Page 2,135«..1020..2,1342,1352,1362,137..2,1402,150..»

Exafunction aims to reduce AI dev costs by abstracting away hardware – TechCrunch

The most sophisticated AI systems today are capable of impressive feats, from directing cars through city streets to writing human-like prose. But they share a common bottleneck: hardware. Developing systems on the bleeding edge often requires a huge amount of computing power. For example, creating DeepMinds protein structure-predicting AlphaFold took a cluster of hundreds of GPUs. Further underlining the challenge, one source estimates that developing AI startup OpenAIs language-generating GPT-3 system using a single GPU wouldve taken 355 years.

New techniques and chips designed to accelerate certain aspects of AI system development promise to (and, indeed, already have) cut hardware requirements. But developing with these techniques calls for expertise that can be tough for smaller companies to come by. At least, thats the assertion of Varun Mohan and Douglas Chen, the co-founders of infrastructure startup Exafunction. Emerging from stealth today, Exafunction is developing a platform to abstract away the complexity of using hardware to train AI systems.

Improvements [in AI] are often underpinned by large increases in computational complexity. As a consequence, companies are forced to make large investments in hardware to realize the benefits of deep learning. This is very difficult because the technology is improving so rapidly, and the workload size quickly increases as deep learning proves value within a company, Chen told TechCrunch in an email interview. The specialized accelerator chips necessary to run deep learning computations at scale are scarce. Efficiently using these chips also requires esoteric knowledge uncommon among deep learning practitioners.

With $28 million in venture capital, $25 million of which came from a Series A round led by Greenoaks with participation from Founders Fund, Exafunction aims to address what it sees as the symptom of the expertise shortage in AI: idle hardware. GPUs and the aforementioned specialized chips used to train AI systems i.e., feed the data that the systems can use to make predictions are frequently underutilized. Because they complete some AI workloads so quickly, they sit idle while they wait for other components of the hardware stack, like processors and memory, to catch up.

Lukas Beiwald, the founder of AI development platform Weights and Biases, reports that nearly a third of his companys customers average less than 15% GPU utilization. Meanwhile, in a 2021 survey commissioned by Run:AI, which competes with Exafunction, just 17% of companies said that they were able to achieve high utilization of their AI resources while 22% said that their infrastructure mostly sits idle.

The costs add up. According to Run:AI, 38% of companies had an annual budget for AI infrastructure including hardware, software and cloud fees exceeding $1 million as of October 2021. OpenAI is estimated to have spent $4.6 million training GPT-3.

Most companies operating in deep learning go into business so they can focus on their core technology, not to spend their time and bandwidth worrying about optimizing resources, Mohan said via email. We believe there is no meaningful competitor that addresses the problem that were focused on, namely, abstracting away the challenges of managing accelerated hardware like GPUs while delivering superior performance to customers.

Prior to co-founding Exafunction, Chen was a software engineer at Facebook, where he helped to build the tooling for devices like the Oculus Quest. Mohan was a tech lead at autonomous delivery startup Nuro responsible for managing the companys autonomy infrastructure teams.

As our deep learning workloads [at Nuro] grew in complexity and demandingness, it became apparent that there was no clear solution to scale our hardware accordingly, Mohan said. Simulation is a weird problem. Perhaps paradoxically, as your software improves, you need to simulate even more iterations in order to find corner cases. The better your product, the harder you have to search to find fallibilities. We learned how difficult this was the hard way and spent thousands of engineering hours trying to squeeze more performance out of the resources we had.

Image Credits: Exafunction

Exafunction customers connect to the companys managed service or deploy Exafunctions software in a Kubernetes cluster. The technology dynamically allocates resources, moving computation onto cost-effective hardware such as spot instances when available.

Mohan and Chen demurred when asked about the Exafunction platforms inner workings, preferring to keep those details under wraps for now. But they explained that, at a high level, Exafunction leverages virtualization to run AI workloads even with limited hardware availability, ostensibly leading to better utilization rates while lowering costs.

Exafunctions reticence to reveal information about its technology including whether it supports cloud-hosted accelerator chips like Googles tensor processing units (TPUs) is cause for some concern. But to allay doubts, Mohan, without naming names, said that Exafunction is already managing GPUs for some of the most sophisticated autonomous vehicle companies and organizations at the cutting edge of computer vision.

