AI & RoboticsNews

Ceremorphic addresses AI, HPC, and the metaverse with QS 1 chip, lands $50M

Did you miss a session from the Future of Work Summit? Head over to our Future of Work Summit on-demand library to stream. Today, Ceremorphic, a startup, is coming out of stealth mode with $50 million of series A funding along with the announcement of the QS 1 chip, which it claims can address multiple high-performance computing workloads from AI training to metaverse computing. Its…
Read more
AI & RoboticsNews

Ethics and ownership of AI-powered identities

Did you miss a session from the Future of Work Summit? Head over to our Future of Work Summit on-demand library to stream. This article was contributed by Taesu Kim, CEO of Neosapience With the tremendous advances in how AI/ML technologies are being deployed, one of the…
AI & RoboticsNews

AI models are becoming better at answering questions, but they’re not perfect

Did you miss a session from the Future of Work Summit? Head over to our Future of Work Summit on-demand library to stream. Let the OSS Enterprise newsletter guide your open source journey! Sign up here. Late last year, the Allen Institute for AI, the research institute founded by the late Microsoft cofounder Paul Allen, quietly open-sourced a large AI language model called Macaw. Unlike…
Read more
AI & RoboticsNews

Turing Labs lands $16.5M to bring AI to product formulation

Did you miss a session from the Future of Work Summit? Head over to our Future of Work Summit on-demand library to stream. The consumer packaged goods (CPG) industry has struggled to grow over the past decade. That’s partly because companies have tended not to economize when it comes to R&D spending. For example, producers of home and personal care goods surveyed by Accenture in 2014 on…
Read more
AI & RoboticsNews

5 ways AI and ML will improve cybersecurity in 2022

Did you miss a session from the Future of Work Summit? Head over to our Future of Work Summit on-demand library to stream. Cyberattacks are happening faster, targeting multiple threat surfaces simultaneously using a broad range of techniques to evade detection and access valuable data. A favorite attack strategy of bad actors is to use various social engineering, phishing, ransomware, and…
Read more