نبذة عني
I am a globally recognized technology leader and Distinguished Engineer, based in Riyadh,…
مقالات Anthony
النشاط
-
Legal text is dense and context-heavy, perfect for testing vector search at scale. I built a semantic search system over 143,000 legal texts…
Legal text is dense and context-heavy, perfect for testing vector search at scale. I built a semantic search system over 143,000 legal texts…
تم إبداء الإعجاب من قبل Anthony Butler
-
Kudos to Dr. Adrian Lucas Malec for his awesome new walkthrough of how he vectorized and indexed hundreds of thousands of legal documents in record…
Kudos to Dr. Adrian Lucas Malec for his awesome new walkthrough of how he vectorized and indexed hundreds of thousands of legal documents in record…
تم إبداء الإعجاب من قبل Anthony Butler
-
Isaacus Raises $700k to Build the “AWS of Legal AI”! Isaacus, an Australian legal AI foundation model builder, just secured $700,000 in pre-seed…
Isaacus Raises $700k to Build the “AWS of Legal AI”! Isaacus, an Australian legal AI foundation model builder, just secured $700,000 in pre-seed…
تم إبداء الإعجاب من قبل Anthony Butler
التعليم
التراخيص والشهادات
براءات الاختراع
-
Secure virtual meeting vaults to protect user privacy
تاريخ الإصدار US20240323320A1
A computer-implemented method, according to one embodiment, includes receiving, from a first user device associated with a first user in a shared virtual world, a request to create a secure virtual meeting vault. In response to receiving the request, the secure virtual meeting vault is created. The secure virtual meeting vault runs on a secured container computing environment that is separate from the shared virtual world. The method further includes teleporting an avatar representing a first…
A computer-implemented method, according to one embodiment, includes receiving, from a first user device associated with a first user in a shared virtual world, a request to create a secure virtual meeting vault. In response to receiving the request, the secure virtual meeting vault is created. The secure virtual meeting vault runs on a secured container computing environment that is separate from the shared virtual world. The method further includes teleporting an avatar representing a first user in the shared virtual world to the secure virtual meeting vault. In response to a determination that an event within the secure virtual meeting vault has concluded, the secure virtual meeting vault is verifiably destroyed. A computer program product, according to another embodiment, includes a computer readable storage medium having program instructions embodied therewith. The program instructions are readable and/or executable by a computer to cause the computer to perform the foregoing method.
-
Decenteralised biometric signing of smart contracts
تاريخ الإصدار US 10541818
A method and system for decentralized biometric signing of a digital contract. A digital identity including a private key is created. The private key was encrypted on a mobile device via use of captured biometric data. A digital hash of the digital contract is generated. A user using biometric data is authenticated. Usage of the biometric data is authorized. Responsive to the usage of the biometric data being authorized, the encrypted private key is decrypted. The digital hash is signed with…
A method and system for decentralized biometric signing of a digital contract. A digital identity including a private key is created. The private key was encrypted on a mobile device via use of captured biometric data. A digital hash of the digital contract is generated. A user using biometric data is authenticated. Usage of the biometric data is authorized. Responsive to the usage of the biometric data being authorized, the encrypted private key is decrypted. The digital hash is signed with the decrypted private key. The signed digital hash is stored in a blockchain.
-
Data Leak Prevention Enforcement based on Learned Document Classification
تاريخ الإصدار US 20150254469
The present disclosure relates generally to the field of automatically learning and automatically adapting to perform classification of protected data. In various examples, learning and adapting to perform classification of protected data may be implemented in the form of systems, methods and/or algorithms.
-
Dynamic Sandboxing based on Intruder Intent
تاريخ الإصدار US 9535731
A method of security sandboxing which may include detecting an illicit intrusion to a computer on a first computer system; cloning the intruded computer; directing all traffic from the illicit intrusion to the cloned computer; observing activities of the illicit intrusion interacting with the cloned computer; and dynamically adapting the cloned computer to perform activities of predicted interest to the illicit intrusion based on the observed activities of the illicit intrusion. The steps of…
A method of security sandboxing which may include detecting an illicit intrusion to a computer on a first computer system; cloning the intruded computer; directing all traffic from the illicit intrusion to the cloned computer; observing activities of the illicit intrusion interacting with the cloned computer; and dynamically adapting the cloned computer to perform activities of predicted interest to the illicit intrusion based on the observed activities of the illicit intrusion. The steps of the method may be performed by one or more computing devices.
