淘优惠

淘优惠

vscode中的chatgpt插件

热门文章 0

淘宝搜:【天降红包222】领超级红包,京东搜:【天降红包222】
淘宝互助,淘宝双11微信互助群关注公众号 【淘姐妹】


最近ChatGPT比较火,我就一直在想能不能把这个人工智能客服接入到我的Excel自动化框架Workflow里。

终于经过一天的努力,Workflow已经成功实现在Excel里用ChatGPT了。不需要复杂的注册,一键即可进行对话。

下面是我使用的截图

有人可能会问,接入了这个有什么用。我个人觉得主要有以下三个用途:

1.方便!可以随时询问Excel相关的问题,比如你突然忘记了SMALL这个函数的用法,那你就可以问一下,而且最最关键的是无需科学

2.准确!它的回复比百度更加精准,当你问Excel函数的用法时,它就会把定义,参数,用法都显示一遍,比直接用百度准确很多

3.摸鱼!它可以回答几乎任何问题,上班累了,可以用它摸鱼。聊天或者让它帮你干活,想做到这一点的话,可能需要提高自己提问题的水平,它的回答的准确度与你问题的准确度是正相关的

所以在Workflow里接入ChatGPT其实算是一次较大的更新,它拓展了很大的领域。

对于我来说,Workflow不仅仅是一个Excel自动化的工具,它更是一个可以实现任意API的入口,我可以用它来做任何API可以做到的事情。

比如最近我接入了每日一图这个API(操作),每天工作打开Workflow就可以先运行一下,随机抽取一张图,也是一个有趣的事情。

后期的话,我还会接入各种有意思的API,所以大家请期待后续Workflow的成长吧!

下面是我B站的视频

在Excel里使用ChatGPT 一键接入人工智能


chatgpt是ai里程碑吗


这几天试用了一下ChatGPT,跟大家分享一下:1. 这个模型的多轮对话能力、常识推理的水准、交互与持续学习等方面,和之前的模型相比,可以称得上一个突破性的提高。

2. 之前GPT-3处理不好的那些常识对话,比如“how many legs does the Sun have?”之类的,已经完全难不倒chatGPT,它甚至跟我解释了为什么这些问题是无意义的,以及为什么它在这些问题上比GPT-3做得好:它声称自己的设计框架中有专门处理这类问题的技术。

3. 我用大学课程离散数学的期末考试题进行测试,命题逻辑的形式化有时会做错,但在后续对话的提示下,它给出了正确答案。推理部分,chatGPT在形式化错误的前提下也给出了一个正确的推理,所以这一部分可能可以表明它的推理不是某个基于符号化方法的模块。求命题公式的主析取范式一开始也做错了,但提示了一下就给出了正确答案。

4. 我请我太太给chatGPT出了一个AWS网络专家测试中的一个题目,模型没能给出正确答案,可能这问题的专业性太强了。

5. open domain的free chat表现也不错。和它探讨关于自身的相关topic,回答相当地严谨流畅,也明显可以串联起上下文的逻辑,它声称自己并不能真正理解我们对话的内容,但可以根据模型概率性的计算结果生成这些看似合理的回答。有意思的是遇到几次异常停机的情况,大多是讨论深入后发生,比如在很多轮关于intelligence的讨论后追问“AI model如果行为表现上完全与人类一致,那它是否算一个intelligent being”,chatGPT长时间没有回复,后来就报错终止了对话。不清楚是推理down了还是网络问题。

这个模型现有的能力提供了更强的基础设施,可以让我们在今后的research中做一些更强的假设。


Q:?For individuals, what should be paid attention to to protect their own information security

qform,QfoRikJ,QfoRikJ-117

最近openai推出的连天机器人chatgpt火遍全网,据说是目前最聪明的聊天机器人,它到底有多强呢?百闻不如一试

什么是网络安全

A:?

Network security is the practice of protecting the integrity, confidentiality, and availability of a computer network and its associated data. It involves the use of technologies, processes, and policies to prevent unauthorized access, use, disclosure, disruption, modification, or destruction of the network and its data. Network security is an essential aspect of any organization's overall security posture, as it helps to protect sensitive information, prevent data breaches, and ensure the availability of critical network resources.

网络安全是保护计算机网络及其相关数据的完整性、机密性和可用性的实践。它涉及使用技术、流程和策略来防止未经授权的访问、使用、披露、中断、修改或破坏网络及其数据。网络安全是任何组织整体安全态势的重要方面,因为它有助于保护敏感信息、防止数据泄露并确保关键网络资源的可用性。

对于个人来说,保护自己的信息安全应该注意什么

A:?

  1. Use strong, unique passwords for all your online accounts. Avoid using the same password for multiple accounts, and make sure your passwords are difficult to guess.

  2. Keep your software and devices up to date. Installing the latest security updates and patches can help protect against known vulnerabilities and malware.

  3. Be careful about what personal information you share online. Avoid sharing sensitive information, such as your social security number or financial information, on social media or other public websites.

  4. Use secure, encrypted connections when accessing sensitive information online. This can help protect your data from being intercepted by hackers.

  5. Be cautious when clicking on links or downloading files from unknown sources. These can often contain malware or other malicious software that can compromise your security.

  6. Use a firewall to protect your home network. A firewall can help to block unauthorized access to your network and prevent malicious traffic from reaching your devices.

  7. Use security software, such as antivirus and anti-malware programs, to protect your devices from malware and other threats.