Exafunction provides a platform that decouples workloads from acceleration hardware like GPUs, ensuring maximally efficient utilization lowering costs, accelerating performance, and allowing companies to fully benefit from hardware [The] platform lets teams consolidate their work on a single platform, without the challenges of stitching together a disparate set of software libraries, he added. We expect that [Exafunctions product] will be profoundly market-enabling, doing for deep learning what AWS did for cloud computing.

Mohan might have grandiose plans for Exafunction, but the startup isnt the only one applying the concept of intelligent infrastructure allocation to AI workloads. Beyond Run:AI whose product also creates an abstraction layer to optimize AI workloads Grid.aioffers software that allows data scientists to train AI models across hardware in parallel. For its part, Nvidia sells AI Enterprise, a suite of tools and frameworks that lets companies virtualize AI workloads on Nvidia-certified servers.

But Mohan and Chen see a massive addressable market despite the crowdedness. In conversation, they positioned Exafunctions subscription-based platform not only as a way to bring down barriers to AI development but to enable companies facing supply chain constraints to unlock more value from hardware on hand. (In recent years, for a range of different reasons, GPUs have become hot commodities.) Theres always the cloud, but, to Mohans and Chens point, it can drive up costs. One estimate found that training an AI model using on-premises hardware is up to 6.5x cheaper than the least costly cloud-based alternative.

While deep learning has virtually endless applications, two of the ones were most excited about are autonomous vehicle simulation and video inference at scale, Mohan said. Simulation lies at the heart of all software development and validation in the autonomous vehicle industry Deep learning has also led to exceptional progress in automated video processing, with applications across a diverse range of industries. [But] though GPUs are essential to autonomous vehicle companies, their hardware is frequently underutilized, despite their price and scarcity. [Computer vision applications are] also computationally demanding, [because] each new video stream effectively represents a firehose of data with each camera outputting millions of frames per day.

Mohan and Chen say that the capital from the Series A will be put toward expanding Exafunctions team and deepening the product. The company will also invest in optimizing AI system runtimes for the most latency-sensitive applications (e.g., autonomous driving and computer vision).

While currently we are a strong and nimble team focused primarily on engineering, we expect to rapidly build the size and capabilities of our org in 2022, Mohan said. Across virtually every industry, it is clear that as workloads grow more complex (and a growing number of companies wish to leverage deep-learning insights), demand for compute is vastly exceeding [supply]. While the pandemic has highlighted these concerns, this phenomenon, and its related bottlenecks, is poised to grow more acute in the years to come, especially as cutting-edge models become exponentially more demanding.

Read the original here:
Exafunction aims to reduce AI dev costs by abstracting away hardware - TechCrunch

Read More..

Adept aims to build AI that can automate any software process – TechCrunch

In 2016 at TechCrunch Disrupt New York, several of the original developers behind what became Siri unveiled Viv, an AI platform that promised to connect various third-party applications to perform just about any task. The pitch was tantalizing but never fully realized. Samsung later acquired Viv, folding a pared-down version of the tech into its Bixby voice assistant.

Six years later, a new team claims to have cracked the code to a universal AI assistant or at least to have gotten a little bit closer. At a product lab called Adept that emerged from stealth today with $65 million in funding, they are in the founders words build[ing] general intelligence that enables humans and computers to work together creatively to solve problems.

Its lofty stuff. But Adepts co-founders, CEO David Luan, CTO Niki Parmar and chief scientist Ashish Vaswani, boil their ambition down to perfecting an overlay within computers that works using the same tools people do. This overlay will be able to respond to commands like generate a monthly compliance report or draw stairs between these two points in this blueprint, Adept asserts, all using existing software like Airtable, Photoshop, Tableau and Twilio to get the job done.

[W]ere training a neural network to use every software tool in the world, building on the vast amount of existing capabilities that people have already created. Luan told TechCrunch in an interview via email. [W]ith Adept, youll be able to focus on the work you most enjoy and ask our [system] to take on other tasks We expect the collaborator to be a good student and highly coachable, becoming more helpful and aligned with every human interaction.

From Luans description, what Adept is creating sounds a little like robotic process automation (RPA), or software robots that leverage a combination of automation, computer vision and machine learning to automate repetitive tasks like filing forms and responding to emails. But the team insists that their technology is far more sophisticated than what RPA vendors like Automation Anywhere and UiPath offer today.

