![](/static/253f0d9b/assets/icons/icon-96x96.png)
![](https://lemmy.ml/pictrs/image/CJ7moKL2SV.png)
This is about light rail though, which is usually built in cities (or, at least between a city and its suburbs). So I wonder how much of the cost (for both rail and road) is for land rights.
This is about light rail though, which is usually built in cities (or, at least between a city and its suburbs). So I wonder how much of the cost (for both rail and road) is for land rights.
“Team restructuring” is so much fun, you never know what you’re going to get.
Your boss’s boss now reports to a slightly different VP? Everyone is getting fired? No way to know which it’s going to be, until the end of the meeting.
no one is defending Putin, the US set the stage for the invasion
That has to be the shortest contradiction.
Yeah, you can call yourself a leftist all you want, but when 90% of your posts is calling Biden and Zelensky Nazis but you never criticize Putin or Trump, I get certain doubts.
AI is whatever machines can’t do yet.
Playing chess was the sign of AI, until a computer best Kasparov, then it suddenly wasn’t AI anymore. Then it was Go, it was classifying images, it was having a conversation, but whenever each of these was achieved, it stopped being AI and became “machine learning” or “model”.
Sadly, it was destined to fail. In Diaspora and in Google+.
The thing is, while people definitely do have different circles, they don’t like to think about these circles in an explicit way.
Facebook has had something like this for a while now, you can set visibility settings on every post, but again almost nobody uses it.
Does anyone remember Google+? When they tried to make everyone with a YouTube account also have a Google+ account.
Spoiler alert: it didn’t go well
More vulnerable, probably yes. Phones are very locked down and secured (unless you root or install custom firmware).
But, they are still worse for privacy due to how they’re used. The phone (and thus Google and Apple and Facebook and others) has access to your location all the time - your computer doesn’t. The computer is only vulnerable when on - the phone is always on.
The threats are different and from different sources. Random hackers mining shitcoins on your computer, big companies knowing what you’re doing when you carry your phone.