chaoticalHeavy's avatar
chaoticalHeavy
chaoticalHeavy@stacker.news
npub1g8g2...k7um
heavy duty chaotician
Those government databases need preventive maintenance sometimes. image
"This is, quite obviously, a phenomenal outcome for Microsoft. The company already has a perpetual license to all OpenAI IP (short of artificial general intelligence), including source code and model weights; the question was whether it would have the talent to exploit that IP if OpenAI suffered the sort of talent drain that was threatened upon Altman and Brockman’s removal. Indeed they will, as a good portion of that talent seems likely to flow to Microsoft; you can make the case that Microsoft just acquired OpenAI for $0 and zero risk of an antitrust lawsuit."
############################################################################### # Introduction) This is UTXOracle.py ############################################################################### # This python program estimates the daily USD price of bitcoin using only # your bitcoin Core full node. It will work even while you are disconnected # from the internet because it only reads blocks from your machine. It does not # save files, write cookies, or access any wallet information. It only reads # blocks, analyzes output patterns, and estimates a daily average a USD # price of bitcoin. The call to your node is the standard "bitcoin-cli". The # date and price ranges expected to work for this version are from 2020-7-26 # and from $10,000 to $100,000 print("UTXOracle version 7\n") ###############################################################################
"To ensure that cloud services do not learn more than they should, and that a breach of one does not pose a fundamental threat to our data, we need two types of decoupling. The first is organizational decoupling: dividing private information among organizations such that none knows the totality of what is going on. The second is functional decoupling: splitting information among layers of software. Identifiers used to authenticate users, for example, should be kept separate from identifiers used to connect their devices to the network."
Understanding the Origins and the Evolution of Vi & Vim The history of both Vi & Vim goes hand in hand with the history of open-source software itself. This article is a trip back to the origins of UNIX text editors. Let's look at the important players and historical events that shaped their evolution. Gustavo Pezzi 11 August 2023 · 15 min read
Joe Biden's ambitious plan to regulate AI, explained "Authorities are worried about a terrorist using a chatbot to learn how to create a nuclear, biological, radiological, or chemical weapon. To guard against this, companies will need to hire red teams to see if they can get these systems to provide information about how to make a nuclear weapon or a dangerous pathogen"