Page 1,786«..1020..1,7851,7861,7871,788..1,8001,810..»

Which European country has the best digital quality of life? – Euronews

Denmark has the best digital quality of life in Europe, according to an index that looks at factors such as Internet affordability, security and quality.

In its 2022 index on digital quality of life, the Dutch VPN company Surfshark ranked 117 countries, with most of the top spots taken up by European countries.

Israel was ranked first globally, while Denmark, Germany, France and Sweden made up the rest of the top five.

The global top 10 also includes the Netherlands, Finland, and Great Britain, meaning seven of the top 10 are European countries. Japan (ranked eighth globally) and South Korea (ranked 10) were, along with Israel, the only non-European countries in the top tier.

At the bottom of the rankings for Europe are Bosnia and Herzegovina (80th globally), Montenegro (75th globally), and Belarus (69th globally).

A small number of European countries werent included in the report, such as Iceland.

The ranking is based on scores looking at five factors which are: Internet affordability, Internet quality, electronic infrastructure, electronic security and electronic government.

Affordability is determined by how much time people have to work to afford a broadband or mobile Internet connection. According to the index, Germany has the most affordable Internet in Europe, ranking third in the world behind Israel and Armenia.

Quality refers to speed and stability of the connection, while the infrastructure score is based on how well developed and inclusive access to electricity is. Denmark was the top European country for both quality and infrastructure.

Electronic security looks at how safe and protected people feel, and at cybersecurity issues such as privacy and ability to counter cybercrimes.

Greece ranked not only highest in Europe but highest in the world for digital security, followed by Lithuania, Belgium, the Czech Republic and Germany an entirely European top five.

Lastly, electronic government refers to a countrys digitalisation of government services. The United States was ranked top globally for this, while the UK was top for Europe and in third place globally.

Heres a map of where each country in Europe stands.

One of the notable findings from the report is that GDP per capita isnt the primary determinant for higher digital quality of life.

Seventeen countries exceeded their expected score given their GDP, including Ukraine, Brazil, Poland, Turkey and Thailand.

"While countries with a strong digital quality of life tend to be those of advanced economies, our global study found that money doesn't always buy digital happiness," said Gabriele Racaityte-Krasauske, Head of PR at Surfshark.

Read more from the original source:
Which European country has the best digital quality of life? - Euronews

Read More..

Remarks by U.S. Ambassador Yuri Kim at the Smart Cities Conference Opening Session* – US Embassy in Albania

I am very upset this morning! I will tell you why. I am very upset because I am looking through this agenda and I am realizing that there are some amazing people who are here for this conference and there are some amazing sessions planned, and I genuinely wished that I had cleared my schedule today and tomorrow to participate in all of these sessions.

Later on today we are going to have Alice Ekman, Evanna Hu, Sheena Greitens, talking about cyber-security risks. And that discussion couldnt come at a more important time. Its really great to have a room full of local leaders, mayors, deputy mayors who really get the work done, and industry leaders and thinkers together.

Local leaders have an especially important role in democracy. You have the closest connection to your fellow citizens and offer some of the most meaningful ways to improve their lives. You also know first-hand, better than all of us, what citizens of all ages and all backgrounds need and want to lead safer, happier, and more productive lives. You also know the dangers and the risks faced by your constituents every day access to services, protection from crime, and as we have seen in Albania in recent months protection from malign actors seeking to hack and disrupt citizens lives, and thereby undermine trust in democracy.

This Smart Cities conference comes at a moment where we need to answer the question how do we connect the right technology, with the right leaders, in the right way, to safeguard and improve the lives our fellow citizens?

The United States is here to help we often like to say the government is here to help. We really are here to help. And helping to put together this conference is one of the ways that we want to do that. We want to help bring some of the best minds together. As I said last night, we want to bring together dreamers and doers, so we can actually produce real results.

I am proud that, here in Albania, we have been assisting with cybersecurity measures before, during, and since Irans reckless and irresponsible cyberattacks against the Albanian government and in fact, against the Albanian people. Overall, the United States is always working with Allies and partners on ways to protect our governments and our people from malicious use of new technologies.

Because of our citizens reliance on technology and the constant risks to their safety and privacy from malign actors, we all need partnerships among governments and with the private sector to keep our people, our businesses, and our democracies safe.

Over the course of this conference, you will have the chance to discuss how to make technology work for democracy, for internet freedom, and for the privacy and safety of our citizens. We all know the risks are out there, weve seen them authoritarian governments advancing their agendas by exporting technologies like networked cameras, sensors, and location services that collect government and citizen data and uses them for other ways. These authoritarian regimes produce technologies to serve their political objectives, at the expense of their customers privacy and security. Other states sponsor cyberattacks to steal, disrupt, or destroy citizens data and digital systems that protect us, our loved ones, and our national security.

We are pleased to have some of the right people here in this room local leaders, technology professionals, and experts from the U.S. and across Europe, who understand risks and, I think, can provide answers. You will find ways to avoid untrusted vendors and learn about secure and reliable alternatives. You will also find new ways to keep building smart cities a process that touches all parts of our lives, including critical infrastructure, such as transportation, electrical distribution, healthcare, utilities and so much more.

