Tag: library

  • Schneier on Security: Ultralytics Supply-Chain Attack

    Source URL: https://www.schneier.com/blog/archives/2024/12/ultralytics-supply-chain-attack.html Source: Schneier on Security Title: Ultralytics Supply-Chain Attack Feedly Summary: Last week, we saw a supply-chain attack against the Ultralytics AI library on GitHub. A quick summary: On December 4, a malicious version 8.3.41 of the popular AI library ultralytics ­—which has almost 60 million downloads—was published to the Python Package Index…

  • Cloud Blog: XRefer: The Gemini-Assisted Binary Navigator

    Source URL: https://cloud.google.com/blog/topics/threat-intelligence/xrefer-gemini-assisted-binary-navigator/ Source: Cloud Blog Title: XRefer: The Gemini-Assisted Binary Navigator Feedly Summary: Written by: Muhammad Umair Here at Mandiant FLARE, malware reverse engineering is a regular part of our day jobs. At times we are required to perform basic triages on binaries, where every hour saved is critical to incident response timelines. At…

  • Simon Willison’s Weblog: googleapis/python-genai

    Source URL: https://simonwillison.net/2024/Dec/12/python-genai/#atom-everything Source: Simon Willison’s Weblog Title: googleapis/python-genai Feedly Summary: googleapis/python-genai Google released this brand new Python library for accessing their generative AI models yesterday, offering an alternative to their existing generative-ai-python library. The API design looks very solid to me, and it includes both sync and async implementations. Here’s an async streaming response:…

  • Hacker News: A ChatGPT clone, in 3000 bytes of C, backed by GPT-2

    Source URL: https://nicholas.carlini.com/writing/2023/chat-gpt-2-in-c.html Source: Hacker News Title: A ChatGPT clone, in 3000 bytes of C, backed by GPT-2 Feedly Summary: Comments AI Summary and Description: Yes Summary: The provided text discusses a minimal implementation of the GPT-2 model in C, detailing the underlying architecture, supporting libraries, and operational principles of a transformer-based neural network. It…

  • Cloud Blog: Toyota shifts into overdrive: Developing an AI platform for enhanced manufacturing efficiency

    Source URL: https://cloud.google.com/blog/topics/hybrid-cloud/toyota-ai-platform-manufacturing-efficiency/ Source: Cloud Blog Title: Toyota shifts into overdrive: Developing an AI platform for enhanced manufacturing efficiency Feedly Summary: The automotive industry is facing a profound transformation, driven by the rise of CASE, — connected cars, autonomous and automated driving, shared mobility, and electrification. Simultaneously,  manufacturers face the imperative to further increase efficiency,…

  • Cloud Blog: How Fullstory uncovers user insights with Vertex AI serving Gemini 1.5 Pro

    Source URL: https://cloud.google.com/blog/topics/partners/how-fullstory-uses-vertex-ai-and-gemini-to-boost-conversion-rates/ Source: Cloud Blog Title: How Fullstory uncovers user insights with Vertex AI serving Gemini 1.5 Pro Feedly Summary: Mapping the user experience is one of the most persistent challenges a business can face. Fullstory, a leading behavioral data analytics platform, helps organizations identify pain points and optimize digital experiences by reproducing  user…

  • Simon Willison’s Weblog: I can now run a GPT-4 class model on my laptop

    Source URL: https://simonwillison.net/2024/Dec/9/llama-33-70b/ Source: Simon Willison’s Weblog Title: I can now run a GPT-4 class model on my laptop Feedly Summary: Meta’s new Llama 3.3 70B is a genuinely GPT-4 class Large Language Model that runs on my laptop. Just 20 months ago I was amazed to see something that felt GPT-3 class run on…

  • Hacker News: Ultralytics AI model hijacked to infect thousands with cryptominer

    Source URL: https://www.bleepingcomputer.com/news/security/ultralytics-ai-model-hijacked-to-infect-thousands-with-cryptominer/ Source: Hacker News Title: Ultralytics AI model hijacked to infect thousands with cryptominer Feedly Summary: Comments AI Summary and Description: Yes Summary: The Ultralytics YOLO11 AI model was compromised due to a supply chain attack that led to the deployment of cryptominers when users installed certain versions from PyPI. This incident highlights…

  • Hacker News: Structured Outputs with Ollama

    Source URL: https://ollama.com/blog/structured-outputs Source: Hacker News Title: Structured Outputs with Ollama Feedly Summary: Comments AI Summary and Description: Yes **Summary:** The text elaborates on enhancements to the Ollama libraries that support structured outputs, allowing users to constrain model responses to predefined JSON formats. This innovation can improve the reliability and consistency of data extraction in…