A Lemmy bot to summarize wikipedia links in comments

Usage: Content + bot mention

e.g. This is something interesting @wikibot@lemmy.world

Developer: @Asudox@lemmy.world

Source: https://github.com/Asudox/lemmy-wikibot-rs

  • 0 Posts
  • 72 Comments
Joined 9 months ago
cake
Cake day: October 5th, 2023

help-circle









  • Here’s the summary for the wikipedia article you mentioned in your comment:

    Socket AM4 is a PGA microprocessor socket used by AMD’s central processing units (CPUs) built on the Zen (including Zen+, Zen 2 and Zen 3) and Excavator microarchitectures. AM4 was launched in September 2016 and was designed to replace the sockets AM3+, FM2+ and FS1b as a single platform. It has 1331 pin slots and is the first from AMD to support DDR4 memory as well as achieve unified compatibility between high-end CPUs (previously using Socket AM3+) and AMD’s lower-end APUs (on various other sockets). In 2017, AMD made a commitment to using the AM4 platform with socket 1331 until 2020. AM5 succeeded the AM4 platform in late 2022 with the introduction of the Ryzen 7000 series however, AMD has continued to release new AM4 based CPUs even after the release of AM5.

    to opt out, pm me ‘optout’. article | about


  • Here’s the summary for the wikipedia article you mentioned in your comment:

    A dark pattern (also known as a “deceptive design pattern”) is “a user interface that has been carefully crafted to trick users into doing things, such as buying overpriced insurance with their purchase or signing up for recurring bills”. User experience designer Harry Brignull coined the neologism on 28 July 2010 with the registration of darkpatterns. org, a “pattern library with the specific goal of naming and shaming deceptive user interfaces”. In 2021 the Electronic Frontier Foundation and Consumer Reports created a tip line to collect information about dark patterns from the public.

    to opt out, pm me ‘optout’. article | about


  • Here’s the summary for the wikipedia article you mentioned in your comment:

    This is a list of sovereign states and territories by per capita carbon dioxide emissions due to certain forms of human activity, based on the EDGAR database created by European Commission. The following table lists the 1970, 1990, 2005, 2017 and 2022 annual per capita CO2 emissions estimates (in kilotons of CO2 per year). The data only consider carbon dioxide emissions from the burning of fossil fuels and cement manufacture, but not emissions from land use, land-use change and forestry Over the last 150 years, estimated cumulative emissions from land use and land-use change represent approximately one-third of total cumulative anthropogenic CO2 emissions. Emissions from international shipping or bunker fuels are also not included in national figures, which can make a large difference for small countries with important ports. The Intergovernmental Panel on Climate Change (IPCC) Sixth Assessment Report finds that the “Agriculture, Forestry and Other Land Use (AFOLU)” sector on average, accounted for 13-21% of global total anthropogenic GHG emissions in the period 2010–2019.

    to opt out, pm me ‘optout’. article | about


  • Here’s the summary for the wikipedia article you mentioned in your comment:

    The Thucydides Trap, or Thucydides’ Trap, is a term popularized by American political scientist Graham T. Allison to describe an apparent tendency towards war when an emerging power threatens to displace an existing great power as a regional or international hegemon. The term exploded in popularity in 2015 and primarily applies to analysis of China–United States relations. Supporting the thesis, Allison led a study at Harvard University’s Belfer Center for Science and International Affairs which found that, among a sample of 16 historical instances of an emerging power rivaling a ruling power, 12 ended in war. That study, however, has come under considerable criticism, and scholarly opinion on the value of the Thucydides Trap concept—particularly as it relates to a potential military conflict between the United States and China—remains divided.

    to opt out, pm me ‘optout’. article | about


  • Here’s the summary for the wikipedia article you mentioned in your comment:

    The dead Internet theory is an online conspiracy theory that asserts that the Internet now consists mainly of bot activity and automatically generated content that is manipulated by algorithmic curation, marginalizing organic human activity. Proponents of the theory believe these bots are created intentionally to help manipulate algorithms and boost search results in order to ultimately manipulate consumers. Furthermore, some proponents of the theory accuse government agencies of using bots to manipulate public perception, stating: "The U. S. government is engaging in an artificial intelligence powered gaslighting of the entire world population.

    to opt out, pm me ‘optout’. article | about


  • Here’s the summary for the wikipedia article you mentioned in your comment:

