BabelOn is trying to create Photoshop for your voice


But a startup from San Francisco called BabelOn is working on a particularly unique offshoot of this technology. Initially, the company wants to use its technology for things like improving dubbed films or localizing video games, but eventually it wants to be able to translate your speech in real time, say while you're on a Skype call. Imagine a game company wanting to localize an English voice-acting performance for other countries; BabelOn could let companies use the same voice actor and digitally create her dialogue rather than having to find a native speaker to rerecord the entire script. However, you can specify the desired emotional output of the translated performance; Hamilton called it an "emotional markup language."

Firms turn to AI and machine learning for data security


More than half (57 percent) of executives report trusting automated systems as much or more than humans to protect their organizations. More than one third (38 percent) indicated that within two years automated security systems would be the primary resource for managing cyber security. A majority of respondents (85 percent) said security threats are a CEO- or board-level concern in their company. Nearly half of all executives (47 percent) cited improving information security as a major goal of their digital transformation, and for three quarters of organizations cyber security considerations were critical in shaping decisions to transform aspects of the business to digital.

Uncle Sam Wants Your Deep Neural Networks


Earlier this year, Kaggle ran a $1 million contest to build algorithms capable of identifying signs of lung cancer in CT scans, helping to fuel a larger effort to apply neural networks to health care.

Helping or hacking? Engineers and ethicists must work together on brain-computer interface technology


Just using an individual's brain activity – specifically, their P300 response – we could determine a subject's preferences for things like favorite coffee brand or favorite sports. The potential ability to determine individuals' preferences and personal information using their own brain signals has spawned a number of difficult but pressing questions: Should we be able to keep our neural signals private? Putting ethicists in labs alongside engineers – as we have done at the CSNE – is one way to ensure that privacy and security risks of neurotechnology, as well as other ethically important issues, are an active part of the research process instead of an afterthought. The goal should be that the ethical standards and the technology will mature together to ensure future BCI users are confident their privacy is being protected as they use these kinds of devices.

Softbank ups investment in security AI firm Cybereason » Banking Technology


Softbank has upped its investment in security firm Cybereason, as the focus on artificial intelligence (AI) continues, writes Banking Technology's sister publication The additional $100 million investment from Softbank now makes the firm the largest investor, with CRV, Spark Capital, and Lockheed Martin also involved. An AI-driven security solution can work continuously and more efficiently than a human, but also use machine learning to access content on the internet to learn about potential attacks it could face. This isn't about replacing humans because an AI is cheaper, it is a job which simply cannot be done by the security team; with the number of access points, the task is too much to ask for.

Cisco's new network uses machine learning to detect threats in encrypted data TheINQUIRER


CISCO HAS HAILED its new network, as a "significant breakthrough" thanks to its ability to detect malware in encrypted traffic. The company says that this is'one of the most significant breakthroughs in enterprise networking', and that the new network can anticipate actions, stop security threats and continues to evolve and learn. AI, in the form of Encrypted Traffic Analytics (ETA), uses Cisco's Talos threat intelligence to detect known attack signatures in all traffic, including encrypted data. "ETA uses Cisco's Talos cyber intelligence to detect known attack signatures even in encrypted traffic, helping to ensure security while maintaining privacy," said Cisco SVP David Goeckeler.

Top 6 Skillsets Required for IoT


Machine learning algorithms make the machines smarter by giving them the ability to predict by recognizing the data patterns. Electrical engineers are needed to help with embedded device development for mobile applications and for radio frequency in order to get a smooth and effective mode of communication. Machine learning algorithms make the machines smarter by giving them the ability to predict by recognizing the data patterns. Electrical engineers are needed to help with embedded device development for mobile applications and for radio frequency in order to get a smooth and effective mode of communication.

Quantum Computing and Deep Learning. How Soon? How Fast?


Add to that the new IBM Q program offering commercial quantum compute time via API where IBM says "To date users have run more than 300,000 quantum experiments on the IBM Cloud". In 2010 Lockheed became D-Wave's first commercial customer after testing whether (now 7 year old) Quantum computers could spot errors in complex code. Temporal Defense Systems (TDS): TDS is using the latest D-Wave 2000Q to build its advanced cyber security system, the Quantum Security Model. Commonwealth recently announced a large investment in a Quantum simulator, while Westpac and Telstra have made sizable ownership investments in Quantum computing companies focused on cyber security.

Web Application Security: Threats, Countermeasures, and Pitfalls

IEEE Computer

Penetration testing is a crucial defense against common web application security threats such as SQL injection and cross-site scripting attacks. A proposed web vulnerability scanner automatically generates test data with combinative evasion techniques, significantly expanding test coverage and revealing more vulnerabilities.

Malware Detection: Cisco Develops Tool To Spot Malware In Encrypted Traffic

International Business Times

The so-called "intuitive network" adds a software-driven element to network security by tapping into concepts of machine learning to analyze and interpret data to identify malicious code as it passes through the network. To determine a potential threat, Cisco's Encrypted Traffic Analytics examines a number of data sources including, transport layer security handshake metadata, domain name server contextual flows linked to the encrypted data and the HTTP information taken from the same source IP address within a 5-minute window. The encrypted traffic analytics system starts its examination by looking at the initial data packet of a particular connection. Cisco's encrypted traffic analytics system will be available on the Cisco Catalyst 9000 series, including the Catalyst 9300 and 9500.