Meter.net News Google opens doors to safer artificial intelligence. Introducing Gemma 2

Google opens doors to safer artificial intelligence. Introducing Gemma 2

Google introduces a trio of new AI models named Gemma 2, which emphasize security, transparency, and accessibility. The Gemma 2 2B model is optimized for regular computers, ShieldGemma protects against toxic content, and Gemma Scope allows detailed analysis of model functioning. Google aims to democratize AI and build trust.

Google opens doors to safer artificial intelligence. Introducing Gemma 2

Google embarks on a quest for more ethical and transparent artificial intelligence. As part of this effort, it has released a trio of new generative AI models named Gemma 2, which promise higher security, lower hardware requirements, and smoother operation.

Security first

Unlike the Gemini models, which Google uses for its own products, the Gemma series is intended for more open use by developers and researchers. Similar to Meta's Llama project, Google is also striving to build trust and collaboration in the AI field.

The first innovation is the Gemma 2 2B model, designed for generating and analyzing text. Its greatest advantage is the ability to run on less powerful devices. This opens the door to a wide range of users. The model is available through platforms like Vertex AI, Kaggle, and Google AI Studio.

ShieldGemma: Guardian against toxic content

The new ShieldGemma introduced a set of safety classifiers whose task is to identify and block harmful content. This includes manifestations of hate, harassment, and sexually explicit materials. In short, ShieldGemma acts as a filter that checks both the input data for the model and its outputs.

The final addition is Gemma Scope, a tool enabling detailed analysis of the Gemma 2 model's functioning. Google describes it as a set of specialized neural networks that unpack the complex information processed by the model into a more comprehensible form.

Researchers can better understand how Gemma 2 identifies patterns, processes data, and generates results. The release of the Gemma 2 models comes shortly after the U.S. Department of Commerce supported open AI models in its report.

These make generative AI accessible to smaller companies, non-profits, and independent developers. Additionally, the report highlighted the need for tools to monitor and regulate these models to minimize potential risks.

Artificial intelligence can write articles, analyze data, and generate videos. However, there are skills and professions that this technology cannot (yet) replace. In the article, we will look at where humans still have the upper hand, why AI needs human supervision, and which abilities will become increasingly valuable to develop in the digital world.

Does your video keep buffering or game lag, even though you pay for 'fast internet'? Perhaps you simply don't have the right one for what you do at home. What internet speed do you need for watching TV, streaming movies, working from home, or online gaming? Find a clear comparison in the article.

Phishing attacks often appear credible and convincing today. Thanks to artificial intelligence, they sound personal, mimic well-known companies, and can be hard to detect. In this article, you'll learn how modern phishing works, why you should watch out for it, and how you can effectively protect yourself from it.

Forgotten passwords, recycled combinations, and fear of data leaks. Traditional login methods have their weak points. A new way to verify identity, known as passkeys, aims to change that. Without the need to remember anything and with a focus on security. How do they work, who is already using them today, and why are they becoming the new standard?

Do you know edge computing? It is a method of data processing that shifts computing power closer to the data source. This significantly reduces latency and enables faster real-time decision-making. This technology is becoming key for IoT, autonomous vehicles, or smart cities and is gradually changing the internet as we know it. What does edge computing mean and how will it impact our future?

Digital identity is becoming an integral part of modern society. What does it reveal about us? How does it work today, and what might it look like in the future? From blockchain to virtual IDs – let's look at the technologies changing the way we verify ourselves and protect our privacy in the world.