


As soon as GPT-4 was released, there was access to the mobile APP. You can upload photos and videos for one-click interpretation. It also served as a Q&A bot for the American version of Zhihu.
This new feature based on GPT-4 is called Virtual Volunteer and comes from the application Be My Eyes.
GPT-4 has just been released, and there is already a mobile application to access it!
Just upload the image and make a request using voice, GPT-4 can help the visually impaired "see clearly" the world in front of them.
Real-time interpretation anytime, anywhere, as natural as chatting.
For example, if you want to change your clothes, but don’t know the color of the clothes in your hand:
Just take a photo and upload it to GPT-4, it will be fast You can describe the texture of the clothes, and the material, color and shape are clear:
Virtual Volunteer, from the application Be My Eyes .
Currently, Virtual Volunteer connected to GPT-4 can help users complete functions including asking for directions, navigating, reading menus, and searching. For example,ask for directions.
Translation.
Public place navigation.
You want to go to the gym, but you can't know the location of the free equipment. Just take a photo of the scene and GPT-4 can guide you to the unoccupied equipment.If you become a volunteer, you only need to stay online to ensure that calls from visually impaired people can be answered at any time.
If it is used by the visually impaired, you can call the volunteer phone number when you need help, or seek help from some professionals:
Join now After Virtual Volunteer, blind people can also call the "virtual volunteer" GPT-4 for help, without having to worry about no one answering late at night.
The official also played a homophonic meme, AI→Eyes, "Let AI be your eyes":
It also serves as the American version of Zhihu Q&A bot
Of course, in addition to the Be My Eyes app, many other apps are also vying to access GPT-4.
For example, on Poe published by the US version of Zhihu Quora, you can now chat with GPT-4 (limited to one sentence):
Like the AI lawyer software DoNotPay, it has also been connected to GPT-4 and plans to use it to launch a “one-click litigation” service.
#Based on this service, you can report complaints about phone scams that you don’t like with just one click.
If you receive a fraudulent phone call, you only need to click a button, and the corresponding phone call will be recorded in its entirety, and a 1,000-word lawsuit will be generated, claiming a claim for US$1,500. (However, it is currently only applicable in the United States)
It is worth mentioning that DoNotPay CEO Joshua Browder said that they had used GPT-3.5 to do similar functions before, but the effect was not very good, and GPT-4 It has been able to hold this requirement very well.
Some netizens have even tried to use GPT-4 for drug discovery...
In addition to the above applications and In addition to its functions, some netizens have noticed the prospect of GPT-4 developing small games.
The new GPT-4 seems to have improved the reliability of programming, whether it is making a table tennis game in 60 seconds:
Still make a complete greedy snake within 20 minutes:
can be said to be very easy to do, and can be completed in time when making changes. The simple program written is basically There are no bugs that need to be fixed.
The above is the detailed content of As soon as GPT-4 was released, there was access to the mobile APP. You can upload photos and videos for one-click interpretation. It also served as a Q&A bot for the American version of Zhihu.. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics



In Debian systems, the readdir function is used to read directory contents, but the order in which it returns is not predefined. To sort files in a directory, you need to read all files first, and then sort them using the qsort function. The following code demonstrates how to sort directory files using readdir and qsort in Debian system: #include#include#include#include#include//Custom comparison function, used for qsortintcompare(constvoid*a,constvoid*b){returnstrcmp(*(

In Debian systems, readdir system calls are used to read directory contents. If its performance is not good, try the following optimization strategy: Simplify the number of directory files: Split large directories into multiple small directories as much as possible, reducing the number of items processed per readdir call. Enable directory content caching: build a cache mechanism, update the cache regularly or when directory content changes, and reduce frequent calls to readdir. Memory caches (such as Memcached or Redis) or local caches (such as files or databases) can be considered. Adopt efficient data structure: If you implement directory traversal by yourself, select more efficient data structures (such as hash tables instead of linear search) to store and access directory information

The readdir function in the Debian system is a system call used to read directory contents and is often used in C programming. This article will explain how to integrate readdir with other tools to enhance its functionality. Method 1: Combining C language program and pipeline First, write a C program to call the readdir function and output the result: #include#include#include#includeintmain(intargc,char*argv[]){DIR*dir;structdirent*entry;if(argc!=2){

Configuring a Debian mail server's firewall is an important step in ensuring server security. The following are several commonly used firewall configuration methods, including the use of iptables and firewalld. Use iptables to configure firewall to install iptables (if not already installed): sudoapt-getupdatesudoapt-getinstalliptablesView current iptables rules: sudoiptables-L configuration

This article describes how to configure firewall rules using iptables or ufw in Debian systems and use Syslog to record firewall activities. Method 1: Use iptablesiptables is a powerful command line firewall tool in Debian system. View existing rules: Use the following command to view the current iptables rules: sudoiptables-L-n-v allows specific IP access: For example, allow IP address 192.168.1.100 to access port 80: sudoiptables-AINPUT-ptcp--dport80-s192.16

This article describes how to adjust the logging level of the ApacheWeb server in the Debian system. By modifying the configuration file, you can control the verbose level of log information recorded by Apache. Method 1: Modify the main configuration file to locate the configuration file: The configuration file of Apache2.x is usually located in the /etc/apache2/ directory. The file name may be apache2.conf or httpd.conf, depending on your installation method. Edit configuration file: Open configuration file with root permissions using a text editor (such as nano): sudonano/etc/apache2/apache2.conf

This guide will guide you to learn how to use Syslog in Debian systems. Syslog is a key service in Linux systems for logging system and application log messages. It helps administrators monitor and analyze system activity to quickly identify and resolve problems. 1. Basic knowledge of Syslog The core functions of Syslog include: centrally collecting and managing log messages; supporting multiple log output formats and target locations (such as files or networks); providing real-time log viewing and filtering functions. 2. Install and configure Syslog (using Rsyslog) The Debian system uses Rsyslog by default. You can install it with the following command: sudoaptupdatesud

In Debian systems, OpenSSL is an important library for encryption, decryption and certificate management. To prevent a man-in-the-middle attack (MITM), the following measures can be taken: Use HTTPS: Ensure that all network requests use the HTTPS protocol instead of HTTP. HTTPS uses TLS (Transport Layer Security Protocol) to encrypt communication data to ensure that the data is not stolen or tampered during transmission. Verify server certificate: Manually verify the server certificate on the client to ensure it is trustworthy. The server can be manually verified through the delegate method of URLSession
