Whisper from OpenAI is pretty solid for speech recognition (at least English), and it is small enough to deploy on mobile devices. If I recall correctly, both PS and Xbox controllers have mics built-in, so input device is covered.
pending anonymous user
Whisper from OpenAI is pretty solid for speech recognition (at least English), and it is small enough to deploy on mobile devices. If I recall correctly, both PS and Xbox controllers have mics built-in, so input device is covered.
Libretube with HLS experimental on. You need to refresh VPN location constantly if you use one.
Once again, nations think the internet have borders.
How about typical watch bands? Without comparison, I highly doubt this is only happening on smartwatch bands.
Not as “disposal” and you need to pay for it, but it would be totally fit your use case in that you want to hide your identity to your VP, reply to those mail, and in some level protect your personal information as they won’t store or leak your mail, granted you don’t use Gmail as a recipient address.
First of all, the name doesn’t translate to “Little Red Note”, but “Little Red Book.”
Second, Little Red Book is literally the nickname of a Chinese political publication called Quotations from Chairman Mao Tse-tung.
Sorry, that name isn’t cute at all.
Really? Let me try.
Hong Kong isn’t part of China. Taiwan is an independent country.
Edit: oh, this community is in lemmy.world, not lemmy.ml. Still, for those disgruntled, report me for rule 2 & 6. I want to see how mods respond to this.
Nah. It is just people, including me, don’t wanna to think too much about the information when it is present to us. Most like to read just the headline and make a conclusion. It is the laziness in thinking and emotional reaction that makes this whole situation worse.
Algorithm (recomendation engines) is just a catalyst.
What’s your setup and your goal?
Yes. Depends on the actual hardware, parameters used, and model quantization, you can get 2~10 tok/s on CPU alone.
Fiber has 1 or 2 and is VERY rugged in comparison…you can literally tie a knot in a fiber cable and it’ll still work.
Emm, not with glass fibers. My friend uses it between router and switch, and the one of the fiber breaks. So, traffic can be sent to router but nothing the other way around. He said he didn’t even touch or put significant stress on the cable. Yet, it breaks in a weird way, and hard to troubleshot without proper equipment.
Wait until you install JShelter and Cloudflare refuse access
Doesn’t have to, I think. Text is actually quite adequate. Sure, images are great but that’s only for a subset of alerts, like AMBER, but that can be achieved by secondary distribution channels like a dedicated webpage or social media. There won’t be network congestion during those alerts. You don’t really need images or video for alerts like floods, hurricanes, or even missile incoming alerts. For those you only need an address or coordinates that can point people to the closest shelter. Yeah, not all people are familiar with the surroundings (like traveling) but in that kind of scenarios every people around you will pool together and get to the same location.
The whole core functionality that the alert system must achieve is a near 100% delivery rate that uses minimal bandwidth of the network. You don’t want to stress the network because there are more important traffic need to be routed, like 911.
I guess you can also use NFS/iSCSI for images too?
And we got news like this.
Addition: Difficult, cumbersome, and bureaucratic to do doesn’t mean they shouldn’t do it. Those are just purely excuses.
Except the primary distributor doesn’t have any actionable details.
Not even another page should be the primary source. That page should be a secondary for updates. The alert itself should have included all the actionable details.
I wonder why such an important piece of info is posted on social media but not on a dedicated webpage that can be linked to any social media posts.
Despite the bad title, the article itself is worth a read, though the topics covered are being discussed long ago, but serves as a good reminder.
A point the author raises is about data security in end-to-end encrypted communications when using with AI. Remember that end-to-end encryption is specifically protecting data in transit? It doesn’t do anything after the data is delivered to the end device. Even before the age of “AI”, the other end can do whatever he wants on that piece of data. He can shared the communication with another person next to him which the sender might or might not know of, upload it to social media, or hand it to the law enforcement. And the “AI” the tech industry going forward is just an other participant of the communication built right into the device. It can do exactly the same as any recipients wants to. It can attempt to try to (badly) summarize the communication for you, submit that communication to any third party, or even report you for CSAM as it determines your engaging in “grooming behavior.”
And the author also asked the question, “Who does your AI agent actually work for?” However, this question is already been answered by Windows Recall, the prime example of an AI agent. It collects data in an attempt to “help” us recall things in the past, but it will answer questions from anyone have access to it. Be it, you, your family/friend, or even law enforcement. The answer is anyone.