I know you will have fruitful discussions and I hope that you will return to your cities, your institutions, and your headquarters with new plans in work that serve citizens needs without compromising their security and in fact, enhancing security. That is the whole point of this conference.

Thank you for participating and I hope that you will find this useful!

Thank you!

*as delivered

By U.S. Embassy Tirana | 20 September, 2022 | Topics: Ambassador, Embassy, Government Offices, Key Officials, News, Policy, Political Affairs, Press Releases, Science & Tech, Speeches

See the original post:
Remarks by U.S. Ambassador Yuri Kim at the Smart Cities Conference Opening Session* - US Embassy in Albania

Read More..

Utrecht wants to cut ties with Guangdong, China after 27 years – NL Times

The province of Utrecht wants to break its friendship relationship with the Chinese province of Guandong after 27 years. China has committed serious human rights violations against the Uyghurs, the province said in a proposal to cut the ties submitted to the Provincial Council, RTV Utrecht reports.

Utrecht said that the friendship relationship with Guandong has offered Utrecht organizations the opportunity to build ties with Chinese parties and resulted in good collaboration between schools. But Guandong is not just a province but part of China. And tension is rising between China and the West, specifically around human rights, corporate social responsibility, and internet security, the Dutch province argued.

The purely economic and social effects of the bond of friendship are difficult to demonstrate and difficult to compare with other political values like democracy and human rights, Utrecht said.

It is now up to the Provincial Council to decide whether or not Utrecht can cut ties with Guandong. According to RTV Utrecht, the Provincial Council rejected several motions and amendments on this topic in recent years.

Continued here:
Utrecht wants to cut ties with Guangdong, China after 27 years - NL Times

Read More..

Your guide to cyber insurance amid rising cyber threats – The Indian Express

The rapid pace of digitisation and technological innovation keep making the world smaller and more close-knit. As per reports, India already has around seven crore internet users, which is expected to increase to around nine crores by 2025. So essentially, around half the population of the country already has some sort of data in the cyber-space. Moreover, online financial transactions are also on a sharp rise in the country. As per data from the Reserve Bank of India, over 46 billion UPI transactions were recorded in the country in the financial year 2021-2 (FY22) amounting to over Rs 84 trillion. This is a steep rise from around 22 billion transactions worth Rs 41 trillion during the previous year.

With a major part of our lives moving to the cyber-space, it is natural that risks of the cyber kind would also increase, warranting the need for a plan to protect against such threats. Industry data estimates that just this year, over 6.7 lakh cyber-attacks have been reported till June alone. Out of these, over 50,000 cases were of online financial frauds amounting to Rs 167 crore, as per the government data. Out of this, only Rs 11.70 crore could be recovered.

Amid rising cyber threats, it has become imperative to ensure ones cyber security with cyber insurance. Let us understand in detail about this emerging insurance cover that is now available to individuals too.

As the name suggests, cyber insurance is a type of insurance cover that protects individuals as well as organisations against the implications of cyber attacks. Not only does it cover the insured against the financial loss due to the cyber-breach, but it also covers the expenses related to data recovery, privacy investigations, regulatory actions and litigation.

There are different types of cyber-threats that one could be exposed to ranging from phishing to spyware, and even ransomware and distributed denial-of-service (DDoS) attacks. A comprehensive cyber-insurance policy covers all such cyber-assaults.

While business organisations have always been inclined to cover themselves against cyber-attacks through cyber insurance policies, several insurance companies these days offer exclusive covers to individuals for protection against cyber-risks.

Comprehensive plans of this kind cover everything ranging from malware, phishing and cyber extortion to identity theft, cyberstalking, and data and privacy breach by third-party. Most importantly, they cover financial fraud. This is the reason that these days, even banks encourage their customers to go for a cyber insurance policy.

Typically, a cyber insurance policy covers the online loss of money not only from bank accounts and credit cards but also from payment wallets. However, cyber-assaults related to cryptocurrency are not covered under any cyber-insurance plan. Moreover, if the attack happens when the insured is accessing restricted sites, such events are also excluded from coverage.

Apart from covering the policyholder against financial loss and litigation expenses, some of these policies even cover the cost of restoring the insureds computer if it is damaged due to malware.

The good news is that even though these plans provide comprehensive coverage against most cyber-risks, they are not very expensive. Several companies have launched cyber insurance plans which start at a premium as low as Rs 2 per day. Typically, a cyber insurance plan with Rs 1 lakh cover could cost somewhere between Rs 700 to Rs 2,000 depending on how extensive is the coverage. Moreover, there also exists a B2B2C model where employers provide cyber insurance coverage to their employees. Considering the massive and sensitive nature of data in the corporate world, this acts as a mutually beneficial protection cover.

Since we live in a digital era, our lives depend on the Internet. We shop online, book tickets online, pay for college online, and even buy our food online. Businesses are conducted online, plans are made online and when it comes to social media, our entire lives are shared online. So ideally, every individual with exposure to the digital world, which covers almost everyone, should have cyber insurance coverage. However, to put it simply, cyber insurance is crucial for every individual who is not too tech savvy and who does any kind of online financial transaction.

