Forwarded from Computer Science and Programming (Abdulaziz Gaibullayev)
This media is not supported in your browser
VIEW IN TELEGRAM
Gen-1: The Next Step Forward for Generative AI
Use words and images to generate new videos out of existing
Introducing Gen-1: a new AI model that uses language and images to generate new videos out of existing ones.
https://research.runwayml.com/gen1
βοΈ Project:
https://research.runwayml.com/gen1
β Paper:
https://arxiv.org/abs/2302.03011
πRequest form:
https://docs.google.com/forms/d/e/1FAIpQLSfU0O_i1dym30hEI33teAvCRQ1i8UrGgXd4BPrvBWaOnDgs9g/viewform
π@computer_science_and_programming
Use words and images to generate new videos out of existing
Introducing Gen-1: a new AI model that uses language and images to generate new videos out of existing ones.
https://research.runwayml.com/gen1
βοΈ Project:
https://research.runwayml.com/gen1
β Paper:
https://arxiv.org/abs/2302.03011
πRequest form:
https://docs.google.com/forms/d/e/1FAIpQLSfU0O_i1dym30hEI33teAvCRQ1i8UrGgXd4BPrvBWaOnDgs9g/viewform
π@computer_science_and_programming
Free University Courses/Materials for CyberSecurity
1)Internet History, Technology, and Security: https://online.umich.edu/courses/internet-history-technology-and-security/
2)Network and Computer Security: https://ocw.mit.edu/courses/6-857-network-and-computer-security-spring-2014/pages/lecture-notes-and-readings/
3)Computer Networks: https://ocw.mit.edu/courses/6-829-computer-networks-fall-2002/
4)Cybersecurity Management: https://itmasters.edu.au/free-short-course-cybersecurity-management/
5)CISSP: https://itmasters.edu.au/free-short-course-cissp-updated/
6)Short Course for Penetration Testing: https://itmasters.edu.au/free-short-course-pen-testing/
7)Cloud Computing: https://www.coursera.org/specializations/cloud
8)Hardware Security: https://www.coursera.org/learn/hardware-security
9)CryptoGraphy: https://www.coursera.org/learn/crypto?action=enroll
10)Cybersecurity Risk Management: https://www.edx.org/course/cybersecurity-risk-management
11) Network Security: https://www.edx.org/course/network-security-2
12)Introduction to Computer Science: https://www.edx.org/course/introduction-computer-science-harvardx-cs50x
13)Introduction to Cybersecurity: https://www.edx.org/course/introduction-to-cybersecurity
14)Programming with Python: https://www.edx.org/course/cs50s-introduction-to-programming-with-python
15) )Network Security Foundation: https://www.edx.org/course/network-security-foundations
16)Cybersecurity Fundamentals: https://www.edx.org/course/cybersecurity-fundamentals
17)Intro To Cyber Attacks: https://www.classcentral.com/course/intro-cyber-attacks-9667
1)Internet History, Technology, and Security: https://online.umich.edu/courses/internet-history-technology-and-security/
2)Network and Computer Security: https://ocw.mit.edu/courses/6-857-network-and-computer-security-spring-2014/pages/lecture-notes-and-readings/
3)Computer Networks: https://ocw.mit.edu/courses/6-829-computer-networks-fall-2002/
4)Cybersecurity Management: https://itmasters.edu.au/free-short-course-cybersecurity-management/
5)CISSP: https://itmasters.edu.au/free-short-course-cissp-updated/
6)Short Course for Penetration Testing: https://itmasters.edu.au/free-short-course-pen-testing/
7)Cloud Computing: https://www.coursera.org/specializations/cloud
8)Hardware Security: https://www.coursera.org/learn/hardware-security
9)CryptoGraphy: https://www.coursera.org/learn/crypto?action=enroll
10)Cybersecurity Risk Management: https://www.edx.org/course/cybersecurity-risk-management
11) Network Security: https://www.edx.org/course/network-security-2
12)Introduction to Computer Science: https://www.edx.org/course/introduction-computer-science-harvardx-cs50x
13)Introduction to Cybersecurity: https://www.edx.org/course/introduction-to-cybersecurity
14)Programming with Python: https://www.edx.org/course/cs50s-introduction-to-programming-with-python
15) )Network Security Foundation: https://www.edx.org/course/network-security-foundations
16)Cybersecurity Fundamentals: https://www.edx.org/course/cybersecurity-fundamentals
17)Intro To Cyber Attacks: https://www.classcentral.com/course/intro-cyber-attacks-9667
online.umich.edu
Internet History, Technology, and Security
The impact of technology and networks on our lives, culture, and society continues to increase. The very fact that you can take this course from anywhere in the world requires a technological infrastructure that was designed, engineered, and built over theβ¦
https://github.com/rockofox/firefox-minima
Make Firefox look minimal like qutebrowser
Make Firefox look minimal like qutebrowser
GitHub
GitHub - rockofox/firefox-minima: Minimalist Firefox Theme inspired by qutebrowser
Minimalist Firefox Theme inspired by qutebrowser. Contribute to rockofox/firefox-minima development by creating an account on GitHub.
Creating a Perfect GPG keypair (and reduce risk of losing your laptop or stolen private keys)
https://alexcabal.com/creating-the-perfect-gpg-keypair
#notes
https://alexcabal.com/creating-the-perfect-gpg-keypair
#notes
This link has all the answers you ever need.
http://www.textfiles.com/computers/taoprogram.pro
#neoreads
http://www.textfiles.com/computers/taoprogram.pro
#neoreads
Whos site is this? Wait its mine but not sure why it says I am a cool dev tho π€π
https://neovoid.is-cool.dev/
https://neovoid.is-cool.dev/