Were building a general system that helps people get things done in front of their computer: a universal AI collaborator for every knowledge worker Were training a neural network to use every software tool in the world, building on the vast amount of existing capabilities that people have already created, Luan said. We think that AIs ability to read and write text will continue to be valuable, but that being able to do things on a computer will be significantly more valuable for enterprise [M]odels trained on text can write great prose, but they cant take actions in the digital world. You cant ask [them] to book you a flight, cut a check to a vendor or conduct a scientific experiment. True general intelligence requires models that can not only read and write, but act when people ask it to do something.

Adept isnt the only one exploring this idea. In a February paper, scientists at Alphabet-backed DeepMind describe what they call a data-driven approach for teaching AI to control computers. By having an AI observe keyboard and mouse commands from people completing instruction-following computer tasks, like booking a flight, the scientists were able to show the system how to perform over a hundred tasks with human-level accuracy.

Not-so-coincidentally, DeepMind co-founder Mustafa Suleyman recently teamed up with LinkedIn co-founder Reid Hoffman to launch Inflection AI, which like Adept aims to use AI to help humans work more efficiently with computers.

Adepts ostensible differentiator is a brain trust of AI researchers hailing from DeepMind, Google and OpenAI. Vaswani and Parmar helped to pioneer the Transformer, an AI architecture that has gained considerable attention within the last several years. Dating back to 2017, Transformer has become the architecture of choice for natural language tasks, demonstrating an aptitude for summarizing documents, translating between languages and even classifying images and analyzing biological sequences.

Among other products, OpenAIs language-generating GPT-3 was developing using Transformer technology.

Over the next few years, everyone just piled onto the Transformer, using it to solve many decades-old problems in rapid succession. When I led engineering at OpenAI, we scaled up the Transformer into GPT-2 (GPT-3s predecessor) and GPT-3, Luan said. Googles efforts scaling Transformer models yielded [the AI architecture] BERT, powering Google search. And several teams, including our founding team members, trained Transformers that can write code. DeepMind even showed that the Transformer works for protein folding (AlphaFold) and Starcraft (AlphaStar). Transformers made general intelligence tangible for our field.

At Google, Luan was the overall tech lead for what he describes as the large models effort at Google Brain, one of tech giants preeminent research divisions. There, he trained bigger and bigger Transformers with the goal of eventually building one general model to power all machine learning use cases, but his team ran into a clear limitation. The best results were limited to models engineered to excel in specific domains, like analyzing medical records or responding to questions about particular topics.

Since the beginning of the field, weve wanted to build models with similar flexibility as human intelligence-ones that can work for a diverse variety of tasks [M]achine learning has seen more progress in the last five years than in the prior 60, Luan said. Historically, long-term AI work has been the purview of large tech companies, and their concentration of talent and compute has been unimpeachable. Looking ahead, we believe that the next era of AI breakthroughs will require solving problems at the heart of human-computer collaboration.

Whatever form its product and business model ultimately takes, can Adept succeed where others failed? If it can, the windfall could be substantial. According to Markets and Markets, the market for business process automation technologies technologies that streamline enterprise customer-facing and back-office workloads will grow from $9.8 billion in 2020 to $19.6 billion by 2026. One 2020 survey by process automation vendor Camunda (a biased source, granted) found that 84% of organizations are anticipating increased investment in process automation as a result of industry pressures, including the rise of remote work.

Adepts technology sounds plausible in theory, [but] talking about Transformers needing to be able to act feels a bit like misdirection to me, Mike Cook, an AI researcher at the Knives & Paintbrushes research collective, which is unaffiliated with Adept, told TechCrunch via email. Transformers are designed to predict the next items in a sequence of things, thats all. To a Transformer, it doesnt make any difference whether that prediction is a letter in some text, a pixel in an image, or an API call in a bit of code. So this innovation doesnt feel any more likely to lead to artificial general intelligence than anything else, but it might produce an AI that is better suited to assisting in simple tasks.

Its true that the cost of training cutting-edge AI systems is lower than it once was. With a fraction of OpenAIs funding, recent startups including AI21 Labs and Cohere have managed to build models comparable to GPT-3 in terms of their capabilities.

Continued innovations in multimodal AI, meanwhile AI that can understand the relationships between images, text and more put a system that can translate requests into a wide range of computer commands within the realm of possibility. So does work like OpenAIs InstructGPT, a technique that improves the ability of language models like GPT-3 to follow instructions.

Cooks main concern is how Adept trained its AI systems. He notes that one of the reasons other Transformer models have had such success with text is that theres an abundance of examples of text to learn from. A product like Adepts would presumably need a lot of examples of successfully completed tasks in applications (e.g. Photoshop) paired with text descriptions, but this data doesnt occur that naturally in the world.