To make it simpler, there are specific plans available in the market for students, working professionals, families, entrepreneurs and online shoppers, providing you with the specific kind of coverage that you may need. For instance, a students cyber insurance plan protects one from threats related to social media, cyberbullying, file transfers and online transactions. On the other hand, a plan for working professionals provides protection against identity theft and malware attacks, apart from covering you against fraudulent online transactions. One can also go for a comprehensive plan, or customise the plan to suit their needs, as many insurers these day offer.

In a nutshell, a cyber insurance policy provides you protection in the online world by safeguarding your losses in case anything goes wrong. By doing so, it offers you peace of mind as you can carry out your online activities without worrying constantly about cyber threats and their financial implications. After all, when you go online, you are constantly exposed to different types of risks. So why take any chances?

The author is Practice Leader Liability & Financial Risk at Policybazaar.com. The views expressed are that of the author.

Read this article:
Your guide to cyber insurance amid rising cyber threats - The Indian Express

Read More..

The Distinctions Between Data Privacy and Data Security – TechSpective

Enterprises should separate data security and privacy by taking steps toward creating a comprehensive data protection framework. Unfortunately, data security and privacy concepts are often confusing and used interchangeably. Inseparable from one another, they have a natural connection. A good understanding of policies and concepts, proper implementation of processes, and intelligent use of technology can go a long way in avoiding data abuse or loss.

Problems with data privacy and security have plagued computer users since the early days. Consumers private information became a commodity alongside the internets rapid rise to prominence. That is due to how businesses use information nowadays. However, depending on the data, companies risk themselves more significantly.

Substantial economic costs and complex reputational ramifications continue to grow in enterprises today. There has been a worldwide surge in business compliance measures in response to the rapidly changing global legislation around data protection. Concurrently, consumers are learning more about the legal protections they have regarding their data privacy and how to exercise those protections.

Businesses must set up safeguards to protect customers sensitive information and comply with the rapidly evolving consumer privacy legislation. Now that the General Data Protection Regulation (GDPR) and other similar laws have come to light, companies are rushing to create data protection programs. For the most encompassing data protection framework, enterprises should separate data security and data privacy in their departments through proper program development.

In general, these are the three key points you should know when it comes to data privacy and data security:

Data privacy, sometimes known as data governance, is the management of personal data, including how you collect, use and share it. The strictness and uniformity of implementing data privacy rules and regulations can vary widely from one jurisdiction to another.

Businesses and people benefit from tight regulations to safeguard private information, which is becoming increasingly apparent worldwide. The General Data Protection Regulation by the European Union is the most stringent law to date, and it has served as a model for other nations privacy obligations.

The proposed Digital Charter Implementation Act in Canada and the California Consumer Privacy Act (CCPA) are among them. The Lei Geral de Proteo de Dados Pessoais (LGPD) is a notable example too in Brazil. Data privacy is impossible without a robust data security foundation and technology solutions, even with established and proposed regulations.

Data security is more concerned with shielding data from internal and external threats. While implementing data security rules and processes can help prevent cyberattacks and incidental usage, this is usually not enough to satisfy privacy regulators.

Data security covers the solutions and techniques to safeguard digital data at all points, from endpoints through networks to the network perimeter.

A robust data security policy should serve as the pillar for your data security procedures, and it should encompass three essential areas: people, processes, and technology solutions. This policy will help reinforce privacy and protect sensitive and private data.

Data security is different from data privacy. The former refers to the rules, procedures, and technological safeguards to prevent unauthorized access to or manipulation of stored information. Businesses cannot automatically meet data privacy by using data security measures. The collection, sharing, and use of private data should comply with applicable laws and regulations.

Data security prevents unauthorized access to data, whereas data privacy focuses on the appropriate administration and use of such data. Data security policy stops anyone from accessing data in the first place. Encryption, tokenization, and user authentication are just a few tools that may strengthen a business security stance.

Enterprises can address data privacy issues by collecting, processing, and storing data following applicable law and with the clients knowledge and consent. Regarding data transparency, customers have the right to know what data companies gather, collect, and share.

Data privacy relies on treating data with due regard for the privacy of individuals. There is a need for data security measures to guarantee the anonymity of acquired data.

Businesses cannot operate without data and constantly collect more of it from various sources. Companies should access relevant data to serve their customers better and react swiftly to changes in the stock market and other unpredictable events. Employing consistent data practices with industry benchmarks is a crucial driver of corporate strategy for many enterprises. Controls to effectively secure and retain personal data must constantly evolve to keep up with the volume and complexity of data produced in the regular course of business.

The compromise of sensitive data might have a devastating effect on any organization, no matter how big or little, making data security an absolute priority. It can be challenging to develop a data protection scheme due to the need to account for both new technology and the constantly evolving sophistication of cybercriminals. A good data protection policy should reduce the quantity of private information companies store and ensure the safety of sensitive information in its hands.

In a data breach, a data protection program can assist restore lost information, limiting the damage done by the incident. In light of the proliferation of laws meant to safeguard consumers personal information, it is crucial that organizations first differentiate data privacy and data security before implementing any protection program.

