|
You are here |
dogan-ucar.de | ||
| | | | |
blog.replit.com
|
|
| | | | | Data privacy and data security is one of the most stringent constraints in the design of our information architecture. As already mentioned in past blog posts, we only use public Repls for analytics and AI training: any user code that's not public - including all enterprise accounts - is not reviewed. And even for public Repls, when training and running analyses, all user code is anonymized, and all PII removed. For any company making creative tools, being able to tell what its most engaged users are bui... | |
| | | | |
vadimkravcenko.com
|
|
| | | | | Dear Robert, The short answer is - stop getting attached to your code. Now lets continue to a more detailed explanation. I understand that coming back to | |
| | | | |
humanloop.com
|
|
| | | | | In this episode, Hamel Husain and Shawn Wang (aka Swyx) share insights on AI engineering, literate programming, and why your AI product desperately needs evals. | |
| | | | |
bosker.wordpress.com
|
|
| | | Calling all bash users. This is a public service announcement. Heres something you need to know if you want to write bash scripts that work reliably, but you probably dont. Recommendations For script authors: Every bash script that uses the cd command with a relative path needs to call unset CDPATH, or else it may | ||