1. The hyper palatability
2. The calorie density to nutrition ratio
3. The high GI
4. The level of processing.
5. The low quality and probably inflammatory oils.
75% of the FDA’s budget comes from the pharmaceutical industry. I assume that part of that is the food industry. Also the USDA is largely outsourced to the industries it’s supposed to manage. The US is bought and paid for by industries that donate to the Democrats and Republicans. Welcome to America.
USDA is more intended to support and promote agriculture and agribusiness than to manage the industry. Food assistance programs are dual duty --- help with poverty, but also ensure a base level of demand for agriculture products.
Complaining that the USDA is good for business is like complaining if the Veterans Administration provides good benefits for Veterans.
That said, I wouldn't put agribusiness in charge of the food groups, but that's what we've got.
I mean that’s everywhere though the rich rule the world even in supposedly communist China or socialist Tanzania that won’t change anytime soon
My confusion is what the poison is? Is it cholesterol or something? My cousin said something about chemical reactions when the potatoes are deep fried creating a thing but I’m the dumb one in my family so I didn’t understand.
We allow things like high fructose corn syrup in greater quantities than the EU. Our wheat has more gluten which is am inflammatory substance. We have dyes that are known carcinogens. We allow higher levels of heavy metals than the EU. We push highly processed foods as the norm. Basically we’ve designed our diets around ease of consumption and profits.
The first generation or two of Vipers were very raw & unrefined, with ~400 horsepower, no stability control, no anti-lock brakes, minimal safety features, cheap & janky looking interiors, etc. It sounds great to me (aside from the lack of a/c & nice ergonomic interior), but it would be extremely easy to have a bad time if you're an average driver.
I'm not sure about the analogy though, they might have been thinking of later Viper versions where the complaints would be more about cost, gas mileage, or general impracticality for daily use.
They were given “tablet friendly” user interfaces that made navigation extremely difficult. But Microsoft never finished the job so you’d try to find something in the stupid sliding screen interface only to be thrown into a windows 3.1 era control panel. Windows server of that era was even worse, as mostly you administered using RDP but it never played nice with the “hover here to bring up the whole screen menu” required to drive it.
Underneath it was just Windows, but the interface ruined it
Vista significantly changed the security model, introducing UAC and requiring driver signing. This caused a bunch of turmoil. It also had much higher system requirements than xp for decent performance, meaning that it ran at least a bit shit on many people's machines when it was new, and that did it no favors.
Mistral has published large language models, not embedding models? sgrep uses Google's Word2Vec to generate embeddings of the corpus and perform similarity searches on it, given a user query.
No I got that I asked because wouldn’t embedding generated by fine tuned transformer based LLMs be more context aware? Idk much about the internals so apologies if this was a dumb thing to say
As a Britisher I did not know the origin before, thank you. But, "pear-shaped" originated within my own lifetime? This has blown my mind as I cannot remember a time before this phrase existed and it seems eternal.
Zero click exploits are a thing, but they are very expensive and have limited shelf life (once they have been used a few times, they tend to get found out and patched). Most actors won’t use one, unless it is a very, very high value target. It seems that the EU parliament member was not high value enough, and got lucky.
Just to be aware that's a start but it's not a full mitigation. Some of the prominent zeroclick exploits have been "rich content" in messaging products such as whatsapp[1] and imessage[2].
Definitely not an expert but I'm presuming they take advantage of the "helpful" behaviour those apps have to preview content and then pair that with some sort of exploit in the library that parses/displays the content. So say they have an exploit in a jpeg library that whatsapp uses then they send a specially-crafted jpeg via whatsapp, whatsapp "previews" the image and that triggers the exploit to compromise the jpeg library and pwn the user.
(from a comment above) Idk much about math or anything would love to make it to AGI that can tell me which opinion is correct when reading HN