voidx

joined 1 year ago
MODERATOR OF
[–] voidx@futurology.today 1 points 1 year ago

Apart from Dokku, there's coolify and caprover.

[–] voidx@futurology.today 1 points 1 year ago

This seems to be the conversation logs being used for training Bard, without the bits pulled from Gmail etc. (if we're to believe the bard workspace TOS). I believe OpenAI does it too, for improving chatgpt, unless you've an enterprise subscription.

[–] voidx@futurology.today 1 points 1 year ago (2 children)

I probably won't be using this too, as terms can change anytime. But I can't seem to find the part where it says it'll using it for training data. I read the verge article, bard blog as well as TOS that is presented when you want to opt-in to this, but didn't see find it.

Here's the excerpt from the TOS:

How data is used

Bard processes your personal data that it gets from Google Workspace, such as your name and email address, and your private content, like emails or docs you created or received, and uses it to:

  • Provide Bard features to you. For example:
    • Summarize your emails when you ask
    • Share content at your request
  • Maintain Bard services. For example:
    • Recover from service crashes
    • Measure overall user experience

Your personal content that Bard gets from Google Workspace is:

  • Not allowed to be accessed or reviewed by human reviewers
  • Not used to improve generative machine learning technologies that power Bard
  • Not used to show you ads
  • Not stored past the time period needed to provide and maintain Bard services
[–] voidx@futurology.today 2 points 1 year ago (1 children)

Happens to the best of us! localhost or 127.0.0.1 should work too.

[–] voidx@futurology.today 1 points 1 year ago (4 children)

Did you get it to work?

[–] voidx@futurology.today 1 points 1 year ago* (last edited 1 year ago) (7 children)

Cloudflare tunnel only requires outbound port opened, check if you've allowed all outbound ports in EC2 security group (the default VPC should have this already).

Otherwise it's probably a misconfiguration reaching the IP/port of the cloudflared service on the EC2. Have you tried checking cloudflared logs? Does your tunnel status show up as healthy?

[–] voidx@futurology.today 4 points 1 year ago* (last edited 1 year ago)

Yeah. I guess we could fetch all image ids from the database excluding those uploaded to our local instance, and loop them through the DELETE /image/delete/{delete_token}/{file} API. But I've no idea how to get the delete_token, seems like it's available only during image upload.

[–] voidx@futurology.today 4 points 1 year ago (1 children)

I was talking about the storage space on server, not on the user side! Sorry if I wasn't clear.

[–] voidx@futurology.today 1 points 1 year ago (3 children)

Doesn't look like there's a way to clean it manually right now, so buckle up!

 

As it is currently, the storage space on server can quickly fill up if cached images are not cleaned regularly.
I've tried to find if lemmy runs any kind of schedule for this, but doesn't seem like it from the code:
https://github.com/LemmyNet/lemmy/blob/main/src/scheduled_tasks.rs

 

We've noticed an increased amount of storage being used for images, and many of them appear to be full-sized images. Is this documented anywhere?

[–] voidx@futurology.today 2 points 1 year ago* (last edited 1 year ago)

There is an API DELETE /internal/variants in pictrs to clear out variants of generated images. However it only cleared out a few megabytes in our case.