Leica made a $329 iPhone camera grip

The Leica Lux Grip works with iPhone models supporting MagSafe accessories. | Image: Leica Leica has announced a new iPhone accessory called the Leica Lux Grip designed to make using its iOS-only Leica Lux app feel more like shooting with its dedicated cameras. It adds a DSLR-style grip to the iPhone and features customizable function … Read more

Fintech Ramp lands Eagles’ Saquon Barkley as investor and Super Bowl commercial star

Philadelphia Eagles’ star running back Saquon Barkley has not only become an investor in fintech startup Ramp, he is also the star of the company’s first Super Bowl commercial. Interestingly, it was Barkley who reached out to Ramp about investing, not the other way around as is so often the case with celebrity endorsements.  Barkley … Read more

How Aetion is using generative AI and Amazon Bedrock to translate scientific intent to results

This post is co-written with Javier Beltrán, Ornela Xhelili, and Prasidh Chhabri from Aetion.  For decision-makers in healthcare, it is critical to gain a comprehensive understanding of patient journeys and health outcomes over time. Scientists, epidemiologists, and biostatisticians implement a vast range of queries to capture complex, clinically relevant patient variables from real-world data. These … Read more

EU details which systems fall within AI Act’s scope

The European Union has published guidance on what constitutes an AI system under its new AI Act. The risk-based framework for regulating applications of artificial intelligence came into force last summer — with the first compliance deadline (on banned use cases) kicking in last weekend. Determining whether a particular software system falls within the act’s … Read more

Mark Zuckerberg’s charity insists its not abandoning its DEI efforts

Mark Zuckerberg’s charity has told its employees it will remain committed to DEI even as Meta eliminates its DEI programs, The Guardian reports.  Chan Zuckerberg Initiative (CZI), founded and co-led by Zuckerberg and his wife Priscilla Chan, reassured its employees after many began expressing concerns about recent changes at Meta as the company scales back … Read more

Crypto and Boxing to Converge at Consensus HK in Lethal One-Two Combination

Crypto Twitter may sometimes seem like a raging brawl, but come Feb. 20, there will be some actual live combat between crypto influencers at Consensus Hong Kong 2025. The conference will play host that evening to the eighth edition of Crypto Fight Night (CFN), an industry sporting and networking event that’s become hugely popular since … Read more

Rooster Teeth is coming back

Rooster Teeth — the studio behind animated web series such as RWBY, Red vs. Blue, and Gen:Lock — seemed like it was shuttering for good last year. The company announced that it was winding down operations due to parent company Warner Bros. Discovery’s inability to find a party interested in buying the production outfit. But … Read more

Trump-Backed World Liberty Financial Buys $470K ONDO Tokens

A wallet identified as belonging to World Liberty Financial, the decentralized finance (DeFi) platform backed by President Donald Trump and his family, has deepened its investment in Ondo Finance, the second-largest issuer of tokenized Treasuries. The address scooped up about 342,000 ONDO, the platform’s governance token, for $470,000 USDC on the CoW Protocol, according to … Read more

Elon Musk’s DOGE storms federal weather forecasters’ headquarters

Elon Musk’s Department of Government Efficiency (DOGE) has reportedly infiltrated the headquarters of the National Oceanic and Atmospheric Administration (NOAA), the agency that collects and shares vital weather and climate information. Sources have told The Verge, as well as other news outlets, that they’re worried about drastic changes that could impact the public’s access to … Read more

Adaptive Attacks Expose SLM Vulnerabilities and Qualitative Insights

Table of Links Part 1: Abstract & Introduction Part 2: Background Part 3: Attacks & Countermeasures Part 4: Experimental Setup Part 5: Datasets & Evaluation Part 6: Attack, Countermeasure Parameters, & Baseline: Random Perturbations Part 7: Results & Discussion Part 8: Transfer Attacks & Countermeasures Part 9: Conclusion, Limitations, & Ethics Statement Part 10: Appendix: … Read more

Transfer Attacks Reveal SLM Vulnerabilities and Effective Noise Defenses

Table of Links Part 1: Abstract & Introduction Part 2: Background Part 3: Attacks & Countermeasures Part 4: Experimental Setup Part 5: Datasets & Evaluation Part 6: Attack, Countermeasure Parameters, & Baseline: Random Perturbations Part 7: Results & Discussion Part 8: Transfer Attacks & Countermeasures Part 9: Conclusion, Limitations, & Ethics Statement Part 10: Appendix: … Read more

Cross-Prompt Attacks and Data Ablations Impact SLM Robustness

Table of Links Part 1: Abstract & Introduction Part 2: Background Part 3: Attacks & Countermeasures Part 4: Experimental Setup Part 5: Datasets & Evaluation Part 6: Attack, Countermeasure Parameters, & Baseline: Random Perturbations Part 7: Results & Discussion Part 8: Transfer Attacks & Countermeasures Part 9: Conclusion, Limitations, & Ethics Statement Part 10: Appendix: … Read more

