speedshifter2015
speedshifter2015 t1_j4q0yvw wrote
Reply to comment by Johnchamberlain123 in ChatGPT won't kill Google, it will help it. Generative AI's biggest impact will be on office apps, not search engines. by cartoonzi
ChatGPT is a large language model developed by OpenAI that is trained to
generate human-like text based on the input it receives. It is a
variation of the GPT (Generative Pre-trained Transformer) model and is
designed to be used in natural language generation and conversation
applications.
Source: ChatGPT
speedshifter2015 t1_j4q07ym wrote
Reply to ChatGPT won't kill Google, it will help it. Generative AI's biggest impact will be on office apps, not search engines. by cartoonzi
I've noticed chatgpt gave me more direct answers and in an amount of time faster than if just used google. Though I always verify and not take chatgpt as law. Treat it like Wikipedia in a way. But so far it's been very accurate in its results.
speedshifter2015 t1_izkzbhz wrote
Reply to comment by TommyTuttle in A website where you can practice typing by typing out classic literature instead of random words or passages - You improve your typing speed and read a great book at the same time ! by MagicalEloquence
I'd rather get into perfect arguments with stupid strangers. 😏
speedshifter2015 t1_iugyqfh wrote
Jamaican me hungry.
speedshifter2015 t1_j4q1iqg wrote
Reply to comment by speedshifter2015 in ChatGPT won't kill Google, it will help it. Generative AI's biggest impact will be on office apps, not search engines. by cartoonzi
What is Cybersecurity?
Cybersecurity is the practice of protecting computer systems, networks,
and sensitive information from unauthorized access, use, disclosure,
disruption, modification, or destruction. It involves a wide range of
technologies, processes, and practices that are designed to prevent,
detect, and respond to cyber threats. Cybersecurity measures include
firewalls, encryption, intrusion detection and prevention systems, and
penetration testing, among others. The goal of cybersecurity is to
maintain the availability, integrity, and confidentiality of information
and systems, and to ensure the ongoing functionality of critical
infrastructure.
Another example of it's use etc etc