How to Hide the Sidebar in Microsoft Edge
Microsoft Edge is a surprisingly good web browser with some unique capabilities, like direct and easy GPT 4 access, and it has been a fun browser to experiment with as my new default. But, like many Microsoft software products, the appearance can be a little cluttered if youâre accustomed to the more minimalist designs of ⊠Read More â Read more
Isode: Harrier 4.0 â New Capabilities
Harrier is our Military Messaging client. It provides a modern, secure web UI that supports SMTP, STANAG 4406 and ACP 127. Harrier allows authorised users to access role-based mailboxes and respond as a role within an organisation rather than as an individual.
You can find out more about Harrier here.
** ⊠â Read moreHow to Use ChatGPT-4 for Free with Microsoft Edge
The Microsoft Edge browser offers perhaps one of the best and easiest ways for an average person to access and use ChatGPT-4 for free, without having to pay for ChatGPT-4 access through OpenAI. Best of all, Edge is available for just about every major platform, including Mac, Windows, Linux, iPhone, iPad, and Android. With the ⊠Read More â Read more
Fix âwarning: unable to access /Users/Name/.config/git/attributes Permission Deniedâ Errors
If youâre at the command line and perhaps interacting with Homebrew, Git, or similar, you may run into an error message that says something like the following âwarning: unable to access /Users/Name/.config/git/attributesâ : Permission deniedâ. This error message sounds more alarming than it is in most cases, but regardless, you likely want to fix ⊠â Read more
Snikket: Security notice: Snikket not affected by CVE-2024-3094
A security vulnerability was intentionally added to a widely used open-source
project known as âxzâ. This project is packaged in many operating systems, and
a lot of software depends upon it. The vulnerability has been assigned the
identifier CVE-2024-3094.
Systems with the vulnerable package may allow an attacker to gain unauthorized
access to the system via SSH, if your systemâs SSH server was linked to the
affected packages.
Thankfully, the vulne ⊠â Read more
Create a Resume with Pages on Mac, iPhone, iPad
Creating a resume is one of those tasks that can be stressful, but it does not need to be if youâre in the Apple ecosystem. Thatâs because your iPhone, iPad, and Mac, all have a readily accessible series of resume templates that you can access. Whether itâs updating a resume into a new format, or ⊠Read More â Read more
Create a Resume with Pages on Mac, iPhone, iPad
Creating a resume is one of those tasks that can be stressful, but it does not need to be if youâre in the Apple ecosystem. Thatâs because your iPhone, iPad, and Mac, all have a readily accessible series of resume templates that you can access. Whether itâs updating a resume into a new format, or ⊠Read More â Read more
Even AI coding machines will need to rotate their access credentials every 90 days.
How Secure are Personal Hotspot Connections from iPhone?
The Personal Hotspot feature on iPhone turns your iPhone cellular connection into a wi-fi hotspot that other nearby devices and computers can use to access the internet. Itâs one of those really great features available for iPhone that allows you to work from just about anywhere that you have a cellular connection, and can also ⊠[Read More](https://osxdaily.com/2024/03/23/how-secure-are-personal-hotspot-connections-from- ⊠â Read more
in the matter of political voice in the US money is speech and therefore companies use their âfree speechâ to donate and gain access to politicians. Therefore companies are people. Thanks a lot âcitizens unitedâ
in the matter of political voice in the US money is speech and therefore companies use their âfree speechâ to donate and gain access to politicians. Therefore companies are people. Thanks a lot âcitizens unitedâ
@lyse@lyse.isobeef.org its a hierarchy key value format. I designed it for the network peering tools i use.. I can grant access to different parts of the tree to other users.. kinda like directory permissions. a basic example of the format is:
@namespace
# multi
# line
# comment
root :value
# example space comment
@namespace.name space-tag
# attribute comments
attribute attr-tag :value for attribute
# attribute with multiple
# lines of values
foo :bar
:bin
:baz
repeated :value1
repeated :value2
each @ starts the definition of a namespace kinda like [name] in ini format. It can have comments that show up before. then each attribute is key :value and can have their own # comment lines.
Values can be multi line.. and also repeated..
the namespaces and values can also have little meta data tags added to them.

the service can define webhooks/mqtt topics to be notified when the configs are updated. That way it can deploy the changes out when they are updated.
