Nicola Sessions – NVIDIA Technical Blog News and tutorials for developers, data scientists, and IT admins 2025-07-01T15:33:45Z http://www.open-lab.net/blog/feed/ Nicola Sessions <![CDATA[How to Build Custom AI Agents with NVIDIA NeMo Agent Toolkit Open Source Library]]> http://www.open-lab.net/blog/?p=102422 2025-07-01T15:33:45Z 2025-07-01T15:33:36Z AI agents are revolutionizing the digital workforce by transforming business operations, automating complex tasks, and unlocking new efficiencies. With the...]]>

AI agents are revolutionizing the digital workforce by transforming business operations, automating complex tasks, and unlocking new efficiencies. With the ability to collaborate, these agents can now work together to tackle complex problems and drive even greater impact. The NVIDIA NeMo Agent toolkit is an open source library that simplifies the integration of agents…

Source

]]>
1
Nicola Sessions <![CDATA[NVIDIA NeMo Retriever Scores First Place for Visual Retrieval]]> http://www.open-lab.net/blog/?p=102729 2025-06-30T16:43:06Z 2025-06-30T16:42:59Z NeMo Retriever tops several visual document retrieval leaderboards, setting new standards for RAG apps.]]>

NeMo Retriever tops several visual document retrieval leaderboards, setting new standards for RAG apps.

Source

]]>
Nicola Sessions <![CDATA[Chat With Your Enterprise Data Through Open-Source AI-Q NVIDIA Blueprint]]> http://www.open-lab.net/blog/?p=101147 2025-06-13T02:27:09Z 2025-06-11T11:00:00Z Enterprise data is exploding��petabytes of emails, reports, Slack messages, and databases pile up faster than anyone can read. Employees are left searching for...]]>

Enterprise data is exploding—petabytes of emails, reports, Slack messages, and databases pile up faster than anyone can read. Employees are left searching for answers in a sea of information, as “68% of available data in an organization goes unused,” according to market researcher Gartner1. That’s now possible with today’s availability of AI-Q, an open-source NVIDIA Blueprint that puts your…

Source

]]>
Nicola Sessions <![CDATA[Extending the NVIDIA NeMo Agent Toolkit to Support New Agentic Frameworks]]> http://www.open-lab.net/blog/?p=99799 2025-06-10T21:52:42Z 2025-05-08T18:30:00Z NVIDIA NeMo Agent toolkit is an open-source library for efficiently connecting and optimizing teams of AI agents. It focuses on enabling developers to quickly...]]>

NVIDIA NeMo Agent toolkit is an open-source library for efficiently connecting and optimizing teams of AI agents. It focuses on enabling developers to quickly build, evaluate, profile, and accelerate complex agentic AI workflows?—?systems in which multiple AI agents collaborate to perform tasks. The Agent toolkit acts as a unifying framework that integrates existing agents, tools…

Source

]]>
Nicola Sessions <![CDATA[DataStax Announces New AI Development Platform, Built with NVIDIA AI]]> http://www.open-lab.net/blog/?p=90307 2025-02-17T05:27:03Z 2024-10-15T13:00:00Z As enterprises increasingly adopt AI technologies, they face a complex challenge of efficiently developing, securing, and continuously improving AI applications...]]>

As enterprises increasingly adopt AI technologies, they face a complex challenge of efficiently developing, securing, and continuously improving AI applications to leverage their data assets. They need a unified, end-to-end solution that simplifies AI development, enhances security, and enables continuous optimization, allowing organizations to harness the full potential of their data for AI…

Source

]]>
Nicola Sessions <![CDATA[Build an Enterprise-Scale Multimodal PDF Data Extraction Pipeline with an NVIDIA AI Blueprint]]> http://www.open-lab.net/blog/?p=87948 2024-11-14T04:04:51Z 2024-08-28T15:00:00Z Trillions of PDF files are generated every year, each file likely consisting of multiple pages filled with various content types, including text, images,...]]>

Trillions of PDF files are generated every year, each file likely consisting of multiple pages filled with various content types, including text, images, charts, and tables. This goldmine of data can only be used as quickly as humans can read and understand it. But with generative AI and retrieval-augmented generation (RAG), this untapped data can be used to uncover business insights that…