Starting this year, a plethora of new data privacy rules and regulations will take effect, presumably leading to stricter enforcement by government agencies. The increasing number of devices needing supervision and security measures will only add to the difficulty of meeting the evolving regulatory standards. This category includes IoT gadgets, sensors, manufacturing equipment, mobile phones, and even wearables like smartwatches. Such devices need protection from unauthorized access or dissemination of personal information.

While organizations worldwide are working hard to comply, they should remember that the goal of compliance is not static. When it comes to data security, companies should not relax at any time. After establishing data security, the business should maintain and improve it regularly. Once the program is up and working, maintaining it is not difficult. That is true, especially if the organization recognized and handled data security and privacy issues individually while planning and executing them.

To better understand how important privacy is to consumers, why not try browsing the internet behind a proxy? Here is when an IPRoyal proxy selection can come in handy. With millions of residential and data center proxies, you will be able to understand just how paramount it is for customers to protect their privacy as they go about their usual online activities.

Anas Baig is a Cyber Security Expert, a computer science graduate specializing in internet security, science and technology. Also, a Security Professional with a passion for robots & IoT devices. Follow him on Twitter @anasbaigdm, or email him directly.

Originally posted here:
The Distinctions Between Data Privacy and Data Security - TechSpective

Read More..

On-Prem AD vs. Hybrid Azure AD Join vs. Azure AD: Key Differences – Spiceworks News and Insights

The most difficult aspect of transitioning from traditional management to a modern one for Windows 10 is deciding whether to utilize on-premises AD, Azure AD, or a hybrid of the two. In this article, we will compare AD DS to Azure AD and see what our standard Active Directory can accomplish that Azure AD cannot. We will also look at how Microsoft conducts hybrid solution installation and why this way may be beneficial for some businesses.

Once upon a time, every Windows enterprise was flat. Active Directory was the sole container that stored all your domain data objects. We simply referred to it as AD back then because it was the only AD form. It was supported by the three pillars: domain controllers, DNS, and group policy. It was an architecture that served many enterprises well for nearly two decades. And then came Azure, and suddenly, traditional AD is now referred to as legacy AD in some circles. Azure AD, of course, exists in the cloud, that wonderful destination to which it seems most organizations want to transition. Because it is cloud-native, it utilizes different protocols and methodologies for account authentication and policy implementation. In some ways, local AD and Azure AD are like water and oil because they are so different.

See More: What Is Azure? Fundamentals, Services, and Pricing in 2022

Many companies had begun their cloud migration journeys years ago. Still, the remote work revolution in 2020 was equivalent to pouring kerosene on an existing flame. That was when the remote work revolution began. Legacy ADs limitation greatly inhibits its ability to support hybrid work architectures. It requires domain-joined computers to have line-of-site to a domain controller. This makes it impossible for employees to log onto the corporate network when operating from a remote workspace such as their home office or hotel room. The only way to attain AD connectivity then is through a VPN connection. This makes the onboarding process of a new computer challenging at best. Moreover, your VPN infrastructure can quickly become a bottleneck when many users use it. VPN then requires remote access and routing policies to enforce the least privilege security so that remote users dont have access to the entire network.

If you are a Windows admin, you are probably familiar with the concept of tombstoning, which helps recover accidental object deletions in AD. Azure AD is a way to tombstone your on-prem AD servers permanently. No more having to worry about AD synchronization or DNS scavenging. Everything now exists in the cloud, where users and Azure-joined computers go to authenticate. Azure-joined computers only need an internet connection to authenticate, thus nullifying the necessity for AD connectivity. Suddenly users can work from anywhere without the hassle of a problematic VPN. Microsoft 365 uses Azure Active Directory (Azure AD) to manage user identities, so employees are automatically signed in on their corporate devices.

The real beauty of Azure AD becomes vivid when provisioning devices. Windows computers that are cloud-domain joined and autopilot configured can be shipped directly from the original equipment manufacturer (OEM) to the waiting user, regardless of location. The user opens the box, powers the device and logs in using their Azure AD credentials. Once autopilot completes the configuration process of the device, Microsoft Endpoint Management, otherwise known as Intune, steps in to deliver all the assigned configuration settings, policies, and applications to that machine. Within a couple of hours, the user is ready to start working. Suppose the machine has a chipset that allows remote access to its BIOS and technicians to perform remote reboots even when the OS isnt operational. In that case, you suddenly have a computer fleet that can be deployed, implemented, and supported without local support. Welcome to the Hybrid World.

Migrating your on-prem AD infrastructure to the native cloud is quite a leap, but not everyone can take it overnight. Some of the reasons include the following:

And finally, there is Group Policy and Group Policy Preferences. Many enterprises have a large portfolio of group policy objects (GPOs) they created to deliver managed configuration and security settings for users and computers over the years. The equivalent of Group Policy is an MDM provider such as Microsoft Endpoint Manager mentioned earlier. While MDMs can deliver setting configurations to computers regardless of location, the list of available settings is not as vast as the combined array of GP and GPP. While Microsoft has made great strides in reducing the parity gap between the two, the disparity between the two remains. For large enterprises that extensively depend on Group Policy, the insufficient setting coverage of MDM may be enough to hold them back for now.

