In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-15 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > IT Information >
Share
Shulou(Shulou.com)11/24 Report--
Thanks to CTOnews.com netizen Wqr_for the clue delivery! CTOnews.com August 17 news, ByteDance (ByteDance) LLM artificial intelligence robot "Bean bag" has begun a small-scale invitation test, users can log in through mobile phone number, chatter or Apple ID.
It is said that "Bean Bag" is an AI tool developed by ByteDance based on the lark model. It provides chat robots, writing assistants and English learning assistants. It can answer various questions and have conversations to help people get information. It supports web platforms, iOS and Android platforms, but iOS needs to be installed using TestFlight.
According to the official website user agreement,"Doubao" software and related services refer to Beijing Chuntian Zhiyun Technology Co., Ltd.(CTOnews.com Note: The company was established on July 26,2023 and is a 100%-owned subsidiary of Beijing Dianyin Information Service Co., Ltd.) and/or related parties provide products and services to you in the form of web pages, application programs (possibly including different versions), Mini programs, software development kits (SDKs) for third-party websites and applications, application programming interfaces (APIs) and innovative forms emerging with technological development. Including but not limited to platforms with "AI interactive dialogue" as its core function and other functions.
The core function of this software and related services is [AI conversation], which requires users to log in to their accounts before they can use it. The official also mentioned that the account number you registered is limited to your own use, and it is prohibited to donate, borrow, lease, transfer, sell or otherwise license others to use it in any form without the written consent of the company. If the Company discovers or has reasonable grounds to believe that the user is not the original registrant of the account, the Company has the right to immediately suspend or terminate the service provided to the registered account and permanently disable the account in order to protect the security of the account.
In addition, if you do not log in for the first time after registration or do not log in for more than six months, the company has the right to withdraw your account. If your account is withdrawn, you may not be able to log in and use the software and related services through your previous account, and any personalized settings and usage records saved under your account will not be restored. Before withdrawing your account, the company will give you a prompt in an appropriate way. If you do not log in and use your account within six months after receiving the relevant prompt, the company will withdraw your account. If your account is withdrawn, you can log in and use the relevant software and related services by registering a new account.
It should be mentioned here that the update date and effective date of the "bean bag" privacy policy are August 22,2023.
The official also stipulates that without the written permission of the company, no user or third party shall, by himself or by authorization, allow or assist any other person to carry out the following acts on the information content in this software and related services:
(1) Copy, read and use the information content of this software and related services for commercial purposes, including but not limited to publicity, increasing reading volume and page views;
(2) Unauthorized editing, sorting and arranging of the information content of this software and related services, and displaying it in channels other than the source page of this software and related services;
(3) Using any form of identification method, including but not limited to special identification, special code, etc., to generate adverse effects such as traffic, reading volume guidance, transfer, hijacking, etc. on the information content of this software and related services by itself or assisting a third party;
(4) Other acts of illegally obtaining or using the information content of this software and related services.
Without the written permission of the company, no user, third party shall in any way (including but not limited to chain theft, redundant theft, illegal capture, simulation download, deep link, fake registration, etc.) directly or indirectly steal the text, pictures, videos and other information content of this software and related services, or in any way (including, but not limited to, concealing or modifying domain names, platform-specific logos, user names, and patent, copyright, trademark or other proprietary notices, etc.) Delete, conceal or change the rights to manage electronic information related to information content, or delete, conceal or change any patent, copyright, trademark or other proprietary notices displayed on or contained in the Software and related services in any way.
With the written permission of the company, the sharing and forwarding of the information content of this software and related services by any user or third party shall also comply with the following specifications:
(1) The relevant data captured, counted and obtained shall not be publicized, provided or disclosed to any third party in any way without the prior written consent of the Company;
(2) Do not make any changes in any form to the source web pages of this software and related services, including but not limited to the links to the home pages (profile pages) of this software and related services, and do not block, insert, pop-up windows, etc. in any form to hinder the display of the source pages of this software and related services;
(3) Safe, effective and strict measures shall be taken to prevent the information content of this software and related services from being illegally obtained by third parties through any form including but not limited to "spider" programs;
(4) Not to use the relevant data content for purposes other than the scope of written permission of the company, for any form of sale and commercial use, or to disclose, provide or allow third parties to use it in any way;
(5) Any act of sharing, forwarding or copying the Software and related service information content to any third party shall comply with other norms and standards established by the Company for this purpose.
In addition, officials require users not to create, publish or disseminate false information using new applications based on new technologies such as deep learning. When you publish or disseminate information generated by new applications based on new technologies such as deep learning and virtual reality, you should identify or prompt it in a prominent way. You should not remove or misleadingly modify logos added to the Software based on new applications of new technologies such as deep learning and virtual reality.
In order to ensure the safe operation of software and services, the quality and efficiency of operation, the bean bag also collects the user's hardware model, operating system version number, and device identifier.(Android such as AndroidID, OAID, IMSI, SIM card information (such as ICCID), GAID, iOS such as IDFV; Different identifiers vary in validity, whether they can be reset by the user, and how they are obtained), network device hardware address (device MAC address), IP address, WLAN access point (e.g. SSID, BSSID), Bluetooth, base station, software version number, network access method, type, status, network quality data, operation, usage, service log, device sensor data.
In order to prevent malicious programs and ensure the quality and efficiency of operations, Doubao also collects information about running processes, overall operation of pages, usage and frequency, page crashes, overall usage, and performance data.
References:
Bean bag
Instructions for Use
Privacy Policy | Privacy Policy
User Service Agreement
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.