How to Build a Generative AI-Enabled Synthetic Data Pipeline with OpenUSD
Training physical AI models used to power autonomous machines, such as robots and autonomous vehicles, requires huge amounts...
Fast-Track Robot Learning in Simulation Using NVIDIA Isaac Lab
Robots need to be adaptable, readily learning new skills and adjusting to their surroundings. Yet traditional training methods...
Building Spatial Intelligence from Real-World 3D Data Using Deep-Learning Framework fVDB
Generative physical AI models can understand and execute actions with fine or gross motor skills within the physical...
Build VLM-Powered Visual AI Agents Using NVIDIA NIM and NVIDIA VIA Microservices
Traditional video analytics applications and their development workflow are typically built on fixed-function, limited models that are designed...
Advancing Telepresence and Next-Generation Digital Humans with NVIDIA Maxine
At SIGGRAPH 2024 this week, NVIDIA is showcasing the latest advancements in the NVIDIA Maxine AI developer platform, available...
Access to NVIDIA NIM Now Available Free to Developer Program Members
The ability to use simple APIs to integrate pretrained AI foundation models into products and experiences has significantly...
Amazon EC2 Fleet and EC2 Auto Scaling groups now supports aliases for Amazon Machine Images (AMIs)
EC2 Fleet and EC2 Auto Scaling group now support using custom identifiers to reference Amazon Machine Images (AMI)...
Apple iOS 18.1 Beta previews Apple Intelligence for the first time
Apple has released the iOS 18.1 Beta to developers, allowing them to test some of its upcoming AI-powered...
Amazon Connect Contact Lens now provides downloadable screen recordings
Amazon Connect Contact Lens now provides the ability to download screen recordings from the contact details page in...
Former Avaya employee gets 4 years for $88M license piracy scheme
Three individuals who orchestrated a massive-scale pirate operation involving the sale of Avaya business telephone system software licenses...
Microsoft: Ransomware gangs exploit VMware ESXi auth bypass in attacks
Microsoft warned today that ransomware gangs are actively exploiting a VMware ESXi authentication bypass vulnerability in attacks. […]...
Build your event-driven application using AWS CloudFormation Git sync status changes
AWS CloudFormation Git sync now publishes sync status changes as events to Amazon Eventbridge. With this launch, you...
Introducing AWS End User Messaging
Today, we announce AWS End User Messaging as the new name for Amazon Pinpoint’s SMS, MMS, push, and...
Amazon Q Business launches support for cross-region AWS IAM Identity Center access
Amazon Q Business is a fully managed, generative-AI powered assistant that enhances workforce productivity by answering questions, providing...
Amazon MQ now supports ActiveMQ version 5.18
Amazon MQ now supports ActiveMQ minor version 5.18, which introduces several improvements and fixes compared to the previous...
AWS Elemental MediaLive now supports SRT caller input
You can now use AWS Elemental MediaLive to receive sources using SRT caller. Secure Reliable Transport (SRT), an...
Critical Flaw in Acronis Cyber Infrastructure Exploited in the Wild
Cybersecurity company Acronis is warning that a now-patched critical security flaw impacting its Cyber Infrastructure (ACI) product has...
HealthEquity says data breach impacts 4.3 million people
HSA provider HealthEquity has determined that a cybersecurity incident disclosed earlier this month has compromised the information of...
Proofpoint settings exploited to send millions of phishing emails daily
A massive phishing campaign dubbed “EchoSpoofing” exploited a security gap in Proofpoint’s email protection service to dispatch millions...
Proofpoint Email Routing Flaw Exploited to Send Millions of Spoofed Phishing Emails
An unknown threat actor has been linked to a massive scam campaign that exploited an email routing misconfiguration...