Applying cyber resilience to DORA solutions

The Digital Operational Resilience Act, or DORA, is a European Union (EU) regulation that created a binding, comprehensive information and communication technology (ICT) risk-management framework for the EU financial sector. DORA establishes technical standards that financial entities and their critical third-party technology service providers must implement in their ICT systems by January 17, 2025. DORA applies to all …

AVIS

Autonomous visual information seeking with large language models

Posted by Ziniu Hu, Student Researcher, and Alireza Fathi, Research Scientist, Google Research, Perception Team There has been great progress towards adapting large language models (LLMs) to accommodate multimodal inputs for tasks including image captioning, visual question answering (VQA), and open vocabulary recognition. Despite such achievements, current state-of-the-art visual language models (VLMs) perform inadequately on …

1 image.max 1000x1000 1

Implementing MLOps tools and processes for supply chain science at Wayfair

In our previous blog post, we presented Wayfair’s MLOps vision and how we implemented it within our Data Science & Machine Learning organization using Vertex AI, supported by tooling that we built in-house and state-of-the-art MLOps processes. We shared our MLOps reference architecture that includes a shared Python library that we built to interact with …

AVA Discovery View: Surfacing Authentic Moments

By: Hamid Shahid, Laura Johnson, Tiffany Low Synopsis At Netflix, we have created millions of artwork to represent our titles. Each artwork tells a story about the title it represents. From our testing on promotional assets, we know which of these assets have performed well and which ones haven’t. Through this, our teams have developed an …

Unlock true Kubernetes cost savings without losing precious sleep over performance risks

The race to innovate has likely left you (and many, many others) with unexpectedly high cloud bills and/or underutilized resources. In fact, according to Flexera’s 2023 State of the Cloud report, for the first time in a decade, “managing cloud spend” (82%) surpassed “security” (79%) to become the number one challenge facing organizations across the board. We …

CHITA2520hero

Neural network pruning with combinatorial optimization

Posted by Hussein Hazimeh, Research Scientist, Athena Team, and Riade Benbaki, Graduate Student at MIT Modern neural networks have achieved impressive performance across a variety of applications, such as language, mathematical reasoning, and vision. However, these networks often use large architectures that require lots of computational resources. This can make it impractical to serve such …

ML 14589 Solution overview 2

Build ML features at scale with Amazon SageMaker Feature Store using data from Amazon Redshift

Amazon Redshift is the most popular cloud data warehouse that is used by tens of thousands of customers to analyze exabytes of data every day. Many practitioners are extending these Redshift datasets at scale for machine learning (ML) using Amazon SageMaker, a fully managed ML service, with requirements to develop features offline in a code …

FineRecon: Depth-aware Feed-forward Network for Detailed 3D Reconstruction

Recent works on 3D reconstruction from posed images have demonstrated that direct inference of scene-level 3D geometry without iterative optimization is feasible using a deep neural network, showing remarkable promise and high efficiency. However, the reconstructed geometries, typically represented as a 3D truncated signed distance function (TSDF), are often coarse without fine geometric details. To …

Curbing Connection Churn in Zuul

By Arthur Gonigberg, Argha C Plaintext Past When Zuul was designed and developed, there was an inherent assumption that connections were effectively free, given we weren’t using mutual TLS (mTLS). It’s built on top of Netty, using event loops for non-blocking execution of requests, one loop per core. To reduce contention among event loops, we created …

Exploring the risks and alternatives of ChatGPT: Paving a path to trustworthy AI

You are making a smoothie for your friends to enjoy. Already mixed with assorted fruit and yogurt, your friend Ruchir arrives with a ripe apple and gives it to you to complete your refreshing masterpiece. Now complete, you can almost still smell the hint of apple as the drink is being poured. Before your first …