When Liquid AI, a startup founded by MIT computer scientists back in 2023, introduced its Liquid Foundation Models series 2 (LFM2) in July 2025, the pitch was straightforward: deliver the fastest on-device foundation models on the market using the new "liquid" architecture, with training and inference efficiency that made small models a serious alternative to cloud-only large language models (...
One malicious prompt gets blocked, while ten prompts get through. That gap defines the difference between passing benchmarks and withstanding real-world attacks — and it's a gap most enterprises don't know exists.When attackers send a single malicious request, open-weight AI models hold the line well, blocking attacks 87% of the time (on average). But when those same attackers send multiple...
A stealth artificial intelligence startup founded by an MIT researcher emerged this morning with an ambitious claim: its new AI model can control computers better than systems built by OpenAI and Anthropic — at a fraction of the cost.OpenAGI, led by chief executive Zengyi Qin, released Lux, a foundation model designed to operate computers autonomously by interpreting screenshots and executing...
With necessary infrastructure now being developed for agentic commerce, enterprises must determine how to participate in this new form of buying and selling. But it remains a fragmented Wild West, with competing payment protocols, and it's unclear what enterprises need to do to prepare. More cloud providers and AI model companies are beginning to provide the tools enterprises need to begin...
As AI, cloud, and other technology investments soar, organizations have to make investment decisions with increased speed and clarity. Practices like FinOps, IT financial management (ITFM), and strategic portfolio management (SPM) help stakeholders evaluate opportunities and trade-offs for maximum value. But they depend on unified, reliable data. And that’s often where the challenge begins.AI can...
Hybrid cloud security was built before the current era of automated, machine-based cyberattacks that take just milliseconds to execute and minutes to deliver devastating impacts to infrastructure. The architectures and tech stacks every enterprise depends on, from batch-based detection to siloed tools to 15-minute response windows, stood a better chance of defending against attackers moving at...