ai writer
In 2020, OpenAI launched GPT-3, a language model that uses machine learning to ingest and produce human-like text.
Panic ensued as writers worried they’d be replaced by AI. But two years later, the impact of GPT-3 has felt underwhelming.
Last week, Lex, an AI-enabled word processor, took Twitter by storm, garnering rave reviews from users and 25k sign-ups within 24 hours of launching.
… by Nathan Baschez, writer and co-founder of Every, a collection of business-focused newsletters.
It looks and feels like a minimalistic version of Google Docs, but with a key difference — a native integration with GPT-3.
While much of the talk around GPT-3 has focused on AI writing entire pieces, Baschez is positioning Lex as a tool to help writers get unstuck so they can produce their best work.
First, Lex only works in English for now, though Baschez says he’s working on adding more languages.
Second, GPT-3 isn’t perfect, so sometimes the suggestions aren’t quite on target.
But overall, the app seems like a major step forward in using AI to assist with writing.
If you want to judge that for yourself, everything after “Of course” above was written by an AI using Lex.
To learn more, check out this three-minute demo, and join the waitlist here.
Mots-clés : cybersécurité, sécurité informatique, protection des données, menaces cybernétiques, veille cyber, analyse de vulnérabilités, sécurité des réseaux, cyberattaques, conformité RGPD, NIS2, DORA, PCIDSS, DEVSECOPS, eSANTE, intelligence artificielle, IA en cybersécurité, apprentissage automatique, deep learning, algorithmes de sécurité, détection des anomalies, systèmes intelligents, automatisation de la sécurité, IA pour la prévention des cyberattaques.
Bots et IA biaisées : une menace silencieuse pour la cybersécurité des entreprises Introduction Les…
Cloudflare en Panne : Causes Officielles, Impacts et Risques pour les Entreprises Le 5 décembre…
Introduction La cybersécurité est aujourd’hui une priorité mondiale. Récemment, la CISA (Cybersecurity and Infrastructure Security…
La transformation numérique face aux nouvelles menaces Le cloud computing s’impose aujourd’hui comme un…
Les attaques par déni de service distribué (DDoS) continuent d'évoluer en sophistication et en ampleur,…
Face à l'adoption croissante des technologies d'IA dans les PME, une nouvelle menace cybersécuritaire émerge…
This website uses cookies.