
Ev Kontsevoy
Articles
-
2 months ago |
thestack.technology | Noah Bovenizer |Ev Kontsevoy |Ed Targett
This post is for subscribers only Subscribe now Already have an account? Sign in This post is for subscribers only Subscribe Already have an account? Sign In
-
Jan 13, 2025 |
thestack.technology | Ed Targett |Tristan Greene |Ev Kontsevoy
AI — Microsoft — Jay Parikh — CoreAI "A new AI-first app stack — one with new UI/UX patterns, runtimes to build with agents, orchestrate multiple agents, and a reimagined management and observability layer Microsoft is creating a new engineering organisation called CoreAI – with the mission of building a stack for “both our first-party and third-party customers to build and run AI apps and agents” said CEO Satya Nadella.
-
Jan 13, 2025 |
thestack.technology | Ed Targett |Tristan Greene |Ev Kontsevoy
Gilt yields are soaring, hiring is slumping, the chancellor is seeking investment from China – an authoritarian nation intent on maliciously attacking critical national infrastructure and stealing intellectual property – and Prime Minister Keir Starmer is unceremoniously hitching UK Plc’s cart to a riproaring AI bandwagon in the hope that it leads to sunlit economic uplands; or at least the dopamine hit of rare positive press. May you live in interesting times.
-
Jan 13, 2025 |
thestack.technology | Tristan Greene |Ev Kontsevoy
State-of-the-art artificial intelligence (AI) models from Alibaba, Google, Meta, Microsoft, Mistral AI, and OpenAI have come under recent scrutiny for allegedly “cheating” on AI benchmarking tests, writes Tristan Greene. Evidence presented by whistleblowers and analysts demonstrates that specific AI models can be made to output the test sets for at least two popular benchmarks — MMLU and GSM8K.
-
Jan 10, 2025 |
cyberscoop.com | Ev Kontsevoy |Greg Otto
Conventional wisdom assumes that the more vulnerabilities a security tool flags, the easier it will be for a company to secure its infrastructure. In theory, layering more tools into a tech stack should equal more effective attack surface monitoring, right? Well, reality isn’t quite panning out like that. If anything, tool sprawl has created an illusion of security, drowning security teams in the performative theatrics of squashing countless alerts — most of them false positives.
Try JournoFinder For Free
Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.
Start Your 7-Day Free Trial →