Edit: OK, OK, I actually got it to work, and yes, I admit the results are incredible[2]. I honestly have no idea what happened with Pro 2.5 the first time.
[1]: https://g.co/gemini/share/5767894ee3bc [2]: https://g.co/gemini/share/a48c00eb6089
Edit: OK, OK, I actually got it to work, and yes, I admit the results are incredible[2]. I honestly have no idea what happened with Pro 2.5 the first time.
[1]: https://g.co/gemini/share/5767894ee3bc [2]: https://g.co/gemini/share/a48c00eb6089
For example, the paragraphs around the paragraph with "compute the exact Poisson tail (or use a Chernoff bound)" and that paragraph itself could be better illustrated with lines of math instead of mostly language.
I think you do need some math if you want to approach this probabilistically, but I agree that might not be the most accessible approach, and a hard threshold calculation is more accessible and maybe just as good.
Speed and local-first was originally the main differentiator, but over time Steph Ango's "file over app" philosophy has become my favorite feature.
Yesterday I used Claude Code to automate some Obsidian cleanup and it was trivial because everything's just a file.
i usually compare obsidian to joplin... seems like i should be looking more at obsidian because i was considering starting a new wiki in notion.
To be fair, the PowerPoint they were shown at that AI Synergies retreat probably was very slick.
It is because they think it will 10x their chances of getting a really good engineer for 1/10th as cheap.
At least that is my theory. maybe i am wrong. i try to be charitable.
Over the past 3 years of calling support any service or infrastructure (bank, health insurance, doctor, wtv), over like 90% of my requests were things only solvable via customer support or escalation.
I only keep track because I document when I didn't need support into a list of "phone hacks" (like press this sequence of buttons when calling this provider).
Most recently, I went to an urgent care facility a few weekends ago, and they keep submitting claims to the arm, of my insurance, that is officed in a different state instead of my proper state.
They also made laws happen that limit how Google can link to news sites to prevent Google News from stealing readers.
And they tried to make Google pay each time a user clicks a link that leads to a German news site.
Also there are surcharges on printers (around $50 or so per piece), laptops etc because you might copy copyright-protected texts with it.
And the German online news websites know they lose a lot of money to adblockers so of course they want to ban them.
I did not know AI tools could access sensitive directories.
Or is it that AI brute forces access to directories that the malware already had access to but the developer of the malware was not aware of?
Does the inventory.txt get uploaded? There seems to be an outbound connection but I did not see verification that it is the inventory.txt.