window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-JYLJ7J3717');

Privacy

A C G I N O S
  • KI Frameworks - Libraries fuer Kuenstliche Intelligenz

AI Frameworks

2023-12-16T10:14:26+01:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

AI frameworks are collections of software libraries, tools and guidelines that are specifically designed for the development of artificial intelligence (AI) are designed. Such frameworks provide developers with a structured starting point with a powerful AI environmentin which they can develop and implement algorithms for machine learning (ML), deep learning, natural language processing (NLP) and other AI-related technologies. Top 10 AI frameworks, Types of AI frameworks, Technological aspects of AI frameworks Application areas and use cases of AI frameworks

  • AI language models

AI language models

2025-02-05T13:55:57+01:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

AI language models - what's behind them? Artificial intelligence is changing the way we interact with machines. Language models enable machines not only to understand language, but also to generate meaningful, human-like responses. Find out more now...

  • Confidential Computing - Technologische Grundlagen und Herausforderungen

Confidential computing – technological foundations and challenges

2024-05-21T18:30:05+02:00Categories: Cloud Computing & Cloud Technology, Unkategorisiert|Tags: , , , , , , , , , , , , , , , , , , , |

Confidential computing - this term sounds pompous at first, but it is a decisive factor when it comes to ensuring the security and confidentiality of our data in the cloud. But what exactly do we mean by confidential computing? In this article and our Rock the Prototype podcast episode, we look at various technologies that play a role in the context of confidential computing. I will illustrate how Trusted Execution Environments or Multi-Party Computation, Zero-Knowledge Proofs and other exciting technologies help to create a more secure environment for our data.

  • Gemini KI Model

Gemini AI model

2023-12-09T19:11:54+01:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Gemini is an advanced AI language model developed by Google DeepMind. It serves as the successor to the earlier AI models LaMDA and PaLM 2 and was presented by google in December 2023. Gemini is characterized as an AI model by its multimodality, which means that it can process different types of data, including text, images, audio, video and computer source code. What can the gemini AI do? Gemini will be integrated into Google's search engine, the google advertising products and the Chrome browser. Learn all about google AI now...

  • Ghostbusters Attack - Facebooks Geheimkrieg & Lausch-Attacken

Ghostbusters cyber attack – Facebook’s secret war & eavesdropping attacks

2024-03-28T11:39:04+01:00Categories: IT Security|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Snapchat users eavesdropped on by a man-in-the-middle attack by Facebook - Facebook has probably deliberately bypassed Snapchat encryption. As part of a class action lawsuit against Facebook, documents have now been made public that once again provide explosive material in the Facebook scandal surrounding data protection and data sovereignty. Facebook's action against Snapchat was probably more aggressive than ever thought.

  • Identitätsmanagement und Vertrauensmodelle in digitalen Infrastrukturen

Identity management and trust models in digital infrastructures

2024-02-01T09:43:03+01:00Categories: IT infrastructure, IT Security|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Identity and access management and trust models in digital infrastructures are the invisible architectures that hold our digitally networked world together. In an era in which our lives increasingly take place online, complex networks interacting with digital identities, protocols and standards form the basic technical infrastructures that we use every day. And in the middle of it all: trust-based identities.

  • IT Standards - Warum Interoperabilität und Sicherheit unverzichtbar sind

IT standards – Why interoperability and security are essential

2024-02-24T18:19:09+01:00Categories: Software development|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

IT standards are the invisible network that ensures security, enables interoperability and holds our digital landscape together. Without IT standards, we would fall back into an era of digital turbulence in which nothing communicates with each other, security gaps are omnipresent and no progress is possible. Today we dive into the world of IT standards - we explore why they are essential, what makes a good standard and how they shape our digital future.

  • Natural Language Processing - NLP

Natural Language Processing (NLP)

2025-01-24T15:57:08+01:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Natural Language Processing (NLP) - a highly specialized subfield of artificial intelligence (AI) How do machines understand human language? Natural Language Processing is the key to bridging the gap between humans and machines

  • NIS2: Europas Update zur Cyberabwehr - Was die NIS2-Richtlinie für uns bedeutet

NIS2: Europe’s cyber defense update – What the NIS2 directive means for us

2024-05-08T13:18:51+02:00Categories: IT Security|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Who is affected by the NIS regulations? The extended scope of the NIS2 Directive. Enter NIS2: A tightening, an expansion, a necessary evolution. The new NIS2 Directive extends the scope, tightens security and reporting obligations and aims to increase Europe's resilience to cyber attacks. From energy suppliers to digital platforms and public administrations - almost no organization is exempt. The transformation from NIS to NIS2 is therefore not just a change of form, but is intended to be a decisive step in the expansion of our digital fortress.

Go to Top