Tokenless

Machine Learning

View All
Post-training best-in-class models in 2025

Post-training best-in-class models in 2025

An expert overview of post-training techniques for language models, covering the entire workflow from data generation and curation to advanced algorithms like Supervised Fine-Tuning (SFT), Direct Preference Optimization (DPO), and Reinforcement Learning (RL), along with practical advice on evaluation and iteration.

Anaximander: Interactive Orchestration and Evaluation of Geospatial Foundation Models

Anaximander: Interactive Orchestration and Evaluation of Geospatial Foundation Models

This talk introduces Anaximander, a system designed to bridge the gap between traditional, GUI-driven Geographic Information System (GIS) workflows and modern, code-heavy machine learning practices. Anaximander integrates geospatial foundation models directly into QGIS, allowing experts to interactively orchestrate, run, and evaluate models for tasks like semantic segmentation and object detection on satellite imagery.

Efficient Reinforcement Learning – Rhythm Garg & Linden Li, Applied Compute

Efficient Reinforcement Learning – Rhythm Garg & Linden Li, Applied Compute

At Applied Compute, efficient Reinforcement Learning is critical for delivering business value. This talk explores the transition from inefficient synchronous RL to a high-throughput asynchronous 'Pipeline RL' system. The core challenge is managing 'staleness'—a side effect of in-flight weight updates that can destabilize training. The speakers detail their first-principles systems model, based on the Roofline model, used to simulate and find the optimal allocation of GPU resources between sampling and training, balancing throughput with algorithmic stability and achieving significant speedups.

Artificial Intelligence

View All
How Ricursive Intelligence’s Founders are Using AI to Shape The Future of Chip Design

How Ricursive Intelligence’s Founders are Using AI to Shape The Future of Chip Design

Anna Goldie and Azalia Mirhoseini of Ricursive Intelligence discuss how their work on Google's AlphaChip, which used AI to design TPUs, is now being extended to automate the entire chip design process. They explain their vision for a 'designless' industry and a recursive self-improvement loop where AI designs better chips, which in turn accelerates AI development.

Identity for AI Agents - Patrick Riley & Carlos Galan, Auth0

Identity for AI Agents - Patrick Riley & Carlos Galan, Auth0

This session from Okta and Auth0 introduces a comprehensive framework for securing AI agents, covering identity establishment, delegated API access via Token Vault, user consent for risky operations using Asynchronous Authorization (CIBA), and integration with MCP servers.

Ransomware whack-a-mole, AI agents as insider threats and how to hack a humanoid robot

Ransomware whack-a-mole, AI agents as insider threats and how to hack a humanoid robot

A discussion on the evolving cybersecurity landscape, covering the persistent threat of ransomware gangs adapting with AI, the critical failures in identity security highlighted by the Zestix case, the emergence of AI agents as a new class of insider threats, and the physical-world risks demonstrated by hacking humanoid robots.

Technology

View All
Palo Alto Networks CEO Nikesh Arora on the Virtues of Being an Outsider

Palo Alto Networks CEO Nikesh Arora on the Virtues of Being an Outsider

Nikesh Arora, CEO of Palo Alto Networks, shares his unconventional journey and leadership philosophy. He provides a masterclass in building a multi-platform company through strategic M&A, explains why founders should sometimes ignore customers, and reveals how to lead with conviction while managing imposter syndrome.

Mental models for building products people love ft. Stewart Butterfield

Mental models for building products people love ft. Stewart Butterfield

Stewart Butterfield, co-founder of Slack and Flickr, shares the product frameworks and leadership principles that guided his success. He delves into concepts like "utility curves" for feature investment, the "owner's delusion" in product design, and why focusing on "comprehension" is often more important than reducing friction. He also introduces powerful mental models for organizational effectiveness, such as combating "hyper-realistic work-like activities" and applying Parkinson's Law to team growth.

Intuit CEO Sasan Goodarzi’s Grown-Up CEO Playbook

Intuit CEO Sasan Goodarzi’s Grown-Up CEO Playbook

Intuit CEO Sasan Goodarzi discusses the operational playbook for reinventing a 40-year-old company, from its slow transition to SaaS to its early adoption of AI. He shares insights on winning the SMB market by treating small businesses like consumers, building effective channel partnerships, and developing a platform strategy. Goodarzi also details his leadership philosophy, emphasizing that grit and curiosity are more critical than raw talent.


Recent Post

925: AI, Automation and the Future of Work — with Oxford’s Prof. Carl Benedikt Frey

925: AI, Automation and the Future of Work — with Oxford’s Prof. Carl Benedikt Frey

University of Oxford Professor Carl Benedikt Frey discusses his book "How Progress Ends," exploring the mechanics of innovation in different economic systems, the limitations of generative AI for true discovery, and the profound impact of AI on the future of work, job displacement, and the skills needed to thrive.

Why Businesses Are Rejecting the AI They’ve Asked For ft Agency CEO Elias Torres

Why Businesses Are Rejecting the AI They’ve Asked For ft Agency CEO Elias Torres

Elias Torres, co-founder of Drift and Agency, discusses the prevalent expectation mismatch in AI adoption, where businesses demand AI but reject it due to "imperfection anxiety." Drawing from his experiences scaling HubSpot and Drift, he explains why human-led customer experience is fundamentally unscalable and details how his new venture, Agency, is building autonomous, AI-first solutions to solve deep, back-end customer challenges. His goal is to "deprogram the entire business world" from inefficient, human-dependent processes.

zk-promises: Anonymous Moderation, Reputation, & Blocking from Anonymous Credentials with Callbacks

zk-promises: Anonymous Moderation, Reputation, & Blocking from Anonymous Credentials with Callbacks

A novel framework called zk-promises is introduced, enabling stateful anonymous credentials with Turing-complete state machines and asynchronous callbacks. This allows for robust moderation, such as banning or reputation updates, for anonymous users without compromising their privacy, using zk-objects and zero-knowledge proofs to ensure state integrity.

More is Less: Extra Features in Contactless Payments Break Security

More is Less: Extra Features in Contactless Payments Break Security

Tom Chothia and George Pavlides discuss how proprietary, uncoordinated features built on top of the core EMV specification by companies like Apple, Google, Square, Visa, and Mastercard lead to significant security vulnerabilities. They detail how these "black box" additions create subtle interactions and mismatches, enabling attacks that bypass authentication, allow high-value fraudulent offline transactions, and leave merchants vulnerable to significant financial loss.

The Death of Classical Computer Science • Matt Welsh & Julian Wood • GOTO 2025

The Death of Classical Computer Science • Matt Welsh & Julian Wood • GOTO 2025

Matt Welsh, former Harvard professor and AI researcher, posits that Large Language Models (LLMs) are not just tools but are evolving into new, general-purpose computers. He argues this signifies the "death of classical computer science," as direct, natural language problem-solving will replace human-written code. This shift promises to democratize computing, moving beyond a "programming priesthood" to empower everyone, while also raising critical challenges regarding job displacement, societal equity, and our adaptation to this powerful technology.

Ethical Hacking in Action: Red Teaming, Pen Testing, & Cybersecurity

Ethical Hacking in Action: Red Teaming, Pen Testing, & Cybersecurity

Explore the core tasks of ethical hacking, from vulnerability scanning to red teaming. This guide covers engagement structure, hacker methodologies, key frameworks like MITRE ATT&CK, and the essential tools for cybersecurity professionals.

Stay In The Loop! Subscribe to Our Newsletter.

Get updates straight to your inbox. No spam, just useful content.