PinnedKen HuangChapter 10: Use GenAI Tools to Boost Your Security PostureAbstractAug 20, 2023Aug 20, 2023
PinnedKen HuangLLM-Powered Applications’ Architecture Patterns and Security ControlsThe chapter begins with an introduction to LLMs, highlighting their ability to unlock AI reasoning, creative creation, and continuous…Jun 9, 2023Jun 9, 2023
PinnedKen HuangChatGPT Plug-in: from AIGC to AIGXIn my upcoming book, “ChatGPT: Revolutionizing Business Applications with Next-Gen AI Technology” I’ll cover different aspects of ChatGPT…Apr 5, 20231Apr 5, 20231
Ken HuangMechanistic Interpretability 101Why are neural networks so notoriously difficult to interpret, and how have researchers attempted to crack this black box in the past? This…Aug 28Aug 28
Ken HuangKey differences between prompt injection and jailbreakingPrompt injection and jailbreaking are two distinct types of attacks on applications built using Large Language Models (LLMs), though they…Aug 6Aug 6
Ken HuangMassive Data Breach Affects 2.9 Billion People: Implications for Generative AI and CybersecurityA recent data breach has affected 2.9 billion individuals worldwide, highlighting our vulnerability in the digital age. This breach…Aug 6Aug 6
Ken HuangMicrosoft and CrowdStrike Outage:The Fragility of Global IT InfrastructureOn July 18 and 19, 2024, the world witnessed a stark reminder of the fragility of our global IT infrastructure. A faulty update from…Jul 19Jul 19
Ken HuangAI Ascension: A Story of Fiction and Reality Kindle Editionby Ken Huang (Author) Format: Kindle EditionJul 14Jul 14
Ken HuangGenAI Agents: Architectures, Frameworks, and Future DirectionsThis article is a deep dive into GenAI Agents tools and framework. For more details, please get my book:Jul 7Jul 7
Ken HuangCommon Index Schemas in Vector DatabaseThis blog post discuss some commonly used index schema in Vector database.Feb 12Feb 12