Tag: Py
-
Simon Willison’s Weblog: My 2.5 year old laptop can write Space Invaders in JavaScript now
Source URL: https://simonwillison.net/2025/Jul/29/space-invaders/ Source: Simon Willison’s Weblog Title: My 2.5 year old laptop can write Space Invaders in JavaScript now Feedly Summary: I wrote about the new GLM-4.5 model family yesterday – new open weight (MIT licensed) models from Z.ai in China which their benchmarks claim score highly in coding even against models such as…
-
Cloud Blog: BigQuery meets ADK & MCP: Accelerate agent development with BigQuery’s new first-party toolset
Source URL: https://cloud.google.com/blog/products/ai-machine-learning/bigquery-meets-google-adk-and-mcp/ Source: Cloud Blog Title: BigQuery meets ADK & MCP: Accelerate agent development with BigQuery’s new first-party toolset Feedly Summary: As the excitement around AI agents reaches enterprise customers, a critical question emerges: How can we empower these agents to securely and intelligently interact with enterprise data systems like Google Cloud BigQuery? Currently,…
-
Simon Willison’s Weblog: Qwen3-235B-A22B-Thinking-2507
Source URL: https://simonwillison.net/2025/Jul/25/qwen3-235b-a22b-thinking-2507/#atom-everything Source: Simon Willison’s Weblog Title: Qwen3-235B-A22B-Thinking-2507 Feedly Summary: Qwen3-235B-A22B-Thinking-2507 The third Qwen model release week, following Qwen3-235B-A22B-Instruct-2507 on Monday 21st and Qwen3-Coder-480B-A35B-Instruct on Tuesday 22nd. Those two were both non-reasoning models – a change from the previous models in the Qwen 3 family which combined reasoning and non-reasoning in the same model,…
-
Cloud Blog: Your guide to Google Cloud Security at Black Hat USA 2025
Source URL: https://cloud.google.com/blog/products/identity-security/your-guide-to-google-cloud-security-at-black-hat-usa-2025/ Source: Cloud Blog Title: Your guide to Google Cloud Security at Black Hat USA 2025 Feedly Summary: At Google Cloud Security, our mission is to empower organizations to strengthen their defenses with innovative security capabilities, all while simplifying and modernizing their cybersecurity. In a world of evolving threats and increasing complexity, we…
-
Scott Logic: Extracting Data From AI Models: A Tale of Three Approaches
Source URL: https://blog.scottlogic.com/2025/07/23/extracting-data-from-ai-models-a-tale-of-three-approaches.html Source: Scott Logic Title: Extracting Data From AI Models: A Tale of Three Approaches Feedly Summary: After building a React application with three AI assistants, our developer discovered that extracting your conversation history afterwards is like trying to collect debts in a frontier town: ChatGPT eventually pays up after some serious negotiation,…
-
Simon Willison’s Weblog: Using GitHub Spark to reverse engineer GitHub Spark
Source URL: https://simonwillison.net/2025/Jul/24/github-spark/ Source: Simon Willison’s Weblog Title: Using GitHub Spark to reverse engineer GitHub Spark Feedly Summary: GitHub Spark was released in public preview yesterday. It’s GitHub’s implementation of the prompt-to-app pattern also seen in products like Claude Artifacts, Lovable, Vercel v0, Val Town Townie and Fly.io’s Phoenix New. I wrote about Spark back…
-
The Register: AI data-suckers would have to ask permission first under new bill
Source URL: https://www.theregister.com/2025/07/24/ai_copyright_bill_floated/ Source: The Register Title: AI data-suckers would have to ask permission first under new bill Feedly Summary: If it passes, the law would redefine the boundaries of fair use A bipartisan pair of US Senators introduced a bill this week that would protect copyrighted content from being used for AI training without…
-
Scott Logic: Visualising the Trade Lifecycle – Phase 2: Refactoring with Cursor IDE
Source URL: https://blog.scottlogic.com/2025/07/22/visualising-the-trade-lifecycle-phase-2-refactoring-with-cursor-ide.html Source: Scott Logic Title: Visualising the Trade Lifecycle – Phase 2: Refactoring with Cursor IDE Feedly Summary: In this instalment, I discovered that Cursor IDE transformed my chaotic multi-AI orchestra of wayward soloists into something rather more like a proper piano duet, successfully refactoring my 847-line monolith into modular components without the…
-
Simon Willison’s Weblog: Introducing OSS Rebuild: Open Source, Rebuilt to Last
Source URL: https://simonwillison.net/2025/Jul/23/oss-rebuild/ Source: Simon Willison’s Weblog Title: Introducing OSS Rebuild: Open Source, Rebuilt to Last Feedly Summary: Introducing OSS Rebuild: Open Source, Rebuilt to Last Major news on the Reproducible Builds front: the Google Security team have announced OSS Rebuild, their project to provide build attestations for open source packages released through the NPM,…
-
Cloud Blog: From Help Desk to Hypervisor: Defending Your VMware vSphere Estate from UNC3944
Source URL: https://cloud.google.com/blog/topics/threat-intelligence/defending-vsphere-from-unc3944/ Source: Cloud Blog Title: From Help Desk to Hypervisor: Defending Your VMware vSphere Estate from UNC3944 Feedly Summary: Introduction In mid 2025, Google Threat Intelligence Group (GITG) identified a sophisticated and aggressive cyber campaign targeting multiple industries, including retail, airline, and insurance. This was the work of UNC3944, a financially motivated threat…