Goto

Collaborating Authors

software


The Next AI Frontier – Software That Writes Software - Liwaiwai

#artificialintelligence

Depending on your opinion, Artificial Intelligence is either a threat or the next big thing. Even though its deep learning capabilities are being applied to help solve large problems, like the treatment and prevention of human and genetic disorders, or small problems, like what movie to stream tonight, AI in many of its forms (such as machine learning, deep learning and cognitive computing) is still in its infancy in terms of being adopted to generate software code. AI is evolving from the stuff of science fiction, research, and limited industry implementations, to adoption across a multitude of fields, including retail, banking, telecoms, insurance, healthcare, and government. However, for the one field ripe for AI adoption – the software industry – progress is curiously slow. Consider this: why isn't an industry, which is built on esoteric symbols, machine syntax, and repetitive loops and functions, all-in on automating code?


Cheap, Easy Deepfakes Are Getting Closer to the Real Thing

WIRED

There are many photos of Tom Hanks, but none like the images of the leading everyman shown at the Black Hat computer security conference Wednesday: They were made by machine learning algorithms, not a camera. Philip Tully, a data scientist at security company FireEye, generated the hoax Hankses to test how easily open source software from artificial intelligence labs could be adapted to misinformation campaigns. His conclusion: "People with not a lot of experience can take these machine learning models and do pretty powerful things with them," he says. Seen at full resolution, FireEye's fake Hanks images have flaws like unnatural neck folds and skin textures. But they accurately reproduce the familiar details of the actor's face like his brow furrows and green-gray eyes, which gaze cooly at the viewer.


Tachyum Shows Prodigy Running Existing x86, ARM, and RISC-V Software

#artificialintelligence

SANTA CLARA, Calif., Aug. 4, 2020 – Tachyum Inc. announced that its Prodigy Universal Processor has successfully completed software emulation testing across x86, ARM and RISC-V binary environments. This important milestone demonstrates that Prodigy will enable customers to run their legacy applications transparently at launch with better performance than any contemporary or future ARM or RISC-V processors. Coupled with hyperscale data center workhorse programs such as Hadoop, Apache and more, which Tachyum is recompiling to Prodigy native code, this capability will ensure that Prodigy customers can run a broad spectrum of applications, right out of the box. Tachyum customers consistently indicate that they would run 100% native applications within 9-18 months of transitioning to the Tachyum platform to exceed performance of the fastest Xeon processor. The emulation is to smoothly transition to native software for Tachyum Prodigy.


How AI is Becoming Essential to Cyber-Strategy

#artificialintelligence

Added to this, the diversity of internet and network-connected technologies are following an even faster curve. There are some hard truths that many organizations ignore at their own peril. Infosec budgets are not matching the pace of change Most security departments will acknowledge that their resources are already spread too thinly. Now there is an expectation to do much more with even less. In a recent Infosecurity webinar, the topic of the impact of artificial intelligence on cyber-resilience was discussed.


How AI and predictive analytics eliminate costly IT downtime

#artificialintelligence

Increasing automation and digitization is inevitable. More companies are transferring their operations to IT systems, and more of these operations are being automated. However, what isn't inevitable is the rise in IT failures and periods of downtime that digitization and automation entail. Businesses are losing billions of dollars per year from IT downtime. Fortunately, the increasing use of AI-based predictive analytics can root out problems before they even arise.


Hospitality Industry Turns to Tech to Lure Guests Back

WSJ.com: WSJD - Technology

The initiatives, overseen by information technology executives, are aimed at helping hotels dig out of what has been a dire season, with steep declines in occupancy, staff layoffs and a fear among some guests of contracting Covid-19. "Without technology, there's no way those companies recover fully," said Les Ottolenghi, who was chief information officer at Caesars Entertainment Corp. until last November. Caesars merged last month with Eldorado Resorts Inc. The Morning Download delivers daily insights and news on business technology from the CIO Journal team. U.S. hotel occupancy collapsed from about 60% in February to roughly 22% in April, according to data analytics firm STR, owned by CoStar Group Inc.


Announcing PyCaret 2.0

#artificialintelligence

We are excited to announce the second release of PyCaret today. PyCaret is an open source, low-code machine learning library in Python that automates machine learning workflow. It is an end-to-end machine learning and model management tool that speeds up machine learning experiment cycle and makes you more productive. In comparison with the other open source machine learning libraries, PyCaret is an alternate low-code library that can be used to replace hundreds of lines of code with few words only. This makes experiments exponentially fast and efficient.


Robots in industries are vulnerable to Cyber Attacks - Cybersecurity Insiders

#artificialintelligence

Robotic machinery that is being used in industries to assemble airplanes and smart phones are vulnerable to cyber attacks say security experts from Trend Micro Inc. And the researchers argue that most of such machinery is susceptible to hacking activities like data steal and remotely altering the movement of robots. Trend Micro's report titled "Robot Automation" says that industrial environments having robotic machinery are exposed to serious consequences like machinery failure, physical damage to operators and sometimes injuries and life loss to them. Technically, robots run with the help of systems driven by operating systems and some vulnerability in them could make cyber criminals to induce malicious codes into them and program them remotely to run as per their likes. For instance, they found App based software produced by ABB LTD from Switzerland to be exhibiting certain flaws that when explored by hackers could bring operational troubles to industrial firms- especially those related to automobile sector.


3 Ways Artificial Intelligence Will Change Healthcare

#artificialintelligence

It's no secret that healthcare costs have risen faster than inflation for decades. Some experts estimate that healthcare will account for over 20% of the US GDP by 2025. Meanwhile, doctors are working harder than ever before to treat patients as the U.S. physician shortage continues to grow. Many medical professionals have their schedules packed so tightly that much of the human element which motivated their pursuit of medicine in the first place is reduced. In healthcare, artificial intelligence (AI) can seem intimidating.


7 Face Recognition Online Tools Ready to Use with Your Apps and Products - Tech Business Guide

#artificialintelligence

Advances in Artificial Intelligence (AI) and computer processors have opened new ways for face recognition online services not possible before. Startups all over the world are developing Apps and products that make use of Face Recognition. Moreover, they are bringing products into the market with user authentication, attendance tracking and photo grouping (for event photographers) capabilities, to name a few. Face Recognition Online software components are challenging to develop in-house. For this reason, it makes sense for startups and software companies to buy this capability from specialized vendors.