1.Β The purpose of the IT product Telepathy β the brain-computer interface of Β NueralinkThe UN General Assembly Resolution of 22.03.2024 No. A/78/L.49 βHarnessing the Potential of Safe, Secure and Trustworthy Artificial Intelligence Systems for Sustainable Developmentβ [1] confirms (paragraph 5) that"human rights and fundamental freedoms must be respected, protected and encouraged throughout the life cycle of artificial intelligence systems"and to all Member States of the United Nations and, where appropriat Read more βΊ
0
This is an article that describes my vision of building a system that actively uses Go as the main programming language and SOA/microservices as a design paradigm.Β Here I will try to cover 4 chapters that together allow us to build a solid and reliable system. Read more Read more βΊ
0
ΠΡΠΈΠ²Π΅Ρ! ΠΠ΅Π½Ρ Π·ΠΎΠ²ΡΡ ΠΠ»Π΅Π³ Π§ΠΈΠΊΠ΅Π»ΡΠ², Ρ ΡΠ°Π·ΡΠ°Π±ΠΎΡΡΠΈΠΊ ΡΠ΅ΡΠ²ΠΈΡΠΎΠ² Π½Π° VK Mini Apps. ΠΡΠ° ΠΈΡΡΠΎΡΠΈΡ Π½Π°ΡΠ°Π»Π°ΡΡ Π±ΡΠ΄Π½ΠΈΡΠ½ΠΎ, ΠΊΠ°ΠΊ ΠΈ ΠΌΠ½ΠΎΠ³ΠΈΠ΅ Π΄ΡΡΠ³ΠΈΠ΅: ΠΎΠ΄Π½Π°ΠΆΠ΄Ρ Ρ ΠΏΡΠΈΡΡΠ» ΠΊ Π΄ΡΡΠ³Ρ Ρ ΠΈΠ΄Π΅Π΅ΠΉ ΠΏΡΠΈΠ»ΠΎΠΆΠ΅Π½ΠΈΡ, ΠΈ ΠΌΡ Π·Π°Π³ΠΎΡΠ΅Π»ΠΈΡΡ Π±ΡΡΡΡΠΎ ΡΠ΄Π΅Π»Π°ΡΡ Π΅Π³ΠΎ Π½Π° ΡΡΠΎΠΉ ΠΏΠ»Π°ΡΡΠΎΡΠΌΠ΅. Π Π°ΡΡΠΊΠ°ΠΆΡ Π²Π°ΠΌ ΠΎ ΡΠ²ΠΎΡΠΌ ΠΎΠΏΡΡΠ΅ ΡΠ°Π·ΡΠ°Π±ΠΎΡΠΊΠΈ ΠΈ ΠΎ ΡΠΎΠΌ, ΠΊΠ°ΠΊ Π²ΡΠ³Π»ΡΠ΄ΠΈΡ ΠΆΠΈΠ·Π½Π΅Π½Π½ΡΠΉ ΡΠΈΠΊΠ» ΠΏΡΠΎΠ΄ΡΠΊΡΠ° Ρ ΡΠΎΡΠΊΠΈ Π·ΡΠ΅Π½ΠΈΡ ΡΠ°Π·ΡΠ°Π±ΠΎΡΡΠΈΠΊΠ°. ΠΡ ΡΠ·Π½Π°Π΅ΡΠ΅, ΠΊΠ°ΠΊ ΠΌΠΈΠ½ΠΈ-ΠΏΡΠΈΠ»ΠΎΠΆΠ΅Π½ΠΈΡ ΡΠ΅ΡΡΠΈΡΡΡΡΡΡ Π² Π±Π°Π³-ΡΡΠ΅ΠΊΠ΅ΡΠ΅ ΠΈ ΠΊΠ°ΠΊ ΠΎΠ½ΠΈ ΠΏΠΎΡΠ²Π»ΡΡΡΡΡ Π² ΠΊΠ°ΡΠ°Π»ΠΎΠ³Π΅. Π Π²... Read more βΊ
0
ΠΠΎΠ·Π½ΠΈΠΊΠ°Π΅Ρ Π·Π°ΠΊΠΎΠ½ΠΎΠΌΠ΅ΡΠ½ΡΠΉ Π²ΠΎΠΏΡΠΎΡ ΠΎ ΡΠΎΠΌ, Π΄Π΅ΠΉΡΡΠ²ΠΈΡΠ΅Π»ΡΠ½ΠΎ Π»ΠΈ Π²Π°ΠΆΠ΅Π½ ΡΠ΅ΡΠΌΠΈΠ½ "ΠΠΎΠ½ΠΎΠΊΠΎΡΠΏΠΎΡΠ°ΡΠΈΡ" ΠΏΡΠΈΠΌΠ΅Π½ΠΈΡΠ΅Π»ΡΠ½ΠΎ ΠΊ Π‘Π‘Π‘Π ( https://habr.com/ru/post/673752/ ). ΠΡΠ²Π΅Ρ - "ΠΠ°, ΠΏΠΎΡΠΎΠΌΡ ΡΡΠΎ ΡΠ»ΠΎΠ²Π° ΠΈΠΌΠ΅ΡΡ ΡΠΌΡΡΠ»". Π’Π΅ΠΌΠ° ΠΎ ΡΠΎΠΌ, ΡΡΠΎ ΡΠ»ΠΎΠ²Π° ΠΈΠΌΠ΅ΡΡ ΡΠΌΡΡΠ», Π½Π΅ ΠΏΡΠΎΡΡΠΎ Π±ΡΠ΄Π΅Ρ ΠΏΡΠΎΡ ΠΎΠ΄ΠΈΡΡ ΠΊΡΠ°ΡΠ½ΠΎΠΉ Π½ΠΈΡΡΡ ΡΠ΅ΡΠ΅Π· Π²ΡΡ ΠΊΠ½ΠΈΠ³Ρ. ΠΠΎ ΡΡΡΠΈ, ΠΎΠ½Π° ΡΠ²Π»ΡΠ΅ΡΡΡ ΡΡΡ Π³Π»Π°Π²Π½ΠΎΠΉ - ΡΠ»ΠΎΠ²Π°, ΠΊΠΎΡΠΎΡΡΠ΅ ΡΠ΅ΠΉΡΠ°Ρ ΠΌΠ½ΠΎΠ³ΠΈΠΌΠΈ Π²ΠΎΡΠΏΡΠΈΠ½ΠΈΠΌΠ°ΡΡΡΡ ΠΊΠ°ΠΊ Π±Π΅ΡΡΠΎΠ΄Π΅ΡΠΆΠ°ΡΠ΅Π»ΡΠ½ΡΠ΅ Π»ΠΎΠ·ΡΠ½Π³ΠΈ, Π½Π° ΡΠ°ΠΌΠΎΠΌ Π΄Π΅Π»Π΅ ΡΠ²Π»ΡΡΡΡΡ ΡΡΡΠΎΠ³ΠΈΠΌΠΈ ΡΠ΅ΡΠΌΠΈΠ½Π°ΠΌΠΈ.Π Π΄Π»Ρ ΠΏΠΎΠ½ΠΈΠΌΠ°Π½ΠΈΡ ΡΡΠ½ΠΊΡΠΈΠΎΠ½ΠΈΡΠΎΠ²Π°Π½ΠΈΡ ΡΠΎΠ²Π΅ΡΡΠΊΠΎΠΉ ΠΏΡΠΎΠΌΡΡΠ»Π΅Π½Π½ΠΎΡΡΠΈ ΠΈ Π²ΡΠ΅ΠΉ ΠΠΎΠ½ΠΎΠΊΠΎΡΠΏΠΎΡΠ°ΡΠΈΠΈ Read more βΊ
0
Analyst Days/14 is the International Conference on System and Business Analytics. The Conference was held in a mixed format letting experts meet and mingle, talk face-to-face, and those who could not attend β listen to presentations and ask questions online. Read more Read more βΊ
0
In this article, we shall provide some background on how multilingual multi-speaker models work and test an IndicΒ TTS modelΒ that supports 9 languages and 17 speakers (Hindi, Malayalam, Manipuri, Bengali, Rajasthani, Tamil, Telugu, Gujarati, Kannada).It seems a bit counter-intuitive at first that one model can support so many languages and speakers provided that each Indic language has its own alphabet, but we shall see how it was implemented.Also, we... Read more βΊ
0
