Player FM - Internet Radio Done Right
11,457 subscribers
Checked 10d ago
تمت الإضافة منذ قبل four أعوام
المحتوى المقدم من Red Hat. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Red Hat أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.
Player FM - تطبيق بودكاست
انتقل إلى وضع عدم الاتصال باستخدام تطبيق Player FM !
انتقل إلى وضع عدم الاتصال باستخدام تطبيق Player FM !
Compiler
وسم كل الحلقات كغير/(كـ)مشغلة
Manage series 2966759
المحتوى المقدم من Red Hat. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Red Hat أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.
Compiler gives you perspectives and insights from the tech industry—free from jargon and judgment. We’re here to help tech newbies understand what’s going on. Learn more about our show at redhat.com/en/compiler-podcast
…
continue reading
78 حلقات
وسم كل الحلقات كغير/(كـ)مشغلة
Manage series 2966759
المحتوى المقدم من Red Hat. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Red Hat أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.
Compiler gives you perspectives and insights from the tech industry—free from jargon and judgment. We’re here to help tech newbies understand what’s going on. Learn more about our show at redhat.com/en/compiler-podcast
…
continue reading
78 حلقات
كل الحلقات
×Phishing. DDoS attacks. Social engineering. These are not new terms if you know anything about cybersecurity. But emerging technologies are making these well-known methods of attack easier than ever. Bad actors are paying attention—and they are leveling up their skills accordingly. It isn’t just cybersecurity professionals who have to be aware and responsive– people working in product security are a part of the effort, too. What do they need to know to respond to these newer attacks? This season, hosts Emily Bock and Vincent Danen will dig into how the security landscape has changed, and how IT professionals can work together to prevent and prepare for whenever, wherever, and however threats emerge.…
C
Compiler


Sure, AI has made a splash. And it's on us to level up, learn the ropes, and roll with it. But how do we even do that? And what cool human stuff might we accidentally ditch along the way? The Compiler team ends the season discussing the importance of context, creativity, and applied knowledge.
C
Compiler


Agentic AIs are showing promise for tedious work. But it’s hard to explain exactly how you want it done—and getting it wrong could create big problems. This episode of Compiler investigates how Agentic AIs could carry out their tasks and how some agents are taking their baby steps in the wide world. The team also considers the difficulties humans have expressing what we want computers to do for us, and how that could create unintended consequences.…
Does your health insurance chatbot need to tell jokes? No. Does it need to be accurate? Absolutely. That's hard when biases get in the way. The introduction of bias into a model can be unintentional, but it can have significant consequences for those relying on its guidance. The Compiler team examines the ways bias can creep in, and what steps can be taken to address it.…
C
Compiler


1 Diagnosing and Dispelling AI Hallucinations 33:43
33:43
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب33:43
AI is notorious for making stuff up. But it doesn’t always tell you when it does. That’s a problem for users who may not realize hallucinations are possible. This episode of Compiler investigates the persistent problem of AI Hallucination. Why does AI lie? Do these AI models know they’re hallucinating? What can we do to minimize hallucinations—or at least get better at seeing them?…
With the massive flow of AI-generated content onto the internet, it was only a matter of time until all of those bits of data found their way back into AI models. But what do you get when generative AI models start getting their answers from that content? The Compiler team digs into AI feedback loops, and the unique challenges they present for technologists...and everyone else.…
Copyright infringement is a huge issue for AI training and use. Can LLMs give you copyrighted content? What data can you use to train and tune your own model? In this episode of Compiler, we explore who owns what when AI models learn from protected content—and why it matters.
There’s no one AI model to rule them all. Each project has its own requirements. Where do you get started building your own model? Compiler continues its conversations with big dreamers about their big projects—and how they’re piecing together the building blocks of their AI models.
There is a lot of excitement around AI models, but can it meet the expectations set by blockbuster movies? What’s the current inflection point between what’s feasible and what’s not? The Compiler team talks to both big dreamers and heavy adopters wading into the space, hearing their thoughts on how AI can help scale daunting work, fill in the gaps, and make the fantastic into reality.…
Everyone’s talking about AI. Everyone says it’s the future. To find out where we’re going, we should know how we got here—and exactly what we’re working with. We hear a short history of AI development before diving into how it’s already changed the ways we learn and code.
Online multiplayer games are a staple of modern entertainment. But internet connectivity is an unpredictable factor in the experience. That’s why netcode exists. But what is it? And how does it really affect players?
From healthcare to banking, there’s a lot of industries that require the utmost protection for sensitive data. But for those sectors, innovation is also essential. That’s why disconnected environments—or air-gap environments—can be seen across the IT landscape. But how do they work? How do technologists ensure the data is accurate and usable, and how can these environments foster innovation?…
C
Compiler


1 Linux, Shadowman, And Open Source Spirit 27:35
27:35
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب27:35
Red Hat Enterprise Linux has been around for a while. For many technologists, be they professional or hobbyist, it jump started their interest in open source. But how did the operating system, and the culture behind it, strike a chord with so many people?
We all know what industry conferences are for. You see the talks, you do the networking, you get the swag. Anything else? Well, yes, actually. In our second episode on tech conferences, we cover how to make the most of attending them. How can you prepare? What do you do in the moment? And how do you use that experience after you return to the office?…
C
Compiler


Last year, we discussed the impact of data centers on the global power grid. We know open source technology can help us optimize our power consumption. But people are looking at sustainable energy usage beyond the server. How can technologists think about the balance between sustainability, business operations, and their customers’ needs?…
مرحبًا بك في مشغل أف ام!
يقوم برنامج مشغل أف أم بمسح الويب للحصول على بودكاست عالية الجودة لتستمتع بها الآن. إنه أفضل تطبيق بودكاست ويعمل على أجهزة اندرويد والأيفون والويب. قم بالتسجيل لمزامنة الاشتراكات عبر الأجهزة.