web analytics

Learn AI With Kesse | Best Place For AI News

We make artificial intelligence easy and fun to read. Get Updated AI News.

Google Unveils AI Designed to Improve Internet Functionality and Performance.

Google Just Dropped AI That Fixes The Internet

Google DeepMind Unveils Code Mender: Autonomous AI for Code Security

Google DeepMind has made significant strides in artificial intelligence with the introduction of Code Mender, an AI that autonomously identifies and resolves security vulnerabilities in large-scale open-source projects. This groundbreaking technology is designed not only to enhance cybersecurity but also to revolutionize how we perceive coding interventions.

What is Code Mender?

Code Mender is marketed as an AI code developer that specializes in open-source security. In just six months, it validated and upstreamed 72 security fixes across various projects, including those encompassing millions of lines of code. Unlike traditional automated tools that merely scan for vulnerabilities, Code Mender demonstrates a comprehensive understanding of code structure and logic. It can identify the root cause of issues, generate patches, and validate them automatically, significantly reducing the time lag between detection and resolution.

Technical Insights

Code Mender operates using Google’s Gemini Deepthink model. This model is specifically fine-tuned for code reasoning, enabling the AI to debug, patch, and even rewrite substantial code sections while ensuring consistency in style and functionality. With this capability, Code Mender not only repairs security flaws but also checks for regressions to prevent new issues from emerging. Once a patch is created, it is sent to human developers for review before being integrated into the codebase.

One notable instance of Code Mender’s capacity was its detection of a heap buffer overflow resulting from incorrect XML stack management. This kind of vulnerability can easily elude even seasoned developers. Additionally, it successfully mitigated a significant flaw in the libwebp image compression library, which had previously been exploited in a zero-day attack against Apple’s iOS. Code Mender applied safety annotations, guiding the compiler to enforce bounds checks and thereby averting potential exploits.

Innovative Techniques

Under the hood, Code Mender employs a suite of advanced program analysis tools, including static analysis, dynamic analysis, fuzzing, differential testing, and SMT solvers. This multifaceted approach enables the AI to effectively analyze data flow through code and pinpoint vulnerabilities. Moreover, it utilizes a multi-agent system where specialized sub-agents tackle distinct debugging tasks. For example, one sub-agent is dedicated to critiquing code changes, ensuring no new regressions are introduced. If issues arise, the AI triggers self-correction steps automatically, thus maintaining the integrity of the code.

Proactive Code Improvements

Beyond merely reacting to bugs, Code Mender takes the initiative to rewrite code to enhance safety proactively. It has been given access to existing codebases and tasked with improving their security by switching to safer data structures or implementing compiler-level safeguards. This forward-thinking approach not only resolves current issues but preemptively secures the code against future vulnerabilities.

The Role of Neo in AI Development

Navigating the complexities of building AI systems typically involves extensive trial and error processes. Here, Neo comes into play, functioning as a fully autonomous machine-learning agent that streamlines the entire workflow. Neo handles everything from raw data processing and feature engineering to training and deployment, making the development cycle far more efficient. It has proven its capabilities by excelling in various machine-learning competitions, showcasing a 34% success rate across multiple runs.

Code Mender’s Real-World Applications

Code Mender’s operational success illustrates its potential in various contexts. DeepMind is already exploring further applications, such as integrating AI for ransomware detection within Google Workspace. These advancements suggest that AI could assume an even broader role in cybersecurity, moving beyond coding assistance to become integral to maintaining the open-source ecosystem.

Gemini 2.5: A New Chapter in AI Efficiency

Alongside Code Mender, Google has also introduced Gemini 2.5 Computer Use, a specialized model capable of operating software in a manner akin to human interaction. This model can navigate web interfaces autonomously, completing tasks such as filling out forms, clicking through menus, and performing drag-and-drop operations.

For example, when prompted, Gemini 2.5 successfully navigated to a pet care signup form, gathered information about pets, updated a CRM system, and scheduled a future appointment—demonstrating its practical application in real-world scenarios.