See More: How Reversible Passwords Compromise Active Directory Security

If you cant make the direct leap to Azure AD right now, a third option called Hybrid Azure AD join. Hybrid Azure AD join retains the legacy trust relationship that your client machines have with on-prem AD while simultaneously creating a registered trust relationship in Azure AD. This dual registration gives your device visibility in the cloud so users can utilize single sign-on when accessing their Microsoft 365 applications. It also provides self-service password reset and Windows Hello PIN reset capabilities for your users regardless of location. You can create device-based conditional access policies requiring devices to meet compliance requirements before being granted access to enterprise resources to enhance your security.

Like traditional AD, Hybrid Azure AD join relies on group policy to centrally manage setting configurations, so the group policy object portfolio you spent so much time on will still be utilized. Unfortunately, group policy still relies on AD connectivity, and computers must be line-of-sight to authenticate AD users that dont have cached credentials. You will also need to install Azure AD Connect on an on-prem server to synchronize the data between on-prem AD and Azure AD so that users have the same credentials in both worlds. This means one more thing that your IT team will have to manage and support. Like any hybrid architecture, it adds complexity to your network, which adds complexity to supporting it.

Suppose youve looked at the Microsoft certification portal in the past two years. In that case, youll notice that they no longer offer certification paths in their traditional operating systems and on-prem architectures. Everything is about the cloud. While you may not be ready to leap yet, there will come a day when you will be forced to begin the transition to Azure AD to access the latest technology and solution innovations. For some, Hybrid Azure AD join may be an edible path to get there.

Which Active Directory solution does your company utilize? Let us know on LinkedIn, Facebook, and Twitter. We would love to hear from you!

View post:
On-Prem AD vs. Hybrid Azure AD Join vs. Azure AD: Key Differences - Spiceworks News and Insights

Read More..

Cleveland wants to use artificial intelligence to fight illegal dumping – cleveland.com

CLEVELAND, Ohio The city of Cleveland will work with Case Western Reserve University and Cleveland State University on a solution for illegal dumping thats powered by artificial intelligence.

The end product will ideally provide new city-owned technology that Cleveland could use to identify people responsible for dumping, according to Roy Fernando, chief innovation and technology officer under Mayor Justin Bibb, who has promised to use technology to improve city services.

Cleveland City Council on Monday approved legislation allowing students and faculty, who are part of the two universities Internet of Things Collaborative, to commence work. It was one of two initiatives approved this week that is intended to bring smart technology to city devices and operations.

Students and staff will use smart cameras to develop and test an AI model designed to identify illegal dumping. Such work would be performed in a controlled-environment, likely on-campus, where students will walk into the field of view of a monitor and leave an item behind, Fernando said.

Once the model has been tweaked and perfected, it would be able to identify that person as having illegally dumped the item on the ground, Fernando said.

Then, the city intends to deploy smart cameras outfitted with the new technology on two corridors known for being dumping hotspots. One would be deployed on the citys East Side, and one on the West Side, Fernando said.

Once someone dumps an item and the AI model detects it, it would automatically alert authorities, so they could investigate and potentially ticket whoevers responsible.

If the test projects are successful, the technology could then be scaled-up for use elsewhere in Cleveland. The technology could also serve as a guide, of sorts, for creating different smart-city solutions for other problems, Fernando said.

Ward 3s Councilman Kerry McCormack, who has long advocated for Cleveland to begin using smart-city technology, praised the idea during a Monday committee hearing. He identified illegal dumping as one of the citys largest problems.

Ward 14s Councilwoman Jasmin Santana, who said illegal dumping has been a big concern in alleyways in her neighborhood, was a bit skeptical. We [already] know the hotspots for illegal dumping. Thats not the question, Santana said. [The issue is] capacity within the illegal dumping task force, and cameras.

The second smart-city initiative approved by Council on Monday was a no-cost partnership with Honeywell, a manufacturing and technology company, to develop a smart city roadmap that could be used to guide Clevelands future use of technology in delivering city services.

Cleveland was one of five cities selected for the partnership by Accelerator for America, which is a coalition of U.S. mayors that seeks and shares innovative solutions for problems commonly faced by municipalities.

Technology advancements identified by Honeywell could relate to any number of city services or needs. Examples mentioned by Fernando and McCormack include uses for transportation, sustainability, smart buildings, smart sensors embedded in roads or other infrastructure, meter-reading for utilities, making traffic lights more efficient, or monitoring air quality or waste collection.

Over a two- or three-month period, Honeywell will interview leaders of several city departments about challenges they routinely face. Honeywell will then present findings about how to address those challenges with smart technology, Fernando said.

Bibb intends to use those findings and recommendations to apply for federal grants that would be used to pay for the needed technology upgrades, he said.

Here is the original post:
Cleveland wants to use artificial intelligence to fight illegal dumping - cleveland.com

Read More..

