Tag: Application

  • Simon Willison’s Weblog: Google Gemini URL Context

    Source URL: https://simonwillison.net/2025/Aug/18/google-gemini-url-context/ Source: Simon Willison’s Weblog Title: Google Gemini URL Context Feedly Summary: Google Gemini URL Context New feature in the Gemini API: you can now enable a url_context tool which the models can use to request the contents of URLs as part of replying to a prompt. I released llm-gemini 0.25 with a…

  • Shabie’s blog: Agents are search over action space

    Source URL: https://shabie.github.io/2025/08/18/agents-are-search-over-action-space.html Source: Shabie’s blog Title: Agents are search over action space Feedly Summary: It’s no secret that today’s LLM-based agents are unreliable. This makes them a gamble for most critical tasks, so where can they be safely applied? The answer lies in finding asymmetry: we should use them in domains where the downside…

  • The Register: Microsoft crams Copilot AI directly into Excel cells

    Source URL: https://www.theregister.com/2025/08/18/microsoft_adds_copilot_ai_formulas/ Source: The Register Title: Microsoft crams Copilot AI directly into Excel cells Feedly Summary: Meet the new COPILOT function Microsoft, in its ongoing effort to AI-ify every product it has, is now adding it right into the cells of Excel.  Available on Monday to beta users of Microsoft 365 Copilot, a new…

  • Cloud Blog: Google is a Leader and positioned furthest in vision in the 2025 Gartner® Magic Quadrant™ for Conversational AI Platforms

    Source URL: https://cloud.google.com/blog/products/ai-machine-learning/gartner-magic-quadrant-for-conversational-ai-platforms/ Source: Cloud Blog Title: Google is a Leader and positioned furthest in vision in the 2025 Gartner® Magic Quadrant™ for Conversational AI Platforms Feedly Summary: Google has been named a Leader in the 2025 Gartner® Magic Quadrant™ for Conversational AI Platforms (CAIP) report, and positioned furthest in vision among all vendors evaluated.…

  • Slashdot: Security Flaws In Carmaker’s Web Portal Let a Hacker Remotely Unlock Cars

    Source URL: https://it.slashdot.org/story/25/08/17/0221251/security-flaws-in-carmakers-web-portal-let-a-hacker-remotely-unlock-cars?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Security Flaws In Carmaker’s Web Portal Let a Hacker Remotely Unlock Cars Feedly Summary: AI Summary and Description: Yes Summary: A security researcher discovered vulnerabilities in a car dealership portal that could expose personal information and allow remote access to cars. The issues highlight the critical importance of secure…

  • Embrace The Red: Data Exfiltration via Image Rendering Fixed in Amp Code

    Source URL: https://embracethered.com/blog/posts/2025/amp-code-fixed-data-exfiltration-via-images/ Source: Embrace The Red Title: Data Exfiltration via Image Rendering Fixed in Amp Code Feedly Summary: In this post we discuss a vulnerability that was present in Amp Code from Sourcegraph by which an attacker could exploit markdown driven image rendering to exfiltrate sensitive information. This vulnerability is common in AI applications…

  • Simon Willison’s Weblog: TIL: Running a gpt-oss eval suite against LM Studio on a Mac

    Source URL: https://simonwillison.net/2025/Aug/17/gpt-oss-eval-suite/#atom-everything Source: Simon Willison’s Weblog Title: TIL: Running a gpt-oss eval suite against LM Studio on a Mac Feedly Summary: TIL: Running a gpt-oss eval suite against LM Studio on a Mac The other day I learned that OpenAI published a set of evals as part of their gpt-oss model release, described in…

  • Embrace The Red: Amp Code: Invisible Prompt Injection Fixed by Sourcegraph

    Source URL: https://embracethered.com/blog/posts/2025/amp-code-fixed-invisible-prompt-injection/ Source: Embrace The Red Title: Amp Code: Invisible Prompt Injection Fixed by Sourcegraph Feedly Summary: In this post we will look at Amp, a coding agent from Sourcegraph. The other day we discussed how invisible instructions impact Google Jules. Turns out that many client applications are vulnerable to these kinds of attacks…