Arun Joseph, Patrick Whelan discuss patterns for productionizing LLM powered applications, AI agents development lifecycle, toolkits, components and building blocks of an AI Agents computing platform.
Michael Brunton-Spall discusses some of the most advanced attacks that are in the public domain, mostly attributed in public by commercial organizations.
Erik Peterson discusses the actions, tasks, and approaches necessary for crafting software that meets technical specifications and controls expenditure in the cloud.
Tejas Kumar overviews web engineering in relation to AI, AI engineering, Intelligent Answering Engines, an update on CSS, HTML, JavaScript, and personal health and productivity.
Georg Dresler discusses various methods to perform prompt injection to extract system prompts and documents used by GPTs, and ways to integrate countermeasures to protect against stealing information.
Rich Smith provides a case study of a real world LLM based app that is vulnerable to a variety of attack vectors that illustrate the challenges to account for when integrating today's LLM technologies.
Karthik Ramgopal, Min Chen discuss how LinkedIn changed the remote procedure calls (RPC) protocol for 50,000 production endpoints from Rest.li to Google's gRPC.