Fine-Tune and Align LLMs Easily with NVIDIA NeMo Customizer
As large language models (LLMs) continue to gain traction in enterprise AI applications, the demand for custom models...
Scale and Curate High-Quality Datasets for LLM Training with NVIDIA NeMo Curator
Enterprises are using large language models (LLMs) as powerful tools to improve operational efficiency and drive innovation. NVIDIA...
Streamline Evaluation of LLMs for Accuracy with NVIDIA NeMo Evaluator
Large language models (LLMs) have demonstrated remarkable capabilities, from tackling complex coding tasks to crafting compelling stories to...
ElastiCache encryption at rest is now available in the AWS GovCloud (US) Regions
Amazon ElastiCache for Redis encryption at rest is now available in the AWS GovCloud (US) Regions (encryption at...
Announcing increased default quotas for CloudWatch Logs APIs
Amazon CloudWatch Logs now supports increased default API quotas. The default quota for ingesting logs has increased from...
Migrate existing domains to new SageMaker Studio via SageMaker Console
We are excited to announce that Amazon SageMaker now provides capability to enable existing Studio Classic domains to...
AWS Systems Manager now supports RHEL 8.9 and 9.3
AWS Systems Manager now supports instances running Red Hat Enterprise Linux (RHEL) versions 8.9 and 9.3. Systems Manager...
AWS Cloud WAN and AWS Network Manager are now available in AWS Asia Pacific (Jakarta) Region
With AWS Cloud WAN, you can use a central dashboard and network policies to create a global network...
CodeCatalyst workflows runtime image selection
Today, Amazon CodeCatalyst announces a new runtime docker image for customers to use with their build and test...
AWS Control Tower now supports APIs in AWS GovCloud (US) Regions
AWS Control Tower customers operating in the AWS GovCloud (US) Regions can now use APIs to programmatically manage...
Cisco Access Point Software Denial of Service Vulnerability
A vulnerability in the IP packet processing of Cisco Access Point (AP) Software could allow an unauthenticated, remote...
Cisco Access Point Software Secure Boot Bypass Vulnerability
A vulnerability in the boot process of Cisco Access Point (AP) Software could allow an unauthenticated, physical attacker...
Cisco Aironet Access Point Software Resource Exhaustion Denial of Service Vulnerability
A vulnerability in the handling of encrypted wireless frames of Cisco Aironet Access Point (AP) Software could allow...
Cisco Catalyst Center Authorization Bypass Vulnerability
A vulnerability in the web-based management interface of Cisco Catalyst Center, formerly Cisco DNA Center, could allow an...
Cisco IOS Software for Catalyst 6000 Series Switches Denial of Service Vulnerability
A vulnerability in Cisco IOS Software for Cisco Catalyst 6000 Series Switches could allow an unauthenticated, adjacent attacker...
Cisco IOS XE Software Auxiliary Asynchronous Port Denial of Service Vulnerability
A vulnerability in auxiliary asynchronous port (AUX) functions of Cisco IOS XE Software could allow an authenticated, local...
Cisco IOS XE Software DHCP Snooping with Endpoint Analytics Denial of Service Vulnerability
A vulnerability in the DHCP snooping feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker...
Cisco IOS XE Software NETCONF/RESTCONF IPv4 Access Control List Bypass Vulnerability
A vulnerability in the data model interface (DMI) services of Cisco IOS XE Software could allow an unauthenticated,...
Cisco IOS XE Software OSPFv2 Denial of Service Vulnerability
A vulnerability in the OSPF version 2 (OSPFv2) feature of Cisco IOS XE Software could allow an unauthenticated,...
Cisco IOS XE Software Privilege Escalation Vulnerability
A vulnerability in the NETCONF feature of Cisco IOS XE Software could allow an authenticated, remote attacker to...