Miles(@mileszim) 's Twitter Profileg
Miles

@mileszim

Narrative Topologies & Cognitive Security

ID:44549120

linkhttp://zim.dev calendar_today04-06-2009 04:53:22

7,5K Tweets

4,7K Followers

3,3K Following

Amos Goldbaum(@AmosGoldbaum) 's Twitter Profile Photo

The banners I designed for the Divisadero Merchants Association are up! The drawing has Alamo Square on the left and The Panhandle on the right. It shows Divisadero as a crossroads not a dividing line. Thanks so much DMA for the opportunity!

The banners I designed for the Divisadero Merchants Association are up! The drawing has Alamo Square on the left and The Panhandle on the right. It shows Divisadero as a crossroads not a dividing line. Thanks so much DMA for the opportunity!
account_circle
kasra(@kasratweets) 's Twitter Profile Photo

ok, so there's a bioelectric network synchronizing the whole body. so what?

the upshot is that we can study this network, model it, and even modify it to reconfigure the body structure. they've used this approach to produce living, viable two-headed worms, and worms with no head

ok, so there's a bioelectric network synchronizing the whole body. so what? the upshot is that we can study this network, model it, and even modify it to reconfigure the body structure. they've used this approach to produce living, viable two-headed worms, and worms with no head
account_circle
Divergent Options(@DivergentOption) 's Twitter Profile Photo

New article! Developing flexible frameworks to address evolving threats like deepfakes without stifling innovation or free speech. divergentoptions.org/2024/04/29/usi…

account_circle
Michael P. Frank is joining a startup!(@MikePFrank) 's Twitter Profile Photo

Dreaming is where the brain nightly fine-tunes itself on the day’s chat transcripts, but mixed in with enough stochastically synthesized data so as to minimize catastrophic forgetting of pretrained concepts

No reason why you couldn’t also do this in an LLM system

account_circle
Binni Shah(@binitamshah) 's Twitter Profile Photo

Reverse-engineering and “running Windows 95” on a disposable vape with a colour LCD screen : ripitapart.com/2024/04/20/dis…

Reverse-engineering and “running Windows 95” on a disposable vape with a colour LCD screen : ripitapart.com/2024/04/20/dis…
account_circle
Luiza Jarovsky(@LuizaJarovsky) 's Twitter Profile Photo

🚨BREAKING: US National Institute of Standards and Technology publishes 1st draft of its 'AI Risk Management Framework: Generative AI Profile.' Important information & quotes:

➡️This is a comprehensive document that contains an overview of risks unique to or exacerbated by generative AI (GAI) and an extensive list of…

🚨BREAKING: US @NIST publishes 1st draft of its 'AI Risk Management Framework: Generative AI Profile.' Important information & quotes: ➡️This is a comprehensive document that contains an overview of risks unique to or exacerbated by generative AI (GAI) and an extensive list of…
account_circle
Grace Kind​(@kindgracekind) 's Twitter Profile Photo

Running llama3 and TTS on an older computer is interesting. I keep thinking to myself, “this computer could’ve spoken to me like this the whole time, it just needed the right instructions.”

account_circle
∿(@somewheresy) 's Twitter Profile Photo

the funniest thing about this video:

they know that their marks are a specific type of guy, so they aren’t wearing any face masks or hair nets or protective gear other than gloves while assembling the dilution refrigerator, destroying any results they could seek to get here

account_circle
Eto Buziashvili(@EtoBuziashvili) 's Twitter Profile Photo

Is this 'Yanukovich moment' of Georgia’s oligarch? It seems so. Bidzina Ivanishvili, the oligarch behind ruling Georgian Dream confirmed yesterday what we have observed since he came to power in 2012 – he announced a shift in Georgia’s foreign policy & political repressions. 1/13

account_circle
Miles(@mileszim) 's Twitter Profile Photo

“The European Union Hybrid COE (Centre of Excellence) define hybrid threats as being:

• coordinated and synchronised actions that deliberately target democratic states’ and institutions’ systemic vulnerabilities through a wide range of means;

• activities that exploit the…

account_circle