I think the issue would be mainly that people fail to realize the nature of what they're corresponding with, and take things from inside their heads and behind the walls, and put them into the chat?
No one is "corresponding" trade secrets outside of their company. I recommend reading up on ITAR and the resulting culture it has created around aerospace info.
Don't forget these companies are both civilian and millitary contractors. These kind of information will stored in separate air-gapped computer systems.
Note that google cloud has an itar-compatible gemini pro and google drive / docs - so, people do talk to it - and google is of course contractually obligated to not export it, nor to learn from it.
This is very different that AWS fed-gov bedrock thingie - where AWS promises that the models are running on hardware dedicated to you, with no external logging, etc.
> google cloud has an itar-compatible gemini pro and google drive / docs - so, people do talk to it
A lot of aerospace engineering is touch and feel. Someone has a "sense" for when to do the next step, and how to finagle the part so it comes out a particular way. They can train someone, if they apply themselves intently. But they probably couldn't explain it in words if they tried.
Morris' autobiography "Animal Days" (1979) is a very charming account of his early life and career, in case someone wishes to take this occasion to read more about that than appears in the obituary.
Sigmoid-type activation functions were popular, probably for the bounded activity and some measure of analogy to biological neuron responses. They work, but get problematic scaling of gradient feedback outside their most dynamic span.
My understanding of the development is that persistent layer-wise pretraining with RBM or autoencoder created an initiation state where the optimization could cope even for more layers, and then when it was proven that it could work, analysis of why led to some changes such as new initiation heuristics, rectified linear activation, eventually normalizations ... so that the pretraining was usually not needed any more.
One finding was that the supervised training with the old arrangement often does work on its own, if you let it run much longer than people reasonably could afford to wait around for just on speculation contrary to observations in CPU computations in the 80s--00s. It has to work its way to a reasonably optimizable state using a chain of poorly scaled gradients first though.
One has to wonder whether destroy is all it does though. Analyzing this as cues about the surroundings seems like it could be pretty useful for successful living, and something evolution could well pick up on.
Will we find eventually that some of those nucleic acid fragments were being hauled off for identification in something like an extra inner sense of smell?
> No need to wonder if you study the lymphatic system.
Does it mean yes or no? I think "no", but IANAMD; IANAB, ... I think it only identify proteins, glycoproteins, and other stuff that is in the surface of the cells/virus but not the DNA/RNA.
Maybe so, but also maybe not quite my point, unless you know something I don't about it.
Sure, some samples will be off to antigen presentation, but does that inform more than this is an encountered foreign substance and this is how to bind to it for neutralization ?
Seems like in principle you could take the overview picture and have something like olfaction, but for things that hadn't been sufficiently cracked open when they passed the olfactory epithelium.
Maybe it's starting to be sorted out, but I'm not up to date on what the neural feedback from the immune system carries.
Are the quantities too small though?
Really foul-smelling small molecules can be sensed at least down to ppb concentrations. And the recent technical use of "eDNA" demonstrates there's signal to be had.
“Your privacy is very important to us.” is technically true though. It probably does take away something from their profits, and sometimes the whole business idea, if they don't continue to rampantly violate it...
Does it still work out if you take into account the insurance premiums for a cargo ship stacked with batteries? Can't imagine the fire hazard is pretty.
Oh, there's precedent for shuttling freighter size metal fire hazards intercontinentally to top up charge, is there?
How does that work out in cost per kWh? Profitable operation anywhere close?
Crisis relief (as suggested by jmward01 here) may be another matter, but setting up the ability to do this on scale, and maintaining it, can't be anything like easy economically.
I'm somewhat dubious about that for icons with actual recognizable pictures, but a lot of icon attempts today are stylized to death, with just a line, bent and broken in a couple places and maybe if you're lucky juxtaposed with the occasional dot.
If there's no text description even on mouseover (or touchscreen, with no cursor...) discovery is more or less trial and error (or perhaps more akin to Russian Roulette if the permissions involve being able to do real damage).
Scratch your head and hope there are existing support questions searchable about what on Earth the programmer could have meant to convey...
But it would be pretty well in line with the "I trust my contact with this communication, but only if they're not systematically misled to copy it to readily exploitable insecure storage" line of thinking.
Since the purposes of the program are pretty heavy on private communication, I'm inclined to think that takes precedence here, especially considering the consequences for dropping default message previews versus adding default reveal of supposedly private information.
I hope you're right though.
reply