مبتكرون آخرونعرض براءة الاختراع -
Managing distribution of software updates in near field communication (NFC) mobile devices
تاريخ الإصدار US 9301132
A method, system and a computer program product for managing distribution of software updates in Near Field Communication (NFC) mobile devices includes retrieving information of one or more softwares in one or more NFC mobile devices by a NFC reader in communication range with the one or more NFC mobile devices, transmitting the retrieved information from the NFC reader to a distribution server which determines if the one or more softwares requires an update based on the retrieved information…
A method, system and a computer program product for managing distribution of software updates in Near Field Communication (NFC) mobile devices includes retrieving information of one or more softwares in one or more NFC mobile devices by a NFC reader in communication range with the one or more NFC mobile devices, transmitting the retrieved information from the NFC reader to a distribution server which determines if the one or more softwares requires an update based on the retrieved information, in response to said determination, receiving an available updated software or update components of the one or more softwares from the distribution server to the NFC reader and transmitting thereof from the NFC reader to a secure element of the one or more NFC mobile devices whose one or more softwares require an updation.
مبتكرون آخرون -
Mobile application data storage allocation
تاريخ الإصدار US US 14/469,765
In a method for allocating and storing application data for applications of mobile devices, one or more processors receive one or more portions of application data of an application selected by a user of a mobile computing device. The one or more processors determine where to store each of the one or more portions of application data based on predefined instructions. The one or more processors cause each of the one or more portions of application data to be stored based on the determination.
مبتكرون آخرون -
Mobile Application Data Storage
قدم US 20150074275
In a method for allocating and storing application data for applications of mobile devices, one or more processors receive one or more portions of application data of an application selected by a user of a mobile computing device. The one or more processors determine where to store each of the one or more portions of application data based on predefined instructions. The one or more processors cause each of the one or more portions of application data to be stored based on the determination.
مبتكرون آخرون -
Executing Electronic Contract on NFC-enabled Mobile Devices
قدم US 20150134561
A method, system and/or NFC (Near field communication) enabled mobile device is provided for executing an electronic contract on NFC enabled mobile devices. A first contracting party is provided to apply an electronic signature thereof in an electronic contract provided on a first NFC enabled mobile device used by the first contracting party, the electronic signature is applied through a secure element of the first NFC enabled mobile device. The electronically signed contract is transmitted…
A method, system and/or NFC (Near field communication) enabled mobile device is provided for executing an electronic contract on NFC enabled mobile devices. A first contracting party is provided to apply an electronic signature thereof in an electronic contract provided on a first NFC enabled mobile device used by the first contracting party, the electronic signature is applied through a secure element of the first NFC enabled mobile device. The electronically signed contract is transmitted from the first NFC enabled mobile device to a second NFC enabled mobile device used by a second contracting party for providing the second contracting party to apply an electronic signature thereof in the received electronically signed contract from the first NFC enabled mobile device through a secure element in the second NFC enabled mobile device.
مبتكرون آخرون -
Accessing Local Applications When Roaming Using A NFC Mobile Device
قدم US US2014/0380044Al
A method of accessing local applications when roaming on a NFC mobile device may include creating a first partition and a second partition on a secure element (SE) of a subscriber identification module (SIM) of a near field communication (NFC) enabled device. The home TSM separates the first partition and the second partition by public key encryption. The home TSM generates cryptographic keys in response to a request by a roaming TSM for access to the second partition of the SIM. Following the…
A method of accessing local applications when roaming on a NFC mobile device may include creating a first partition and a second partition on a secure element (SE) of a subscriber identification module (SIM) of a near field communication (NFC) enabled device. The home TSM separates the first partition and the second partition by public key encryption. The home TSM generates cryptographic keys in response to a request by a roaming TSM for access to the second partition of the SIM. Following the exchange of security keys, the home TSM delegates to the roaming TSM access to the second partition of the SIM.
مبتكرون آخرون -
Detection of Steganograpy at the Perimeter
قدم US 20160283746
A method to detect a plurality of steganography based information embedded in a multimedia file associated with an online computer environment is provided. The method may include detecting the multimedia file entering or exiting an online environment associated with a network or an organization. The method may also include comparing a stored hashed version of the detected multimedia file to the detected version of the multimedia file. The method may also include comparing a stored perceptual…
A method to detect a plurality of steganography based information embedded in a multimedia file associated with an online computer environment is provided. The method may include detecting the multimedia file entering or exiting an online environment associated with a network or an organization. The method may also include comparing a stored hashed version of the detected multimedia file to the detected version of the multimedia file. The method may also include comparing a stored perceptual hashed version of the detected multimedia file to the detected version of the multimedia file based on the detected multimedia file not matching the stored hashed version of the detected multimedia file. The method may further include assigning a flag attribute to the detected multimedia file based on the detected multimedia file matching the stored perceptual hashed version of the detected multimedia file.
