Tag: developers

  • Cloud Blog: Deutsche Telekom designs the telco of tomorrow with BigQuery

    Source URL: https://cloud.google.com/blog/topics/telecommunications/deutsche-telekom-designs-the-telco-of-tomorrow-with-bigquery/ Source: Cloud Blog Title: Deutsche Telekom designs the telco of tomorrow with BigQuery Feedly Summary: Imagine you unlocked your phone and all you saw was a blank glowing screen in a happy shade of pink, or a family photo, and nothing else.  No apps, no window, no pop-ups. You simply tap the…

  • Hacker News: Meta does a U-turn, will share its technology with Five Eyes members

    Source URL: https://news.slashdot.org/story/24/11/05/043209/meta-permits-its-ai-models-to-be-used-for-us-military-purposes Source: Hacker News Title: Meta does a U-turn, will share its technology with Five Eyes members Feedly Summary: Comments AI Summary and Description: Yes Summary: Meta’s recent policy shift allows U.S. government agencies and contractors to utilize its artificial intelligence models for military applications, marking a significant change from its previous restrictions.…

  • NCSC Feed: The leaky pipe of secure coding

    Source URL: https://www.ncsc.gov.uk/blog-post/leaky-pipe-secure-coding Source: NCSC Feed Title: The leaky pipe of secure coding Feedly Summary: Helen L discusses how security can be woven more seamlessly into the development process. AI Summary and Description: Yes Summary: The text emphasizes the necessity of accepting software vulnerabilities as an inherent risk while promoting a developer-centered approach to security.…

  • Schneier on Security: Subverting LLM Coders

    Source URL: https://www.schneier.com/blog/archives/2024/11/subverting-llm-coders.html Source: Schneier on Security Title: Subverting LLM Coders Feedly Summary: Really interesting research: “An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities against Strong Detection“: Abstract: Large Language Models (LLMs) have transformed code com- pletion tasks, providing context-based suggestions to boost developer productivity in software engineering. As users often…

  • Simon Willison’s Weblog: yet-another-applied-llm-benchmark

    Source URL: https://simonwillison.net/2024/Nov/6/yet-another-applied-llm-benchmark/#atom-everything Source: Simon Willison’s Weblog Title: yet-another-applied-llm-benchmark Feedly Summary: yet-another-applied-llm-benchmark Nicholas Carlini introduced this personal LLM benchmark suite back in February as a collection of over 100 automated tests he runs against new LLM models to evaluate their performance against the kinds of tasks he uses them for. There are two defining features…

  • Slashdot: UK Will Legislate Against AI Risks in Next Year, Pledges Kyle

    Source URL: https://news.slashdot.org/story/24/11/06/182210/uk-will-legislate-against-ai-risks-in-next-year-pledges-kyle?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: UK Will Legislate Against AI Risks in Next Year, Pledges Kyle Feedly Summary: AI Summary and Description: Yes Summary: The UK is set to introduce legislation aimed at mitigating AI risks, transitioning voluntary agreements on AI testing into legally binding regulations. This initiative reflects a commitment to enhancing AI…

  • Technologies | Sovereign Tech Agency: Reproducible Builds

    Source URL: https://www.sovereign.tech/tech/reproducible-builds Source: Technologies | Sovereign Tech Agency Title: Reproducible Builds Feedly Summary: AI Summary and Description: Yes Summary: The Reproducible Builds project plays a crucial role in enhancing the security of open source software supply chains by addressing vulnerabilities that arise from third-party dependencies. It aims to establish reproducible builds as a standard…

  • Hacker News: Every Boring Problem Found in eBPF (2022)

    Source URL: https://tmpout.sh/2/4.html Source: Hacker News Title: Every Boring Problem Found in eBPF (2022) Feedly Summary: Comments AI Summary and Description: Yes **Summary:** The article provides an in-depth exploration of eBPF (extended Berkeley Packet Filter) and its application in Linux endpoint security. It discusses both the advantages and challenges of using eBPF in security contexts,…

  • Hacker News: Tencent drops a 389B MoE model(Open-source and free for commercial use))

    Source URL: https://github.com/Tencent/Tencent-Hunyuan-Large Source: Hacker News Title: Tencent drops a 389B MoE model(Open-source and free for commercial use)) Feedly Summary: Comments AI Summary and Description: Yes **Summary:** The text introduces the Hunyuan-Large model, the largest open-source Transformer-based Mixture of Experts (MoE) model, developed by Tencent, which boasts 389 billion parameters, optimizing performance while managing resource…