Let’s see the hackers figure that one out!
Let’s see the hackers figure that one out!
Security implications?
People working with these technologies have known this for quite awhile. It’s nice of Apple’s researchers to formalize it, but nobody is really surprised-- Least of all the companies funnelling traincars of money into the LLM furnace.
What if I’m already pretty good at Python and C? :)
How do you learn? I have some ESP32s that I’ve messed around a little bit with, and done some neat stuff…But I don’t have an electronics background at all and I often have trouble even figuring out how to power the damn things safely.
That’s super interesting. How do you get started at something like that? Or where would a newcomer start to learn more about it?
s/“a god”/“finished for the day”
H e m p
Venn diagram of Lemmy users and Mary Poppins stans barely touching.
If that works, you should try it with a product that you aren’t interested in too and compare the results.
Sound was quite atrocious, downvoted 👎
What are some shortcomings in your view?
What the hell kind of second-rate DBMS doesn’t encode gender into its primary keys SMDH!!
Maybe there’s a specific person who keeps doing this and they wrote this error specifically for him.
Trust the science
But is he rewriting in Rust?
Oh cool! Is there any non-mobile app/service that does something similar?
Right! For music, I think it’s even like saying… The process of making music is much more than just literally performing it… But it’d be weird for the creative process to not contain any playing-of-music that looked in some ways like performance.
I don’t think it’s just marketing bullshit to think of LLMs as AI… The research community generally does, too. Like the AI section on arxiv is usually where you find LLM papers, for example.
That’s not like a crazy hype claim like the “AGI” thing, either… It doesn’t suggest sentience or consciousness or any particular semblance of life (and I’d disagree with MW that it needs to be “human” in any way)… It’s just a technical term for systems that exhibit behaviors based on training data rather than explicit programming.
Damn okay well if the hackers are at that level I guess you’re just screwed.