From 2017 · We should all be automating our image compression.In 2017, image optimization should be automated. It's easy to forget, best practices change, and content that doesn't go through a build pipeline can…
1 min read · Jun 8th · This is what a broken security model looks like.
Crucially, they build on each other: if your favorite password didn’t leak out in the Dropbox breach, hackers could have gotten it from LinkedIn, Yahoo, or hundreds of others. (This, as you probably know, is why you need a unique password for each service.)
with more than 500 separate breaches, there’s ample opportunity for human beings to double up on leaked accounts but the scale of compromised information is still staggering.
~12 min read · 2020-06-17 · We find that, just as a large transformer model trained on language can generate coherent text, the same exact model trained on pixel sequences can generate coherent image completions and samples