Meter.net News Google opens doors to safer artificial intelligence. Introducing Gemma 2

Google opens doors to safer artificial intelligence. Introducing Gemma 2

Google introduces a trio of new AI models named Gemma 2, which emphasize security, transparency, and accessibility. The Gemma 2 2B model is optimized for regular computers, ShieldGemma protects against toxic content, and Gemma Scope allows detailed analysis of model functioning. Google aims to democratize AI and build trust.

Google opens doors to safer artificial intelligence. Introducing Gemma 2

Google embarks on a quest for more ethical and transparent artificial intelligence. As part of this effort, it has released a trio of new generative AI models named Gemma 2, which promise higher security, lower hardware requirements, and smoother operation.

Security first

Unlike the Gemini models, which Google uses for its own products, the Gemma series is intended for more open use by developers and researchers. Similar to Meta's Llama project, Google is also striving to build trust and collaboration in the AI field.

The first innovation is the Gemma 2 2B model, designed for generating and analyzing text. Its greatest advantage is the ability to run on less powerful devices. This opens the door to a wide range of users. The model is available through platforms like Vertex AI, Kaggle, and Google AI Studio.

ShieldGemma: Guardian against toxic content

The new ShieldGemma introduced a set of safety classifiers whose task is to identify and block harmful content. This includes manifestations of hate, harassment, and sexually explicit materials. In short, ShieldGemma acts as a filter that checks both the input data for the model and its outputs.

The final addition is Gemma Scope, a tool enabling detailed analysis of the Gemma 2 model's functioning. Google describes it as a set of specialized neural networks that unpack the complex information processed by the model into a more comprehensible form.

Researchers can better understand how Gemma 2 identifies patterns, processes data, and generates results. The release of the Gemma 2 models comes shortly after the U.S. Department of Commerce supported open AI models in its report.

These make generative AI accessible to smaller companies, non-profits, and independent developers. Additionally, the report highlighted the need for tools to monitor and regulate these models to minimize potential risks.

Listening to a movie or playlist on multiple headphones has always been difficult. Auracast offers the ability to play the same audio to multiple people without pairing or special accessories. It can be used at home with TV, on trips, and in places with poorly audible announcements. In the article, we will show how this innovation works in practice and when we will start encountering it regularly.

Losing signal in the middle of the mountains or on the open sea no longer has to mean a loss of connection to the world. A satellite phone works even where regular mobile networks end. In the article, you'll learn how the device connects via satellites, what types of networks exist, how much calls cost, and why satellite communication is becoming more accessible for ordinary users.

Data breaches happen all the time and can affect anyone. Even strong login credentials can appear in the database of leaked passwords circulating on the internet. In the article, you will learn how to perform a password check using verified tools and find out if someone has gained access to your accounts.

With the growing number of connected devices and the increased volume of data being transmitted, new ways are being sought to speed up and improve network efficiency. Internet via light, referred to as Li-Fi technology, uses LED lighting for wireless data transmission and promises higher speed and greater security. Let's see how it works and where it's already being tested.

Mobile networks of the sixth generation will push the boundaries of communication and data transmission. 6G internet will offer speeds in the order of terabits, minimal delay, and integration with artificial intelligence. In the article, we explain how this technology works, how it differs from 5G, what frequencies it uses, and why it is essential for smart cities and modern industry.

Wireless charging has evolved from a luxury feature to a standard part of most modern phones. Simply place your mobile on the pad, and energy begins to flow without searching for a cable and connector. We explain how wireless charging works, what it entails, and why Qi and Qi2 technologies have become the new standard of convenience.