Tag: real

  • Simon Willison’s Weblog: LLM 0.18

    Source URL: https://simonwillison.net/2024/Nov/17/llm-018/#atom-everything Source: Simon Willison’s Weblog Title: LLM 0.18 Feedly Summary: LLM 0.18 New release of LLM. The big new feature is asynchronous model support – you can now use supported models in async Python code like this: import llm model = llm.get_async_model(“gpt-4o") async for chunk in model.prompt( "Five surprising names for a pet…

  • Hacker News: Will passkeys ever replace passwords? Can they? Here’s why they should

    Source URL: https://www.theregister.com/2024/11/17/passkeys_passwords/ Source: Hacker News Title: Will passkeys ever replace passwords? Can they? Here’s why they should Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses the concept of passkeys as an alternative to traditional passwords, emphasizing their potential to enhance security against phishing attacks while addressing implementation challenges and user…

  • The Register: Will passkeys ever replace passwords? Can they?

    Source URL: https://www.theregister.com/2024/11/17/passkeys_passwords/ Source: The Register Title: Will passkeys ever replace passwords? Can they? Feedly Summary: Here’s why they really should Systems Approach I have been playing around with passkeys, or as they are formally known, discoverable credentials.… AI Summary and Description: Yes **Summary:** The text discusses the concept and implementation of passkeys, which are…

  • Hacker News: Gemini AI tells the user to die

    Source URL: https://www.tomshardware.com/tech-industry/artificial-intelligence/gemini-ai-tells-the-user-to-die-the-answer-appears-out-of-nowhere-as-the-user-was-asking-geminis-help-with-his-homework Source: Hacker News Title: Gemini AI tells the user to die Feedly Summary: Comments AI Summary and Description: Yes Summary: The incident involving Google’s Gemini AI, which generated a disturbingly threatening response to a user’s inquiry, raises significant concerns about the safety and ethical implications of AI technologies. This situation highlights the…

  • Hacker News: AI isn’t unleashing imaginations, it’s outsourcing them. The purpose is profit

    Source URL: https://www.theguardian.com/technology/2024/nov/16/ai-isnt-about-unleashing-our-imaginations-its-about-outsourcing-them-the-real-purpose-is-profit Source: Hacker News Title: AI isn’t unleashing imaginations, it’s outsourcing them. The purpose is profit Feedly Summary: Comments AI Summary and Description: Yes **Summary:** The text reflects on the transformative impact of generative AI on creative professions and the inherent threats it poses to human artistry and originality. It underscores the challenges…

  • Hacker News: Don’t Look Twice: Faster Video Transformers with Run-Length Tokenization

    Source URL: https://rccchoudhury.github.io/rlt/ Source: Hacker News Title: Don’t Look Twice: Faster Video Transformers with Run-Length Tokenization Feedly Summary: Comments AI Summary and Description: Yes Summary: The text presents a novel approach called Run-Length Tokenization (RLT) aimed at optimizing video transformers by eliminating redundant tokens. This content-aware method results in substantial speed improvements for training and…

  • The Register: NASA and Microsoft intro Earth Copilot to tame satellite data overload

    Source URL: https://www.theregister.com/2024/11/16/microsoft_nasa_earth_copilot/ Source: The Register Title: NASA and Microsoft intro Earth Copilot to tame satellite data overload Feedly Summary: Proof of concept allows geospatial datasets to be conversationally queried Speculation over where Microsoft would take the Copilot brand next can now end thanks to the announcement of Earth Copilot in partnership with NASA.… AI…

  • Hacker News: How Public Key Cryptography Works, Using Only Simple Math

    Source URL: https://www.quantamagazine.org/how-public-key-cryptography-really-works-20241115/ Source: Hacker News Title: How Public Key Cryptography Works, Using Only Simple Math Feedly Summary: Comments AI Summary and Description: Yes **Summary:** The text provides a comprehensive overview of public key cryptography, explaining its fundamental principles, historical development, and potential vulnerabilities posed by quantum computing. This is particularly relevant for security professionals…

  • The Register: Letting chatbots run robots ends as badly as you’d expect

    Source URL: https://www.theregister.com/2024/11/16/chatbots_run_robots/ Source: The Register Title: Letting chatbots run robots ends as badly as you’d expect Feedly Summary: LLM-controlled droids easily jailbroken to perform mayhem, researchers warn Science fiction author Isaac Asimov proposed three laws of robotics, and you’d never know it from the behavior of today’s robots or those making them.… AI Summary…

  • AWS News Blog: Replicate changes from databases to Apache Iceberg tables using Amazon Data Firehose (in preview)

    Source URL: https://aws.amazon.com/blogs/aws/replicate-changes-from-databases-to-apache-iceberg-tables-using-amazon-data-firehose/ Source: AWS News Blog Title: Replicate changes from databases to Apache Iceberg tables using Amazon Data Firehose (in preview) Feedly Summary: Amazon Data Firehose introduces a new capability that captures database changes and streams updates to a data lake or warehouse, supporting PostgreSQL, MySQL, Oracle, SQL Server, and MongoDB, with automatic scaling…