Cloud CISO Perspectives: What you’re missing when you miss out on mWISE Conference
Gain insights on the importance of attending the mWISE Conference for CISOs and security leaders
Magic partners with Google Cloud to train frontier-scale LLMs
Magic partners with Google Cloud to build frontier-scale LLMs with advanced AI capabilities
Apple Workshop on Privacy-Preserving Machine Learning 2024
Exploring the latest advances in privacy-preserving machine learning with a focus on private federated learning and differentially private algorithms.
Provide a personalized experience for news readers using Amazon Personalize and Amazon Titan Text Embeddings on Amazon Bedrock
Enable personalized news recommendations using Amazon Personalize and Titan Text Embeddings on Amazon Bedrock in AWS ecosystem
A Measure of Motive: How Attackers Weaponize Digital Analytics Tools
Exploring how attackers weaponize digital analytics tools to enhance malicious campaigns and offering defense strategies for detection and mitigation
Recommending for Long-Term Member Satisfaction at Netflix
Optimizing recommendations for long-term member satisfaction using proxy rewards and bandit policies at Netflix
How to Evaluate Jailbreak Methods: A Case Study with the StrongREJECT Benchmark
Evaluating jailbreak methods and benchmark using the StrongREJECT approach
A framework for solving parabolic partial differential equations
A framework for solving parabolic partial differential equations on triangle meshes using a novel splitting technique.
Unlocking Insights with High-Quality Dashboards at Scale
Maximizing insights with advanced dashboard quality framework in a dual-tool approach
Unlocking Real-Time Insights: Engineering the Hyperforce Experience for All
Empowering Salesforce teams with near-real-time insights through a streaming data platform for perimeter telemetry.
I Spy With My Little Eye: Uncovering an Iranian Counterintelligence Operation
Uncovering an Iranian counterintelligence operation targeting Iranians and domestic threats collaborating with foreign intelligence and security agencies, using fake recruitment websites to collect personal details.
Build an end-to-end RAG solution using Knowledge Bases for Amazon Bedrock and the AWS CDK
Automate end-to-end RAG solution deployment with Amazon Bedrock knowledge bases and AWS CDK