@lyse@lyse.isobeef.org its a hierarchy key value format. I designed it for the network peering tools i use.. I can grant access to different parts of the tree to other users.. kinda like directory permissions. a basic example of the format is:
@namespace
# multi
# line
# comment
root :value
# example space comment
@namespace.name space-tag
# attribute comments
attribute attr-tag :value for attribute
# attribute with multiple
# lines of values
foo :bar
:bin
:baz
repeated :value1
repeated :value2
each @ starts the definition of a namespace kinda like [name] in ini format. It can have comments that show up before. then each attribute is key :value and can have their own # comment lines.
Values can be multi line.. and also repeated..
the namespaces and values can also have little meta data tags added to them.

the service can define webhooks/mqtt topics to be notified when the configs are updated. That way it can deploy the changes out when they are updated.
Huffing product limits part of new bill
A Minnesota family tragedy could prompt a new law to cut down on access materials for huffing. FOX 9 introduced the story of Tommy Byers last August, about ten months after he passed away. Tommyâs mother says her life also ended when her son died from huffing 1, 1-difluoroethane â or DFE. â Read more
MWC 2024: Microsoft to open up access to its AI models to allow countries to build own AI economies
Tech behemoth Microsoft has unveiled a new set of guiding principles on how it will govern its artificial intelligence (AI) infrastructure, effectively further opening up access to its technology to developers. The announcement came at the Mobile World Congress tech fair in Barcelona on Monday where AI ⊠â Read more
âSwedenâs accession to NATO follows that of Finland last yearâ
2024-02-26 20:40 âSwedenâs accession to NATO follows that of Finland last yearâ â Read more
Hungary ratifies Swedenâs NATO accession
Hungaryâs parliament approved Swedenâs NATO accession on Monday (February 26), clearing the last hurdle before the historic step by the Nordic country whose neutrality lasted through two world wars and the simmering conflict of the Cold War. Olivia Chan has more. â Read more
How to Make Microsoft Edge the Default Mac Web Browser
Microsoft Edge is a great web browser alternative that is available for MacOS, iPhone, iPad, and obviously Windows, and Android too. Not only is it fast and offers free access to ChatGPT 4, but if you regularly use different computing platforms, youâll appreciate that you can sync your browser data across all of your devices, ⊠[Read More](https://osxdaily.com/2024/02/24/how-to-make-microsoft-edge-the-default-mac-web-browser ⊠â Read more
** In reply to: Scaling accessibility beyond compliance at VA.gov through community and culture - Ad Hoc **
In reply to: Scaling accessibility beyond compliance at VA.gov through community and culture - Ad Hoc
Ifâaccessibility as complianceâ is a staircase where outcomes are restricted to the normative limitations of the law, Accessibility Beyond Compliance is an exponential curve. It isnât limited to fulfilling legal constraints, and we can use it to explore, understand, and b ⊠â Read more
Empowering all developers to build without barriers
GitHub has been awarded the 2024 Axe Accessibility at Scale Award from Deque Systems. Read more about how weâve implemented accessibility at scale.
The post Empowering all developers to build without barriers appeared first on The GitHub Blog. â Read more
Wi-Fi HaLow Development Platform is Compatible with OpenWrt
Morse Microâs MM6108-EKH03 Wi-Fi HaLow Development Platform offers a sophisticated solution for enhancing wireless connectivity in IoT applications. Ideal for diverse uses like smart city infrastructures, long-range access points, and various industrial and commercial scenarios. The Morse Micro MM6108-EKH03 Wi-Fi HaLow Development Platform provides an efficient configuration for easy and rapid evaluation of Wi-Fi HaLow [âŠ] â Read more
Microchip Launches Affordable PolarFire SoC Kit, Expanding Access to RISC-V and FPGA for Embedded Engineers
Today, Microchip unveiled the PolarFire SoC Discovery Kit, a cost-effective and versatile tool catering to a wide range of users, including students, beginners, and seasoned professionals. This user-friendly kit facilitates quick testing of application ideas, firmware development, programming, and debugging, making it suitable for ⊠â Read more
GitHubâs Engineering Fundamentals program: How we deliver on availability, security, and accessibility
The Fundamentals program has helped us address tech debt, improve reliability, and enhance observability of our engineering systems.
