An increasing number of companies are adopting AI-as-a-Service solutions to collaborate, train, and operate their artificial intelligence applications. From emerging AI startups like Hugging Face and Replicate to established cloud providers such as Microsoft Azure and SAP, thousands of customers place their trust in these services, relying on them to handle their proprietary models and Read More …
Category: Computers
Notes – About GitHub-hosted runners
GitHub offers hosted virtual machines to run workflows. The virtual machine contains an environment of tools, packages, and settings available for GitHub Actions to use. Overview of GitHub-hosted runners Runners are the machines that execute jobs in a GitHub Actions workflow. For example, a runner can clone your repository locally, install testing software, and then Read More …
AZ 900 – Part II – Architecture & Security I
Microsoft Azure is a comprehensive cloud computing platform that provides a wide range of services, including computing power, storage, networking, databases, analytics, and more. Understanding its global infrastructure involves several key concepts: Regions and Availability Zones Regions: Azure is divided into geographic regions, which are clusters of data centers located in specific areas around the Read More …
DDoS – Distributed Denial of Service
A Distributed Denial of Service (DDoS) attack is a malicious attempt to disrupt the normal functioning of a targeted server, service, or network by overwhelming it with a flood of internet traffic. DDoS attacks are executed using multiple compromised computer systems, often referred to as a botnet, which are controlled by the attacker. These botnets Read More …
Conference Video – Former CIA Officer Will Teach You How to Spot a Lie
In this participatory session, you will learn how to tell when someone is lying. Really. As a former CIA Officer with more than 20 years of experience in interviewing, interrogation and polygraph examination, Susan has seen her share of truth avoiders. She has, in fact, developed behavioral screening programs that are used by the federal Read More …
Malware TV – Reverse Engineering
CTF Field Guide Alex Sotirov, Reverse Engineering 1, Fall 2011
Month of AI Video – Practical LLM Security
Practical LLM Security As large language models (LLMs) become increasingly integrated into various applications, the security standards for these integrations have not kept pace. Much of the current security research tends to focus on either 1) the social harms and biases associated with LLMs, along with content moderation issues, or 2) the LLMs themselves, often Read More …
LLM – Large Language Model
A non-technical definition………. Imagine you have a friend who is an incredible storyteller. This friend has read thousands of books, articles, and conversations, absorbing all kinds of information about the world. When you ask them a question or give them a topic, they can quickly come up with a thoughtful response, tell a story, or Read More …
Notes – GitHub Actions
GitHub Actions is a powerful automation platform built directly into GitHub. It allows you to automate workflows within your software development life cycle, right in your repositories. Here’s a breakdown of what it is: Core Functionality: Automation of Workflows: GitHub Actions enables you to create automated workflows that respond to events within your GitHub repository. These Read More …
AZ 900 – Part I – Microsoft Azure Cloud Concepts
Microsoft Azure Cloud Concepts Cloud Service Models Types of Cloud Computing Benefits of the Cloud Fundamental characteristics of cloud computing Cloud computing offers convenient, on-demand access to your computing resources online. This has facilitated the move to remote work and supports collaboration wherever you are located. For IT teams, cloud services also make technological provisioning Read More …