Gorkem Batmaz – NVIDIA Technical Blog News and tutorials for developers, data scientists, and IT admins 2025-06-12T18:50:56Z http://www.open-lab.net/blog/feed/ Gorkem Batmaz https://twitter.com/gorkembatmaz <![CDATA[Accelerating Text-to-SQL Inference on Vanna with NVIDIA NIM for Faster Analytics]]> http://www.open-lab.net/blog/?p=100926 2025-06-12T18:50:56Z 2025-05-30T15:45:28Z Slow and inefficient query generation from natural language inputs bottlenecks decision-making. This forces analysts and business users to rely heavily on data...]]>

Slow and inefficient query generation from natural language inputs bottlenecks decision-making. This forces analysts and business users to rely heavily on data teams, delaying insights and limiting agility. Text-to-SQL is shifting how we interact with data, enabling users to query structured databases in natural language. This is especially useful when deploying a domain-specific model for…

Source

]]>
Gorkem Batmaz https://twitter.com/gorkembatmaz <![CDATA[Building Cyber Language Models to Unlock New Cybersecurity Capabilities]]> http://www.open-lab.net/blog/?p=84556 2025-02-04T19:45:51Z 2024-07-09T16:00:00Z General-purpose large language models (LLMs) have proven their usefulness across various fields, offering substantial benefits in applications ranging from text...]]>

General-purpose large language models (LLMs) have proven their usefulness across various fields, offering substantial benefits in applications ranging from text generation to complex problem-solving. However, there are circumstances where developing a bespoke language model becomes not just beneficial but essential. This necessity arises particularly in specialized domains characterized by…

Source

]]>
Gorkem Batmaz https://twitter.com/gorkembatmaz <![CDATA[Generative AI and Accelerated Computing for Spear Phishing Detection]]> http://www.open-lab.net/blog/?p=70728 2023-10-05T18:18:13Z 2023-09-12T18:00:00Z Spear phishing is the largest and most costly form of cyber threat, with an estimated 300,000 reported victims in 2021 representing $44 million in reported...]]>

Spear phishing is the largest and most costly form of cyber threat, with an estimated 300,000 reported victims in 2021 representing $44 million in reported losses in the United States alone. Business e-mail compromises led to $2.4 billion in costs in 2021, according to the FBI Internet Crime Report. In the period from June 2016 to December 2021, costs related to phishing and spear phishing totaled…

Source

]]>
0
Gorkem Batmaz https://twitter.com/gorkembatmaz <![CDATA[Designing a New Net for Phishing Detection with NVIDIA Morpheus]]> http://www.open-lab.net/blog/?p=48165 2022-06-02T17:19:25Z 2022-05-16T17:36:19Z Email became one of the most pervasive, powerful communication tools during the digital revolution. Attempts to defraud users by deceptively posing as...]]>

Email became one of the most pervasive, powerful communication tools during the digital revolution. Attempts to defraud users by deceptively posing as legitimate people or institutions through email became so widespread that it got its own name: phishing. Today, with the digital world deeply interwoven in our work and personal lives, phishing remains one of the top three initial infection…

Source

]]>
0
Gorkem Batmaz https://twitter.com/gorkembatmaz <![CDATA[Fingerprinting Every Network User and Asset with NVIDIA Morpheus]]> http://www.open-lab.net/blog/?p=41837 2022-09-29T17:15:26Z 2021-12-01T20:00:00Z Traditional approaches to finding and stopping threats have ceased to be appropriately effective. One reason is the scope of ways an attacker can enter a system...]]>

Traditional approaches to finding and stopping threats have ceased to be appropriately effective. One reason is the scope of ways an attacker can enter a system and do damage have proliferated as the interconnections between apps and systems have proliferated. Applying AI to the problem seems like a natural choice but this in some sense broadens the data problem. A typical user may interact…

Source

]]>
0
Gorkem Batmaz https://twitter.com/gorkembatmaz <![CDATA[Enabling Predictive Maintenance Using Root Cause Analysis, NLP, and NVIDIA Morpheus]]> http://www.open-lab.net/blog/?p=31337 2022-08-21T23:51:33Z 2021-05-10T16:00:00Z Background Predictive maintenance is used for early fault detection, diagnosis, and prediction when maintenance is needed in various industries including oil...]]>

Predictive maintenance is used for early fault detection, diagnosis, and prediction when maintenance is needed in various industries including oil and gas, manufacturing, and transportation. Equipment is continuously monitored to measure things like sound, vibration, and temperature to alert and report potential issues. To accomplish this in computers, the first step is to determine the root cause…

Source

]]>
0
���˳���97caoporen����