How Gemini 2.5 Works

Operating in a loop, Gemini 2.5 begins each task by analyzing a screenshot of the user interface alongside the user’s request. From there, it determines the necessary actions—such as clicking or typing—executes them, and reevaluates the interface until the goal is met or an error occurs. The focus is primarily on web interfaces, but promising developments for mobile UI control are underway.

Benchmark assessments position Gemini 2.5 Computer Use at the forefront of AI technology. It has shown superior performance over competing models in tasks requiring online navigation, achieving over 70% accuracy while maintaining a latency of around 225 seconds per task.

Safety Considerations

While the capabilities of Code Mender and Gemini 2.5 are revolutionary, they do raise concerns regarding safety and oversight. DeepMind has proactively integrated safeguards into both models. A per-step safety service evaluates each proposed action, ensuring that the AI does not undertake risky maneuvers such as bypassing security protocols or compromising sensitive information.

Developers can also set customized safety measures to require human input for high-stakes actions. Transparency is crucial, and DeepMind has published a detailed system card explaining how it addresses potential risks, including misuse and unexpected model behavior.

Conclusion

As AI technology continues to evolve, Code Mender and Gemini 2.5 signify a new era where AI not only assists developers but actively participates in maintaining and enhancing code security. The future landscape of software development may soon see AI working alongside human engineers, offering unparalleled efficiency and security in code management.

Stay tuned for more updates as this exciting technology unfolds!



#Google #Dropped #Fixes #Internet
Thanks for reaching. Please let us know your thoughts and ideas in the comment section.

Source link

About The Author

8 thoughts on “Google Unveils AI Designed to Improve Internet Functionality and Performance.

  1. Four for Thor!!!!
    This is supercool and I learn all I can about ai, but does anyone else have any qualms with invasive, snooping, personal info hungry Google making such advanced ai? And does anyone feel ok while using their ai? I prefer chat so far. Thoughts??

Leave a Reply

Your email address will not be published. Required fields are marked *

We use cookies to personalize content and ads and to primarily analyze our geo traffic sources. We also may share information about your use of our site with our social media, advertising, and analytics partners to improve your user experience. We respect your privacy and will never abuse your information. [ Privacy Policy ] View more
Cookies settings
Accept
Decline
Privacy & Cookie Policy
Privacy & Cookies policy
Cookie name Active

The content on this page governs our Privacy Policy. It describes how your personal information is collected, used, and shared when you visit or make a purchase from learnaiwithkesse.com (the "Site").

Kesseswebsites and Advertising owns Learn AI With Kesse and the website learnaiwithkesse.wiki. For the purpose of this Terms and Agreements [ we, us, I, our ] represents the owner of Learning AI With Kesse which is Kesseswebsites and Advertising. [ You, your, student and buyer ] represents you as the user and visitor of this site. Terms of Conditions, Terms of Service, Terms and Agreement and Terms of use shall be considered the same here. This website or site refers to https://learnaiwithkesse.com. You agree that the content of this Terms and Agreement may include Privacy Policy and Refund Policy. Products refer to physical or digital products. This includes eBooks, PDFs, and text or video courses. If there is anything on this page you do not understand you agree to reach out to us via email [ emmanuel@learnaiwithkesse.com ] for explanation before using any part of this site.

1. Personal Information We Collect

When you visit this Site, we automatically collect certain information about your device, including information about your web browser, IP address, time zone, and some of the cookies that are installed on your device. The primary purpose of this activity is to provide you a better user experience the next time you visit our again and also the data collection is for analytics study. Additionally, as you browse the Site, we collect information about the individual web pages or products that you view, what websites or search terms referred you to the Site, and information about how you interact with the Site. We refer to this automatically-collected information as "Device Information."

We collect Device Information using the following technologies:

"Cookies" are data files that are placed on your device or computer and often include an anonymous unique identifier. For more information about cookies, and how to disable cookies, visit http://www.allaboutcookies.org. To comply with European Union's GDPR (General Data Protection Regulation), we do display a disclaimer a consent text at the bottom of this website. This disclaimer alerts you the visitor or user of this website about why we use cookies, and we also give you the option to accept or decline. If you accept for us to use cookies on your site, the agreement between you and us will expire after 180 has passed.

