Networks


Businesses need to understand AI before putting it to work

#artificialintelligence

Artificial intelligence is a big deal for business – it's the biggest marketing buzzword this side of cryptocurrency and it's set to make a very real difference to the future of work. But what does that really look like? How will AI support employees? And what responsibilities do you have when you start applying AI to customer data? BT's Adastral Park research facility is at the forefront of the development and application of AI technologies in the UK, from using real-time network analysis to detect and protect against cyberattacks as they happen, to enabling customer service agents to anticipate the future needs of their clients based on customer behaviour trends.


MIT Lincoln Laboratory wins 10 R&D 100 Awards

MIT News

Ten technologies developed at MIT Lincoln Laboratory have been honored with 2018 R&D 100 Awards. The awards have been presented by R&D Magazine annually since 1963 and recognize the 100 most significant inventions of the year. "The R&D 100 Award is one of the top awards for recognizing new technology," says Eric Evans, the director of Lincoln Laboratory. "Receiving 10 awards in one year is a great recognition of the quality and scale of Lincoln Laboratory work and all of the excellent technical and support staff involved." A panel of independent experts selected the winning technologies from hundreds of nominations submitted from industry, government laboratories, and research institutions worldwide.


AWS Global Accelerator to boost performance across regions

ZDNet

Amazon Web Services (AWS) has lifted the lid off a handful of products and services ahead of its annual re:Invent conference in Las Vegas, announcing on Monday night a network service that allows for the automatic routing of traffic to multiple regions. The AWS Global Accelerator has been touted by VP of global infrastructure at AWS Peter DeSantis as improving availability and performance for AWS customers' end users. Essentially, user traffic enters AWS Global Accelerator through the closest edge location. The accelerator then routes the user traffic to the closest healthy application endpoint within the global AWS network. Lastly, at the endpoint, the application response returns over the AWS global network and reaches the user through the optimal endpoint.


What IoT is Bringing to the Digital Workplace

#artificialintelligence

Despite the fact that there are many well-publicized problems with the Internet of Things (IoT) and enterprise efforts to use it to achieve better business results, the fact is as IoT apps, devices and infrastructure matures, IoT will drive digital innovation in the coming years. Make no mistake, the problems hindering IoT development that we have identified previously are still problematic -- what enterprise can ignore the threat that unsecured endpoints pose -- but at the recent Gartner Symposium/ITxpo 2018 in Barcelona in Spain, Gartner identified a number of emerging trends and technologies that will go a long way to solving IoT related problems. The result is that the IoT will continue to deliver new opportunities for digital business innovation as well as give CIOs that can master these trends, the push they need to drive digital transformation and development initiatives in their businesses. As data drives the IoT, AI will be applied to a wide range of IoT information, including video, still images, speech, network traffic activity and sensor data. A wide range of social, legal and ethical issues will grow in importance around ownership and use of data.


Space Communication with Neural Network Resource Allocation

#artificialintelligence

Space may be the final frontier, but it continues to pose myriad technical challenges as commercial and government-driven space investment continues. One of those challenges is developing more effective space-based communication systems for the increasing number of satellites and spacecrafts that need to interact with one another in the void. A team of researchers has developed an algorithm to enable cognitive radio functions on satellite communications systems to adapt themselves autonomously. Current space communication systems deploy radio-resource selection algorithms, but they are rudimentary and work with a pre-programmed look-up table. Furthermore, they have little flexibility regarding the various parameters for the performance goals the system needs to achieve.


Blind Over-the-Air Computation and Data Fusion via Provable Wirtinger Flow

arXiv.org Machine Learning

Over-the-air computation (AirComp) shows great promise to support fast data fusion in Internet-of-Things (IoT) networks. AirComp typically computes desired functions of distributed sensing data by exploiting superposed data transmission in multiple access channels. To overcome its reliance on channel station information (CSI), this work proposes a novel blind over-the-air computation (BlairComp) without requiring CSI access, particularly for low complexity and low latency IoT networks. To solve the resulting non-convex optimization problem without the initialization dependency exhibited by the solutions of a number of recently proposed efficient algorithms, we develop a Wirtinger flow solution to the BlairComp problem based on random initialization. To analyze the resulting efficiency, we prove its statistical optimality and global convergence guarantee. Specifically, in the first stage of the algorithm, the iteration of randomly initialized Wirtinger flow given sufficient data samples can enter a local region that enjoys strong convexity and strong smoothness within a few iterations. We also prove the estimation error of BlairComp in the local region to be sufficiently small. We show that, at the second stage of the algorithm, its estimation error decays exponentially at a linear convergence rate.


