A 2-year-old generative artificial intelligence startup called MosaicML will be acquired by Databricks, a $38 billion company, in a deal worth $1.3 billion in stock, with the retention benefits of the MosaicML team. According to the official website, the team consisted a total of 60+ members, combining the staff of offices in San Francisco, New York, Palo Alto & San Diego.
The whole MosaicML team, including its top-tier research team, is anticipated to join Databricks following the acquisition. According to Databricks, the partnership with MosaicML would make generative AI available to all types of businesses, allowing them to create, control, and secure generative AI models using their own data.
Naveen Rao, a former executive at Intel and the founder of Nervana and Hanlin Tang established MosaicML in 2021. From investors including DCVC, AME Cloud Ventures, Lux Capital, Lux, Frontline, Atlas, Playground Global, and Samsung Next, MosaicML had raised $64 million.
Two AI solutions from MosaicML were unveiled last month in an effort to undercut market leaders like OpenAI on price. Numerous generative AI services offered by MosaicML compete more directly with firms like OpenAI or Anthropic.
Modern MPT large language models (LLMs) are a trademark of MosaicML. With more than 3.3 million downloads of MPT-7B and the most recent launch of MPT-30B, MosaicML has demonstrated how businesses can easily create and train their own cutting-edge models using their data in a time- and money-efficient manner. These AI services are available as much as 15 times less expensive than its rivals, according to MosaicML.
On June 26, Facebook parent company Meta announced a collaboration with the Confederation of All India Traders (CAIT) to train one million traders in the WhatsApp Business App over the course of the following three years. The company stated that this programme will include thousands of trade groups affiliated with CAIT across the nation.
Praveen Khandelwal, National Secretary General of CAIT said, “The five essential foundations for India’s trading community are networking, logistics, communication, technology, and the internet. With businesses of all sizes using WhatsApp to communicate, coordinate, and interact with their consumers successfully, there is an urgent need to equip them with the skills needed to promote company growth.”
Additionally, the business has announced the opening of Meta Small Business Academy, a programme that trains up-and-coming business owners and marketers in digital marketing techniques so they may succeed on the Meta’s family of applications, which includes Facebook, Instagram, and WhatsApp, while earning an award certification in the process.
In order to serve Micro, Small, and Medium Enterprises (MSMEs) across the nation, the training module and examination will be made available in six Indian languages in addition to English, including Hindi, Marathi, Bengali, Kannada, Tamil, and Telugu, the company stated in a statement.
As a strategic partner for its MSME skilling programmes, Federation of Indian Chambers of Commerce & Industry (FICCI) is listed by Meta as having created numerous programmes over the past few years to meet the specific needs of the nation’s MSMEs.
FICCI and Meta helped 500,000 women-owned small and medium-sized businesses (SMBs) last year by teaching them digital marketing skills. “In the future, we look forward to partnering with Meta to build a strong ecosystem for small businesses across the country, especially women-led businesses,” Khandelwal said.
To help shape a budding yet highly-invested market, Meta Platforms on Monday introduced Meta Quest+, a subscription-based service for its virtual reality (VR) devices.
CEO Mark Zuckerberg announced that the Meta Quest+ membership will be available starting on Monday for $7.99 (about ₹655) per month or $59.99 (roughly ₹4,920) per year for its Quest 2, Pro, and soon for Quest 3. Since its major bets on the metaverse failed to pay off, Meta lowered the price of their headsets in March.
According to Meta’s website, Quest 2 is being sold for $299.99 (almost ₹24,600), and the company’s flagship VR headset, Meta Quest Pro, is currently available at $999.99 (nearly ₹82,000), down from its launch price of $1,499.99 (nearly ₹1,23,000).
Although virtual reality headsets have become the “next big thing,” their adoption has been restricted to the gaming industry despite the devices’ advanced capabilities.
Every month, members of the Meta Quest+ subscription service will have access to two carefully chosen VR titles. Additionally, if users sign up before July 31 with Meta, they may get their first month for just $1 or ₹82, which is a limited-time offer. Only new subscribers qualify for the promotion.
Meta said in an official statement, “At a monthly value of up to $60, Meta Quest+ combines affordability with the convenience of a curated experience. We’re excited to give gamers on Meta Quest a new way to explore all their headsets have to offer.”
According to an internal memo, Sony Music has appointed former BPI CEO Geoff Taylor to the position of executive vice president of AI, possibly the first senior executive position in the music business dedicated to AI.
