data Google Workspace & their education services? How can I best protect privacy on it?

    Jump
  • If you’ve never worked before, this can be considered practice runs for the when you do.

    Like one of the other commentors said, assume everything is accessible by Google and/or your university (and later, your boss, company, organization, …).

    And not just you, but the people who interact with you through it. So that means you may be able to put up defenses, but if they don’t (and they most likely do not), the data that you interact with them would likely be accessible as well.

    So here are some potential suggestions to minimize private-data access by Google/university while still being able to work with others (adjust things depending on your threat model of course):

    • use Google Workspace services only for collaboration and for official business communication
    • don’t link things that may be personal, such as Google Map, Youtube, Search history, Browser, …
    • if more sensitive things need to be shared with other people, use more private/encrypted solutions that you like or the university suggests. You should use the latter if it’s still “business”-related, e.g. communicate about medical research data with PII
    • if there are communications that need sensitive information (eg HR documents, tax documents), ask them (a) if you can bring the sensitive documents to them, (b) or if the university has an encrypted solution, or (c) if you can use your own encrypted solution (eg put files on protondrive and you give them the appropriate folder password in person)
    • go through all Google privacy and security settings every 6 months or so, and turn off what you don’t need (there are usually a bunch of guides for that). Note: every 6 months because there may be new stuff that they add
    • turn off all the AI integrated features (sometimes called smart features) in Google services like Mail, GDoc, …
    • avoid using GDrive for storage of personal files - if you need to, try to encrypt them before uploading
    • you may find there are other people like you; and if you work with them, try to ask whether they are comfortable with alternatives or if they have anything suggestions. However, this is usually rare in most fields, so keep your expectations low for this
    • use the multi-account containers in Firefox to containerize all stuff related to university account in one container. Don’t use Google Chrome; if you must you Chromium, there are other “forks?” that you can try
    • use UBlock Origin and block unnecessary Google services (you’ll have to play around with this a lot)
    • avoid clicking on links in emails if possible, but instead copy them by selecting them (or the right click, copy). This is an unfounded suspicion, Google may track what links you click on
  • You can also just post the 4-5 data items without claiming that this is low or high credibility or bias. Then let the people make the decision. Like this maybe:

    “Based on source X, this source media bias is:

    • bias: A
    • cred: B

    Methodology of X is at: “

  • sounds like this can be a plot of a new Pixar movie

  • Many things are called “AI models” nowadays (unfortunately due to the hype). I wouldn’t dismiss the tools and methodology yet.

    That said, the article (or the researchers) did a disservice to the analysis by not including a link to the report (and code) that outlines the methodology and how the distribution of similarities look. I couldn’t find a link in the article and a quick search didn’t turn up anything.

  • you should try to ask the same question using xAI / Grok if possible. May also ask ChatGPT about Altman as well

  • tell me more about the “almost” part …

  • Lol ads that can be engineered into DNA, so that they can be passed down for generations.

  • iPhone @lemmy.world

    Apps randomly turned on in “Apps using iCloud”?

  • No Stupid Questions @lemmy.world

    Is there a day of any given year that is least special?