Quantcast
Channel: inovex GmbH
Browsing all 77 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Platform Engineering – Die DevOps Evolution?

Moderne digitale Produkte basieren in der Regel auf zahlreichen unterschiedlichen Diensten, die eine Vielzahl von Technologien nutzen. Diese stetig wachsende Technologielandschaft stellt immer mehr...

View Article


Image may be NSFW.
Clik here to view.

Bessere Auffindbarkeit von Automatischen Externen Defibrillatoren im...

Ein außerklinischer Herz-Kreislauf-Stillstand ist die dritthäufigste Todesursache in Deutschland. Eine Möglichkeit, die Überlebenschance bei einem solchen Notfall zu erhöhen, ist der frühe Einsatz...

View Article


Image may be NSFW.
Clik here to view.

Beating GPT-4: Fine-Tuning Llama-3 for Software Security

In this blog post, I will walk you through the process of fine-tuning and evaluating Llama-3 and DeepSeek-Coder for detecting software vulnerabilities. I will share valuable insights and key takeaways...

View Article

Image may be NSFW.
Clik here to view.

Considerations for Repairing Vulnerabilities using LLMs

Large Language Models have become essential for many applications but for repairing vulnerabilities there are important considerations. In this Blogpost we want to discuss some considerations for...

View Article

Image may be NSFW.
Clik here to view.

Einsatz von Foundation Models zur Erkennung von Brustkrebs

In diesem Beitrag beleuchten wir, wie das ConvNeXt-Modell, ein fortschrittliches Vision Foundation Model, in Kombination mit einem Random-Forest-Klassifikator zur Klassifikation von Mammographien...

View Article


Image may be NSFW.
Clik here to view.

Protecting MQTT Communication and Device Data via Trusted Platform Module

Wherever connected devices are utilized, it is essential to pay special attention to security. It is crucial to assess the existing risks in order to implement appropriate measures. A device that is...

View Article

Image may be NSFW.
Clik here to view.

AI-Based Diagnostics for Confocal Laser Endomicroscopy Images

(This article is an excerpt of the master’s thesis of Stefanie Marx supervised by Department of Computer Science Faculty of Mathematics and Natural Sciences, University of Cologne, inovex GmbH and the...

View Article

Image may be NSFW.
Clik here to view.

How AI Can Support Precision and Safety in CLE Procedures

AI is changing the game in healthcare – and surgery is no exception. In complex anatomic areas like the head and neck, AI offers promising opportunities to enhance precision, support intraoperative...

View Article


Image may be NSFW.
Clik here to view.

Enhancing Object Detection with Synthetic Data

Object detection is a vital component in a variety of fields, including autonomous driving, surveillance, medical imaging, and robotics. It’s the technology that allows computers to „see“ and interpret...

View Article


Image may be NSFW.
Clik here to view.

Combining and Quantizing LLMs for Enhanced Performance

Large Language Models (LLMs) are increasingly being used in automated environments to solve a wide range of tasks, such as categorizing customer feedback, summarizing lengthy research papers, and...

View Article

Sustainable Computing – Was heißt Nachhaltigkeit in IT-Projekten?

IT und Nachhaltigkeit – auf den ersten Blick ein ungleiches Paar, doch bei genauerem Hinsehen wird klar: Die Digitalisierung kann sowohl Treiber als auch Bremse des Klimawandels sein. In diesem Beitrag...

View Article

Image may be NSFW.
Clik here to view.

Agentic Workflows and Model Context Protocol – Lessons Learned

LangGraph enables us to create and orchestrate workflows driven by Large Language Models (LLMs). In this article, we share our lessons learned from working with Agentic Workflows and Model Context...

View Article

Image may be NSFW.
Clik here to view.

Sustainable AI – Wie wir den CO2-Fußabdruck messen & reduzieren können

Sustainable AI (nachhaltige KI) ist eine Schlüsseltechnologie der digitalen Transformation, die es ermöglicht, die Umweltauswirkungen von KI-Systemen zu minimieren, während gleichzeitig deren Vorteile...

View Article


Data Fabric Explained: Architecture, Benefits & Comparison with Data Mesh

As organizations face increasingly complex data landscapes – spanning cloud, on-premises, and edge systems – data fabric has emerged as a powerful solution to unify, manage, and analyze data in diverse...

View Article

Image may be NSFW.
Clik here to view.

Phishing for Passkeys – An Analysis of WebAuthn and CTAP

One of the features offered by Passkeys is cross-device authentication (CDA) via “just scanning a QR code“. But how does this actually work? Does it deliver on the strong phishing resistance that...

View Article


Image may be NSFW.
Clik here to view.

Security von Anfang an integrieren mit OWASP SAMM

Mit dem bevorstehenden Cyber Resilience Act (CRA) rückt das Thema „sichere Softwareentwicklung“ wieder einmal mehr ins Rampenlicht. Doch auch abseits von Regulatorik lohnt sich eine Beschäftigung für...

View Article

Simplicity Bias in Transformer-Modellen: Warum tiefe Netzwerke einfache...

Transformer-Modelle wie GPT-3 haben in den letzten Jahren die KI-Welt nachhaltig verändert. Doch wie passen ihre beeindruckenden Generalisierungsleistungen zum bekannten No-Free-Lunch-Theorem, laut...

View Article

Browsing all 77 articles
Browse latest View live