2) ingest as much VC money and stolen training data as we can
3) profit
This item has no comments currently.
It looks like you have JavaScript disabled. This web app requires that JavaScript is enabled.
Please enable JavaScript to use this site (or just go read Hacker News).
2) ingest as much VC money and stolen training data as we can
3) profit