Source

]]>
Nicola Sessions <![CDATA[Develop Production-Grade Text Retrieval Pipelines for RAG with NVIDIA NeMo Retriever?]]> http://www.open-lab.net/blog/?p=85762 2024-10-28T21:50:54Z 2024-07-23T15:15:00Z Enterprises are sitting on a goldmine of data waiting to be used to improve efficiency, save money, and ultimately enable higher productivity. With generative...]]>

Enterprises are sitting on a goldmine of data waiting to be used to improve efficiency, save money, and ultimately enable higher productivity. With generative AI, developers can build and deploy an agentic flow or a retrieval-augmented generation (RAG) chatbot, while ensuring the insights provided are based on the most accurate and up-to-date information. Building these solutions requires not…

Source

]]>
Nicola Sessions <![CDATA[NVIDIA Text Embedding Model Tops MTEB Leaderboard]]> http://www.open-lab.net/blog/?p=83571 2024-10-28T21:57:46Z 2024-06-10T17:00:00Z The latest embedding model from NVIDIA��NV-Embed��set a new record for embedding accuracy with a score of 69.32 on the Massive Text Embedding Benchmark...]]>

The latest embedding model from NVIDIA—NV-Embed—set a new record for embedding accuracy with a score of 69.32 on the Massive Text Embedding Benchmark (MTEB), which covers 56 embedding tasks. Highly accurate and effective models like NV-Embed are key to transforming vast amounts of data into actionable insights. NVIDIA provides top-performing models through the NVIDIA API catalog.

Source

]]>
Nicola Sessions <![CDATA[Applying Generative AI for CVE Analysis at an Enterprise Scale]]> http://www.open-lab.net/blog/?p=82796 2024-05-30T19:55:47Z 2024-05-23T16:00:00Z The software development and deployment process is complex. Modern enterprise applications have complex software dependencies, forming an interconnected web...]]>

The software development and deployment process is complex. Modern enterprise applications have complex software dependencies, forming an interconnected web that provides unprecedented functionality, but with the cost of exponentially increasing complexity. Patching software security issues is becoming progressively more challenging as the number of reported security flaws in the common…

Source

]]>
Nicola Sessions <![CDATA[Develop Custom Enterprise Generative AI with NVIDIA NeMo]]> http://www.open-lab.net/blog/?p=80360 2025-02-17T05:27:49Z 2024-03-27T20:00:00Z Generative AI is transforming computing, paving new avenues for humans to interact with computers in natural, intuitive ways. For enterprises, the prospect of...]]>

Generative AI is transforming computing, paving new avenues for humans to interact with computers in natural, intuitive ways. For enterprises, the prospect of generative AI is vast. Businesses can tap into their rich datasets to streamline time-consuming tasks—from text summarization and translation to insight prediction and content generation. But they must also navigate adoption challenges.

Source

]]>
Nicola Sessions <![CDATA[Translate Your Enterprise Data into Actionable Insights with NVIDIA NeMo Retriever]]> http://www.open-lab.net/blog/?p=79433 2024-10-28T21:47:47Z 2024-03-18T22:00:00Z Across every industry, and every job function, generative AI is activating the potential within organizations��turning data into knowledge and empowering...]]>

Across every industry, and every job function, generative AI is activating the potential within organizations—turning data into knowledge and empowering employees to work more efficiently. Accurate, relevant information is critical for making data-backed decisions. For this reason, enterprises continue to invest in ways to improve how business data is stored, indexed, and accessed.