Putting artificial intelligence and machine learning workloads in the cloud – ComputerWeekly.com

Artificial intelligence (AI) and machine learning (ML) are some of the most hyped enterprise technologies and have caught the imagination of boards, with the promise of efficiencies and lower costs, and the public, with developments such as self-driving cars and autonomous quadcopter air taxis.

Of course, the reality is rather more prosaic, with firms looking to AI to automate areas such as online product recommendations or spotting defects on production lines. Organisations are using AI in vertical industries, such as financial services, retail and energy, where applications include fraud prevention and analysing business performance for loans, demand prediction for seasonal products and crunching through vast amounts of data to optimise energy grids.

All this falls short of the idea of AI as an intelligent machine along the lines of 2001: A Space Odysseys HAL. But it is still a fast-growing market, driven by businesses trying to drive more value from their data, and automate business intelligence and analytics to improve decision-making.

Industry analyst firm Gartner, for example, predicts that the global market for AI software will reach US$62bn this year, with the fastest growth coming from knowledge management. According to the firm, 48% of the CIOs it surveyed have already deployed artificial intelligence and machine learning or plan to do so within the next 12 months.

Much of this growth is being driven by developments in cloud computing, as firms can take advantage of the low initial costs and scalability of cloud infrastructure. Gartner, for example, cites cloud computing as one of five factors driving AI and ML growth, as it allows firms to experiment and operationalise AI faster with lower complexity.

In addition, the large public cloud providers are developing their own AI modules, including image recognition, document processing and edge applications to support industrial and distribution processes.

Some of the fastest-growing applications for AI and ML are around e-commerce and advertising, as firms look to analyse spending patterns and make recommendations, and use automation to target advertising. This takes advantage of the growing volume of business data that already resides in the cloud, cutting out the costs and complexity associated with moving data.

The cloud also lets organisations make use of advanced analytics and compute facilities, which are often not cost-effective to build in-house. This includes the use of dedicated, graphics processing units (GPUs) and extremely large storage volumes made possible by cloud storage.

Such capabilities are beyond the reach of many organisations on-prem offerings, such as GPU processing. This demonstrates the importance of cloud capability in organisations digital strategies, says Lee Howells, head of AI at advisory firm PA Consulting.

Firms are also building up expertise in their use of AI through cloud-based services. One growth area is AIOps, where organisations use artificial intelligence to optimise their IT operations, especially in the cloud.

Another is MLOps, which Gartner says is the operationalisation of multiple AI models, creating composite AI environments. This allows firms to build up more comprehensive and functional models from smaller building blocks. These blocks can be hosted on on-premise systems, in-house, or in hybrid environments.

Just as cloud service providers offer the building blocks of IT compute, storage and networking so they are building up a range of artificial intelligence and machine learning models. They are also offering AI- and ML-based services which firms, or third-party technology companies, can build into their applications.

These AI offerings do not need to be end-to-end processes, and often they are not. Instead, they provide functionality that would be costly or complex for a firm to provide itself. But they are also functions that can be performed without compromising the firms security or regulatory requirements, or that involve large-scale migration of data.

Examples of these AI modules include image processing and image recognition, document processing and analysis, and translation.

We operate within an ecosystem. We buy bricks from people and then we build houses and other things out of those bricks. Then we deliver those houses to individual customers, says Mika Vainio-Mattila, CEO at Digital Workforce, a robotic process automation (RPA) company. The firm uses cloud technologies to scale up its delivery of automation services to its customers, including its robot as a service, which can run either on Microsoft Azure or a private cloud.

Vainio-Mattila says AI is already an important part of business automation. The one that is probably the most prevalent is intelligent document processing, which is basically making sense of unstructured documents, he says.

The objective is to make those documents meaningful to robots, or automated digital agents, that then do things with the data in those documents. That is the space where we have seen most use of AI tools and technologies, and where we have applied AI ourselves most.

He sees a growing push from the large public cloud companies to provide AI tools and models. Initially, that is to third-party software suppliers or service providers such as his company, but he expects the cloud solution providers (CSPs) to offer more AI technology directly to user businesses too.

Its an interesting space because the big cloud providers spearheaded by Google obviously, but very closely followed by Microsoft and Amazon, and others, IBM as well have implemented services around ML- and AI-based services for deciphering unstructured information. That includes recognising or classifying photographs or, or translation.

These are general-purpose technologies designed so that others can reuse them. The business applications are frequently very use-case specific and need experts to tailor them to a companys business needs. And the focus is more on back-office operations than applications such as driverless cars.

Cloud providers also offer domain-specific modules, according to PA Consultings Howells. These have already evolved in financial services, manufacturing and healthcare, he says.

In fact, the range of AI services offered in the cloud is wide, and growing. The big [cloud] players now have models that everyone can take and run, says Tim Bowes, associate director for data engineering at consultancy Dufrain. Two to three years ago, it was all third-party technology, but they are now building proprietary tools.

Azure, for example, offers Azure AI, with vision, speech, language and decision-making AI models that users can access via AI calls. Microsoft breaks its offerings down into Applied AI Services, Cognitive Services, machine learning and AI infrastructure.