In the February DeepMind study, the scientists wrote that, in order to collect training data for their system, they had to pay 77 people to complete over 2.4 million demonstrations of computer tasks.

[T]he training data is probably created artificially, which raises a lot of questions both about who was paid to create it, how scalable this is to other areas in the future, and whether the trained system will have the kind of depth that other Transformer models have, Cook said. Its [also] not a path to general intelligence by any means It might make it more capable in some areas, but its probably going to be less capable than a system trained explicitly on a particular task and application.

Even the best-laid roadmaps can run into unforeseen technical challenges, especially where it concerns AI. But Luan is placing his faith in Adepts founding senior talent, which includes the former lead for Googles model production infrastructure (Kelsey Schroeder) and one of the original engineers on Googles production speech recognition model (Anmol Gulati).

[W]hile general intelligence is often described in the context of human replacement, thats not our north star. Instead, we believe that AI systems should be built with people at the center, Luan said. We want to give everyone access to increasingly sophisticated AI tools that help empower them to achieve their goals collaboratively with the tool; our models are designed to work hand-in-hand with people. Our vision is one where people remain in the drivers seat: discovering new solutions, enabling more informed decisions, and giving us more time for the work that we actually want to do.

Greylock and Addition co-led Adepts funding round. The round also saw participation from Root Ventures and angels including Behance founder Scott Belsky (founder of Behance), Airtable founder Howie Liu, Chris Re, Tesla Autopilot lead Andrej Karpathy and Sarah Meyohas.

Read the original:
Adept aims to build AI that can automate any software process - TechCrunch

Read More..

How AI Will Shape the Future of Business & Marketing – Analytics Insight

lets check out here how AI is set to shape the future of business and marketing?

As the well-known proverb goes, Necessity is the mother of invention. The last few years have seen a rapid advancement in artificial intelligence (AI), but how is AI set to shape the future of business and marketing?

Many benefits of AI in business have already been demonstrated. For example, it provides real-time data analytics allowing for better and faster decision making, better customer experience, and most importantly, increasing profits. Some emerging trends of AI in business that are already becoming the norm are digital marketing automated tasks and smart devices, just to name a few.

Despite the massive success of AI, there remains untapped potential, in part due to the discomfort of business leaders and employees with the adoption of new technologies. Whether in our personal lives or business practices, how we embrace technology has a lot to do with our technological age. A recent ExpressVPN quiz that calculates yourtechnological agewas based on real-world statistics and explores how different demographics engage with devices and technology to varying degrees. Whatever your technological age, embracing change needs to happen both on an individual and organizational level for the successful and natural progression of utilizing AI in our business practices.

Source: Pixabay

In particular, AI has massive potential for digital marketing to increase profits and save on costs. Advanced AI gives marketing agencys the ability to produce targeted, interactive intelligence advertising. Machine learning through AI works by making predictions of future outcomes based on historical data. Many of the applications and programs we use every day are already trying to predict your behavior and provide information and recommendations based on this data.

The scope for digital marketing agencies is massive, from automating time-consuming tasks to collecting and analyzing massive amounts of data to learn about clients needs. These technologies, although very impressive, are still at the beginning stages of what the potential uses and benefits could be.

Source: Pixabay

Artificial intelligence and robotics are being hailed as the solution to the current massive global labor shortage. There is much debate about whether the benefits outweigh the potential downsides that AI labor will bring. Jobs that AI-powered robots could take over include copywriting, customer service, coding, and many more.

The not too distant future looks a lot like our favorite science fiction movies, with self-driving cars and advanced robotics already all in development. One sample of what the present and future look like is DeepMind, the cutting-edgeAI company. DeepMind technology is not pre-programmed but rather works by compiling inputs and learning from experience. This technology famously beat world champion Go player Lee Sedol, proving that it could not only learn incredibly fast but beat the best human. This AI tech has since been adapted to be used in healthcare and has many demonstrated benefits. Artificial intelligence and machine learning are exponential and will have mind-blowing functions in the near future.

Share This ArticleDo the sharing thingy

About AuthorMore info about author

Analytics Insight is an influential platform dedicated to insights, trends, and opinions from the world of data-driven technologies. It monitors developments, recognition, and achievements made by Artificial Intelligence, Big Data and Analytics companies across the globe.

