I am of the opinion that actions taken by independent people with agency distributed across a geographical location will always be superior in effectiveness to a centralized planning process. This is due to the fact that if different people with different goals end up wanting to do the same thing, for instance, developing a plot […]
LLMs are Comprehension Engines
My personal interpretation of Large Language Models is that more than any other type of comparison, more than “autocorrect on steroids”, more than a “lossy compression algorithm”—they are “Comprehension Engines”. By being able to parse language and understand context, LLMs can “comprehend” similarly to how humans do. And by producing outputs and understanding those outputs, […]
VPN stands for “Virtual Private Network”. It’s a service that encrypts the data you send over the Internet and changes your IP address to make it look like you’re located somewhere else. This is useful because having your data encrypted makes it impossible for hackers to see what you’re doing online. However, nowadays almost all […]
Here are 4 quick things you can do to contain the damage and prevent others from getting hacked: Change your password! You also need to change the password for all other accounts where you’ve reused that password or a variation. Start the account recovery process. This is different for every website so you’ll need to […]
Unfortunately, people nowadays think that you need to have all kinds of weird symbols and numbers in your password to make it secure. This isn’t the case! Despite the many websites that require you to have symbols and numbers, it’s often more secure to have an all lowercase password, as long as it is 16 characters […]
Phishing is an attack used by hackers where they try to gain access to your account by tricking you into clicking on a malicious link sent in an email, text message, or social media message. Phishing messages are designed to look important and legitimate to convince you to click on them. They’re often phony password […]