prologic @twtxt.net

Follow

"Problems are Solved by Method" 🇦🇺👨‍💻👨‍🦯🏹♔ 🏓⚯ 👨‍👩‍👧‍👧🛥 -- James Mills (operator of twtxt.net / creator of Yarn.social 🧶)

Block / Report User

If this user/feed is violating this Pod's (VltraPlus) community guidelines as set out in the Abuse Policy, please report them immediately!

You are also free to Unfollow or Mute this user or feed. Muting will also remove that user/feed's content from your view and you will no longer see content from that user/feed anywhere.

@prologic does not follow you (they may not see your replies!)

Recent Twts

Recent twts from prologic

(#wadcmrq) @hacker-news-newest@feeds.twtxt.net Hmmmm

Conclusion: Is there anybody out there?

I’m not one for conspiracy theories, but it’s hard not to think that there is some truth to The Dead Internet Theory, i.e. the belief that the Internet is now empty and devoid of real people, and that everything is just bots talking to bots to generate content and clicks in order to get a share of the all-important and ever-growing advertising revenue5.


#cwchixa

(#zo4ivxa) @marado@twtxt.net GPT-3 summarizes this as:

The European Parliament has passed a resolution on Artificial Intelligence with a majority of 495 votes in favor, 34 against, and 102 abstentions. The resolution includes many references to the advantages of Free Software and the FSFE is urging the Parliament to transfer its own position into the AI regulation.

Is this accurate? Is there a bit more to this? 🤔


#kzqi3dq

(#z36cowq) @slashdot@feeds.twtxt.net isn’t that like asking those same 26 million people to breathe out less carbon dioxide? 🤔😆 we do a fairly similar thing here in Brisbane Australia where when I damage dry out we go on water restrictions and your sepically not allowed to do things like water your garden or what you are on. I suppose Texas could and act a similar requirement and restriction and restrict the use of air conditioners? 🤔


#zs5s6lq

(#vg6grrq) @eaplmx@twtxt.net Yeah this is true I guess. Twitter™ could show cards in your Timeline that might be related to the content being discussed in that “thread”. They could easily do that without collecting behaviour, personal information (besides reading public Tweets, which are public anyway). Then they could get rid of the shitty society mutating algorithm 😂


#7zeqjga

GPT-3 Resources - HedgeDoc

Trying to find interesting things related to GPT-3, tools, apps, etc. I haven’t found much though. There’s a lot of “hype” on Twitter™ but “no show”. Anyone come across anything interesting I should add to this list? I mean c’mon, if you’re gonna show off something, at least link to a working version, show the code, something! 🤦‍♂️


#zzs23kq

(#vg6grrq) Until Twitter™ gets rid of “targettered advertising”, you will always be manipulated by the “algorithm”. Take DuckDuckGo’s business model. They collect little to nothing about you, don’t target ads at you, they just generate revenue from serving ads based on keyword searches.


#qalqnnq

(#obnz45a) You should be able to basically perform the following steps:

  1. Download the latest v0.0.14 binary from the Releases page
  2. Replace the binary installed on the Vultr VM which I think is located in /usr/local/bin/
  3. Restart the yarnd service, which think is systemctl restart yarnd

#vqcszga

(#ijjwp4a) It’s just something I’ve been doing for quite a while now to bring together anyone from the Yarn.social / Twtxt community where we just have a good ‘ol fashioned Yarn about whatever and often also talk about upcoming features, interesting things that we’ve seen or have happened (like new spam bots that have joined my pod!) and how we can continue to improve the experience of the ecosystem at large as well as that of yarnd (what every Yarn.social pod runs)


#s4es2aq

(#jo6jxja) @slashdot@feeds.twtxt.net Another interesting summary by GPT-3:

The text describes a situation where a security consultant, Lance Vick, recently acquired the expired domain used by the maintainer of a widely used NPM package. He did this to remind the JavaScript community that the NPM Registry still hasn’t implemented adequate security. Vick argues that taking over the NPM account of a popular project to conduct a software supply chain attack continues to be too easy. Part of the problem is that JavaScript developers often use packages that implement simple functions that are either already built into the language, like forEach, or ought to be crafted manually to avoid yet another dependency, like left-pad (now built-in as padStart). These trivial packages get incorporated into other packages, which may in turn become dependencies in different packages


#54tsg7q

(#ijjwp4a) @ullarah@txt.quisquiliae.com I asked GPT-3 to summarize and categorize the Email for you, here’s what it said:

Categorize this text:

This text is an email from a hacker who has gained access to the recipient’s devices and has been monitoring their internet activity. The hacker threatens to release embarrassing videos of the recipient if they do not pay a ransom of $1590 within 48 hours.


#mn7exna

(#4pieqwq) @slashdot@feeds.twtxt.net I asked the Open AI’s GPT-3 to summarize the Slashdot article here and this is what it came up with:

The Open Source Security Foundation (OpenSSF) and Linux Foundation are asking for $150 million in funding over two years to fix ten major open-source security problems. The government will not be paying the freight for these changes. Amazon, Ericsson, Google, Intel, Microsoft, and VMWare have

Hmmm 🤔


#dcgcptq