-
### System Info
System:
langchain 0.0.321
Python 3.10
Hi,
I get an error related to a missing OpenAI token when trying to reuse the code to [dynamically select from multiple retrievers](htt…
-
Hi - thanks for this project. Currently looking for the best way to seed/bridge vault/azure-kv stored secrets and provision/access them from k8s. I came across the Secrets Store CSI project yesterday …
-
### _title_
Crafting a Real-World MAGI: From Anime Dream to Technological Reality
### _temperature_
0.69
### _prompt_
Write a blog post in which the author explains how one could develop it's own MAGI…
-
This is a placeholder issue for implementing commands that allow the end user to sign arbitrary bytes with one of the keys (over CLI and RPC).
## Constraints
- Allow for signing of arbitrary byt…
lidel updated
11 months ago
-
Threat modeling involves identifying ways that an adversary might try to attack notation and then designing mitigations to prevent, detect or reduce the impact of those attacks.
Aspect:
TS+TP+Envelo…
-
- Cum Laude candidate
[USA House of Representatives - INVESTIGATION OF COMPETITION IN DIGITAL MARKETS ](https://www.govinfo.gov/content/pkg/CPRT-117HPRT47832/pdf/CPRT-117HPRT47832.pdf) :
```
As p…
-
Threat modeling involves identifying ways that an adversary might try to attack notation and then designing mitigations to prevent, detect or reduce the impact of those attacks.
Aspects:
Dir + Con…
-
As I understand it, the TOC is starting to review projects with a consideration to reassess their level in the CNCF or even to remove them altogether. I wanted to bring the Notary V2 project to the T…
-
protocols:
- [ ] instant cold start
- [ ] start / stop spaces
- [ ] benchmark 20-50 users collaborating
- [ ] paper key recovery
- [ ] invitations
- [ ] pin-less
- [ ] expiry duration
…
-
I will maintain in this OP a summary of current proposed syntax as I understand it to be. Note this is not authoritative, subject to change, and it may be inaccurate. Please make comments to discuss.
…