Taylor, a Member of the Order of the British Empire and former CEO of the British Phonographic Industry (BPI) trade association for 15 years, will report to Sony Music Entertainment COO Kevin Kelleher in his new position.
Taylor will be in charge of overseeing the company’s AI-related business initiatives. He will also be looking after the business and legal affairs, global digital business, and other divisions, according to what the memo states.
“Geoff brings to our company decades of music industry experience,” Kelleher said. Prior to joining the BPI, Geoff was General Counsel and Executive Vice-President at the global recorded music trade body, the IFPI from 2005-2007.
Since the introduction of streaming, nothing has had as much of an impact on the industry as AI in recent months. In contrast to how it responded to illicit downloading and file-sharing at the beginning of this century, the industry is now acting considerably more proactively and is developing standards and guidelines for authorizing and paying artists and rights holders. Taylor’s appointment is unquestionably representative of that strategy.
Recently, major changes were revealed by The Recording Academy for the biggest award show in music. The Grammys will now accept entries for music created by artificial intelligence, although it will not be considered for nomination or for award representation.
Sam Altman, the CEO of OpenAI, traveled to India earlier this month to meet with the country’s prime minister, Narendra Modi, and other industry leaders to discuss the future of AI.
However, the creator of ChatGPT also came under fire for his remarks about India’s capacity to produce something akin to the ground-breaking AI chatbot. Later, Altman explained his position, claiming that the question posed to him was inappropriate. Anand Mahindra has since added to his defense of the OpenAI CEO, claiming that he was misunderstood.
Anand Mahindra said in a tweet that he recently visited the Tech Handshake event at the White House and met OpenAI CEO Sam Altman there. He claimed that Altman’s remarks about India developing ChatGPT-like technologies were misinterpreted, and he added that he has no doubts about India’s potential. He also made reference to CP Gurnani, CEO of Tech Mahindra, who tweeted that he had “accepted” Sam Altman’s challenge.
The Tech Handshake meeting this morning at the White House, was refreshingly frank, thanks to the direction of @GinaRaimondo My optimism about closer technology cooperation is because mutual benefit is now involved rather than just a one-way request from India. On the sidelines… pic.twitter.com/SNsm9blx4V
“The Tech Handshake meeting this morning at the White House was refreshingly frank, thanks to the direction of Gina Raimondo. My optimism about closer technology cooperation is because mutual benefit is now involved rather than just a one-way request from India. On the sidelines of the meeting, I caught up with Sam Altman about the ‘challenge’ that CP Gurnani had accepted. Sam reiterated that he’d been misunderstood. He’s far from skeptical about Indian abilities,” Anand Mahindra tweeted.
OpenAI founder Sam Altman said it’s pretty hopeless for Indian companies to try and compete with them.
When Tech Mahindra CEO CP Gurnani interpreted Altman’s statement as a “challenge,” the conversation attracted even more attention. “OpenAI founder Sam Altman said it’s pretty hopeless for Indian companies to try and compete with them,” he commented on Twitter after sharing the video. “CHALLENGE ACCEPTED,” he added.
In a collaboration between UC Berkeley, LinkedIn has come up with cutting-edge detection techniques that correctly identify artificially created profile pictures 99.6% of the time. Only 1% of real photos are mistakenly identified as fake.
Two forensic techniques can be applied to look into this matter, according to the blog. Methods based on hypotheses can identify peculiarities in faces created artificially. Learning blatant semantic outliers assists this method. Second, data-driven methods like machine learning can be used to tell natural faces apart from CGI ones.
The suggested work uses a hybrid methodology that involves first identifying a distinctive geometric feature in computer-generated faces and then using data-driven techniques to quantify and detect it. This approach uses a lightweight classifier that can be trained fast, and it only needs a small number of synthetic faces. 41,500 synthetic faces were created using five different synthesis engines, and 100,000 genuine LinkedIn profile photographs were used as extra data.
Researchers compared an average of 400 of each of actual (publicly available) LinkedIn profile photographs with artificially generated (StyleGAN2) faces to see how they differed. The majority of real profile photographs are essentially stock headshots because people’s actual photos vary so much from one another.
