Tag: Time

  • Slashdot: Tim Berners-Lee Urges New Open-Source Interoperable Data Standard, Protections from AI

    Source URL: https://tech.slashdot.org/story/25/09/28/1958242/tim-berners-lee-urges-new-open-source-interoperable-data-standard-protections-from-ai?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Tim Berners-Lee Urges New Open-Source Interoperable Data Standard, Protections from AI Feedly Summary: AI Summary and Description: Yes Summary: Tim Berners-Lee expresses concern over the current state of the web, which has deviated from its original vision of a free platform. He highlights the control of user data by…

  • Simon Willison’s Weblog: Quoting Nick Turley

    Source URL: https://simonwillison.net/2025/Sep/28/nick-turley/#atom-everything Source: Simon Willison’s Weblog Title: Quoting Nick Turley Feedly Summary: We’ve seen the strong reactions to 4o responses and want to explain what is happening. We’ve started testing a new safety routing system in ChatGPT. As we previously mentioned, when conversations touch on sensitive and emotional topics the system may switch mid-chat…

  • Simon Willison’s Weblog: Video models are zero-shot learners and reasoners

    Source URL: https://simonwillison.net/2025/Sep/27/video-models-are-zero-shot-learners-and-reasoners/ Source: Simon Willison’s Weblog Title: Video models are zero-shot learners and reasoners Feedly Summary: Video models are zero-shot learners and reasoners Fascinating new paper from Google DeepMind which makes a very convincing case that their Veo 3 model – and generative video models in general – serve a similar role in the…

  • Tomasz Tunguz: Modernizing Agent Tools with Google ADK Patterns: 60% Token Reduction & Enterprise Safety

    Source URL: https://www.tomtunguz.com/modernizing-agent-tools-with-google-adk-patterns/ Source: Tomasz Tunguz Title: Modernizing Agent Tools with Google ADK Patterns: 60% Token Reduction & Enterprise Safety Feedly Summary: I recently discovered Google’s Agent Development Kit (ADK) and its architectural patterns for building LLM-powered applications. While ADK is a Python framework, its core design principles proved transformative when applied to my existing…

  • Slashdot: Hugging Face Researchers Warn AI-Generated Video Consumes Much More Power Than Expected

    Source URL: https://hardware.slashdot.org/story/25/09/27/0249201/hugging-face-researchers-warn-ai-generated-video-consumes-much-more-power-than-expected?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Hugging Face Researchers Warn AI-Generated Video Consumes Much More Power Than Expected Feedly Summary: AI Summary and Description: Yes Summary: The findings from researchers at Hugging Face reveal that generative AI tools for text-to-video production have a significantly larger carbon footprint than expected. The study highlights a non-linear increase…

  • The Register: Hunt for RedNovember: Beijing hacked critical orgs in year-long snooping campaign

    Source URL: https://www.theregister.com/2025/09/27/rednovember_chinese_espionage/ Source: The Register Title: Hunt for RedNovember: Beijing hacked critical orgs in year-long snooping campaign Feedly Summary: Not to be confused with all the other reports of Chinese intruders on US networks that came to light this week RedNovember, a Chinese state-sponsored cyberspy group, targeted government and critical private-sector networks around the…

  • Unit 42: Threat Insights: Active Exploitation of Cisco ASA Zero Days

    Source URL: https://unit42.paloaltonetworks.com/zero-day-vulnerabilities-affect-cisco-software/ Source: Unit 42 Title: Threat Insights: Active Exploitation of Cisco ASA Zero Days Feedly Summary: CVE-2025-20333, CVE-2025-20362 and CVE-2025-20363 affect multiple Cisco products, and are being exploited by a threat actor linked to the ArcaneDoor campaign. The post Threat Insights: Active Exploitation of Cisco ASA Zero Days appeared first on Unit 42.…

  • Slashdot: Chinese Hackers Breach US Software and Law Firms Amid Trade Fight

    Source URL: https://yro.slashdot.org/story/25/09/26/1836203/chinese-hackers-breach-us-software-and-law-firms-amid-trade-fight?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Chinese Hackers Breach US Software and Law Firms Amid Trade Fight Feedly Summary: AI Summary and Description: Yes Summary: The text discusses a sophisticated hacking campaign by suspected Chinese hackers targeting US software developers and law firms, as reported by cybersecurity firm Mandiant. The implications for cloud computing security…

  • Simon Willison’s Weblog: How to stop AI’s “lethal trifecta”

    Source URL: https://simonwillison.net/2025/Sep/26/how-to-stop-ais-lethal-trifecta/ Source: Simon Willison’s Weblog Title: How to stop AI’s “lethal trifecta” Feedly Summary: How to stop AI’s “lethal trifecta” This is the second mention of the lethal trifecta in the Economist in just the last week! Their earlier coverage was Why AI systems may never be secure on September 22nd – I…