In Part 1 of this article, I built and compared two classifiers to detect trolls on Twitter. You can check it out here.Now, time has come to look more deeply into the datasets to find some patterns using exploratory data analysis and topic modelling.EDATo do just that, I first created a word cloud of the most common words, which you can see below. Read more Read more βΊ
0
During the last decades, the worldβs population has been developing as an information society, which means that information started to play a substantial end-to-end role in all life aspects and processes. In view of the growing demand for a free flow of information, social networks have become a force to be reckoned with. The ways of war-waging have also changed: instead of conventional weapons, governments now use political warfare, including... Read more βΊ
0
The IDS Bypass contest was held at the Positive Hack Days conference for the third time (for retrospective, here's . This year we created six game hosts, each with a flag. To get the flag, participants had either to exploit a vulnerability on the server or to fulfill another condition, for example, to enumerate lists of domain users. The tasks and vulnerabilities themselves were quite straightforward. The difficulty laid in... Read more βΊ
0
In this article, I would like to describe how weβve tackled the named entity recognition (aka NER) issue at Sber with the help of advanced AI techniques. It is one of many natural language processing (NLP) tasks that allows you to automatically extract data from unstructured text. This includes monetary values, dates, or names, surnames and positions. Just imagine countless textual documents even a medium-sized organisation deals with on a... Read more βΊ
0
ΠΠΈΡΡΡ ΡΠΎ ΡΡΠ½ΠΊΡΡΡ Π²ΡΠ΄ ΡΠ°ΡΡ, Π΄Π°Π²Π°ΠΉΡΠ΅ ΡΡΠ²ΠΈΠΌΠΎ ΡΠ΅ ΡΠ°ΠΊ:life(time):-deathtime(time). life(moment):-life(moment).Π ΠΌΠΎΠΆΠ΅ ΠΆΠΈΡΡΡ ΡΠΎ ΡΡΠ½ΠΊΡΡΡ Π²ΡΠ΄ ΡΠ°ΡΡ ΡΠ· ΠΏΠ°ΡΠ°ΠΌΠ΅ΡΡΠΎΠΌ ΡΡΠ°Π½Ρ:life(time,state):-deathtime(time),toanswer(state). life(time,state):-newtime,newstate=moment(time,sate),life(newtime,newstate).Π€ΡΠ½ΠΊΡΡΡ ΠΆΠΈΡΡΡ ΡΠΎΡΡ ΠΏΠΎΠ²Π΅ΡΡΠ°? Π§ΠΈ ΡΡΠ½ΡΡΡΡ ΠΌΠ΅ΡΠ°ΡΡΠ½ΠΊΡΡΡ Π΄Π»Ρ Π½Π΅Ρ. Π§ΠΈ Π²ΠΈΠΊΠΎΠ½ΡΡΡΡΡΡ ΠΏΠ΅ΡΠ΅Π²ΡΡΠΊΠ° ΡΡ ΡΠ΅Π·ΡΠ»ΡΡΠ°ΡΡ?foreach(life in alllifes) do universe(0,life); universe(time,life):-life(time),newtime=inc(time),universe(newtime,life).Π¦ΡΠΉ ΡΡΠ½ΠΊ Read more βΊ
0
Typically when a Node falls out of the OpenShift cluster, this is resolved by simply restarting the offending element. What should you do, however, if youβve forgotten the SSH key or left it in the office? You can attempt to restore access by using your wit and knowledge of Linux commands. Renat Garaev, lead developer at Innotech, described how he found the solution for this riddle and what was the... Read more βΊ
0
Most people fear of artificial intelligence (AI) for the unpredictability of its possible actions and impact [1], [2]. In regard to this technology concerns are voiced also by AI experts themselves - scientists, engineers, among whom are the foremost faces of their professions [3], [4], [5]. And you possibly share these concerns because it's like leaving a child alone at home with a loaded gun on the table - in... Read more βΊ