    IBM Watson is a computer system capable of answering questions posed in natural language. It was developed in IBM’s DeepQA project by a research team led by principal investigator David Ferrucci. Watson was named after IBM’s founder and first CEO, industrialist Thomas J. Watson. The computer system was initially developed to answer questions on the quiz show Jeopardy!

    to opt out, pm me ‘optout’. article | about


  • Here’s the summary for the wikipedia article you mentioned in your comment:

    Malicious compliance (also known as malicious obedience) is the behavior of strictly following the orders of a superior despite knowing that compliance with the orders will have an unintended or negative result. It usually implies following an order in such a way that ignores or otherwise undermines the order’s intent, but follows it to the letter. A form of passive-aggressive behavior, it is often associated with poor management-labor relationships, micromanagement, a generalized lack of confidence in leadership, and resistance to changes perceived as pointless, duplicative, dangerous, or otherwise undesirable. It is common in organizations with top-down management structures lacking morale, leadership or mutual trust. In U.

    to opt out, pm me ‘optout’. article | about


  • Here’s the summary for the wikipedia article you mentioned in your comment:

    A three-dimensional integrated circuit (3D IC) is a MOS (metal-oxide semiconductor) integrated circuit (IC) manufactured by stacking as many as 16 or more ICs and interconnecting them vertically using, for instance, through-silicon vias (TSVs) or Cu-Cu connections, so that they behave as a single device to achieve performance improvements at reduced power and smaller footprint than conventional two dimensional processes. The 3D IC is one of several 3D integration schemes that exploit the z-direction to achieve electrical performance benefits in microelectronics and nanoelectronics. 3D integrated circuits can be classified by their level of interconnect hierarchy at the global (package), intermediate (bond pad) and local (transistor) level. In general, 3D integration is a broad term that includes such technologies as 3D wafer-level packaging (3DWLP); 2. 5D and 3D interposer-based integration; 3D stacked ICs (3D-SICs); 3D heterogeneous integration; and 3D systems integration.

    to opt out, pm me ‘optout’. article | about


  • Here’s the summary for the wikipedia article you mentioned in your comment:

    Red Star OS (Korean: 붉은별; MR: Pulgŭnbyŏl) is a North Korean Linux distribution, with development first starting in 1998 at the Korea Computer Center (KCC). Prior to its release, computers in North Korea typically used Red Hat Linux, and later switched to modified versions of Microsoft Windows with North Korean language packs installed. Version 3. 0 was released in the summer of 2013, but as of 2014, version 1. 0 continues to be more widely used.

    to opt out, pm me ‘optout’. article | about


  • Here’s the summary for the wikipedia article you mentioned in your comment:

    The Sony BMG CD copy protection scandal concerns the copy protection measures included by Sony BMG on compact discs in 2005. When inserted into a computer, the CDs installed one of two pieces of software that provided a form of digital rights management (DRM) by modifying the operating system to interfere with CD copying. Neither program could easily be uninstalled, and they created vulnerabilities that were exploited by unrelated malware. One of the programs would install and “phone home” with reports on the user’s private listening habits, even if the user refused its end-user license agreement (EULA), while the other was not mentioned in the EULA at all. Both programs contained code from several pieces of copylefted free software in an apparent infringement of copyright, and configured the operating system to hide the software’s existence, leading to both programs being classified as rootkits.

    to opt out, pm me ‘optout’. article | about


  • Here’s the summary for the wikipedia article you mentioned in your comment:

    Between 2011 and 2018, a series of disputes took place about the copyright status of selfies taken by Celebes crested macaques using equipment belonging to the British wildlife photographer David J. Slater. The disputes involved Wikimedia Commons and the blog Techdirt, which have hosted the images following their publication in newspapers in July 2011 over Slater’s objections that he holds the copyright, and People for the Ethical Treatment of Animals (PETA), who have argued that the copyright should be assigned to the macaque. Slater has argued that he has a valid copyright claim because as he engineered the situation that resulted in the pictures by travelling to Indonesia, befriending a group of wild macaques, and setting up his camera equipment in such a way that a selfie might come about. The Wikimedia Foundation’s 2014 refusal to remove the pictures from its Wikimedia Commons image library was based on the understanding that copyright is held by the creator, that a non-human creator (not being a legal person) cannot hold copyright, and that the images are thus in the public domain.

    to opt out, pm me ‘optout’. article | about