Internet Speed Test News Google opens doors to safer artificial intelligence. Introducing Gemma 2

Google opens doors to safer artificial intelligence. Introducing Gemma 2

Google introduces a trio of new AI models named Gemma 2, which emphasize security, transparency, and accessibility. The Gemma 2 2B model is optimized for regular computers, ShieldGemma protects against toxic content, and Gemma Scope allows detailed analysis of model functioning. Google aims to democratize AI and build trust.

Google opens doors to safer artificial intelligence. Introducing Gemma 2

Google embarks on a quest for more ethical and transparent artificial intelligence. As part of this effort, it has released a trio of new generative AI models named Gemma 2, which promise higher security, lower hardware requirements, and smoother operation.

Security first

Unlike the Gemini models, which Google uses for its own products, the Gemma series is intended for more open use by developers and researchers. Similar to Meta's Llama project, Google is also striving to build trust and collaboration in the AI field.

The first innovation is the Gemma 2 2B model, designed for generating and analyzing text. Its greatest advantage is the ability to run on less powerful devices. This opens the door to a wide range of users. The model is available through platforms like Vertex AI, Kaggle, and Google AI Studio.

ShieldGemma: Guardian against toxic content

The new ShieldGemma introduced a set of safety classifiers whose task is to identify and block harmful content. This includes manifestations of hate, harassment, and sexually explicit materials. In short, ShieldGemma acts as a filter that checks both the input data for the model and its outputs.

The final addition is Gemma Scope, a tool enabling detailed analysis of the Gemma 2 model's functioning. Google describes it as a set of specialized neural networks that unpack the complex information processed by the model into a more comprehensible form.

Researchers can better understand how Gemma 2 identifies patterns, processes data, and generates results. The release of the Gemma 2 models comes shortly after the U.S. Department of Commerce supported open AI models in its report.

These make generative AI accessible to smaller companies, non-profits, and independent developers. Additionally, the report highlighted the need for tools to monitor and regulate these models to minimize potential risks.

Ransomware attacks are among the most common cyber threats today and are no longer just a concern for large companies. Just one careless click can cost you access to your data. We'll explain what ransomware is, how it works, and why attackers are increasingly targeting average users and smaller businesses.

Connecting to the internet today is not just a matter of speed but also of trust. Networks handle more and more devices, sensitive data, and services that communicate almost constantly. This is why an approach called zero trust has emerged, where nothing is automatically considered safe. The article explains why this model was created and how it subtly influences everyday internet functioning.

It happens that the battery life decreases faster than one would expect, even when the device is not particularly stressed during the day. Often, it's not a single specific error but a sum of small influences that gradually accumulate. This article explains what has the greatest impact on battery life, when idle draining occurs, and why this can turn into an issue causing the phone not to last even one day.

Connecting to the internet during a flight is no longer an exception, but it still doesn't work as you're used to at home. In-flight Wi-Fi depends on the technology used, the type of aircraft, and network congestion, and paying for access doesn't always mean fast connection. In this article, we'll explain how in-flight internet works, why it can be slow, and when you can rely on it.

RCS chat is appearing more frequently in mobile devices, especially with the arrival of iOS 18 and the gradual phasing out of older networks. It is a method of communication that uses the internet, offering higher quality sharing of photos and videos than traditional SMS. We'll explain what RCS means and when it makes sense to keep it enabled.

A first mobile phone can make a child's communication and daily orientation easier, but it also opens topics that are good to address in advance. These include safety, sharing, communication, or screen time. How to prepare a child for their first phone so that they use it safely, calmly, and wisely?