InfoWorld |
|
||||||
OpenAI launches stateful AI on AWS, signaling a control plane power shift2:58 Stateless AI, in which a model offers one-off answers without context from previous sessions, can be helpful in the short-term but lacking for more complex, multi-step scenarios. To overcome these limitations, OpenAI is introducing what it is calling, naturally, “stateful AI.” The company has announced that it will soon offer a stateful runtime environment in partnership with Amazon, built to sim… Red Hat ships AI platform for hybrid cloud deployments23:25 Red Hat has made its Red Hat AI Enterprise platform generally available, with the intent to provide an AI platform to simplify development and deployment of hybrid cloud-based applications powered by AI. Availability of the platform was announced February 24 . Engineered to solve the “production gap” for AI, Red Hat AI Enterprise unifies AI model and application life cycles—from model development… ‘Silent’ Google API key change exposed Gemini AI data22:28 Google Cloud API keys, normally used as simple billing identifiers for APIs such as Maps or YouTube, could be scraped from websites to give access to private Gemini AI project data, researchers from Truffle Security recently discovered. According to a Common Crawl scan of websites carried out by the company in November, there were 2,863 live Google API keys that left organizations exposed. This i… FinOps for agents: Loop limits, tool-call caps and the new unit economics of agentic SaaS27.února The first time my team shipped an agent into a real SaaS workflow, the product demo looked perfect. The production bill did not. A small percentage of sessions hit messy edge cases, and our agent responded the way most agents do: it tried harder. It re-planned, re-queried, re-summarized and retried tool calls. Users saw a slightly slower response, and finance saw a step-change in variable spend. … Cloud sovereignty isn’t a toggle feature27.února Sovereignty, locality, and “alternative cloud” strategies are often treated as simple settings in hyperscaler consoles. Pick a region, check a compliance box, and move on. IT consultancy Coinerella posted about replacing a typical US-centric startup baseline with a “Made in the EU” stack . They treat sovereignty as an architectural posture and an operating model that can save money. It still invo… The reliability cost of default timeouts27.února In user-facing distributed systems, latency is often a stronger signal of failure than errors. When responses exceed user expectations, the distinction between “slow” and “down” becomes largely irrelevant, even if every service is technically healthy. I’ve seen this pattern across multiple systems. One incident, in particular, forced me to confront how much production behavior is shaped by defaul… Google’s Android developer verification program draws pushback27.února Google’s planned Android developer verification program, requiring Android apps to be registered by verified developers, is getting pushback, with opponents urging developers not to sign up for the program and to make their opposition known. An open letter opposing the verification program was posted February 24 at Keep Android Open , a consortium that is fighting the Google verification program.… Lightrun unveils AI SRE to find and fix software production errors26.února Lightrun has announced Lightrun AI SRE, an AI-powered site reliability engineering (SRE) assistant designed to detect software production errors and performance degradations. Introduced February 25, the Lightrun AI SRE correlates the service-level issues it finds with proven root causes to propose solutions. Drawing on on live, in-line runtime context, the AI SRE allows AI agents and engineering … Three web security blind spots in mobile DevSecOps pipelines26.února We know that mobile development in 2025 was different. It shifted from a “front-end” concern to a massive, distributed headache in which the most vulnerable component could be any unmanaged, hostile endpoint. In fact, 43% of organizational breaches originate at the mobile edge. The problem lies with the outdated web-centric security models that app developers rely on. With mobile platforms operat… The best new features of C# 1426.února Available as a part of .NET 10 , which was released last November, C# 14 brings a plethora of new features and enhancements that make it easier to write efficient, high performant code. Just as we walked through the new features and enhancements in C# 13 and C# 12 , in this article we’ll take a close look at some of the best new features in C# 14. To work with the code examples provided in this a… The browser is your database: Local-first comes of age26.února Once upon a time, we had mainframes with simple, nonprogrammable consoles. All the power was centralized. Then, Gates and Jobs put a personal computer on every desk. The power was distributed. Then, the internet came along, and the browser became the most popular application in the world. The power moved back onto the server, the cloud became king. Now, that pendulum is swinging back. This articl… Abandoned project linking Java, JavaScript makes a comeback26.února Once envisioned as a bridge between Java and JavaScript , the Detroit project never got off the ground. Now, there are efforts at reviving it, adding a Python engine to the mix. Intended to enable using JavaScript as an extension language for Java applications, the Detroit project fizzled out after losing its sponsoring group around 2018. But according to a new proposal dated February 25, there s… Inception’s Mercury 2 speeds around LLM latency bottleneck25.února Inception has introduced Mercury 2, calling it the world’s fastest reasoning LLM. Intended for production AI, the large language model leverages parallel refinement rather than sequential decoding. Mercury 2 was announced February 24 , with access requests available on Inception’s website . Developers can also try Mercury 2 using the Inception chat . Inception says Mercury 2 is intended to solve … Microsoft warns of job‑themed repo lures targeting developers with multi‑stage backdoors25.února Microsoft says it has uncovered a coordinated campaign targeting software developers through malicious repositories posing as legitimate Next.js projects and technical assessments. The campaign employs carefully crafted lures to blend into routine workflows, such as cloning repositories, opening projects, and running builds, thereby allowing the malicious code to execute undetected. Telemetry col… |