What I learned from looking at 900 most popular open source AI tools
Four years ago, I did an analysis of the open source ML ecosystem. Since then, the landscape has changed, so I revisited the topic. This time, I focused exclusively on the stack around foundation models.
This video is about mergekit, how to choose and blend models. It's non technical but links to technical papers are included. You need to know how to navigate...
Marking a major investment in Meta’s AI future, we are announcing two 24k GPU clusters. We are sharing details on the hardware, network, storage, design, performance, and software that help us extr…
My Robotic Doppelganger Is The Grim Face of Journalism's Future!
As journalism endures catastrophic financial collapse, I watch software seize my long-lost archives, erase my name—or attribute my work to a fake person. PLUS: Evan and I sign on Friday!
Four weeks ago, GPT-4 remained the undisputed champion: consistently at the top of every key benchmark, but more importantly the clear winner in terms of “vibes”. Almost everyone investing serious …
Microsoft engineer warns company's AI tool creates violent, sexual images, ignores copyrights
Shane Jones, who's worked at Microsoft for six years, has found a plethora of disturbing images that are being created by the company's Copilot Designer tool.
Large language models can do jaw-dropping things. But nobody knows exactly why.
And that's a problem. Figuring it out is one of the biggest scientific puzzles of our time and a crucial step towards controlling more powerful future models.
Who Am I? Conditional Prompt Injection Attacks with Microsoft Copilot · Embrace The Red
Conditional Instructions open a powerful way for adversaries to target individual and delay detonation of malicious payloads for when certain conditions are met
Malicious AI models on Hugging Face backdoor users’ machines
At least 100 instances of malicious AI ML models were found on the Hugging Face platform, some of which can execute code on the victim's machine, giving attackers a persistent backdoor.