Google’s new toolset to help connect AI agents to BigQuery
The new toolset contains tools that will allow AI agents to execute queries inside BigQuery as well as fetch metadata from the cloud-based data warehouse. These tools include the list_dataset_ids tool, which retrieves all dataset IDs within a Google Cloud project; get_dataset_info tool, which provides detailed metadata about a specific dataset; list_table_ids tool, which lists […]
Read MoreWhat is an IoT gateway?
An IoT gateway is a physical device or software program that serves as the connection point between the cloud and internet of things devices, such as controllers, sensors and smart devices. IoT is used in enterprises and industries and can be found in consumer products. IoT gateways act as a central hub, connecting IoT devices […]
Read MoreSnowflake brings analytics workloads into its cloud with Snowpark Connect for Apache Spark
Snowpark Connect for Apache Spark is Snowflake’s take on that technology, enabling enterprises to run their Spark code on Snowflake’s vectorized engine in Data Cloud. For Snowflake customers, the new capability will make it easy for developers to move their code to Snowpark, essentially offering a combination of Spark’s familiarity and Snowflake’s simplicity, according to […]
Read MoreThe importance of memory for AI
Persona memory stores the agent’s identity, personality traits, roles, expertise, and communication style. Toolbox memory contains tool definitions, metadata, parameter schemas, and embeddings for the agent’s capabilities. Conversation memory stores the history of exchanges between the user and the agent. Workflow memory tracks the state of multistep processes. Episodic memory stores specific events or experiences […]
Read MoreWhat public cloud gets wrong with AI
AI is not cheap. During the past year, public cloud giants have significantly accelerated their investments in AI. By the close of 2024, Microsoft had invested more than $80 billion in AI infrastructure, partnerships, and development. AWS is on track to spend nearly a year’s worth of its revenue on AI in 2025, with AI […]
Read More11 IoT security challenges and how to overcome them
From smartwatches to smart streetlights, smart home devices to smart manufacturing, the internet of things has revolutionized how people and organizations operate, improving efficiencies and optimizing processes. With these benefits, however, comes a major challenge: IoT increases the number and types of security risks businesses and consumers face. Any device that connects to the […]
Read MoreJetBrains working on higher-abstraction programming language
JetBrains, creator of the popular Kotlin programming language, is developing a new programming language intended to make AI and code much more controllable and transparent. In a July 23 interview with InfoWorld, JetBrains CEO Kirill Skrygan elaborated on company plans for an as-yet-unnamed language that would describe a program at a higher level of abstraction. […]
Read MoreWhat you can do now with Python 3.14 RC1
Python 3.14’s first release candidate is here, and we’ve done a quick review of all the best new features. Also, four tips for making the best of Python’s now-fully-supported free-threading features, a first look at how Astral’s uv tool doubles as a Python package click-to-run system, and a side-by-side comparison of two new Rust-powered Python typecheckers. It’s […]
Read MoreWhat is internet of things privacy (IoT privacy)?
Internet of things privacy, or IoT privacy, is the special consideration required to protect individuals’ information from exposure in the IoT environment. These steps are necessary because, in an IoT setting, almost any physical or logical entity or object can be given a unique identifier and the ability to communicate autonomously over the internet or […]
Read MoreHacker inserts destructive code in Amazon Q as update goes live
“While this may have been an attempt to highlight associated risks, the issue underscores a growing and critical threat in the AI ecosystem: the exploitation of powerful AI tools by malicious actors in the absence of robust guardrails, continuous monitoring, and effective governance frameworks,” said Sunil Varkey, a cybersecurity professional. “When AI systems like code […]
Read More