Go here to read the rest:
How AI Will Shape the Future of Business & Marketing - Analytics Insight

Read More..

Why every veteran should try deep-sea fishing at least once – We Are The Mighty

Many soldiers deployed for missions in violent combat zones end up with mental health issues, mainly PTSD. Given the numerous encounters with death and losing friends during field operations, this is expected. Naturally, humans deal with such occurrences differently, but sometimes the brain finds it hard to cope. For such reasons, veterans are always encouraged to enroll in activities that keep them active, blocking the memories of the tough days. Several programs have been created to help veterans cope with life after active duty.

Besides providing a wide variety of fish types, deep-sea fishing is a lifesaver for troubled veterans. According to Captain Jimmy Armel, an Army Ranger, fishing is more than a hobby. After returning home from deployments in Afghanistan and Iraq, Captain Jimmy struggled to adjust to civilian life. During his active duty days, he suffered concussions and other injuries.

Jimmy shares that he was depressed and frequently resorted to alcoholic beverages to relieve his stress. He even considered suicide at one point, which many veterans with PTSD have considered. He figured he had to find a better way of coping with his PTSD since alcoholism only made it worse. Jimmy took advantage of a newly discoveredpassion by establishing a fishing charter on Tybee Island, which he used to allow veteransto recover.

Many times, people who visit counselors or therapists perceive themselves as weak, something we should change. Until recently, mental health was not prioritized in many countries. The stigma around counseling should end as it has resulted in many suicides, some of which may have been prevented if the deceased had visited a counselor or therapist. This stigma is especially pronounced in the gun fighting world, as these people are expected to be tough. As such, veterans shy from seeking help when dealing with PTSD because they dont want to seem fragile.

According to experts, such veterans can benefit from deep-sea fishing, as it works well as a form of counseling. Those enrolled in deep-sea fishing programs often report a feeling of mental calmness after returning from the sea. Talking to other people while catching fish is therapeutic, especially if the people involved are also veterans. Sharing your experiences and seeing that you are not the only one suffering from loneliness, anxiety or PTSD will help with recovery. Even if you dont catch any fish, deep-sea fishing has a way of clearing the evil thoughts off your mind.

Keeping yourself busy is one of the best ways to deal with PTSD, as loneliness and idleness kill the mind the most. According to veterans who have participated in deep-sea fishing, the activity gives them something to worry about. At that moment, the veteran controls the situation and does not have to worry about the unknown constantly.Sometimes, the veterans will engage in healthy fishing competitions, a sport that is proven to relieve stress. While most veterans rarely share their anxiety issues with people they are close with, telling a stranger your deepest worries is easier. You will find yourself opening up and even getting emotional, a major step in recovery. Furthermore, no one will judge you for being weak because almost everyone participating in veteran-focused deep-sea fishing has a similar issue. Keeping your mental health in check is as vital as your bodys health. Veterans with or without PTSD should try deep-sea fishing to reap its benefits.

Originally posted here:
Why every veteran should try deep-sea fishing at least once - We Are The Mighty

Read More..

Artificial intelligence Might Soon Tell you How Adam and Eve Lived – Analytics Insight

Researchers are using technologies like Artificial Intelligence and Machine learning to get more accurate results.

Uncovering evidence for historical theories and identifying patterns in past events has long been hindered by the labor-intensive process of inputting data from artifacts and handwritten records. Normally, epigraphers scholars who study ancient texts written on durable materials such as stone, metal, or pottery use their knowledge of repositories of information and digital databases to perform string matching searches to find textual and contextual parallels. However, differences in the digital-search query that can exclude or conceal relevant results and that the texts often are discovered not in their original context can complicate the work. Starting from Adam and Eve to the Greek gods there is so much to discover and researchers are using advanced technologies like Artificial Intelligence and Machine learning to get more accurate results. Most scientific research to date has focused on whether Adam and Eve could have passed on genetic material to everyone living; however, this doesnt seem to be the type of ancestry the Bible is concerned with. While all genetic ancestors are genealogical ancestors, the inverse is not necessarily true.

So, what does this mean for Adam and Eve? Well, in 2004, a computer simulation of life on Earth was created to test and see when the most recent common ancestor for all humans was. The researchers put higher barriers than historically existed to stack the odds against there being a common ancestor in the recent past. Despite this, the results, published in Nature, found common ancestors only two or three thousand years ago. Apart from Adam and Eve, the adoption of artificial intelligence and machine learning techniques is speeding up such research and drawing attention to overlooked information. But this approach, known as digital humanities, is in a battle for funding against more future-focused applications of AI.