"Log files" track actions occurring on the Site, and collect data including your IP address, browser type, Internet service provider, referring/exit pages, and date/time stamps.

"Web beacons," "tags," and "pixels" are electronic files used to record information about how you browse the Site.

Additionally, when you make a purchase or attempt to make a purchase through the Site, we collect certain information from you, including your name, billing address, shipping address, payment information (including credit card numbers), email address, and phone number. We refer to this information as "Order Information."

When we talk about "Personal Information" in this Privacy Policy, we are talking both about Device Information and Order Information.

Payment Information

Please note that we use 3rd party payment processing companies like https://stripe.com and https://paypal.com to process your payment information. PayPal and Stripe protects your data according to their terms and agreement and may store your data to help make your subsequent transactions on this website easier. We never and [ DO NOT ] store your card information or payment login information on our website or server. By making payment on our site, you agree to abide by the Terms and Agreement of the 3rd Party payment processing companies we use. You can visit their websites to read their Terms of Use and learn more about them.

2. How Do We Use Your Personal Information?

We use the Order Information that we collect generally to fulfill any orders placed through the Site (including processing your payment information, arranging for shipping, and providing you with invoices and/or order confirmations). Additionally, we use this [a] Order Information to:

[b] Communicate with you;

[c] Screen our orders for potential risk or fraud; and

When in line with the preferences you have shared with us, provide you with information or advertising relating to our products or services. We use the Device Information that we collect to help us screen for potential risk and fraud (in particular, your IP address), and more generally to improve and optimize our Site (for example, by generating analytics about how our customers browse and interact with the Site, and to assess the success of our marketing and advertising campaigns).

3. Sharing Your Personal Information

We share your Personal Information with third parties to help us use your Personal Information, as described above. For example, we use System.io to power our online store--you can read more about how Systeme.io uses your Personal Information here: https://systeme.io/privacy-policy/ . We may also use Google Analytics to help us understand how our customers use the Site--you can read more about how Google uses your Personal Information here: https://www.google.com/intl/en/policies/privacy/. You can also opt-out of Google Analytics here: https://tools.google.com/dlpage/gaoptout.

Finally, we may also share your Personal Information to comply with applicable laws and regulations, to respond to a subpoena, search warrant or other lawful request for information we receive, or to otherwise protect our rights.

4. Behavioral Advertising

As described above, we use your Personal Information to provide you with targeted advertisements or marketing communications we believe may be of interest to you. For more information about how targeted advertising works, you can visit the Network Advertising Initiative’s (“NAI”) educational page at http://www.networkadvertising.org/understanding-online-advertising/how-does-it-work.

You can opt-out of targeted advertising by:

COMMON LINKS INCLUDE:

FACEBOOK - https://www.facebook.com/settings/?tab=ads

GOOGLE - https://www.google.com/settings/ads/anonymous

BING - https://advertise.bingads.microsoft.com/en-us/resources/policies/personalized-ads]

Additionally, you can opt-out of some of these services by visiting the Digital Advertising Alliance’s opt-out portal at: http://optout.aboutads.info/.

5. Data Retention

Besides your card payment and payment login information, when you place an order through the Site, we will maintain your Order Information for our records unless and until you ask us to delete this information. Example of such information include your first name, last name, email and phone number.

6. Changes

We may update this privacy policy from time to time in order to reflect, for example, changes to our practices or for other operational, legal or regulatory reasons.

7. Contact Us

For more information about our privacy practices, if you have questions, or if you would like to make a complaint, please contact us by e-mail at emmanuel@learnaiwithkesse.com or by mail using the details provided below:

8. Your acceptance of these terms

By using this Site, you signify your acceptance of this policy. If you do not agree to this policy, please do not use our Site. Your continued use of the Site following the posting of changes to this policy will be deemed your acceptance of those changes.

Last Update | 18th August 2024

Save settings
Cookies settings