wp-plugin-hostgator
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home4/scienrds/scienceandnerds/wp-includes/functions.php on line 6114ol-scrapes
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home4/scienrds/scienceandnerds/wp-includes/functions.php on line 6114Source:https:\/\/techcrunch.com\/2023\/03\/31\/twitter-reveals-some-of-its-source-code-including-its-recommendation-algorithm\/<\/a><\/br> As repeatedly promised<\/a> by Twitter CEO Elon Musk, Twitter has opened<\/a> a portion of its source code to public inspection, including the algorithm it uses to recommend tweets in users\u2019 timelines.<\/p>\n On GitHub, Twitter published two<\/a> repositories<\/a> containing code for many parts that make the social network tick, including the mechanism Twitter uses to control the tweets users see on the For You timeline. In a blog post, Twitter characterized the move as a \u201cfirst step to be[ing] more transparent\u201d while at the same time \u201c[preventing] risk\u201d to Twitter itself and people on the platform.<\/p>\n On a Twitter Spaces session today, Musk clarified:<\/p>\n \u201cOur initial release of the so-called algorithm is going to be quite embarrassing, and people are going to find a lot of mistakes, but we\u2019re going to fix them very quickly,\u201d Musk said. \u201cEven if you don\u2019t agree with something, at least you\u2019ll know why it\u2019s there, and that you\u2019re not being secretly manipulated \u2026 The analog, here, that we\u2019re aspiring to is the great example of Linux as an open source operating system \u2026 One can, in theory, discover many exploits for Linux. In reality, what happens is the community identifies and fixes those exploits.\u201d<\/span><\/p>\n On that second point in the blog post about preventing risk, the open source releases don\u2019t include the code that powers Twitter\u2019s ad recommendations or the data used to train Twitter\u2019s recommendation algorithm. Moreover, they include few instructions on how to inspect or actually use the code \u2014 reinforcing the idea that the releases are strictly developer-focused.<\/p>\n \u201c[We excluded] any code that would compromise user safety and privacy or the ability to protect our platform from bad actors, including undermining our efforts at combating child sexual exploitation and manipulation,\u201d Twitter wrote. It\u2019s a bit of mixed messaging coming only weeks after<\/a> Twitter fired much<\/a> of its ethical AI and trust and safety staff, which was responsible for content moderation among other user security-related tasks. But the company nonetheless insists that it \u201c[took] steps to ensure that user safety and privacy would be protected\u201d with today\u2019s code release.<\/p>\n
\nTwitter reveals some of its source code, including its recommendation algorithm<\/br>
\n2023-03-31 21:44:51<\/br><\/p>\n