The average StyleGAN face, in contrast, has very distinct features and keen eyes. This is because of the standardized interocular distance and ocular position of StyleGAN faces. While StyleGAN faces are normally created from the neck up, real profile shots frequently concentrate on the upper body and shoulders. Researchers also sought to focus on the visual similarities and discrepancies that can be observed within and among distinct social groups.
On the grounds of the Commissioner’s office in Vepery, Greater Chennai Police Commissioner Shankar Jiwal on Friday officially opened an integrated command and control center (ICCC) as part of the Chennai Safe City Project (CSCP).
In accordance with the plans, 1,750 important locations inside the Greater Chennai Police (GCP) boundaries will have a total of 5,250 CCTV cameras installed, and ICCC will monitor the live feeds from all of these cameras.
The first phase of the project would involve viewing the footage from 4,008 CCTV cameras placed at 1,336 different sites at the ICCC. Furthermore, the Commissioner’s office in Vepery has continuous access to the CCTV camera feeds. Personnel at the ICCC will keep an eye on this.
The Commissioner claimed that a cutting-edge software system powered by artificial intelligence had been installed in the network with several analytics features mixed with alarms to enable quick response to a crime. This technology makes video analytics on crimes including kidnapping, vandalism, vehicle theft, harassment of women, and harassment of women.
According to the Commissioner, the AI-based software will aid in protecting the safety of women because the camera feeds will analyze the scenario using AI software, and the programme will alert the ICCC to take the necessary action even in the case of SOS motions made on the camera.
The video feeds will be replicated and stored in the data recovery center and data center, respectively. The ICCC will be responsible for live stream monitoring, and the same will be made available in the offices of the 12 Deputy Commissioners of Police and the six Joint Commissioners of Police.
Nowadays, we all need technology to work since companies are becoming more dependent on the Internet for their operations. Things like the rise of remote work, IoT devices, and cloud computing increase the need for robust network security measures. But unfortunately, despite the proliferation of security tools, many companies still fall victim to common network security threats.
These threats end up disturbing the business operations of companies, compromising sensitive data, and damaging their reputation. Today, we’ll examine five network security threats that companies can’t afford to ignore. Our goal is to help you understand the risks and implement effective security measures. By doing so, you’ll be able to safeguard your network and protect your company against potential threats.
Phishing Attacks
Let’s start with phishing attacks, which are one of the most common threats out there. These attacks typically involve a hacker trying to replicate a trustworthy source, such as a bank or even a fellow employee. These hackers try to trick the victim into divulging sensitive data making them think that the requester is a valid entity. The attackers usually go for information such as credit card numbers, passwords, and other sensitive data.
Phishing attacks come in all shapes and sizes; emails, social engineering, and SMS phishing (smishing). Although this feels like a very basic way of getting access to sensitive data, phishing attacks are usually very convincing. Attackers use tactics such as urgency, authority, and fear to make the victim feel compelled to provide the information as soon as possible.
The consequences of a phishing attack are often severe, ranging from financial loss to reputational damage. The best way to avoid phishing attacks is to train employees on how to spot suspicious emails or links and avoid downloading attachments from unknown sources. It also does not hurt to implement anti-phishing software or multi-factor authentication.
Insider Threats
While companies always go for external threats first, it is essential to prevent risks posed by insider threats. To explain, an insider threat is when a security incident originates from within the organization itself, such as employees, contractors, or business partners.
Insider threats are various accidental data leaks to malicious, intentional attacks. For example, remote users might accidentally expose sensitive data through unsecured Wi-Fi connections or share protected files with unknown individuals. Additionally, a malicious insider may intentionally steal, leak, or sell insider data, disrupt business operations, or cause financial damage to the company.
Insider threats are significant as they result in financial losses, data breaches, or even legal repercussions. In order to minimize insider threats, it is important to implement access restrictions to sensitive information, always monitor network traffic, and provide ongoing cybersecurity training to employees. But more importantly, there should be a culture of security accountability throughout the company.
Malware Infections
Malware is a broad term, and it is one of the worst network security threats. It refers to any software that is designed to damage computer systems, networks, or other devices. They can take many forms, such as viruses, worms, trojans, and ransomware. Malware infections happen when the user downloads or installs a malicious file or clicks on a malicious link.
Once the user clicks on the link or downloads the file, the malware starts infecting the whole system. The infection causes a range of problems, such as losing access to the device, system crashes, or data theft. Worst, malware can also cause the attacker to access sensitive information directly or take control of the system completely for unauthorized purposes.
