2026-02-14 04:14:39
How is there no space for people in the humanities who actually work with *and* interrogate AI? not knee-jerk condemnation and not fanboy acceptance, but using the tools and thinking through their consequences. so strange.
How is there no space for people in the humanities who actually work with *and* interrogate AI? not knee-jerk condemnation and not fanboy acceptance, but using the tools and thinking through their consequences. so strange.
Nvidia announces the Alpamayo family of AI models, tools, and datasets for AVs, and details a collaboration with Mercedes-Benz on its first full-stack AV effort (Larry Dignan/Constellation Research)
https://www.constellationr.com/blog-news/i
Since I've been seeing a lot of "switch to Ecosia for search they are sustainable and European" hints lately your evaluation might soon change:
Their boss explicitly wants not just to add "AI" to search but go all in on more "AI" tools. (Which sucks, I was thinking about applying for the CTO job there but I won't waste my time seeing that)
(Article in German)
@… hi Elena! I'm digging deeper into self hosting (I've been doing that for more than 15 years on simple sites, image hosting, and some tools at a web server), but, I'm thinking of using more complex apps. The point, on why I'm writing to you 😃 aren't you afraid of the security side? Thousands of sites are being hacked daily, aren't you afra…
From The Conversation
Canada’s long history with public service media offers a useful model for thinking about how AI could serve the public.
A publicly funded AI system could draw on public-domain materials, government datasets and openly licensed cultural content. It could be offered as an open-source system, making it widely available to researchers, developers and everyday users alike.
Is anyone are of good tools for "the attacker knows the key but not the system" cryptanalysis?
I'm thinking scenarios like "I've dumped external flash and efuses off a target with encrypted firmware, but I don't know the algorithm or image format".
So ciphertext and key are believed to be known, but bit ordering, endianness, algorithm, headers, etc are unknown.