He / They

  • 11 Posts
  • 344 Comments
Joined 3 years ago
cake
Cake day: June 16th, 2023

help-circle

  • As usual, the headline is pretty overstated. Yes, the AO3-to-Barnes-and-Noble pipeline is pretty well established at this point, but while that might be making FPP a heavy preference on BookTok for romantasy, I don’t think that’s spilling out into other areas of fiction.

    Prokop maintains that while those complex themes can be explored in first person, off-loading narrative tension into an internal monologue has a way of flattening a romance narrative, hemming in the scope. “It limits the kind of stories you can tell,” she continued. “It’s a lot harder to keep a secret from a reader.”

    I think this is a bit of personal bias on their part; FPP doesn’t have to be any less complex than TPP. The entire trope of the unreliable narrator is the POV of the reader, lying to the reader, as an example.

    Prokop is especially weary of the clear-eyed mindfulness possessed by the wayward lovers that tends to populate first-person novels—how their acuities remain crystalline and sharp, as if touched by the divine, across the pages, in a way that requires almost too much suspension of disbelief, even for a genre that traffics in that suspension.

    “All of the characters are nice. There’s a trope called the ‘Cinnamon Roll hero,’ and he’s just a good guy who wants the protagonist,” said Prokop.

    I think this is a distinct issue that pops up in a lot of the same books, but isn’t intrinsically related. Fanfics are often self-insert fantasy, both by the author and for the readers (and I don’t mean ‘fantasy’ as in the genre, I mean it as in ‘wish-fulfillment’). FPP books are more popular in romantasy right now, and (sometimes overly-) ‘cozy’ stories with Mary Sue FMCs and no conflict are blowing up (or at least, I’m seeing more of them on shelves than I used to). But one doesn’t imply the other, they just happen to be correlated right now because I think they’re coming from the same pipeline, or being pushed by publishers when they might have been turned down before.

    “The best first person has a strong narrative voice. The character is super distinctive. But if the books all sound the same—which a lot of them do—then that’s not great for the genre.”

    This is just something that happens anytime there is an explosion of genre popularity; a bunch of new mediocre authors pop up in the space. Go read the late-90s to early-2000s Clive Cussler-esque action schlock that all popped up after Tom Clancy got big, and you’ll see the same thing. Or the Dan Brown-wannabe pseudo-religious-thriller books circa 2005.




  • You can’t be sure, but you can use providers and exit nodes that are based in places hostile to whoever you are trying to protect against.

    Also, functional anonymity can exist by different entities having different pieces of data that together would de-anonymize you, but who are unlikely to ever intersect. A good example of this is DMCA requests: if a copyright holder sees a US IP address on a residential Comcast IP range, they’re going to file a court case and get a subpoena for the subscriber info.

    If they see a Hong Kong IP from a co-lo datacenter who would need to cooperate to tell them who owned that IP at that time, they’re not going to even bother because they don’t know how to even start filing a court case in China, and if your VPN has too much data it won’t even matter because no one will even have contacted them.

    It all depends on your threat model.



  • This absolutely did not kill them. I’ve been dealing with federal procurement, including ATOs for DoD, for years, and 99% of companies never even remotely interact with it. Yes, there’s a large number that do, especially among Fortune 500s and up, but the actual percentage of companies who have military contracts is tiny. This was meant to intimidate them into compliance, but this doesn’t make them any less viable than AIaaS already is or isn’t.

    no company wants to become a supply chain risk to potential customers who might have a DoD supplier somewhere down the supply chain

    The order is actually much narrow than that; it only applies to companies who directly have contracts with the military.

    Anthropic software just can’t be used to process federal data, but if e.g. Lockheed uses ADP to process internal payroll, and ADP uses a third-party developer to build some software, and that developer uses Claude, that doesn’t snake it’s way back up the chain and invalidate Lockheed’s contracts.






  • I’m not sure if you’re being sarcastic, but given that this is an anti-firearms bill, they will probably do the same thing they do when you purchase a firearm magazine cross-state; they’ll open the box and check that it is ‘compliant’ with the 10-round limit (or in this case, has compliant firmware). If it is, they’ll ship it on to you. If it’s not, they’ll ship you the empty box with a notice of seizure. You may also be contacted by CADOJ later, depending how much free time they have.