If you are looking for an answer to the question What is Artificial Intelligence? and you only have a minute, then here's the definition the Association for the Advancement of Artificial Intelligence offers on its home page: "the scientific understanding of the mechanisms underlying thought and intelligent behavior and their embodiment in machines."
However, if you are fortunate enough to have more than a minute, then please get ready to embark upon an exciting journey exploring AI (but beware, it could last a lifetime) …
The Apple Watch Series 4 is the best smartwatch you can buy. There's no single killer feature that makes the Apple Watch Series 4 (as tested: 40mm with GPS and GPS/LTE), our pick for best smartwatch. It's the fact that it does almost everything better than every other smartwatch we've come across. That it can be used as a minimalist device, for keeping abreast of your smartphone notifications, or as an all-in wearable that will let you take or make phone calls, send text messages, navigate through a crowded city and listen to music without bringing your cellphone with you (provided you spring for the GPS/LTE version) is the icing on the cake. Setting up the Apple Watch to work with your iPhone is almost effortless. Using this watch, with its responsive OLED touchscreen display and rotating Digital Crown (Apple's marketing mumbo jumbo for the knob on the side of the watch) is just as easy. You can use your finger to navigate apps and menus, scroll through text with the Digital Crown or ask Siri to do some hands-free heavy lifting for you.
Apple is offering iPhone users a way to bypass Facebook's and Google's sign-in services when using new apps. That era actually ended quite some time ago. Remember when iPhones were tied to the desktop for updates? So when Apple confirmed Monday that its next desktop operating system upgrade would split up iTunes into three separate apps, for music, TV shows and movies and podcasts, it seemed like an afterthought. "It's a rounding error," something that should have been done a long time ago, says Gene Munster, an analyst and investor with Loup Ventures, iTunes "had gotten way too big."
Is AI the Silver Bullet of Cybersecurity? Two years ago, I talked about how we were in the early stages of the artificial intelligence revolution and how to evaluate AI in security products. Since then, AI research continues to blow minds, particularly with Generative Adversarial Networks (GAN), which are being used to clone voices, generate big chunks of coherent text, and even create creepy pictures of faces of people who don't exist. With all these cool developments making headlines, it's no wonder that people want to understand how AI works and how it can be applied to different industries like cyber security. Unfortunately, there's no such thing as a silver bullet in security, and you should run away from anyone who says they're selling one.
There has been tumultuous excitement in the Computer Science field surrounding the potential of applying machine learning algorithms to the commercial problems at enterprise scale over the last few decades. Solving complex conundrums and HPC at web scale will need a new enterprise-grade operating system and hardware data flow computing with ASIC or FPGA chips to minimize the data movements and maximize the shorter communication paths to reboot the fourth industrial revolution and execute more parallel instructions on a single semiconductor chip die. The data lifecycle management of IoT requires unlimited number of threads to spawn on an operating system at the same time simultaneously with guaranteed QoS. All the IoT operating systems such as Android Things, Arm Mbed OS, Embedded Apple iOS and macOS, Google Brillo, Green Hills Integrity, Nucleus RTOS, RIOT OS, RTOS, Windows, WindRiver VxWorks, or Linux targeting Raspberry Pi or BeagleBoards, Intel Edison IoT Boards, and Arduino platforms can provide the performance based on the number of cores in the machine without unlimited threads. However, regardless of an exponential increase in the hardware resources to deliver the multitasking capabilities and memory management, corporations have hit the wall on Moore's Law plagued with communication delays requiring precision programming in C and C through Open MPI and heavy parallelprogramming which does not seem to be the norm for developing regular applications.
This paper describes a possible way to improve computer security by implementing a program which implements the following three features related to a weak notion of artificial consciousness: (partial) self-monitoring, ability to compute the truth of quantifier-free propositions and the ability to communicate with the user. The integrity of the program could be enhanced by using a trusted computing approach, that is to say a hardware module that is at the root of a chain of trust. This paper outlines a possible approach but does not refer to an implementation (which would need further work), but the author believes that an implementation using current processors, a debugger, a monitoring program and a trusted processing module is currently possible.
Even after all these years, the first thing that likely comes to mind when you think Google is search. Google has long been about way more than that, of course, and the annual Google I/O developer conference, now underway in Mountain View, California, is where the Alphabet-subsidiary previews new hardware, software and other products. Google didn't ignore search during I/O and showcased 3D and augmented reality effects to make search that much more meaningful; it brought a virtual shark onto the I/O stage during one demo. What's more, using the Google Lens tool, the company showed how you could point a camera at a sign in a foreign language to not only translate that sign but to read aloud its contents. And it announced the next generation of the Google Assistant (coming later in the year) that Google says is 10 times faster than today's Assistant.
GE Aviation and Auterion said they will partner to build a full stack platform for drone manufacturers and operators looking to scale commercial drone operations. The partnership will bring together GE Avaiation's Aircraft System avionics platform and Auterion's Enterprise PX4 operating system, combining airborne autopilot and application computing hardware, flight management, safety management and integration. GE Aviation is providing the avionics hardware, application computing, flight management and integration into airframes. Meanwhile, Auterion's operating system, which runs on-vehicle, in the cloud and in the ground station, provides core software infrastructure including flight peripherals and camera integrations, data networking, precision navigation and compliance with traffic management. GE Aviation and Auterion tested the hardware and software platform over the last three weeks at Reno-Stead airport in Nevada.
An online tool allows users to see exactly what kind of detail Facebook, Google, and Instagram are keeping about the digital online activities of users. Popular dating site Tinder, for example, knows the time, date and number of exchanges you have online. The findings show that apps can even ignore'Do not track' requests from mobile devices, and these include Netflix and online dating apps Hinge and Happn. A new site allows users to see exactly what kind of detail social media sites like Facebook, Google, and Instagram keep about your online activity. Facebook can tell if its emails to user's email accounts have been opened, and a wealth of information about the status of the device and signal being used to access the app.
If you haven't heard the news this week, an international team of scientists from the Event Horizon Telescope (EHT) Collaboration photographed and confirmed the existence of Powehi: the supermassive black hole at the center of galaxy Messier 87, which is over 55 million light years away, has the mass of over 6.5 billion suns, and has a radius wider than our entire solar system. It is a very, very big black hole, and it is beautiful and utterly frightening. It was imaged with 5 petabytes of collected data from a network of geographically dispersed radio telescopes around the world, using a computer algorithm created by a young post-doctoral student from MIT, Katie Bouman. Of the many very important things about this discovery, this is what stands out for me: How it has put science front and center, reminding us that incredible mysteries in the universe are yet to be revealed to us, and that the end products of hard scientific research can be fun, exciting, educational and terrifying all at the same time. We finally got to see one.