Press "Enter" to skip to content

Category: general

Syracuse University chancellor says anti-Israel campus protests ‘encouraged’ by Iran

The chancellor of Syracuse University revealed his belief that pro-Hamas, anti-Israel protests were encouraged and potentially orchestrated by Iran while speaking on a panel this week in Washington, D. C.

DeepAgents CLI: A New Tool for Efficient Coding and Research

The post DeepAgents CLI: A New Tool for Efficient Coding and Research appeared com. Ted Hisokawa Nov 01, 2025 12: 25 LangChain introduces DeepAgents CLI, a tool for coding, research, and building agents with persistent memory, enhancing productivity through terminal-based operations. LangChain has announced the launch of DeepAgents CLI, a command-line interface designed to streamline coding, research, and the creation of agents with persistent memory. This innovative tool allows users to create and manage custom DeepAgents directly from their terminal, according to LangChain. Features and Capabilities DeepAgents CLI offers a suite of functionalities aimed at enhancing productivity. Users can read, write, and edit files within their projects, execute shell commands with human approval, and search the web for up-to-date information. Additionally, the tool can make HTTP requests to APIs and maintain a persistent memory system, allowing it to learn and remember information across different sessions. One of the tool’s standout features is its ability to plan tasks using visual to-do lists, making it a versatile assistant for developers and researchers alike. The CLI supports both Anthropic (Claude) and OpenAI models, with Anthropic Claude Sonnet 4 being the default model and Tavily used for web searches. Installation and Setup Installing DeepAgents CLI is straightforward. Users can simply run the command pip install deepagents-cli or, if using uv, uv pip install deepagents-cli. After installation, users need to set up their API keys by adding them to the . env file in the project root. This setup ensures that DeepAgents can automatically load the necessary configurations. Getting Started with DeepAgents Once installed, launching DeepAgents in the project directory is as simple as entering deepagents or, for uv users, uv run deepagents. The CLI can assist with tasks such as adding type hints to functions, where it reads the relevant files, analyzes them, proposes changes, and seeks user approval before executing those.

Meta Introduces Agents Rule of Two for Enhanced AI Security

The post Meta Introduces Agents Rule of Two for Enhanced AI Security appeared com. Rebeca Moen Nov 01, 2025 12: 29 Meta AI unveils the ‘Agents Rule of Two’ to mitigate security risks in AI agents, focusing on reducing vulnerabilities such as prompt injection. Understanding the Agents Rule of Two Meta AI has announced a new security framework known as the ‘Agents Rule of Two’ to address the growing security challenges faced by AI agents. This initiative aims to minimize the risks associated with AI, particularly focusing on vulnerabilities like prompt injection, according to Meta AI’s official blog post. The Challenge of Prompt Injection Prompt injection is a significant security concern in Large Language Models (LLMs), where malicious strings or data can lead AI agents to ignore developer instructions or perform unauthorized actions. For instance, an AI-powered email assistant could be compromised to leak sensitive information or send phishing emails if an attacker exploits this vulnerability. Framework Inspired by Existing Policies The ‘Agents Rule of Two’ is inspired by security policies from Chromium and concepts like Simon Willison’s “lethal trifecta.” It is designed to help developers navigate the trade-offs in deploying powerful AI agents, ensuring a balance between functionality and security. Key Principles of the Agents Rule of Two The framework dictates that AI agents should not satisfy more than two of the following properties within a session to mitigate the risks of prompt injection: [A] Processing untrustworthy inputs [B] Accessing sensitive systems or private data [C] Changing state or communicating externally If all three are required, the agent should operate under supervision, such as human-in-the-loop approval, to prevent autonomous actions that could lead to security breaches. Implications for AI Development This approach reflects Meta’s commitment to advancing AI technology while safeguarding user data and system integrity. By adopting the Agents Rule of Two, developers can create.

Tai Baribo scores 2 goals, Union beats Fire 3-0 to sweep first-round series

CHICAGO (AP) Tai Baribo scored two early goals and the Philadelphia Union beat the Chicago Fire 3-0 on Saturday to sweep the best-of-three first-round series in the MLS Cup playoffs. Philadelphia, the No. 1 seed in the Eastern Conference, will host fourth-seeded Charlotte or No. 5 seed New York City in the one-game conference.

Hammond Jr., Smith run for 2 TDs each, Sacramento State beats Eastern Washington 35-13

Rodney Hammond Jr. had 208 yards rushing and two touchdowns on 22 carries, Jaquail Smith ran for TDs of 45 and 29 yards and Sacramento State beat Eastern Washington 35-13. Quarterback Cardell Williams opened the scoring with a 1-yard touchdown run a little more than two minutes into the game for Sacramento State (4-4, 2-2), which finished with 376 yards rushing and averaged 6. 7 yards per carry. Hammond raced 59 yards to the end zone to give the Hornets a 14-10 lead with about five minutes left in the first quarter. Eastern Washington’s Nate Bell left the game early in the second quarter due to an apparent shoulder injury and finished 6-of-14 passing for 39 yards. Jake Schakel replaced Bell and went 24 of 38 for 201 yards.

A new partnership between McAvoy, Zadorov has Bruins defense regaining some bite

“He’s able to physically dominate guys which I think is his superpower.” The post A new partnership between McAvoy, Zadorov has Bruins defense regaining some bite appeared first on Boston. com.