0
The first text-based CAPTCHA ( weβll call it just CAPTCHA for the sake of brevity ) was used in 1997 by AltaVista search engine. It prevented bots from adding Uniform Resource Locator (URLs) to their web search engine. Back then it was a decent defense measure. However the progress can't be stopped, and this defense was bypassed using OCR available at those times (for example FineReader).CAPTCHA became more complex, noise... Read more βΊ
0
The article is an abstract of my book [1] based on previously presented publications [2], [3], [4], [5] Read more Read more βΊ
0
The published material is in the Appendix ofΒ my book [1]Modern civilization finds itself at a crossroads in which to choose the meaning of life. Because of the development of technology, the majority of the world's population may be "superfluous" - not in demand in the production of values. There is another option, where each person is a supreme value, an absolute individual and can be indispensably useful in the... Read more βΊ
0
Some time ago I discovered that Django has the ability to auto-register ModelAdmins. Since this is not common knowledge and carries a number of benefits, I decided to write an article about it to bring it to the attention of the Django community. Read about Django ModelAdmin autoregistry Read more βΊ
0
I guess, it's not a big deal to say that Wi-Fi (IEEE 802.11 standards) is the one of the most popular and most spread communication technology of the current day. Especially indoors. The growing number of Wi-Fi devices still remains that leads to the overcrowded spectrums: both 2.4 GHz and 5 GHz.This fact means increasing of demand for some optimization routines for utilization of resources. And therefore some RRM (Radio... Read more βΊ
0
Hello, I am Aleksandr Ivanov, CTO at Quadcode. We came to the Medium to show the Fintech βkitchenβ; weβve been at it for 8 years, so we can already share our experience. In our blog we will talk about architectures, technologies, tools and life hacks. Read more Read more βΊ
0
WebRTC integrations have emerged as a game-changer in the Video Calling Technology over the years. The protocol has redefined the way real-time video communications take Developers can integrate WebRTCs commonly available as JavaScript APIs to add audio and video solutions to their apps. place. Developers can integrate WebRTCs commonly available as JavaScript APIs to add audio and video solutions to their apps. This tutorial will take you through the steps... Read more βΊ
0
Most popular sources
Business Insider | 31% 6 |
Eurogamer.net | 10% 5 |
Tom's Hardware | 9% 0 |
Gizmodo | 8% 1 |
CNET | 7% 2 |
View sources » |
LIKE us on Facebook so you won't miss the most important news of the day!
25.11.2024 08:36
Last update: 08:31 EDT.
News rating updated: 15:30.
What is Times42?
Times42 brings you the most popular news from tech news portals in real-time chart.
Read about us in FAQ section.