logoalt Hacker News

d-lisplast Saturday at 9:06 PM0 repliesview on HN

Well, if you have a terminal emulator, a database, a voice recognition software, a LLM wrapped in such a way that it can interact with the other elements, you obtain a ressembling stack.