Trying to diminish this as brute force (something by the way that is categorically not 'unfamiliar to human brains' - as anyone who has every worked on complex slippery problems will tell you) is foolish, when the models hypothesize along the way to their solutions. That's reasoning.
The dimension of brute force unfamiliar to human brains is "well-read with zero judgement", where connections can be made even if they're not thought through.
You cannot — not with the model alone. It gives you spans + types, not identity.
You need to do that part yourself after the model runs. The filter gives you spans;
for each one, assign a stable ID (PERSON_1, PERSON_2) and keep
{PERSON_1: "Harry", PERSON_2: "Ron"} next to the document. Swap IDs in
before the LLM call, swap originals back in the reply.
Scoping that map to a document/project keeps the same person consistent
across calls, so Harry stays PERSON_1 instead of becoming PERSON_3 the
next time he's mentioned.
(Disclosure: I'm building a Mac privacy tool, RedMatiq, that does exactly this.
The mapping layer turned out substantially harder than detection.)
Funny how the strongest challenge to Nvidia's near-monopoly(full monopoly?) is coming from Google, and not AMD.
Still rooting for AMD to catch up too, especially if they can continue improving their software stack. They seem to be moving in the right direction.. though, they could benefit from speeding up a bit more.
Google now has it's fingers in all the pies.. is successfully fully vertically integrated and now expanding horizontally.
"socialise ownership and control" ... this always ends up with just one person owning(not literally) it, through sheer misuse of political power.
As far as I can see as of now, there is no "realistic" way out. It's a problem of human nature... People are corrupt, people with authority are more corrupt, and people with money and authority, even more. Come intelligent and cheaply mass-produceable robots, and we'll have a new, 4th level spinup too that will be worse than the first 3, combined.
I was thinking... will x402 protocol make it super easy for scammers to commit such frauds in future? By tricking online searches done by LLM's to trick them into spending money?
"If you’re not sure what you want to do, just do Java. It’s a shitty programming language that’s good at almost everything."
- I agree, 100%.
And here's a take that a lot of the folks will disagree, and categorically state that these both belong to two entirely different domains: "Rust, is the evolution of Java. Not Kotlin, not Scala, not clojure, but, Rust".
Oh I don't know. It's a vision of java if java tried to supplant C and not C++.
I guess jit is bad for a micro service that scales constantly or a lambda. But java does have all of these options now. They just are not useful for most people.
The context dependency injection is so so so good. Once we switched over to json & Jax-rs, it made such a great simple direct backend. Good throughput. Just, a bit high memory.
I hadn't thought about Rust that way before, but I think you might be on to something here. Rust and Java both lean heavily into keeping developers from doing anything dangerous with expressiveness and power being pretty far down the list of concerns.
reply