مبتكرون آخرون
المشروعات
-
Industry Sector AI strategy and implementation
-
-
National Emerging Technology Strategy
-
-
Wholesale Central Bank Digital Currency (CBDC)
-
-
National Blockchain Strategy
-
-
Platform for tracking hydrocarbon supply chain for oil and gas industry
-
-
Blockchain Strategy for Riyadh
-
المزيد من أنشطة Anthony
-
Darío Gil has been appointed under secretary of science at the U.S. Department of Energy. A 20+ year IBM veteran and former head of IBM Research…
Darío Gil has been appointed under secretary of science at the U.S. Department of Energy. A 20+ year IBM veteran and former head of IBM Research…
تم إبداء الإعجاب من قبل Anthony Butler
-
Impressive work from Isaacus with the release of the Massive Legal Embedding Benchmark (MLEB), now the most comprehensive evaluation for legal text…
Impressive work from Isaacus with the release of the Massive Legal Embedding Benchmark (MLEB), now the most comprehensive evaluation for legal text…
تم إبداء الإعجاب من قبل Anthony Butler
-
ADIA Lab welcomes Professor Robert F. Engle, Nobel Laureate in Economic Sciences (2003), and Professor Sir Konstantin Novoselov, Nobel Laureate in…
ADIA Lab welcomes Professor Robert F. Engle, Nobel Laureate in Economic Sciences (2003), and Professor Sir Konstantin Novoselov, Nobel Laureate in…
تم إبداء الإعجاب من قبل Anthony Butler
-
Ubyx Inc. was incorporated 24 March 2025. The whitepaper was published same day. We raised $10mm from fabulous investors. We are now 10 strong. And…
Ubyx Inc. was incorporated 24 March 2025. The whitepaper was published same day. We raised $10mm from fabulous investors. We are now 10 strong. And…
تم إبداء الإعجاب من قبل Anthony Butler
-
Isaacus just beat OpenAI, Google (and the rest of the competition) at legal retrieval. Their model scores the highest on the Massive Legal Embedding…
Isaacus just beat OpenAI, Google (and the rest of the competition) at legal retrieval. Their model scores the highest on the Massive Legal Embedding…
تم إبداء الإعجاب من قبل Anthony Butler
-
Kudos to J. Michael Dockery for this very helpful, plain English explanation of why legal-optimized embeddings are preferable over general-domain…
Kudos to J. Michael Dockery for this very helpful, plain English explanation of why legal-optimized embeddings are preferable over general-domain…
تم إبداء الإعجاب من قبل Anthony Butler
-
The Massive Legal Embedding Benchmark (MLEB), now on Hugging Face, addresses the need for a high-quality evaluation benchmark for legal AI. It…
The Massive Legal Embedding Benchmark (MLEB), now on Hugging Face, addresses the need for a high-quality evaluation benchmark for legal AI. It…
تمت المشاركة من قبل Anthony Butler
-
It's not often you get to announce two monumental achievements in legal AI in the span of 24 hours, but, for my whole team at Isaacus, today is that…
It's not often you get to announce two monumental achievements in legal AI in the span of 24 hours, but, for my whole team at Isaacus, today is that…
تم إبداء الإعجاب من قبل Anthony Butler
-
Kanon 2 Embedder is No. 1! Congrats Isaacus for releasing this embedder model + the first Massive Legal Embedding Benchmark (10 datasets, multiple…
Kanon 2 Embedder is No. 1! Congrats Isaacus for releasing this embedder model + the first Massive Legal Embedding Benchmark (10 datasets, multiple…
تم إبداء الإعجاب من قبل Anthony Butler
-
In a monumental first for both legal AI and Australian-made AI, we're proud to announce the release of 𝘁𝗵𝗲 𝘄𝗼𝗿𝗹𝗱'𝘀 𝗳𝗶𝗿𝘀𝘁…
In a monumental first for both legal AI and Australian-made AI, we're proud to announce the release of 𝘁𝗵𝗲 𝘄𝗼𝗿𝗹𝗱'𝘀 𝗳𝗶𝗿𝘀𝘁…
تم إبداء الإعجاب من قبل Anthony Butler
-
We’ve just released Kanon 2 Embedder, the world’s best legal embedding model, ranked first on the Massive Legal Embedding Benchmark…
We’ve just released Kanon 2 Embedder, the world’s best legal embedding model, ranked first on the Massive Legal Embedding Benchmark…
تم إبداء الإعجاب من قبل Anthony Butler
-
The fastest and most effective legal embedding model on the planet. Nearly 10% more accurate than OpenAI in legal benchmarks and 30% faster.…
The fastest and most effective legal embedding model on the planet. Nearly 10% more accurate than OpenAI in legal benchmarks and 30% faster.…
تمت المشاركة من قبل Anthony Butler
ملفات شخصية أخرى مشابهة
أعضاء آخرون يحملون اسم Anthony Butler
-
Anthony Butler
-
Anthony Butler
-
Anthony Butler
Executive Cybersecurity Leader | Driving Enterprise Risk, Cloud Security & GRC Excellence | CISM • CCISO • Azure Security
-
Anthony Butler
Decision Engine Specialist @ SoFi | US Air Force Veteran
1088 أخرى باسمAnthony Butler على LinkedIn
استعرض الأعضاء الآخرين الذين يحملون اسم Anthony Butler