logo
Dates

Author


Conferences

Tags

Sort by:  

Conference:  Transform X 2022
Authors: Richard Socher, Russell Kaplan
2022-10-19

tldr - powered by Generative AI

The speaker discusses the use of large language models in search engines and how they can improve productivity for users. They also mention the potential for AI in healthcare, agriculture, and robotics.
  • Large language models are being incorporated into search engines to generate essays and provide code completion
  • Other companies can contribute apps to the ecosystem
  • AI can improve healthcare by making processes more efficient
  • AI can also be used in agriculture and robotics
Conference:  Transform X 2022
Authors: Aidan Gomez
2022-10-19

tldr - powered by Generative AI

The speaker discusses the practical applications and limitations of large language models, and emphasizes the importance of making the technology accessible to developers. They also address concerns around bias in data and the need for monitoring and mitigation.
  • Large language models can be used for creative applications such as world building in gaming and pro-social technology to create healthier online communities
  • The technology requires deep contextual understanding of language and sentiment analysis
  • To drive adoption, the interfaces onto the text need to be made easier for developers to use
  • Data filtration and monitoring are necessary to mitigate bias and prevent misuse
  • The speaker is excited about the potential for models to use tools and references in the world to improve efficiency
Authors: Alejandro Saucedo, Elena Neroslavskaya
2022-05-18

tldr - powered by Generative AI

The presentation covers machine learning acceleration at scale, optimization of models, deployment to Kubernetes, and introduction of production cloud native tooling.
  • Running ML server locally is important to ensure everything works and debug any issues before deployment to production.
  • Other resources for CI/CD for production machine learning at scale, production machine learning monitoring, machine learning security, and machine learning ecosystem and operations.
  • Collaboration with Hugging Face team to access a pre-trained GPT2 model using their Transformers library.
  • Optimization of the model using ONNX serialization format.
  • Deployment to Kubernetes cluster after testing locally to ensure it works.
  • Anecdote about a computationally intensive dungeon crawler game that uses AI model for personalization.
Conference:  Transform X 2021
Authors: Clement Delangue
2021-10-07

tldr - powered by Generative AI

Transformers are becoming the most impactful tech of the decade, but it's important to ensure they are used in an ethical and transparent manner.
  • Transformers have enabled huge advances in NLP like next sentence prediction, question answering, and text summarization.
  • Transformers have become the new default way of building technology.
  • There are important limitations today, such as bias in models like BERT.
  • It's important to invest heavily in machine learning ethics and transparency.
  • Initiatives like model cards and data measurement tools can help ensure AI fairness.
Authors: Or Katz
2021-09-24

tldr - powered by Generative AI

Using data mining techniques to refine and optimize web attack detection, specifically for SQL injection attacks, by analyzing CDN logs and breaking payloads into keywords to gain new insights.
  • SQL injection attacks have been around for over 20 years and some defensive capabilities have stayed obsolete and manual
  • CDN logs classified as SQL injection attacks can be used to refine and optimize security rules
  • Data mining techniques, specifically elements taken from Natural Language Processing, can be used to analyze SQL injection payloads, clean and curate them, break them into keywords, and find the best relation between them to gain new insights
  • The process includes five steps: collecting and cleaning the data, choosing keywords, creating a matrix, creating relationships between keywords, and clustering keywords to gain insights
  • An anecdote is shared about encountering a registration website that did not allow certain characters in the first and last name fields, potentially as a protective detection mechanism against web application attacks