I think the most effective strategy here is to provide accessible tools to solve problems with ML, and provide accessible education material to get people started. Not just grad students, not just engineers -- but everyone who's in a position to build things and solve problems
-
-
Show this thread
-
This is also a strong form of power decentralization. "Decentralization" seems to be a keyword of interest these days, although people often use it to pitch businesses and products that use decentralized computing to *centralize* power into the hands of a small number of insiders
Show this thread
End of conversation
New conversation -
-
-
That's why
@jeremyphoward and@math_rachel are so important! -
So is
@AndrewYNg
End of conversation
New conversation -
-
-
I feel like Keras really started this, and
@fastai and Lore are taking it to the next level https://tech.instacart.com/how-to-build-a-deep-learning-model-in-15-minutes-a3684c6f71e …Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
What you are claiming: its ok for the end users to have a gui & command type interfaces but not third primary interface where they can automate what functionality they manually already have access to. Roman numeral accountants claimed only fools thinks nothing can have value "0"
-
Correct Ethics violation http://3seas.org/EAD-RFI-response.pdf … & follow ref'd link in pdf. Security needed is already there in whether or not user has access to application, library, device. Don't use the security excuse either. Maybe only concern is avoiding destructive actions like delete?
End of conversation
New conversation -
-
-
Expectations are really really high
#MachineLearningThanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
Your proof is? Avoiding proof is not proof, it is avoidance of proof. The claim/excuse does not stand, should never have stood. Apparently, Intell and AMD cloning Intel didn't understand what they were doing that is now been exposed as CPU flaws allowing hacking any system.
-
For years an IT guy wouldn't allow me to make available to a CNC router operator, the software for programming the CNC. After IT guy was gone, CNC operator was able to learn & do, mostly on his own, yet today he still knows nothing about basic programming concepts. U know G-Code?
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.