The post [GitHubâs Engineering Fundamentals program: How we deliver on availability, security, and accessibility](https://github.blog/2024-02-08-githubs-engineering-fundamentals-program-how-we-delive ⊠â Read more
When Will Space Travel Be Accessible To All? href=âhttps://txt.sour.is/search?q=%23neildegrassetysonâ>#neildegrassetyson** â Read more
Rotating credentials for GitHub.com and new GHES patches
GitHub received a bug bounty report of a vulnerability that allowed access to the environment variables of a production container. We have patched GitHub.com and rotated all affected credentials. If you have hardcoded or cached a public key owned by GitHub, read on to ensure your systems continue working with the new keys.
The post [Rotating credentials for GitHub.com and new GHES patches](https://github.blog/2024-01-16-ro ⊠â Read more
Erlang Solutions: Enhancing the Efficiency of Erlang and Elixir System Management: WombatOAM Now Accessible on AWS Marketplace
WombatOAM, a well-established tool for operations and maintenance in both proprietary and open-source Erlang and Elixir systems, is here to simplify your monitoring and management tasks, allowing you to concentrate on your business logic while benefiting from decades of operational expertise in Erlang-based systems. Itâs now access ⊠â Read more
Georg Lukas: Converse.js webchat for prosody-hosted chatrooms
The goal of this post is to make an easily accessible (anonymous)
webchat for any chatrooms hosted on a prosody XMPP
server, using the web client converse.js.
There are two use cases:
Have an easily accessible default support room for users having trouble with
the server or their accounts.Have a working âJoin using browserâ button on
[search.jabber.network ⊠â Read more
Cost-efficient $39.90 Travel Router with Dual GbE Ports and Flexible Storage Options
Recently, SeeedStudio introduced the LinkStar-H28K-0408, a compact, pocket-sized router that offers advanced connectivity options. This device is equipped with Dual Gigabit Ethernet ports for high-speed internet access and includes a versatile USB Type-C port with Power Delivery support, enhancing its usability and convenience for various applications. Differing from the LinkS ⊠â Read more
I appreciate living in a city with a university and multiple libraries nearby. Whenever there is too much noise from construction works at home, I can simply go to the library and enjoy a quiet place. đ A 5G cell tower is also within reach, enabling fast internet access without the necessity of logging into the eduroam Wi-Fi network. đ€ â Read more
Today, while remotely accessing my home server, I noticed that the network was a bit slower than usual. It turns out, thereâs no 5G connection and only an LTE connection with another cell tower more far away. I checked the service providerâs website and thereâs actually a problem with a base station nearby. â Read more
Today, while remotely accessing my home server, I noticed that the network was a bit slower than usual. It turns out, thereâs no 5G connection and only an LTE connection with another cell tower more far away. I checked the service providerâs website and thereâs actually a problem with a base station nearby. â Read more
** Accessibility-first **
Whereas mobile-first design and development invited folks to think more expansively about the physical reality of the devices people use, accessibility-first design and development invites folks to think more expansively about the lived experiences, and physical reality of actual people. â Read more
4 Useful Keyboard Shortcuts Every Mac User Should Know
Want to boost your Mac productivity with some super useful keyboard shortcuts? Here are four of them that every Mac user should know and memorize, where youâre sure to get plenty of use from. From switching between apps, windows, jumping into any directories, or force quitting, read on! Command+Tab Accesses the Application Switcher Hitting Command+Tab ⊠Read More â Read more
Qnapâs Hybridmount feature makes it possible for me to access the files on OneDrive as if they were available from a local network drive on my Fedora PC. Pretty neat (when everything works).
Ignite Realtime Blog: New Openfire plugin: Reporting Account Affiliations
Iâm excited to announce a new Openfire plugin: the Reporting Account Affiliations Plugin!
This plugin implements a new prototype XMPP extension of the same name.
To quote the specification:
In practice, a server may not trust all accounts equally. For example, if a server offers anonymous access or open registration, it ⊠â Read more
How to Use & Access GPT-4 for Free
You may already be using ChatGPT, the phenomenally powerful and useful AI tool, but the free version is based on GPT-3.5. GPT-4 is said to be ten times more advanced, with enhanced creativity, reliability, up-to-date information, and an ability to interpret more nuanced instructions, so itâs understandable why users would like to explore and experience ⊠Read More â Read more
How to Use & Access GPT-4 for Free
You may already be using ChatGPT, the phenomenally powerful and useful AI tool, but the free version is based on GPT-3.5. GPT-4 is said to be ten times more advanced, with enhanced creativity, reliability, up-to-date information, and an ability to interpret more nuanced instructions, so itâs understandable why users would like to explore and experience ⊠Read More â Read more
Having fun with React - yet again. A large part of my job entails (re)learning technologies - luckily I have access to some good resources in the form of training- and tutorial sites, all provided by my employer.