Overall, the key to protecting your own information security is to be vigilant and proactive. Stay aware of the latest security threats, and take steps to protect yourself and your

  1. 为您的所有在线帐户使用强而独特的密码。避免为多个帐户使用相同的密码,并确保您的密码难以被猜到。

  2. 使您的软件和设备保持最新状态。安装最新的安全更新和补丁有助于防范已知漏洞和恶意软件。

  3. 请注意您在网上分享的个人信息。避免在社交媒体或其他公共网站上分享敏感信息,例如您的社会安全号码或财务信息。

  4. 在线访问敏感信息时使用安全、加密的连接。这有助于保护您的数据不被黑客拦截。

  5. 单击链接或从未知来源下载文件时要小心。这些通常可能包含恶意软件或其他可能危及您安全的恶意软件。

  6. 使用防火墙保护您的家庭网络。防火墙有助于阻止未经授权访问您的网络,并防止恶意流量到达您的设备。

  7. 使用安全软件(例如防病毒和反恶意软件程序)来保护您的设备免受恶意软件和其他威胁。

总的来说,保护自身信息安全的关键是保持警惕和积极主动。随时了解最新的安全威胁,并采取措施保护您自己和您的。

使用golang写一个安全登录代码

A:?

Here is an example of how you might use Go (also known as Golang) to write a secure authentication code:

以下是您如何使用 Go(也称为 Golang)编写安全身份验证代码的示例:

This code uses the ` package to hash the user's password using the SHA-256 algorithm. It then compares the hashed password with the stored password hash to authenticate the user. It's important to use a unique and secure password salt to add an extra layer of security to the password hashing process.

此代码使用包通过 SHA-256 算法对用户密码进行哈希处理。然后它将散列密码与存储的密码散列进行比较以验证用户。使用独特且安全的密码盐来为密码哈希过程添加额外的安全层非常重要。

如何使用css的sticky

A:?

The sticky attribute in CSS is used to position an element relative to its parent element, but when the user scrolls the page, the element becomes fixed in the viewport. This allows the element to "stick" to the page as the user scrolls, giving the effect of an element that remains visible even when the user has scrolled past it.

To use the sticky attribute in CSS, you first need to set the position of the element to , like this:

CSS 中的 sticky 属性用于相对于其父元素定位元素,但当用户滚动页面时,该元素会固定在视口中。这允许该元素在用户滚动时“粘附”到页面上,从而提供即使用户滚动过它也仍然可见的元素效果。

要在 CSS 中使用 sticky 属性,首先需要将元素的位置设置为,如下所示:

Then, you can specify the top, right, bottom, or left edge of the element that you want to stick to, like this:

然后,您可以指定要粘附的元素的顶部、右侧、底部或左侧边缘,如下所示:

In this example, the ` will be positioned relative to its parent element until the user scrolls the page, at which point it will stick to the top edge of the viewport.

You can also specify a z-index for the element to control its stacking order relative to other elements on the page, like this:

在此示例中,将相对于其父元素定位,直到用户滚动页面,此时它将粘在视口的上边缘。

您还可以为元素指定一个 z-index 以控制其相对于页面上其他元素的堆叠顺序,如下所示:

The sticky attribute is supported in most modern browsers, but it is not supported in Internet Explorer. If you want to use sticky positioning in Internet Explorer, you will need to use a polyfill or fallback to another positioning method.

大多数现代浏览器都支持 sticky 属性,但 Internet Explorer 不支持它。如果您想在 Internet Explorer 中使用粘性定位,则需要使用 polyfill 或回退到另一种定位方法。

从cpu性能来说apple silicon和intel哪个好

A:

It is difficult to make a blanket statement about which is better in terms of CPU performance, as it can depend on a variety of factors, such as the specific model of Apple Silicon or Intel Core CPU, the type and amount of workload being run, and the overall design and architecture of the device.

Generally speaking, Apple Silicon CPUs are based on ARM architecture, while Intel Core CPUs are based on x86 architecture. ARM CPUs are known for their low power consumption and energy efficiency, while x86 CPUs are known for their higher performance and compatibility with a wider range of software.

In recent years, Apple has been making significant investments in the performance and capabilities of its Apple Silicon CPUs, and many users have reported good performance from these chips. However, Intel Core CPUs are still generally considered to be the performance leader in the PC market, and they are often used in high-end laptops and desktop computers where maximum performance is a priority.

Ultimately, it is difficult to say which is better without considering the specific context and needs of the user. It is worth doing some research and comparing the available options to determine which is the best fit for your specific needs and workloads.

就 CPU 性能而言,很难一概而论,因为它取决于多种因素,例如 Apple Silicon 或 Intel Core CPU 的具体型号、正在运行的工作负载的类型和数量,以及设备的整体设计和架构。

一般来说,Apple Silicon CPU是基于ARM架构的,而Intel Core CPU是基于x86架构的。ARM CPU 以其低功耗和能效着称,而 x86 CPU 以其更高的性能和与更广泛的软件的兼容性而闻名。

近年来,Apple 一直在对其 Apple Silicon CPU 的性能和功能进行大量投资,许多用户表示这些芯片性能良好。然而,英特尔酷睿 CPU 仍被普遍认为是 PC 市场的性能领导者,它们通常用于优先考虑最大性能的高端笔记本电脑和台式电脑。

最终,如果不考虑用户的具体情况和需求,就很难说哪个更好。值得做一些研究并比较可用的选项,以确定哪个最适合您的特定需求和工作负载。