15
nových článků - klikněte pro zobrazení

InfoWorld

URL:

http://www.infoworld.com

Katalog:

Technology
Tech → .COM

Publikuje:

5,2 položek/den

OpenAI launches stateful AI on AWS, signaling a control plane power shift

2:58
Stateless AI, in which a model offers one-off answers without context from previous sessions, can be helpful in the short-term but lacking for more complex, multi-step scenarios. To overcome these limitations, OpenAI is introducing what it is calling, naturally, “stateful AI.” The company has announced that it will soon offer a stateful runtime environment in partnership with Amazon, built to sim…

Red Hat ships AI platform for hybrid cloud deployments

23:25
Red Hat has made its Red Hat AI Enterprise platform generally available, with the intent to provide an AI platform to simplify development and deployment of hybrid cloud-based applications powered by AI. Availability of the platform was announced February 24 . Engineered to solve the “production gap” for AI, Red Hat AI Enterprise unifies AI model and application life cycles—from model development…

‘Silent’ Google API key change exposed Gemini AI data

22:28
Google Cloud API keys, normally used as simple billing identifiers for APIs such as Maps or YouTube, could be scraped from websites to give access to private Gemini AI project data, researchers from Truffle Security recently discovered. According to a Common Crawl scan of websites carried out by the company in November, there were 2,863 live Google API keys that left organizations exposed. This i…

FinOps for agents: Loop limits, tool-call caps and the new unit economics of agentic SaaS

27.února
The first time my team shipped an agent into a real SaaS workflow, the product demo looked perfect. The production bill did not. A small percentage of sessions hit messy edge cases, and our agent responded the way most agents do: it tried harder. It re-planned, re-queried, re-summarized and retried tool calls. Users saw a slightly slower response, and finance saw a step-change in variable spend. …

Cloud sovereignty isn’t a toggle feature

27.února
Sovereignty, locality, and “alternative cloud” strategies are often treated as simple settings in hyperscaler consoles. Pick a region, check a compliance box, and move on. IT consultancy Coinerella posted about replacing a typical US-centric startup baseline with a “Made in the EU” stack . They treat sovereignty as an architectural posture and an operating model that can save money. It still invo…

The reliability cost of default timeouts

27.února
In user-facing distributed systems, latency is often a stronger signal of failure than errors. When responses exceed user expectations, the distinction between “slow” and “down” becomes largely irrelevant, even if every service is technically healthy. I’ve seen this pattern across multiple systems. One incident, in particular, forced me to confront how much production behavior is shaped by defaul…

Google’s Android developer verification program draws pushback

27.února
Google’s planned Android developer verification program, requiring Android apps to be registered by verified developers, is getting pushback, with opponents urging developers not to sign up for the program and to make their opposition known. An open letter opposing the verification program was posted February 24 at Keep Android Open , a consortium that is fighting the Google verification program.…

Lightrun unveils AI SRE to find and fix software production errors

26.února
Lightrun has announced Lightrun AI SRE, an AI-powered site reliability engineering (SRE) assistant designed to detect software production errors and performance degradations. Introduced February 25, the Lightrun AI SRE correlates the service-level issues it finds with proven root causes to propose solutions. Drawing on on live, in-line runtime context, the AI SRE allows AI agents and engineering …

Three web security blind spots in mobile DevSecOps pipelines

26.února
We know that mobile development in 2025 was different. It shifted from a “front-end” concern to a massive, distributed headache in which the most vulnerable component could be any unmanaged, hostile endpoint. In fact, 43% of organizational breaches originate at the mobile edge. The problem lies with the outdated web-centric security models that app developers rely on. With mobile platforms operat…

The best new features of C# 14

26.února
Available as a part of .NET 10 , which was released last November, C# 14 brings a plethora of new features and enhancements that make it easier to write efficient, high performant code. Just as we walked through the new features and enhancements in C# 13 and C# 12 , in this article we’ll take a close look at some of the best new features in C# 14. To work with the code examples provided in this a…

The browser is your database: Local-first comes of age

26.února
Once upon a time, we had mainframes with simple, nonprogrammable consoles. All the power was centralized. Then, Gates and Jobs put a personal computer on every desk. The power was distributed. Then, the internet came along, and the browser became the most popular application in the world. The power moved back onto the server, the cloud became king. Now, that pendulum is swinging back. This articl…

Abandoned project linking Java, JavaScript makes a comeback

26.února
Once envisioned as a bridge between Java and JavaScript , the Detroit project never got off the ground. Now, there are efforts at reviving it, adding a Python engine to the mix. Intended to enable using JavaScript as an extension language for Java applications, the Detroit project fizzled out after losing its sponsoring group around 2018. But according to a new proposal dated February 25, there s…

Inception’s Mercury 2 speeds around LLM latency bottleneck

25.února
Inception has introduced Mercury 2, calling it the world’s fastest reasoning LLM. Intended for production AI, the large language model leverages parallel refinement rather than sequential decoding. Mercury 2 was announced February 24 , with access requests available on Inception’s website . Developers can also try Mercury 2 using the Inception chat . Inception says Mercury 2 is intended to solve …

Microsoft warns of job‑themed repo lures targeting developers with multi‑stage backdoors

25.února
Microsoft says it has uncovered a coordinated campaign targeting software developers through malicious repositories posing as legitimate Next.js projects and technical assessments. The campaign employs carefully crafted lures to blend into routine workflows, such as cloning repositories, opening projects, and running builds, thereby allowing the malicious code to execute undetected. Telemetry col…
© 2000-2026 ANNECA s.r.o., Klíšská 977/77, 400 01 Ústí nad Labem, Tel: +420 478571021, Email: info@pravednes.cz, Twitter: @pravednes