Safety Alignment and Jailbreak Attacks Challenge Modern LLMs

Table of Links Part 1: Abstract & Introduction Part 2: Background Part 3: Attacks & Countermeasures Part 4: Experimental Setup Part 5: Datasets & Evaluation Part 6: Attack, Countermeasure Parameters, & Baseline: Random Perturbations Part 7: Results & Discussion Part 8: Transfer Attacks & Countermeasures Part 9: Conclusion, Limitations, & Ethics Statement Part 10: Appendix: … Read more

Audio Encoder Pre-training and Evaluation Enhance SLM Safety

Table of Links Part 1: Abstract & Introduction Part 2: Background Part 3: Attacks & Countermeasures Part 4: Experimental Setup Part 5: Datasets & Evaluation Part 6: Attack, Countermeasure Parameters, & Baseline: Random Perturbations Part 7: Results & Discussion Part 8: Transfer Attacks & Countermeasures Part 9: Conclusion, Limitations, & Ethics Statement Part 10: Appendix: … Read more

Integrated Speech Language Models Face Critical Safety Vulnerabilities

Table of Links Part 1: Abstract & Introduction Part 2: Background Part 3: Attacks & Countermeasures Part 4: Experimental Setup Part 5: Datasets & Evaluation Part 6: Attack, Countermeasure Parameters, & Baseline: Random Perturbations Part 7: Results & Discussion Part 8: Transfer Attacks & Countermeasures Part 9: Conclusion, Limitations, & Ethics Statement Part 10: Appendix: … Read more

SpeechVerse Unites Audio Encoder and LLM for Superior Spoken QA

Table of Links Part 1: Abstract & Introduction Part 2: Background Part 3: Attacks & Countermeasures Part 4: Experimental Setup Part 5: Datasets & Evaluation Part 6: Attack, Countermeasure Parameters, & Baseline: Random Perturbations Part 7: Results & Discussion Part 8: Transfer Attacks & Countermeasures Part 9: Conclusion, Limitations, & Ethics Statement Part 10: Appendix: … Read more

Unified Speech and Language Models Can Be Vulnerable to Adversarial Attacks

:::info Authors: (1) Raghuveer Peri, AWS AI Labs, Amazon and with Equal Contributions (raghperi@amazon.com); (2) Sai Muralidhar Jayanthi, AWS AI Labs, Amazon and with Equal Contributions; (3) Srikanth Ronanki, AWS AI Labs, Amazon; (4) Anshu Bhatia, AWS AI Labs, Amazon; (5) Karel Mundnich, AWS AI Labs, Amazon; (6) Saket Dingliwal, AWS AI Labs, Amazon; (7) … Read more

SLMs Outperform Competitors Yet Suffer Rapid Adversarial Jailbreaks

Table of Links Part 1: Abstract & Introduction Part 2: Background Part 3: Attacks & Countermeasures Part 4: Experimental Setup Part 5: Datasets & Evaluation Part 6: Attack, Countermeasure Parameters, & Baseline: Random Perturbations Part 7: Results & Discussion Part 8: Transfer Attacks & Countermeasures Part 9: Conclusion, Limitations, & Ethics Statement Part 10: Appendix: … Read more

Applying Modern Technology to Business: Shoyu Ro’s Path to Success

In the past decades, technology use in businesses has become vital to company success. As technology becomes increasingly prominent in the business world, so does the need for people who can utilize and apply these developments to boost business productivity. Shoyu Ro is an accomplished leader in the technology field who has developed great technologies … Read more

Adversarial Settings and Random Noise Reveal Speech LLM Vulnerabilities

Table of Links Part 1: Abstract & Introduction Part 2: Background Part 3: Attacks & Countermeasures Part 4: Experimental Setup Part 5: Datasets & Evaluation Part 6: Attack, Countermeasure Parameters, & Baseline: Random Perturbations Part 7: Results & Discussion Part 8: Transfer Attacks & Countermeasures Part 9: Conclusion, Limitations, & Ethics Statement Part 10: Appendix: … Read more

Datasets and Evaluation Define the Robustness of Speech Language Models

Table of Links Part 1: Abstract & Introduction Part 2: Background Part 3: Attacks & Countermeasures Part 4: Experimental Setup Part 5: Datasets & Evaluation Part 6: Attack, Countermeasure Parameters, & Baseline: Random Perturbations Part 7: Results & Discussion Part 8: Transfer Attacks & Countermeasures Part 9: Conclusion, Limitations, & Ethics Statement Part 10: Appendix: … Read more