The best way to prevent malware infections is to use up-to-date antivirus and anti-malware software. But beyond the tools, the best practice is to avoid downloading files or clicking on links from unfriendly sources and keep all applications updated. It is also critical to conduct regular security audits on the network to detect vulnerabilities in the system that malware can go through.
DDoS Attacks
A Distributed Denial of Service (DDoS) attack is a cyber-attack that aims to disrupt the functioning of a website or a server by overflowing the network with traffic. DDoS attacks usually involve a network of compromised devices controlled by a cyber-criminal. During a DDoS attack, the network becomes unavailable to normal users since the hacker overwhelms the network with unexpected traffic.
DDoS attacks can cause a great deal of damage to business operations, especially for companies that rely on the availability of their website for sales, marketing, and customer support.
Unfortunately, DDoS attacks are very challenging to prevent since they are done through multiple devices located around the world. On that note, companies can still minimize the impact of a potential DDoS attack by using Content Delivery Network (CDN) to distribute the overwhelming traffic. It is also suggested to use DDoS mitigation services to block attacks in real time.
Ransomware Attacks
We already talked about malware, but ransomware is a significant threat on its own since it has a greater risk of resulting in considerable financial loss. Ransomware attacks happen when a hacker gets access to a device, locks out the user, and demands a ransom to give the access back. These attacks are initiated through phishing scams and software vulnerabilities.
Once a device is infected with ransomware, all the files get encrypted by the hacker and become inaccessible to the user until the hacker gets paid a ransom. To avoid the consequences of a ransomware attack, companies should prioritize the implementation of robust recovery and backup plans. This will help them recover the files even if they lose access completely and save them from the hefty ransom the attacker demands.
If a ransomware attack occurs and you don’t have a backup, it is advised not to pay the ransom and request assistance from law enforcement or online cybersecurity services. However, the best thing to do is always be proactive and implement robust measures to reduce the risk of falling victim to ransomware attacks, as it is one of the prominent reasons for disrupted business operations.
Canadians will no longer be able to share news on Meta‘s platforms as a result of the planned action. This follows the Canadian federal government’s adoption of a new law requiring payment to domestic media organizations for the use of their content on digital platforms.
In a statement, Meta, the company that owns Facebook and Instagram, said, “We have repeatedly shared that in order to comply with Bill C-18, passed today in Parliament, content from news outlets, including news publishers and broadcasters, will no longer be available to people accessing our platforms in Canada.”
The Online News Act is a part of a larger initiative by the Canadian government to control the digital sphere and curtail the authority held by tech monopolies. The government has enacted several laws in addition to this one. It had previously approved legislation requiring streaming services like Netflix to advertise Canadian content to their local subscribers.
Additionally, it is one of numerous suggestions being considered globally to help failing news organizations by mandating social media companies to negotiate with media organisations for compensation for the content that is shared on their networks.
As a result of the internet’s development and the success of organizations like Facebook and Google, the advertising revenue that has long sustained media organizations’ operations has been affected, prompting them to demand that Silicon Valley’s powerhouses share more of their profits with them.
Tech behemoths will be required by Canadian legislation to negotiate fees with media organizations in return for posting or linking to their content. If those negotiations fail, the parties are required to participate in binding arbitration to decide on the appropriate compensation.
With the aid of AI, YouTube aims to make it simpler for users to dub videos in different languages. The company said at VidCon on Thursday that it is hiring the team from Google’s Area 120 incubator’s AI-powered dubbing service Aloud for the job.
According to the website for Aloud, this is how it functions. The video is initially transcribed by the programme, which then provides users with a transcription that can be checked and adjusted. The dub is then created after translation. The specifics are in the video above.
According to YouTube’s Amjad Hanif, hundreds of creators have already participated in testing the service. According to spokesperson Jessica Gibby, Aloud is currently available in English, Spanish, and Portuguese. Hanif also claims that although Aloud supports a few languages, there are more to come in the future.
Aloud could be a helpful tool even with its limited language selection as more and more creators add multi-language dubs to their videos. Additionally, users may listen to a sample of Aloud’s output by seeing this video from the Amoeba Sisters channel and listening to the Spanish dub track.
YouTube is eventually “working to make translated audio tracks sound like the creator’s voice, with more expression, and with lip sync,” according to Hanif. According to Gibby, those features will be unveiled in the year 2024.