Geekflare is supported by our audience. We may earn affiliate commissions from buying links on this site.
In Latest Tech Last updated: June 15, 2023
Share on:
Invicti Web Application Security Scanner – the only solution that delivers automatic verification of vulnerabilities with Proof-Based Scanning™.

Hello! 🙋We have the following Product updates for you today! đź“Ł

Salesforce Launches AI Cloud

Salesforce launches AI Cloud for efficient generative experiences across applications and workflows. AI Cloud’s Einstein GPT Trust Layer ensures data security and enterprise-level compliance when implementing generative AI technology, offering customers both safety and access to the benefits of this technology.

Salesforce-Launches-AI-Cloud

Salesforce claims that their Einstein GPT is the first artificial intelligence for Salesforce’s Einstein GPT is an AI system for customer relations management. It powers over one trillion weekly predictions across several Salesforce apps.

Its Einstein-powered Generative AI boosts productivity and efficiency in sales, marketing, service, and commerce.

Salesforce’s AI Cloud will merge several technologies, including Einstein, Data Cloud, Tableau, Flow, and MuleSoft, to provide businesses with dependable and available AI services.

Hyper for Virtual YouTubers and Avatar Content Creators

Hyper Online produces software tools for virtual YouTubers and avatar content creators. Their first product is a mobile app that makes recording and streaming content easier with a 3D Live2D avatar.

Hyper-for-Virtual-YouTubers-and-Avatar-Content-Creators

VTubers and avatar makers can stream on various platforms, including Hyper, Twitch, YouTube, TikTok, etc.

The product has a new feature, Hyper AI, for creating AI-generated characters used as personal chatbots or in storytelling with VTuber avatars. The company recently raised $3.6M in its seed round from Amazon and other notable investors.

Hyper’s AI-powered VTuber characters are sustained by generative AI built on OpenAI’s GPT technology and adjusted by Hyper to handle natural language inquiries and verbal communication. Unlike other VTubers, these avatars need no human counterpart to energize them.

Blink Copilot assists IT and security professionals to enhance productivity and provide secure workflows despite their expertise level through AI-generated no-code, low-code, or code security automation.

YouTube video

Blink claims that its Copilot’s automation is unbeatable and will complete automation for security teams in seconds that would take months.

As per a report, the company has raised $26M in total funding. Blink Copilot automates workflows for different security teams, including SOC & Incident Response, Cloud Security, IT & SaaS Security, Identity & Access Management, Governance, Risk & Compliance.

Its key features include a low code editor, an automation library of 7k+ security workflow automation, and a self-service portal.

By utilizing Blink, you can optimize security team operations and enhance your organization’s overall protection.

For more updates, check out the Latest Tech category.

  • Satish Shethi
    Author
    I have been in the IT industry for more than 20 years. I have served Fortune 100 company in a senior role looking after projects related to US Banking, BFS, Mortgage, Insurance, and FMCG. Apart from IT, I like to read books, especially spirituality… read more
Thanks to our Sponsors
More great readings on Latest Tech
Power Your Business
Some of the tools and services to help your business grow.
  • Invicti uses the Proof-Based Scanning™ to automatically verify the identified vulnerabilities and generate actionable results within just hours.
    Try Invicti
  • Web scraping, residential proxy, proxy manager, web unlocker, search engine crawler, and all you need to collect web data.
    Try Brightdata
  • Monday.com is an all-in-one work OS to help you manage projects, tasks, work, sales, CRM, operations, workflows, and more.
    Try Monday
  • Intruder is an online vulnerability scanner that finds cyber security weaknesses in your infrastructure, to avoid costly data breaches.
    Try Intruder