Google offers AI infrastructure, Vertex AI, an ML platform, data science services, media translation and speech to text, to name a few. Its Cloud Inference API lets firms work with large datasets stored in Googles cloud. The firm, unsurprisingly, provides cloud GPUs.

Amazon Web Services (AWS) also provides a wide range of AI-based services, including image recognition and video analysis, translation, conversational AI for chatbots, natural language processing, and a suite of services aimed at developers. AWS also promotes its health and industrial modules.

The large enterprise software and software-as-a-service (SaaS) providers also have their own AI offerings. These include Salesforce (ML and predictive analytics), Oracle (ML tools including pre-trained models, computer vision and NLP) and IBM (Watson Studio and Watson Services). IBM has even developed a specific set of AI-based tools to help organisations understand their environmental risks.

Specialist firms include H2O.ai, UIPath, Blue Prism and Snaplogic, although the latter three could be better described as intelligent automation or RPA companies than pure-play AI providers.

It is, however, a fine line. According to Jeremiah Stone, chief technology officer (CTO) at Snaplogic, enterprises are often turning to AI on an experimental basis, even where more mature technology can be more appropriate.

Probably 60% or 70% of the efforts Ive seen are, at least initially, starting out exploring AI and ML as a way to solve problems that may be better solved with more well-understood approaches, he says. But that is forgivable because, as people, we continually have extreme optimism for what software and technology can do for us if we didnt, we wouldnt move forward.

Experimentation with AI will, he says, bring longer-term benefits.

There are other limitations to AI in the cloud. First and foremost, cloud-based services are best suited to generic data or generic processes. This allows organisations to overcome the security, privacy and regulatory hurdles involved in sharing data with third parties.

AI tools counter this by not moving data they stay in the local business application or database. And security in the cloud is improving, to the point where more businesses are willing to make use of it.

Some organisations prefer to keep their most sensitive data on-prem. However, with cloud providers offering industry-leading security capabilities, the reason for doing this is rapidly reducing, says PA Consultings Howells.

Nonetheless, some firms prefer to build their own AI models and do their own training, despite the cost. If AI is the product and driverless cars are a prime example the business will want to own the intellectual property in the models.

But even then, organisations stand to benefit from areas where they can use generic data and models. The weather is one example, image recognition is potentially another.

Even firms with very specific demands for their AI systems might benefit from the expansive data resources in the cloud for model training. Potentially, they might also want to use cloud providers synthetic data, which allows model training without the security and privacy concerns of data sharing.

And few in the industry would bet against those services coming, first and foremost, from the cloud service providers.

More here:
Putting artificial intelligence and machine learning workloads in the cloud - ComputerWeekly.com

Read More..

Artificial Intelligence Market in the Education Sector 2026, Increasing Demand For ITS to Boost Growth – Technavio – PR Newswire

NEW YORK, Sept. 19, 2022 /PRNewswire/ -- The Artificial Intelligence Market in the Education Sector is expected to grow by USD 374.3 million during 2021-2026, at a CAGR of 48.15% during the forecast period, according to Technavio. The increasing demand for ITS will offer immense growth opportunities, and security and privacy concerns will challenge the growth of the market participants.

To make the most of the opportunities, market vendors should focus more on the growth prospects in the fast-growing segments, while maintaining their positions in the slow-growing segments. Increasing demand for it has been instrumental in driving the growth of the market. However, security and privacy concerns might hamper the market growth. Buy Sample Report.

Artificial Intelligence Market in the Education Segmentation

Artificial Intelligence Market in the Education Sector Scope

Technavio presents a detailed picture of the market by the way of study, synthesis, and summation of data from multiple sources. Our artificial intelligence market in the education sector report covers the following areas:

This study identifies increased emphasis on chatbots as one of the prime reasons driving the artificial intelligence market in the education sector growth during the next few years. Request Free Sample Report.

Artificial Intelligence Market in the Education Sector Vendor Analysis

We provide a detailed analysis of around 25 vendors operating in the Artificial Intelligence Market in the Education Sector, including some of the vendors such as vendors Backed with competitive intelligence and benchmarking, our research reports on the Artificial Intelligence Market in the Education Sector are designed to provide entry support, customer profile and M&As as well as go-to-market strategy support.

Find additional highlights on the growth strategies adopted by vendors and their product offerings, Download Free Sample Report.

Artificial Intelligence Market in the Education Sector Key Highlights

Related Reports:Overhead Cables Marketby Type and Geography - Forecast and Analysis 2022-2026:The overhead cables market share is expected to increase by USD17.67 billion from 2021 to 2026,and the market's growth momentum will accelerate at a CAGR of 5.1%.

Electric Motor Sales Marketby Application and Geography - Forecast and Analysis 2022-2026:The electric motor sales market share is expected to increase by USD52.69 billion from 2021 to 2026,and the market's growth momentum will accelerate at a CAGR of 6.38%.