Worked on expanding the scope of accessible alternative press in my RSS aggregator. The numbers reached were 215 media.
Diversity, inclusion, and belonging at GitHub in 2023
We expanded diversity of our employee base, launched several new employee engagement programs, made investments to improve accessibility, and more.
The post Diversity, inclusion, and belonging at GitHub in 2023 appeared first on The GitHub Blog. â Read more
5 tips for making your GitHub profile page accessible
Your profileâs README invites the world to know you and your work, so itâs important that everyone can read and understand it. In this post, we share some tips for making your README more accessible.
The post 5 tips for making your GitHub profile page accessible appeared first on The GitHub Blog. â Read more
How to Recover Recently Deleted Passwords on Mac
Forgetting or losing a password is a hassle, but assuming you save your logins and passwords with iCloud Keychain, that happens less and less. But you can still delete a password or login, whether intentionally or accidentally, and then end up needing access to that login information or password later. Fortunately the Mac offers a ⊠Read More â Read more
Your curated GitHub Universe agenda: AI, ethics, and productivity
Gain actionable insights about the intersection of AI and human skills, while tackling ethics, accessibility, and productivity at these GitHub Universe sessions.
The post Your curated GitHub Universe agenda: AI, ethics, and productivity appeared first on The GitHub Blog. â Read more
How to âSave Asâ in MacOS Sonoma & Ventura
Do you wish you had the âSave Asâ keyboard shortcut back in MacOS Sonoma and MacOS Ventura? Wish no more, itâs easy to re-enable, even in the latest versions of MacOS system software and with the peculiar System Settings experience. Many longtime Mac users adore the âSave Asâ keyboard shortcut, which had been accessed by ⊠Read More â Read more
Iâm telling ya guys đ plex.tv had way better shitâą, Get it installed on your own server, get access to free content + your own + whatever and no stupid tracking and bullshit đ€Ł
Prompting GitHub Copilot Chat to become your personal AI assistant for accessibility
GitHub Copilot Chat can help you learn about accessibility and improve the accessibility of your code. In this blog, we share a sample foundational prompt that instructs GitHub Copilot Chat to become your personal AI assistant for accessibility.
The post [Prompting GitHub Copilot Chat to become your personal AI assistant for accessibility](https://github.blog/2023-10- ⊠â Read more
Announcing Udemy + Docker Partnership
Docker and Udemy announced a new partnership at DockerCon to give developers a clear, defined, accessible path for learning how to use Docker, best practices, advanced concepts, and everything in between. As the #1 rated online course platform (as ranked by Stack Overflow), Udemy will be the first to house Docker-accredited content and customized learning paths to provide developers with the latest training materials on how to best use Docker tools. â Read more
How to Install iOS 17 on iPhone
Installing iOS 17 onto your iPhone is easy to do, and youâll gain access to the neat new features available in iOS 17. This includes everything from customizable contact cards, FaceTime Video voicemail, interactive widgets on your Home Screen, NameDrop easy contact sharing, new stickers features in Messages, new ringtones and text tones, new autocorrect ⊠Read More â Read more
How I used GitHub Copilot Chat to build a ReactJS gallery prototype
GitHub Copilot Chat can help developers create prototypes, understand code, make UI changes, troubleshoot errors, make code more accessible, and generate unit tests.
The post How I used GitHub Copilot Chat to build a ReactJS gallery prototype appeared first on The GitHub Blog. â Read more
Changes to How Docker Handles Personal Authentication Tokens
Docker is improving the visibility of Docker Desktop and Hub usersâ personal access tokens. Specifically, we are changing how tokens are handled across sessions between the two tools. Learn more about this security improvement. â Read more
GitHub Copilot Chat beta now available for all individuals
All GitHub Copilot for Individuals users now have access to GitHub Copilot Chat beta, bringing natural language-powered coding to every developer in all languages.
The post GitHub Copilot Chat beta now available for all individuals appeared first on The GitHub Blog. â Read more
Hardening repositories against credential theft
Some best practices and important defenses to prevent common attacks against GitHub Actions that are enabled by stolen personal access tokens, compromised accounts, or compromised GitHub sessions.
