Explain Like I'm Five

13507 readers
43 users here now

Simplifying Complexity, One Answer at a Time!

Rules

  1. Be respectful and inclusive.
  2. No harassment, hate speech, or trolling.
  3. Engage in constructive discussions.
  4. Share relevant content.
  5. Follow guidelines and moderators' instructions.
  6. Use appropriate language and tone.
  7. Report violations.
  8. Foster a continuous learning environment.

founded 1 year ago
MODERATORS
1
 
 

We noticed this community was abandoned by its previous moderators, and so we’re here to help it thrive again!

We’re looking for new moderators to help make this a truly awesome community. Keep in mind that as a moderator, it would be up to you to make sure all posts are following the Lemmy.World’s rules, and your own community rules.

Server rules can be found on https://lemmy.world/legal

If you are interested in moderating this community, please reply to this post with your time zone and availability.

2
 
 

Developers still continue to shaft anyone that isn't using an IBM PC compatible. But if the IBM PC was more closely related to the latest Nexus/Pixel device, then would the gaming experience on smartphones be any good?

3
 
 

Ultra-low-end business laptops from 2015 with a mobile Intel Core i3, 4 GB of RAM, and integrated graphics still have a dramatically better gaming experience than the Pixel 7 Pro. Why?

By the way, this is even with the help of emulators. Without emulators, gaming would outright be impossible for most people

4
5
 
 

Exemple: How does Apple guarantee that the iOS source code will not be discovered by an adversary?

Is there any type of different encryption for this case?

6
 
 

AI tools are helpful and cool as long as you know their limitations. AI doesn’t exist. It's machine learning and is as good as the data used in his training.

The general workflow of how AI works is:

  • Data Input: Collecting and preparing the necessary data for the AI system

  • Data Processing: The AI algorithms analyze the data, identify patterns, and learn from them

  • Decision Making: Based on the learned patterns, the AI system makes predictions, recommendations or decisions

Overall, the key to how AI works is its ability to learn from data and improve its performance over time.

But AI build on biased data sets will give biased results.

Some common issues that lead to AI mistakes include:

  • Brittleness: AI can only recognize previously encountered patterns and can be easily deceived by new situations

  • Embedded biases: If the training data for AI contains biases, the AI system will reflect those biases in its decision-making

  • Catastrophic forgetting: AI systems can abruptly forget previously learned information when trained on new data

So what?It is good or not? Answer: It's a tool, use it as one and not as an oracle of truth.


More source

How Does AI Actually Work?

But what is a GPT?

AI is NOT Artificial Intelligence, the real threat of AI is "Automated Stupidity"

When AI Makes a Mistake, Who’s Responsible?

Experts: Human Involvement Can Help Prevent AI Mistakes

7
 
 

PLEASE. I keep seeing it in memes. As I understand it the latest version of the xz package (present in rolling release distros like Arch and SUSE Tumbleweed) has "a backdoor", but I have no earthly clue what can be done by malicious folks with access to that backdoor or if I should be afraid or how to check if my distro is compromised or how to prevent damage if it is or (...)

8
9
 
 
10
 
 

I figured out that there's a clown who crashes his car into a tree because he is drunk, but I don't get the last panel. Why are there suddenly so many bodies?

11
 
 

It’s weird how I’ll see a dream and really ponder over it right after waking only for it to be completely out of my memory shortly after.

12
 
 

Theres many platforms to choose on peertube, does making account on one platform still works on other peertube platform? ELI5 the peertube

13
 
 

It's been a while since I was taught Chemistry, but I was reading something the other day and I couldn't quite get my head around the concept.

So the periodic table shows elements with their atomic numbers (protons) and atomic weight (protons + neutrons). Isotopes have different numbers of neutrons, like carbon-12 and carbon-13 which I believe would have 6 and 7 neurons respectively.

So why is carbon-12 the 'default' option, shown on the periodic table? Is it to do with which version of carbon is the most common? I don't understand how we decide what makes up the pure version of an element/ it's atomic weight as shown on the periodic table

14
 
 

I understand that the Romans were unable to conquer Scotland so they build Hadrian's Wall (which explains the survival of older cultures there). But as far as I know they occupied Wales and Cornwall, so how is it that the Celtic culture (language etc.) survived in those places?

15
 
 

I've been trying to keep up with it but I just don't understand how he profits from this scheme?

16
 
 

Also why is it sometimes called a federated ID? Does it have to be an email address or could any value work?

17
1
submitted 1 year ago* (last edited 1 year ago) by [email protected] to c/[email protected]
 
 

So almost every GDPR cookie consent banner out there has a section for "legitimate interest" cookies that they can leave on by default and you will inadvertently accept even if you choose "Reject all" unless you go to the detailed settings and disabled those too.
Some of them have dozens of legitimate-interest cookies.
I read some articles about what they are and why it is allowed to keep them on by default, but they were very vague. So can someone explain it to me like I am five?

18
19
 
 

Do they get some kind of real-time feed that tells them "hey this URL popped up in the web today, but it is a tracker, so block it", or is this exercise is mostly helped by the crowd ?

20
 
 

I keep seeing references to RICO in the Trump Georgia stuff. What is it and how is it relevant to that case?

21
 
 

I'm completely out of the loop.

22
 
 

I understand that in end to end encryption the message is encrypted and only the recipient has the key to Decrypt it. How is the key transmitted, and how can the key not get intercepted with the message?

23
 
 

I feel like whenever I see the ampersand on this website, it’s followed with “amp;”. I’ve noticed it other places on the internet also. Why does this happen? Is it some programming thing?

Just for a test: &

24
 
 

For example, anyone could use Let's Encrypt to get a trusted certificate, so what makes this trustworthy? Or why not trust everyone that signs their own certificates with a program like OpenSSL?

25
 
 

In a similar vein, why can we not use the technology of RAM to prolong the life-cycle of an SSD?

view more: next ›