Artificial Intelligence Market In The Education Sector Scope

Report Coverage

Details

Page number

120

Base year

2021

Forecast period

2022-2026

Growth momentum & CAGR

Accelerate at a CAGR of 48.15%

Market growth 2022-2026

$ 374.3 million

Market structure

Fragmented

YoY growth (%)

46.6

Regional analysis

US

Performing market contribution

North America at 100%

Key consumer countries

US

Competitive landscape

Leading companies, competitive strategies, consumer engagement scope

Companies profiled

Alphabet Inc., Carnegie Learning Inc., Century-Tech Ltd., Cognii, DreamBox Learning Inc., Fishtree Inc., Intellinetics Inc., International Business Machines Corp., Jenzabar Inc, John Wiley and Sons Inc., LAIX Inc., McGraw Hill Education Inc., Microsoft Corp., Nuance Communications Inc., Pearson Plc, PleIQ Smart Toys Spa, Providence Equity Partners LLC, Quantum Adaptive Learning LLC, Tangible Play Inc., and True Group Inc.

Market Dynamics

Parent market analysis, Market growth inducers and obstacles, Fast-growing and slow-growing segment analysis, COVID-19 impact and future consumer dynamics, and market condition analysis for the forecast period.

Customization purview

If our report has not included the data that you are looking for, you can reach out to our analysts and get segments customized.

Browse for Technavio "Industrials" Research Reports

Table Of Contents :

1 Executive Summary

2 Market Landscape

3 Market Sizing

4 Five Forces Analysis

5 Market Segmentation by End-user

6 Market Segmentation by Type

7 Customer Landscape

8 Drivers, Challenges, and Trends

9 Vendor Landscape

10 Vendor Analysis

11 Appendix

About Us

Technavio is a leading global technology research and advisory company. Their research and analysis focus on emerging market trends and provides actionable insights to help businesses identify market opportunities and develop effective strategies to optimize their market positions. With over 500 specialized analysts, Technavio's report library consists of more than 17,000 reports and counting, covering 800 technologies, spanning across 50 countries. Their client base consists of enterprises of all sizes, including more than 100 Fortune 500 companies. This growing client base relies on Technavio's comprehensive coverage, extensive research, and actionable market insights to identify opportunities in existing and potential markets and assess their competitive positions within changing market scenarios.

Contact

Technavio ResearchJesse MaidaMedia & Marketing ExecutiveUS: +1 844 364 1100UK: +44 203 893 3200Email: [emailprotected]Website: http://www.technavio.com/

SOURCE Technavio

Read the original:
Artificial Intelligence Market in the Education Sector 2026, Increasing Demand For ITS to Boost Growth - Technavio - PR Newswire

Read More..

Distracted drivers are being identified by artificial intelligence in Edmonton – The Gateway Online

Artificial intelligence is currently being used in Edmonton to detect distracted driving as part of a research project.

On September 13, the University of Alberta launched this three-week research project to understand the prevalence of distracted drivers, specifically in Edmonton. Karim El-Basyouny, a professor in the faculty of engineering and urban traffic safety research chair at the University of Alberta, is the lead of the research team. The U of A research is in a collaboration with Acusensus, the City of Edmonton, and the Edmonton Police Service.

Since September 13, the technology has been stationed at its first location on the intersection of 79 Street and Argyll Road. According to El-Basyouny, it will be stationed there for about a week before moving to the next location, which is currently unknown. There will be a total of three different locations, one for each week during this project.

El-Basyounys research is being supported by a seed grant, making the use of Acusensus technology possible. Although the Edmonton Police Service is in collaboration with this project, the collection of data will be used solely for research, not traffic enforcement.

Edmonton is the first city in Canada to test Acusensus technology, according to Tony Parrino, the general manager for Acusensus in North America.

The data around distracted driving in Canada has been a little patchy, [and] we dont really understand how big of a problem it is what were trying to do is see if there is a better way of understanding how big of an issue [distracted driving] is, El-Basyouny explained.

The technology being used to determine the prevalence of distracted drivers is mainly AI. According to Parrino, the AI has gone through a number of training scenarios with millions of data points.

The system is radar-based with many different sensors, and four different cameras. Each camera captures something different; one captures a steep shot of the windshield, one camera is shallow in case of a phone-to-ear event, and the other two cameras are used for color context and capturing license plates. The information gathered is then given to the AI.

According to Parrino, although the AI has been trained to have maximum accuracy there is a possibility for false positives.

It is very accurate, but there are false positives 100 per cent of the images that are captured are reviewed by trained individuals [who determine if] the criteria is met for the U of A to determine that a distracted driving event has occurred, and only those are counted, Parrino said.

Although Acusensus technology is being used in Australia for traffic enforcement, according to Parrino, it is unknown if the technology will be used for traffic enforcement in Edmonton. As of right now, this research is being used solely to see the prevalence of distracted drivers in Edmonton.

I think [traffic enforcement] is an option that is available to us at [some] point in the future, [however] it is not predominantly the purpose of this study, El-Basyouny said.

In a statement sent out September 13, Jessica Lamarre, director of Safe Mobility for the City of Edmonton, commented on the U of A research project.

This project provides an opportunity to gain a better understanding of the prevalence and safety impacts of distracted driving on our streets through the creative use of new technology alongside our talented research partners at the University of Alberta.

Read the rest here:
Distracted drivers are being identified by artificial intelligence in Edmonton - The Gateway Online

Read More..