- Joined
- Jul 22, 2017
Cease speaking about the bibble immediately (CERTIFIED GODLESS THREAD)
Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
I mean if Altman believes in ASI he then should believe in life extension (I don't think you can beat entropy and call it 'immortality'). What's the deal here?I think that's the reason Musk is shitting out so many turkey baster babies despite having his designated heir X, he wants those bloodbags and organ warmers.
Homosexuals make a mockery of nature.
There's a better way to do this I think, without having to OOC your rolls, since the model can't read them. (in general, OOCing is a bad idea because unless you have explicitly declared a format for out of context commands in your prefill, you may confuse the model into thinking you're actually doing an in-context roleplay and start OOCing you back and commenting on it.)Here are some more screenshots of my game. This model is soulful.
There's a better way to do this I think, without having to OOC your rolls, since the model can't read them. (in general, OOCing is a bad idea because unless you have explicitly declared a format for out of context commands in your prefill, you may confuse the model into thinking you're actually doing an in-context roleplay and start OOCing you back and commenting on it.)
You can set a range of roll outcomes (critical failure, failure, success, critical success), map them to a range of D20 rolls, and have the model read that outcome instead of the roll. I'm pretty sure you could inject this result automatically with STscript.
Visual Basic is an interpreted language, so it isn't doing some impressive decompilation or mapping from machine to source code, or binary analysis at all. Just looking at a VB EXE would give you enough text clues to deduce the general structure and purpose of the program, then use those as instructions to recreate it in a different language.
True, but I'd agree that it's pretty damn cool that you can feed it some old, ancient VB4 project and you can port it automagically to another language.Visual Basic is an interpreted language, so it isn't doing some impressive decompilation or mapping from machine to source code, or binary analysis at all. Just looking at a VB EXE would give you enough text clues to deduce the general structure and purpose of the program, then use those as instructions to recreate it in a different language.
Doubt it could do much with a compiled executable.
Everything has to come to an end.best case scenario there are a lot of Fortran government programs about to be updated by force.
On Thursday, Inception Labs released Mercury Coder, a new AI language model that uses diffusion techniques to generate text faster than conventional models. Unlike traditional models that create text word by word—such as the kind that powers ChatGPT—diffusion-based models like Mercury produce entire responses simultaneously, refining them from an initially masked state into coherent text.
In an amended complaint to recent civil litigation, Microsoft is naming the primary developers of malicious tools designed to bypass the guardrails of generative AI services, including Microsoft’s Azure OpenAI Service. We are pursuing this legal action now against identified defendants to stop their conduct, to continue to dismantle their illicit operation, and to deter others intent on weaponizing our AI technology.
The individuals named are: (1) Arian Yadegarnia aka “Fiz” of Iran, (2) Alan Krysiak aka “Drago” of United Kingdom, (3) Ricky Yuen aka “cg-dot” of Hong Kong, China, and (4) Phát Phùng Tấn aka “Asakuri” of Vietnam. These actors are at the center of a global cybercrime network Microsoft tracks as Storm-2139.
Members of Storm-2139 exploited exposed customer credentials scraped from public sources to unlawfully access accounts with certain generative AI services. They then altered the capabilities of these services and resold access to other malicious actors, providing detailed instructions on how to generate harmful and illicit content, including non-consensual intimate images of celebrities and other sexually explicit content.
This activity is prohibited under the terms of use for our generative AI services and required deliberate efforts to bypass our safeguards. We are not naming specific celebrities to keep their identities private and have excluded synthetic imagery and prompts from our filings to prevent the further circulation of harmful content.
Information obtained in response to Microsoft’s subpoenas has furthered Microsoft’s attribution efforts. Second, execution of the Court’s temporary restraining order and preliminary injunction has resulted in disruption of Defendants “aitism.net” infrastructure and yielded additional data related to the users of such infrastructure. Such data has also furthered Microsoft’s attribution efforts. Third, in response to service of process on Defendants and public commentary about this litigation, Microsoft has received - 3 - communications from certain Defendants and/or persons associated with Defendants. These communications have also furthered Microsoft’s attribution efforts. Fourth, Microsoft has observed communications on public message boards such as 4chan and Rentry discussing this litigation, Microsoft, and its counsel.
As we’ve said before, no disruption is complete in one day. Going after malicious actors requires persistence and ongoing vigilance. By unmasking these individuals and shining a light on their malicious activities, Microsoft aims to set a precedent in the fight against AI technology misuse.
to be fair it has precedent, Microsoft last time with tay AI didnt go so well.And of course it's about Taytay, again.