Coral One review: This 2-in-1 robot vacuum promises more complete cleaning

PCWorld

The Coral One robot vacuum--the first product from Coral Robots--seeks to remedy some of the shortcomings that all such devices possess: They leave dirt in corners, and they can't navigate stairs, dust shelves, or get at those cobwebs in your ceiling. Cleaning those troublespots means hauling your stick vacuum and its attachments out of the closet. Detach the Dustbuster-style vacuum unit from this unique 2-in-1 robot and you can clean curtains, between couch cushions, and get to other hard-to-reach places, using its crevice- and fabric-cleaning attachments if need be. Setting up the Coral One is similar to other robot vacuums. You attach the spin brush to the bottom of the robot, plug in its dock, then set the robot on its charging pins.


The Role of Artificial Intelligence in IoT and OT Security

#artificialintelligence

As the modern threat landscape continues to expand, adding artificial intelligence (AI) to a security strategy has become paramount to establishing and maintaining an effective security posture. Given the speed and complexity of modern cyberthreats and the current cybersecurity skills shortage, network security teams need the assistance of machine learning and other AI-based capabilities in order to detect, secure, and mitigate modern attacks. However, it should come as no surprise that while organizations are adopting AI to bolster their security efforts, cybercriminals are also adopting of things like agile software development, automation, and machine learning to potentially leverage AI themselves to better identify and more quickly exploit network vulnerabilities. Due to the growing number and variety of IoTand OT devices entering network infrastructures, cybercriminals already have the opportunity and capability to launch rapid, complex attacks that these inherently vulnerable devices as entryways into corporate networks. The potential attack capabilities posed by AI will only further compound the threats to today's digital transformation efforts.


IBM's Call for Code Prize Goes to a Team With 'Clusterducks'

WIRED

You know when you try to go online at a Starbucks or on an airplane, first you get a little popup that asks you to accept some terms before you can get to the internet? That popup window exists in a sort of netherworld between actual internet connection and being offline–you pick it up via Wi-Fi, but until you click a box, you're not actually online. A team of five developers realized in that gray area was potentially a huge opportunity to save lives. It's an intractable problem during natural disasters: telecommunications networks and power grids are often damaged or overwhelmed; without them, first responders struggle to help survivors, coordinate evacuations, and even count the dead. Project Owl proposes an elegant solution: an AI-powered disaster coordination platform paired with a robust communication network that can reach people even when other connections are down.


Big Data Meet Cyber-Physical Systems: A Panoramic Survey

arXiv.org Machine Learning

The world is witnessing an unprecedented growth of cyber-physical systems (CPS), which are foreseen to revolutionize our world {via} creating new services and applications in a variety of sectors such as environmental monitoring, mobile-health systems, intelligent transportation systems and so on. The {information and communication technology }(ICT) sector is experiencing a significant growth in { data} traffic, driven by the widespread usage of smartphones, tablets and video streaming, along with the significant growth of sensors deployments that are anticipated in the near future. {It} is expected to outstandingly increase the growth rate of raw sensed data. In this paper, we present the CPS taxonomy {via} providing a broad overview of data collection, storage, access, processing and analysis. Compared with other survey papers, this is the first panoramic survey on big data for CPS, where our objective is to provide a panoramic summary of different CPS aspects. Furthermore, CPS {require} cybersecurity to protect {them} against malicious attacks and unauthorized intrusion, which {become} a challenge with the enormous amount of data that is continuously being generated in the network. {Thus, we also} provide an overview of the different security solutions proposed for CPS big data storage, access and analytics. We also discuss big data meeting green challenges in the contexts of CPS.