The post Hardening repositories against credential theft appeared first on The GitHub Blog. â Read more
Docker Desktop 4.22: Resource Saver, Compose âincludeâ, and Enhanced RBAC Functionality
Docker Desktop 4.22 is now available, with improved memory & CPU management, support for Compose subprojects, and improvements to role-based access control. â Read more
GitHub Copilot Chat beta now available for every organization
All GitHub Copilot for Business users now have access to a limited GitHub Copilot Chat beta, bringing the power of conversational coding right to the IDE. â Read more
Erlang Solutions: How IoT is Revolutionising Supply Chain Management
As global supply chains continue to face significant disruptions, many businesses are turning to IoT to access greater visibility, reactivity, and streamlined operations.
Unforeseen geopolitical conflicts, economic pressures due to inflation and severe climate change events have all contributed to an uncertain and cost ⊠â Read more
Isode: Icon-PEP 2.0 â New Capabilities
Icon-PEP is used to enable the use of IP applications over HF networks. Using STANAG 5066 Link Layer as an interface.
Listed below are the changes brought in with 2.0.
Web ManagementA web interface is provided which includes:
- Full configuration of Icon-PEP
- TLS (HTTPS) access and configuration including bootstrap with self signed certificate and ide ⊠â Read more
no wonder he cut off API access and added rate limit.
(De)coding conventions
Navigating the ebb and flow of programming paradigmsâfrom the shifts in the JavaScript ecosystem and TypeScriptâs rise, to AIâs role in advancing accessibility, and strategies for encouraging non-code contributionsâtune in to the latest episode of The ReadME Podcast for more. â Read more
Accessibility considerations behind code search and code view
A look at how we improved the readability of code on GitHub. â Read more
Question to all you Gophers out there: How do you deal with custom errors that include more information and different kinds of matching them?
I started with a simple var ErrPermissionNotAllowed = errors.New("permission not allowed"). In my function I then wrap that using fmt.Errorf("%w: %v", ErrPermissionNotAllowed, failedPermissions). I can match this error using errors.Is(err, ErrPermissionNotAllowed). So far so good.
Now for display purposes Iâd also like to access the individual permissions that could not be assigned. Parsing the error message is obviously not an option. So I thought, I create a custom error type, e.g. type PermissionNotAllowedError []Permission and give it some func (e PermissionNotAllowedError) Error() string { return fmt.Sprintf("permission not allowed: %v", e) }. My function would then return this error instead: PermissionNotAllowedError{failedPermissions}
At some layers I donât care about the exact permissions that failed, but at others I do, at least when accessing them. A custom func (e PermissionNotAllowedError) Is(target err) bool could match both the general ErrPermissionNotAllowed as well as the PermissionNotAllowedError. Same with As(âŠ). For testing purposes the PermissionNotAllowedError would then also try to match the included permissions, so assertions in tests would work nicely. But having two different errors for different matching seems not very elegant at all.
Did you ever encounter this scenario before? How did you address this? Is my thinking flawed?
Introduction to SELinux
SELinux is the most popular Linux Security Module used to isolate and protect system components from one another. Learn about different access control systems and Linux security as I introduce the foundations of a popular type system. â Read more
An official FBI document dated January 2021, obtained by the American association âProperty of Peopleâ through the Freedom of Information Act.

This document summarizes the possibilities for legal access to data from nine instant messaging services: iMessage, Line, Signal, Telegram, Threema, Viber, WeChat, WhatsApp and Wickr. For each software, different judicial methods are explored, such as subpoena, search warrant, active collection of communications metadata (âPen Registerâ) or connection data retention law (â18 USC§2703â). Here, in essence, is the information the FBI says it can retrieve:
Apple iMessage: basic subscriber data; in the case of an iPhone user, investigators may be able to get their hands on message content if the user uses iCloud to synchronize iMessage messages or to back up data on their phone.
Line: account data (image, username, e-mail address, phone number, Line ID, creation date, usage data, etc.); if the user has not activated end-to-end encryption, investigators can retrieve the texts of exchanges over a seven-day period, but not other data (audio, video, images, location).
Signal: date and time of account creation and date of last connection.
Telegram: IP address and phone number for investigations into confirmed terrorists, otherwise nothing.
Threema: cryptographic fingerprint of phone number and e-mail address, push service tokens if used, public key, account creation date, last connection date.
Viber: account data and IP address used to create the account; investigators can also access message history (date, time, source, destination).
WeChat: basic data such as name, phone number, e-mail and IP address, but only for non-Chinese users.
WhatsApp: the targeted personâs basic data, address book and contacts who have the targeted person in their address book; it is possible to collect message metadata in real time (âPen Registerâ); message content can be retrieved via iCloud backups.
