Tag: handling

  • Simon Willison’s Weblog: Quoting James Luan

    Source URL: https://simonwillison.net/2025/Sep/8/james-luan/ Source: Simon Willison’s Weblog Title: Quoting James Luan Feedly Summary: I recently spoke with the CTO of a popular AI note-taking app who told me something surprising: they spend twice as much on vector search as they do on OpenAI API calls. Think about that for a second. Running the retrieval layer…

  • Slashdot: Mathematicians Find GPT-5 Makes Critical Errors in Original Proof Generation

    Source URL: https://science.slashdot.org/story/25/09/08/165206/mathematicians-find-gpt-5-makes-critical-errors-in-original-proof-generation?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Mathematicians Find GPT-5 Makes Critical Errors in Original Proof Generation Feedly Summary: AI Summary and Description: Yes Summary: The text discusses a study by University of Luxembourg mathematicians that evaluated the capabilities of GPT-5 in extending a qualitative mathematical theorem. The findings revealed significant shortcomings of the AI, particularly…

  • The Register: Perplexity wants to get discounted AI products into the US government too

    Source URL: https://www.theregister.com/2025/09/08/perplexity_us_govt_ai_discount/ Source: The Register Title: Perplexity wants to get discounted AI products into the US government too Feedly Summary: $0.25-per-agency deal not finalized, and no FedRAMP approval either – so don’t get excited Perplexity has entered the race to inject AI into the federal government with a new public sector version of its…

  • Simon Willison’s Weblog: Is the LLM response wrong, or have you just failed to iterate it?

    Source URL: https://simonwillison.net/2025/Sep/7/is-the-llm-response-wrong-or-have-you-just-failed-to-iterate-it/#atom-everything Source: Simon Willison’s Weblog Title: Is the LLM response wrong, or have you just failed to iterate it? Feedly Summary: Is the LLM response wrong, or have you just failed to iterate it? More from Mike Caulfield (see also the SIFT method). He starts with a fantastic example of Google’s AI mode…

  • Simon Willison’s Weblog: Kimi-K2-Instruct-0905

    Source URL: https://simonwillison.net/2025/Sep/6/kimi-k2-instruct-0905/#atom-everything Source: Simon Willison’s Weblog Title: Kimi-K2-Instruct-0905 Feedly Summary: Kimi-K2-Instruct-0905 New not-quite-MIT licensed model from Chinese Moonshot AI, a follow-up to the highly regarded Kimi-K2 model they released in July. This one is an incremental improvement – I’ve seen it referred to online as “Kimi K-2.1". It scores a little higher on a…

  • The Register: Knock-on effects of software dev break-in hit schools trust

    Source URL: https://www.theregister.com/2025/09/05/uk_schools_intradev_breach/ Source: The Register Title: Knock-on effects of software dev break-in hit schools trust Feedly Summary: Affinity Learning Partnership warns staff after Intradev breach A major UK education trust has warned staff that their personal information may have been compromised following a cyberattack on software developer Intradev in August.… AI Summary and Description:…

  • The Register: Boffins detail new method to make neural nets forget private and copyrighted info

    Source URL: https://www.theregister.com/2025/09/04/boffins_detail_ai_mind_wipe/ Source: The Register Title: Boffins detail new method to make neural nets forget private and copyrighted info Feedly Summary: Because nobody’s going to spend billions to retrain a model built on dubiously legal content Researchers have found promising new ways to have AI models ignore copyrighted content, suggesting it may be possible…

  • The Register: Attackers snooping around Sitecore, dropping malware via public sample keys

    Source URL: https://www.theregister.com/2025/09/04/unknown_miscreants_snooping_around_sitecore/ Source: The Register Title: Attackers snooping around Sitecore, dropping malware via public sample keys Feedly Summary: You cut and pasted the machine key from the official documentation? Ouch Unknown miscreants are exploiting a configuration vulnerability in multiple Sitecore products to achieve remote code execution via a publicly exposed key and deploy snooping…