There have been multiple accounts created with the sole purpose of posting advertisement posts or replies containing unsolicited advertising.

Accounts which solely post advertisements, or persistently post them may be terminated.

technology

This magazine is from a federated server and may be incomplete. Browse more on the original instance.

OpenTracks is an open source sport tracking application for Android that completely respects your privacy: Almost a Strava alternative (beehaw.org)

Value your health by keeping track on your training. It records as you go running or walking, and gives you a bike computer with a bigger screen for cycling. You can even mark interesting locations along your way with pictures. The app keeps recorded statistics in great detail for analysis....

AI for identifying social norm violation (www.nature.com)

Prof. Yair Neuman and the engineer Yochai Cohen at Ben-Gurion University of the Negev have designed an AI system that identifies social norm violations. They trained a system to identify ten social emotions: competence, politeness, trust, discipline, caring, agreeableness, success, conformity, decency, and loyalty....

The Secret Life of the 500+ Cables That Run the Internet (www.cnet.com)

These cables, only about as thick as a garden hose, are high-tech marvels. The fastest, the newly completed transatlantic cable called Amitié and funded by Meta, Microsoft and others, can carry 400 terabits of data per second. That’s 400,000 times faster than your home broadband if you’re lucky enough to have high-end...

Greg Rutkowski Was Removed From Stable Diffusion, But AI Artists Brought Him Back - Decrypt (decrypt.co)

Greg Rutkowski, a digital artist known for his surreal style, opposes AI art but his name and style have been frequently used by AI art generators without his consent. In response, Stable Diffusion removed his work from their dataset in version 2.0. However, the community has now created a tool to emulate Rutkowski’s style...

Study shows how images and sounds can be used for indirect prompt and instruction injection in multi-modal LLMs (arxiv.org)

An attacker generates an adversarial perturbation corresponding to the prompt and blends it into an image or audio recording. When the user asks the (unmodified, benign) model about the perturbed image or audio, the perturbation steers the model to output the attacker-chosen text and/or make the subsequent dialog follow the...

A Discussion of Mastodon's Potential Growth Needs (erinkissane.com)

The title I have assigned this article is intentionally boring. The article’s body goes out of its way to not provide simple summaries, silver bullets, or otherwise give a single size fits all answer to everything. The author actually gave it a fun title that, I felt, did a slight disservice to their overall point, but hey, we...

  • All
  • Subscribed
  • Moderated
  • Favorites
  • [email protected]
  • random
  • lifeLocal
  • goranko
  • All magazines