Tag: transformer
-
The Register: Boffins detail new algorithms to losslessly boost AI perf by up to 2.8x
Source URL: https://www.theregister.com/2025/07/17/new_algorithms_boost_ai_perf/ Source: The Register Title: Boffins detail new algorithms to losslessly boost AI perf by up to 2.8x Feedly Summary: New spin on speculative decoding works with any model – now built into Transformers We all know that AI is expensive, but a new set of algorithms developed by researchers at the Weizmann…
-
Cloud Blog: Zero-shot forecasting in BigQuery with the TimesFM foundation model
Source URL: https://cloud.google.com/blog/products/data-analytics/bigquery-ml-timesfm-models-now-in-preview/ Source: Cloud Blog Title: Zero-shot forecasting in BigQuery with the TimesFM foundation model Feedly Summary: Accurate time-series forecasting is essential for many business scenarios such as planning, supply chain management, and resource allocation. BigQuery now embeds TimesFM, a state-of-the-art pre-trained model from Google Research, enabling powerful forecasting via the simple AI.FORECAST function.…
-
Transformer Circuits Thread: Circuits Updates
Source URL: https://transformer-circuits.pub/2025/april-update/index.html Source: Transformer Circuits Thread Title: Circuits Updates Feedly Summary: AI Summary and Description: Yes **Summary:** The text discusses emerging research and methodologies in the field of machine learning interpretability, specifically focusing on large language models (LLMs). It examines the mechanisms by which these models respond to harmful requests (like making bomb instructions)…
-
CSA: Exploiting Trusted AI: GPTs in Cyberattacks
Source URL: https://abnormal.ai/blog/how-attackers-exploit-trusted-ai-tools Source: CSA Title: Exploiting Trusted AI: GPTs in Cyberattacks Feedly Summary: AI Summary and Description: Yes Summary: The text discusses the emergence of malicious AI, particularly focusing on how generative pre-trained transformers (GPTs) are being exploited by cybercriminals. It highlights the potential risks posed by these technologies, including sophisticated fraud tactics and…