Posts

Image segmentation with U-Net

In image segmentation, every pixel of an image is assigned a class. Depending on...

Modeling censored data with tfprobability

In this post we use tfprobability, the R interface to TensorFlow Probability, to...

TensorFlow feature columns: Transforming your data reci...

TensorFlow feature columns provide useful functionality for preprocessing catego...

Dynamic linear models with tfprobability

Previous posts featuring tfprobability - the R interface to TensorFlow Probabili...

Adding uncertainty estimates to Keras models with tfpro...

As of today, there is no mainstream road to obtaining uncertainty estimates from...

Hierarchical partial pooling, continued: Varying slopes...

This post builds on our recent introduction to multi-level modeling with tfproba...

Tadpoles on TensorFlow: Hierarchical partial pooling wi...

This post is a first introduction to MCMC modeling with tfprobability, the R int...

This data set helps researchers spot harmful stereotype...

AI models are riddled with culturally specific biases. A new data set, called SH...

The AI Hype Index: AI agent cyberattacks, racing robots...

Separating AI reality from hyped-up fiction isn’t always easy. That’s why we’ve ...

We need to start thinking of AI as “normal”

Right now, despite its ubiquity, AI is seen as anything but a normal technology....

Seeing AI as a collaborator, not a creator

The reason you are reading this letter from me today is that I was bored 30 year...

The future of AI processing

Artificial Intelligence (AI) is emerging in everyday use cases, thanks to advanc...

Top 10 AI Agents in Healthcare: Use Cases & Examples

AI agents in healthcare are transforming the way care delivery, diagnostics, ope...

Hands-On Top 10 AI-Generated Text Detector Comparison

We conducted a benchmark of the most commonly used 10 AI-generated text detector...

Transform OT Automation with IT/OT Convergence in 2025

Software-driven disruption is reshaping OT automation by enabling flexible, hard...

Best Vector Database for RAG: Qdrant vs. Weaviate vs. P...

Vector databases power the retrieval layer in RAG workflows by storing document ...

Agent2Agent (A2A) Protocol and Its Importance

As businesses increasingly deploy AI agents across their workflows, one challeng...

AI Video Pricing: Compare Runway, Synthesia & Invideo AI

AI video pricing can differ significantly across platforms, influenced by factor...

Business Intelligence Software Market: Top 60+ free and...

Business analysts must understand the business intelligence software market tren...

Top 5 DNS Security Solutions: Features & Benchmark Resu...

We’ve compared the top DNS security solutions and their key features and pricing...

MLSecOps: Top 20+ Open Source and Commercial Tools

AI is a key technology used in the security software landscape, yet what is ofte...

4 Agentic AI Design Patterns & Real-World Examples

Agentic AI design patterns enhance the autonomy of large language models (LLMs) ...

Top 5 AI Gateways for OpenAI: OpenRouter Alternatives

The growing number of LLM providers creates significant API management hurdles. ...

Top 10 WAF Solutions with Features & Pricing

Since nearly half of all cybersecurity breaches involve web applications, web ap...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.