-
Post your questions for [Uri Hasson](https://psychology.princeton.edu/people/uri-hasson) about his talk and paper: **Deep language models as a cognitive model for natural language processing in the hu…
-
monerod uses dandelion++ to propagate txs around the network, this happens in 2 stages: stem and fluff. This proposal will only affect txs in the fluff stage.
When monerod receives a fluff tx, it w…
-
There are multiple layers of "difficulties" that are not yet mentioned in the lesson but might be too much for this course at this time. These ideas come from my self-teaching Docker last year to impl…
-
# Abstract
ipEHR is about putting patients first, but gives opportunities to all parties of the medical market to establish trustless, safe, event-based data exchange respecting data sovereignty. Pat…
-
# Secret Network Grant Proposal
# LootMogul
## Overview
**LootMogul** is a multiverse blockchain gaming, NFT, crypto, landsale metaverse platform for sports athletes and fans to engage in. Sp…
-
**Describe the bug**
A clear and concise description of what the bug is.
**To Reproduce**
Steps to reproduce the behavior:
1. Go to https://dev.alkem.io/forum/new
2. Type the following text:
```
Are…
-
# Open Grant Proposal: `PKP-controlled curations with role-based access control using Lit Actions - index.as`
**Name of Project:** index.as
**Proposal Category:** `app-dev`, `integration-adoptio…
-
First specify on which part this is related in the title with:
`core/language/modules...: title`
**Describe the bug**
I used the following intent files and get mostly random response. I was won…
-
## 1. Introduction
**Confidentiality, privacy, and security**
Confidentiality is limiting access and disclosure on certain types of information to ensure personal information is secured. Privacy…
-
To Whom it May Concern,
Please see Adobe’s comments to the 2017 Report to the President on Federal IT Modernization.
Thanks for considering.
V/r,
Matt
Matt Schrader
Dir…