Wickr: Date and time of account creation, types of terminal on which the application is installed, date of last connection, number of messages exchanged, external identifiers associated with the account (e-mail addresses, telephone numbers), avatar image, data linked to adding or deleting.
TL;DR Signal is the messaging system that provides the least information to investigators.
An official FBI document dated January 2021, obtained by the American association âProperty of Peopleâ through the Freedom of Information Act.

This document summarizes the possibilities for legal access to data from nine instant messaging services: iMessage, Line, Signal, Telegram, Threema, Viber, WeChat, WhatsApp and Wickr. For each software, different judicial methods are explored, such as subpoena, search warrant, active collection of communications metadata (âPen Registerâ) or connection data retention law (â18 USC§2703â). Here, in essence, is the information the FBI says it can retrieve:
Apple iMessage: basic subscriber data; in the case of an iPhone user, investigators may be able to get their hands on message content if the user uses iCloud to synchronize iMessage messages or to back up data on their phone.
Line: account data (image, username, e-mail address, phone number, Line ID, creation date, usage data, etc.); if the user has not activated end-to-end encryption, investigators can retrieve the texts of exchanges over a seven-day period, but not other data (audio, video, images, location).
Signal: date and time of account creation and date of last connection.
Telegram: IP address and phone number for investigations into confirmed terrorists, otherwise nothing.
Threema: cryptographic fingerprint of phone number and e-mail address, push service tokens if used, public key, account creation date, last connection date.
Viber: account data and IP address used to create the account; investigators can also access message history (date, time, source, destination).
WeChat: basic data such as name, phone number, e-mail and IP address, but only for non-Chinese users.
WhatsApp: the targeted personâs basic data, address book and contacts who have the targeted person in their address book; it is possible to collect message metadata in real time (âPen Registerâ); message content can be retrieved via iCloud backups.
Wickr: Date and time of account creation, types of terminal on which the application is installed, date of last connection, number of messages exchanged, external identifiers associated with the account (e-mail addresses, telephone numbers), avatar image, data linked to adding or deleting.
TL;DR Signal is the messaging system that provides the least information to investigators.
Isode: Harrier 3.3 â New Capabilities
Harrier is our Military Messaging client. It provides a modern, secure web UI that supports SMTP, STANAG 4406 and ACP 127. Harrier allows authorised users to access role-based mailboxes and respond as a role within an organisation rather than as an individual.
 to support mand ⊠â Read more
In reply to: Oatmeal - week notes
The worst kind of blogging is blogging about blogging, so, Iâll keep this blogging about blogging short!
Iâve made some minor updates to the design of the website that have improved itâs usability a wee bit, and are a step in the right direction toward upping my accessibility game. The major remaining accessibility issues are around color contrast and some structura ⊠â Read more
The most secure way to access this site is to torify a gopher client and go to the onion address.
Dependabot alerts are now visible to more developers
Default settings will allow developers with write and maintain access to see and resolve Dependabot alerts. â Read more
@xuu@txt.sour.is yeah, I know less about ISO27k (in part because you have to pay for access to the complete standards documents!!!), but I figured it was similar.
I had an AWS training in November and have the opportunity to get the âCertified Developer Associateâ certificate. Even though I have two attempts, I want to do well on the first shot. Since the trainer didnât show us everything that is required for the exam, Iâm kind of re-doing the training with this Udemy course (luckily I have access to Udemy Business and donât have to pay for it). Itâs really helpful because it helps me demystify the AWS cloud and reduce the đ€Ż whenever I do something in the AWS console. â Read more
Pourquoi ChatGPT nâest pas quâune intĂ©ressante curiositĂ©
Le 30 novembre 2022 est une date Ă garder en tĂȘte : câest ce jour que ChatGPT est officiellement devenu accessible Ă tous. ChatGPT a Ă©tĂ© produit par OpenAI, une sociĂ©tĂ© créée en 2015 et qui sâest lancĂ©e dans lâintelligence artificielle. En janvier 2021, elle proposait dĂ©jĂ Dall-E, un modĂšle de traitement du langage entraĂźnĂ© sur [âŠ] â Read more
I bought a full year of access to the Freeletics coach, so I should actually start doing my workout, right? đ I can already feel the soreness just thinking about it⊠â Read more
I couldnât access the Pleroma link.
Anyone uses the putr command? (to access pdp11 disk images)