Source

]]>
2
Nicola Sessions <![CDATA[How to Take a RAG Application from Pilot to Production in Four Steps]]> http://www.open-lab.net/blog/?p=79558 2024-10-28T21:58:37Z 2024-03-18T22:00:00Z Generative AI has the potential to transform every industry. Human workers are already using large language models (LLMs) to explain, reason about, and solve...]]>

Generative AI has the potential to transform every industry. Human workers are already using large language models (LLMs) to explain, reason about, and solve difficult cognitive tasks. Retrieval-augmented generation (RAG) connects LLMs to data, expanding the usefulness of LLMs by giving them access to up-to-date and accurate information. Many enterprises have already started to explore how…

Source

]]>
Nicola Sessions <![CDATA[Webinar: Improve Spear Phishing Detection with AI]]> http://www.open-lab.net/blog/?p=77126 2024-02-08T18:51:58Z 2024-01-24T18:00:00Z Learn how generative AI can help defend against spear phishing in this January 30 webinar.]]>

Learn how generative AI can help defend against spear phishing in this January 30 webinar.

Source

]]>
0
Nicola Sessions <![CDATA[Bolstering Cybersecurity: How Large Language Models and Generative AI are Transforming Digital Security]]> http://www.open-lab.net/blog/?p=73728 2023-12-14T19:27:39Z 2023-11-27T09:00:00Z Identity-based attacks are on the rise, with phishing remaining the most common and second-most expensive attack vector. Some attackers are using AI to craft...]]>

Identity-based attacks are on the rise, with phishing remaining the most common and second-most expensive attack vector. Some attackers are using AI to craft more convincing phishing messages and deploying bots to get around automated defenses designed to spot suspicious behavior. At the same time, a continued increase in enterprise applications introduces challenges for IT teams who must…

Source

]]>
0
Nicola Sessions <![CDATA[ICYMI: New and Updated AI Workflows Announced at NVIDIA GTC 2023]]> http://www.open-lab.net/blog/?p=62115 2023-03-30T17:43:51Z 2023-03-22T15:00:00Z NVIDIA showed how AI workflows can be leveraged to help you accelerate the development of AI solutions to address a range of use cases at NVIDIA GTC 2023. AI...]]>

NVIDIA showed how AI workflows can be leveraged to help you accelerate the development of AI solutions to address a range of use cases at NVIDIA GTC 2023. AI workflows are cloud-native, packaged reference examples showing how NVIDIA AI frameworks can be used to efficiently build AI solutions such as intelligent virtual assistants, digital fingerprinting for cybersecurity…

Source

]]>
0
Nicola Sessions <![CDATA[NVIDIA Morpheus Helps Defend Against Spear Phishing with Generative AI]]> http://www.open-lab.net/blog/?p=62189 2023-03-23T17:12:11Z 2023-03-21T16:50:53Z Using generative AI and the NVIDIA Morpheus cybersecurity AI framework, developers can build solutions that detect spear phishing attempts more effectively and...]]>

Using generative AI and the NVIDIA Morpheus cybersecurity AI framework, developers can build solutions that detect spear phishing attempts more effectively and with extremely short training times. In fact, using NVIDIA Morpheus and a generative AI training technique, we were able to detect 90% of targeted spear phishing emails—a 20% improvement compared to a typical phishing detection solution…

Source

]]>
2
Nicola Sessions <![CDATA[Top Cybersecurity Sessions at NVIDIA GTC 2023]]> http://www.open-lab.net/blog/?p=61461 2023-03-09T19:15:54Z 2023-03-01T22:00:00Z Learn how AI is improving your cybersecurity to detect threats faster.]]>

Learn how AI is improving your cybersecurity to detect threats faster.

Source

]]>
0
Nicola Sessions <![CDATA[Hands-on Lab: Digital Fingerprinting to Detect Cyber Threats]]> http://www.open-lab.net/blog/?p=60721 2023-02-23T18:34:17Z 2023-02-08T16:00:00Z Learn how to use an NVIDIA AI workflow to uniquely fingerprint users and machines across your network in a new, free NVIDIA LaunchPad hands-on lab.]]>

Learn how to use an NVIDIA AI workflow to uniquely fingerprint users and machines across your network in a new, free NVIDIA LaunchPad hands-on lab.

Source

]]>
0
Nicola Sessions <![CDATA[Upcoming Event: Improve Your Cybersecurity Posture with AI]]> http://www.open-lab.net/blog/?p=56537 2023-08-18T20:37:57Z 2022-10-26T21:30:00Z Find out how federal agencies are adopting AI to improve cybersecurity in this November 16 webinar featuring Booz Allen Hamilton.]]>

Find out how federal agencies are adopting AI to improve cybersecurity in this November 16 webinar featuring Booz Allen Hamilton.

