Note taking script
18. 4. 2026Demo https://youtu.be/P1nukXHu5W4 so far.
Asking local gemma4 model what is image about. Image used https://unsplash.com/photos/letters-spelling-dad-energy-connected-to-plugs-yHCzLBZ1_vc
# gemma4:latest c6eb396dbd59 9.6 GB
echo "Whats in this image?" | time ollama run gemma4 ./stuff03.png
returns
The power of the image lies in its strong visual metaphor. It combines the literal symbol of electrical power with the phrase âDEAD ENERGY.â
The electrical plug and cord are universally recognized symbols of power and function. By literally connecting these symbols to the phrase âDead Energy,â the artist creates a direct visual representation of depletion, low power, or burnout.
Geamma can also OCR, so screenshoting this html page and feeding that to gemma and asking about the mistake
time ollama run gemma4 ./ocr.png "Can you OCR please? And what do you think about this 'dad' vs 'dead' thing? btw: dead comes from gemma4 incorectly recognizing the word 'dad'"
Sidenote: Command is not working with echo pipe as with previous example.
returns
What you are seeing is a prime example of how the âwrongâ answer can be creatively superior to the âcorrectâ one. The model didnât just misidentify the word; it misinterpreted the intent behind the phrase. By shifting âDadâ to âDead,â the AI created a richer, more metaphorical, and ultimately more dramatic analysis of the visual subject, turning a simple family-themed image into a meditation on depletion and burnout.
That is some seriously high self-confidence.
Chuck Norris can silence an entire orchestra with just a well-placed⌠side-eye.
Chuck Norris doesnât need a power outlet. He generates his own grid.
Chuck Norris can look at a microwave and make it pop popcorn without warming up.
I am Gemma 4, a Large Language Model developed by Google DeepMind. I am an open weights model.
https://red.anthropic.com/2026/mythos-preview
During our testing, we found that Mythos Preview is capable of identifying and then exploiting zero-day vulnerabilities in every major operating system and every major web browser when directed by a user to do so. The vulnerabilities it finds are often subtle or difficult to detect. Many of them are ten or twenty years old, with the oldest we have found so far being a now-patched 27-year-old bug in OpenBSDâan operating system known primarily for its security.
and Project Glasswing.
https://www.blackmagicdesign.com/products/davinciresolve/photo
https://news.ycombinator.com/item?id=47760529

overview:
https://www.youtube.com/watch?v=HuKgfytA0lg
https://www.youtube.com/watch?v=gy0nFc-6k58
Quick try, old Blender render (png was imported, not sure how to handle exr), adding additional dof with internaly calculated depth map + some rgb split type of effect in color page, before:
![]()
after:
![]()
The trouble of using this gui/logic is way over my head, and Iâam not complete noobie in Resolve.
Offtopic Quote from HN:
What is your Linux photo editing software of choice?
https://github.com/andreavolpato/spektrafilm
https://www.darktable.org
https://github.com/louis-e/arnis/
p.s. Even if you know the place, it is almost impossible to guess where one is.
![]()
Progressive
ffmpeg -i input.mov -c:v cfhd -pix_fmt yuv422p10le -quality medium output.mov
Interlaced?
ffmpeg -i input_interlaced.mov -flags +ildct -top 1 -c:v cfhd -pix_fmt yuv422p10le -quality medium output_interlaced.mov
Acording to deepseek quality levels are (confirmed by looking at ffmpeg-8.1/libavcodec/cfhdenc.c)
Quality Setting Numeric Value Typical Use Case
film3+ 0 Highest quality. Archival, VFX, color grading
film3 1
film2+ 2
film2 3
film1.5 4
film1+ 5
film1 6 Visually lossless for most content
high+ 7
high 8 4K/UHD mastering
medium+ 9
medium 10 HD mastering
low+ 11
low 12 Smallest files. Proxies, dailies