software engineering

AI Large Language Models

How to Upload Files to ChatGPT: A More Powerful Experience

In this video from Automate My Life., see how to upload files into ChatGPT, a powerful language model based on the GPT-3.5 architecture. With this code, you can easily upload text files, JS files, Python files, and even CSV ‘s to ChatGPT and get accurate responses to your prompts.

Read More
GameDev Python

How to Code An Entire Game Using ChatGPT

Nick White used ChatGPT to create an entire game from scratch using Chat GPT. Are we witnessing the birth of an entirely new kind of coder?

Read More
AI Mathematics

AI Just Solved a 53-Year-Old Problem! | AlphaTensor, Explained

In a year where we’ve seen Artificial intelligence move forward in a significant way, AlphaTensor is the most exciting breakthrough we have accomplished. This video briefly introduces AlphaTensor and what it means for humanity.

Read More
Data

Kafka in Action (Teaser) • Viktor Gamov & Tim Berglund • GOTO 2022

Viktor Gamov’s co-authored book “Kafka in Action” ensures that you have a list of recipes to dive into. Joined by Tim Berglund, VP DevRel at StarTree, they explore the fundamentals of Apache Kafka. Learn what Kafka can help you achieve, what Viktor’s favorite MCU film is and what “Highway to Mars” by Beast In Black […]

Read More
AI Ethics

The Road to General AI • Danny Lange • GOTO 2021

With recent news of a “sentient chatbot,” the topic of AGI is top of mind for me again. Danny Lange, SVP of AI and ML at Unity Technologies, presents this talk on the subject. ABSTRACT Senior vice president of machine learning and artificial intelligence at Unity Danny Lange will set the stage by introducing the […]

Read More
Privacy Windows

Does Windows have Back Doors?

Retired Microsoft engineer Davepl discusses “back doors” in Windows, the implications, and how the software developer protects against such attacks from rogues, hackers, and nation-states. Understand how back doors are like the Follina zero-day exploit in Office, giving complete control of the system to the attacker.

Read More