Source

]]>
0
Nicola Sessions <![CDATA[Safeguarding Networks and Assets with Digital Fingerprinting]]> http://www.open-lab.net/blog/?p=55803 2023-06-12T08:52:56Z 2022-10-05T16:00:00Z Use of stolen or compromised credentials remains at the top of the list as the most common cause of a data breach. Because an attacker is using credentials or...]]>

Use of stolen or compromised credentials remains at the top of the list as the most common cause of a data breach. Because an attacker is using credentials or passwords to compromise an organization’s network, they can bypass traditional security measures designed to keep adversaries out. When they’re inside the network, attackers can move laterally and gain access to sensitive data…

Source

]]>
0
Nicola Sessions <![CDATA[Detecting Threats Faster with AI-Based Cybersecurity]]> http://www.open-lab.net/blog/?p=55006 2023-07-11T23:10:17Z 2022-09-22T18:40:00Z Network traffic continues to increase, with the number of Internet users across the globe reaching 5 billion in 2022. As the number of users expands, so does...]]>

Network traffic continues to increase, with the number of Internet users across the globe reaching 5 billion in 2022. As the number of users expands, so does the number of connected devices, which is expected to grow into the trillions. The ever-increasing number of connected users and devices leads to an overwhelming amount of data generated across the network. According to IDC…

Source

]]>
0
Nicola Sessions <![CDATA[Addressing Cybersecurity in the Enterprise with AI]]> http://www.open-lab.net/blog/?p=51115 2023-07-11T23:10:27Z 2022-08-18T16:00:00Z Cybersecurity-related risk remains one of the top sources of risk in the enterprise. This has been exacerbated by the global pandemic, which has forced...]]>

Cybersecurity-related risk remains one of the top sources of risk in the enterprise. This has been exacerbated by the global pandemic, which has forced companies to accelerate digitization initiatives to better support a remote workforce. This includes not only the infrastructure to support a distributed workforce but also automation through robotics, data analytics, and new applications.

Source

]]>
0
Nicola Sessions <![CDATA[Upcoming Webinar: Detecting Cyber Threats with Unsupervised Learning?]]> http://www.open-lab.net/blog/?p=51733 2023-08-18T20:27:54Z 2022-08-05T16:00:00Z Discover how to detect cyber threats using machine learning and NVIDIA Morpheus, an open-source AI framework.]]>

Discover how to detect cyber threats using machine learning and NVIDIA Morpheus, an open-source AI framework.

Source

]]>
0
Nicola Sessions <![CDATA[Supercharging AI-Accelerated Cybersecurity Threat Detection]]> http://www.open-lab.net/blog/?p=45716 2023-12-05T19:01:29Z 2022-03-23T15:01:00Z Cybercrime worldwide is costing as much as the gross domestic product of countries like Mexico or Spain, hitting more than $1 trillion annually. And global...]]>

Cybercrime worldwide is costing as much as the gross domestic product of countries like Mexico or Spain, hitting more than $1 trillion annually. And global trends point to it only getting worse. Data centers face staggering increases in users, data, devices, and apps increasing the threat surface amid ever more sophisticated attack vectors. NVIDIA Morpheus enables cybersecurity…

Source

]]>
1
Nicola Sessions <![CDATA[Accelerating Next-Generation Cybersecurity with NVIDIA Morpheus, Now with Expanded Early Access]]> http://www.open-lab.net/blog/?p=39555 2023-07-11T23:11:23Z 2021-11-09T09:30:00Z Traditional cybersecurity methods include creating barriers around your infrastructure to protect it from intruders with ill intentions. However, as enterprises...]]>

Traditional cybersecurity methods include creating barriers around your infrastructure to protect it from intruders with ill intentions. However, as enterprises continue along the path of digital transformation, faced with a proliferation of devices, more sophisticated cybersecurity attacks, and an incredibly vast network of data to protect, new cybersecurity methodologies must be explored.

Source

]]>
0
���˳���97caoporen����