All posts tagged: Endtoend

Train-to-Test scaling explained: How to optimize your end-to-end AI compute budget for inference

Train-to-Test scaling explained: How to optimize your end-to-end AI compute budget for inference

The standard guidelines for building large language models (LLMs) optimize only for training costs and ignore inference costs. This poses a challenge for real-world applications that use inference-time scaling techniques to increase the accuracy of model responses, such as drawing multiple reasoning samples from a model at deployment. To bridge this gap, researchers at University of Wisconsin-Madison and Stanford University have introduced Train-to-Test (T2) scaling laws, a framework that jointly optimizes a model’s parameter size, its training data volume, and the number of test-time inference samples. In practice, their approach proves that it is compute-optimal to train substantially smaller models on vastly more data than traditional rules prescribe, and then use the saved computational overhead to generate multiple repeated samples at inference. For enterprise AI application developers who are training their own models, this research provides a proven blueprint for maximizing return on investment. It shows that AI reasoning does not necessarily require spending huge amounts on frontier models. Instead, smaller models can yield stronger performance on complex tasks while keeping per-query inference costs manageable …

Gmail End-to-End Encryption Comes to iOS for Workspace Users

Gmail End-to-End Encryption Comes to iOS for Workspace Users

Google has expanded Gmail’s end-to-end encryption for Workspace users to iOS and Android, allowing mobile users to compose and read encrypted messages natively within the Gmail app for the first time. The feature is part of Gmail’s client-side encryption (CSE) offering, which until now was limited to desktop. According to Google’s Workspace update, users no longer need to download additional apps or use separate mail portals to handle encrypted email on mobile, and the experience is now built directly into the existing Gmail app on both platforms. Google says encrypted messages can be sent to any recipient regardless of their email provider. If the recipient uses Gmail, the message arrives as a standard email thread. If they use a different provider, they can read and reply via a secure browser interface without needing to install anything. The feature is available now for both Rapid Release and Scheduled Release domains. Access requires an Enterprise Plus plan with either the Assured Controls or Assured Controls Plus add-on, which is Google’s compliance-oriented tier aimed at enterprise and public …

The AI Scientist takes a big step toward end-to-end automation of scientific research

The AI Scientist takes a big step toward end-to-end automation of scientific research

A paper built entirely by artificial intelligence did not arrive with a flashy headline. At its core, the study delivers a surprisingly flat result: a promising technique that does nothing to improve how artificial neural networks learn. That outcome isn’t what’s important. What matters is the method itself—the way the research was carried out, which is where the paper’s real contribution lies. The real story is that an AI system, called The AI Scientist, helped carry out nearly the whole research pipeline that produced it, from generating ideas and searching prior work to running experiments, writing the manuscript and reviewing the result. The research findings, published in Nature, describe this as a step toward end-to-end automation of scientific research, at least in machine learning, where experiments can be run entirely on computers. That claim lands at an uneasy moment for science. Large language models are already being used to help with coding, literature reviews and data analysis. The AI Scientist pushes further, aiming to automate not just the routine labor around research, but the parts …

The Danger Behind Meta Killing End-to-End Encryption for Instagram DMs

The Danger Behind Meta Killing End-to-End Encryption for Instagram DMs

As law enforcement agencies scramble to address threats of terrorism, child sexual abuse, and human trafficking—and repressive governments around the world look to broadly expand their surveillance capabilities—researchers fear that Meta’s retreat from its commitments to protect user privacy with end-to-end encryption on Instagram chat could create a problematic precedent in big tech. Meta spent the better part of a decade working to deploy end-to-end encryption by default across all of its chat apps. It was a saga—fraught with both technical and political hurdles. But in December 2023, the company declared victory, announcing default end-to-end encryption for Messenger and promising that it was in testing to roll out for Instagram Direct Messaging as well. In the end, though, end-to-end encryption only came to Instagram chat as a backwater opt-in feature. And as threats to end-to-end encryption from governments around the world loom larger than ever, Meta quietly announced last week that it intends to eliminate the feature from Instagram chat entirely on May 8. Crucially, few companies have the scale and stability needed to stake …

End-to-end encryption: Best ideas of the century

End-to-end encryption: Best ideas of the century

We all keep secrets. Whether you are trying to protect messages to loved ones, company accounts or vital state intelligence, the technology that allows you peace of mind in our increasingly online world is end-to-end encryption (ETEE). ETEE means that whoever provides your internet connection, or runs your messenger or video-conference app, cannot see your communications. That’s because they are encrypted on your device, then decrypted on the recipient’s. During transmission, they are a meaningless string of impenetrable gibberish, so no police force, spy agency or criminally minded company insider could demand, blackmail or threaten their way in. Digital encryption doesn’t depend on promises, but on immutable mathematics. The first useful form of encryption was made possible by the RSA algorithm, publicly described in 1977, which hinges on how difficult it is to find the two prime factors that must be multiplied to create a particular extremely large number. Since then, other algorithms have used all manner of obscure mathematics to create other hard-to-crack encryption codes. But ETEE’s power is less about exactly how it …