Tag: Wind
-
Simon Willison’s Weblog: Quoting Steven Johnson
Source URL: https://simonwillison.net/2024/Nov/21/steven-johnson/#atom-everything Source: Simon Willison’s Weblog Title: Quoting Steven Johnson Feedly Summary: When we started working on what became NotebookLM in the summer of 2022, we could fit about 1,500 words in the context window. Now we can fit up to 1.5 million words. (And using various other tricks, effectively fit 25 million words.)…
-
The Register: Microsoft Fabric promises transactions, analytics on one database service
Source URL: https://www.theregister.com/2024/11/19/microsoft_data_platform_fabric_upgrade/ Source: The Register Title: Microsoft Fabric promises transactions, analytics on one database service Feedly Summary: Windows giant also improving Iceberg support after throwing lot in with Delta Parquet Ignite Microsoft is set to launch a database service that can manage transactional and analytical workloads in the same system.… AI Summary and Description:…
-
Cloud Blog: Empowering Gemini for Malware Analysis with Code Interpreter and Google Threat Intelligence
Source URL: https://cloud.google.com/blog/topics/threat-intelligence/gemini-malware-analysis-code-interpreter-threat-intelligence/ Source: Cloud Blog Title: Empowering Gemini for Malware Analysis with Code Interpreter and Google Threat Intelligence Feedly Summary: One of Google Cloud’s major missions is to arm security professionals with modern tools to help them defend against the latest threats. Part of that mission involves moving closer to a more autonomous, adaptive…
-
Schneier on Security: Most of 2023’s Top Exploited Vulnerabilities Were Zero-Days
Source URL: https://www.schneier.com/blog/archives/2024/11/most-of-2023s-top-exploited-vulnerabilities-were-zero-days.html Source: Schneier on Security Title: Most of 2023’s Top Exploited Vulnerabilities Were Zero-Days Feedly Summary: Zero-day vulnerabilities are more commonly used, according to the Five Eyes: Key Findings In 2023, malicious cyber actors exploited more zero-day vulnerabilities to compromise enterprise networks compared to 2022, allowing them to conduct cyber operations against higher-priority…
-
Simon Willison’s Weblog: Qwen: Extending the Context Length to 1M Tokens
Source URL: https://simonwillison.net/2024/Nov/18/qwen-turbo/#atom-everything Source: Simon Willison’s Weblog Title: Qwen: Extending the Context Length to 1M Tokens Feedly Summary: Qwen: Extending the Context Length to 1M Tokens The new Qwen2.5-Turbo boasts a million token context window (up from 128,000 for Qwen 2.5) and faster performance: Using sparse attention mechanisms, we successfully reduced the time to first…
-
Hacker News: Reverse Engineering iOS 18 Inactivity Reboot
Source URL: https://naehrdine.blogspot.com/2024/11/reverse-engineering-ios-18-inactivity.html Source: Hacker News Title: Reverse Engineering iOS 18 Inactivity Reboot Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses the new inactivity reboot feature in iOS 18, which adds a significant layer of security by forcing a device reboot after three days of inactivity. This feature aims to protect…