Restoring or recreating archaeological artifacts is a complicated problem for computer vision models. Previous work algorithms learning to reassemble photos or documents, for example has not accounted for the degradation of fragments, unclear images, or imprecise piece-fitting.

Ancient texts written on stone tablets, such as those found in Greece, provide invaluable insight into the history of past civilizations. However, being as much as 2,600 years old, these priceless inscriptions havent been immune to the ravages of time. Theyre often damaged and littered with chips and cracks, sometimes even missing entire fragments of text. To fill these gaps and reconstruct the missing sections, historians typically rely on a discipline called epigraphy, which uses grammatical and linguistic considerations, layout and shape, textual parallels, and historical context to estimate what the text originally contained. As this is a very complex and time-consuming process, the team behind Googles DeepMind AI joined forces with the University of Oxford to develop Pythia, the first ancient text restoration model that uses deep neural networks to recover missing characters from damaged text.

Artificial intelligence technology has had a profound impact on a wide variety of industries in recent years, transforming almost every aspect of our lives in the process. While most of the talk surrounding AI has focused on how it will affect the human workforce, it cant be denied that its found some very promising applications in certain areas. One of these areas is archaeology, where AIs ability to analyze large amounts of data in a short amount of time and uncover hidden patterns is very useful. Whether its used to restore ancient Greek texts, translate long-lost languages, reassemble damaged archaeological artifacts, or uncover hidden designs in the Nazca Lines, AI is becoming an increasingly important tool in archaeologists arsenal, helping them bring history back to life.

In conclusion, looking at the continued developments there is no lie that in no time artificial intelligence will be able to tell how Adam and Eve used to live in the past. Also, we will get the answers to many unsolved mysteries.

Share This ArticleDo the sharing thingy

About AuthorMore info about author

Read more:
Artificial intelligence Might Soon Tell you How Adam and Eve Lived - Analytics Insight

Read More..

The Air Force is trusting the internet to name its ridiculous new cybersecurity mascot – Task & Purpose

Cybersecurity. Its important stuff. Theres a lot of critical data out there that you dont want bad actors snooping on.

That is why the Air Force apparently needs a cybersecurity mascot. A caped robot with a shield and lightning bolt adorned helmet, here to ask you if youve tried turning your computer off and on again and presumably solving the myriad of technical issues that come with the territory when youre using decades-old software.

He is mighty, strong and here to fight our cyber problems away, says the Air Force.

He is just he for now, and like any good mascot, he needs a catchy name. And its up to the proud men and women of the Air Force to come up with one.

We will be integrating this character with the Department of Air Force cyber awareness marketing material, campaigns and announcements to help support brand awareness, reads the website for the Air Forces chief information security officer, along with instructions for how to send in your name suggestions via email.

Will this become another Boaty McBoatface situation? Surely not.

After all, the Air Force is supposed to be the smart branch. Marines just trip balls at Camp Lejeune, but airmen do it while guarding nuclear weapons. When the Navy draws a sky penis, pilots lament that the balls are going to be a little lopsided. The Air Force does the same thing with some of the most expensive jets to ever take to the sky. And who wouldnt want to use a C-130 Hercules for a brief excursion to Marthas Vineyard to pick up your motorcycle?

Once given a name, this robot, whether its named Cyber McCyberface or any other proposed monikers, might have a lot on its cyber plate. Especially when its going to be operating in computers that struggle to even turn on.

So airmen, dont let us down. Comeup with a namefor this new keyboard warrior! You can find the email to submit your suggestions and more information about the mascothere.

Want to write for Task & Purpose? Click here. Or check out the latest stories on our homepage.

More here:
The Air Force is trusting the internet to name its ridiculous new cybersecurity mascot - Task & Purpose

Read More..

Overview of Internet Security and Protection – Social Telecast

People use different ways to protect themselves. You lock your car to ensure your cars safety or lock your room to keep you protected. The internet is a wider global phenomenon and people spend much time online. Providers like Xfinity have given us safe access to the internet, but even the best of the best provider cannot erase the chance of your internet security being risked, because internet crime has advanced to high grounds.

There is something that needs protection, especially in todays world. That is your online identity. Cybercrime is very much common nowadays and to protect yourself online, you need to take some steps. You will be given a brief overview of those steps in this article.

Cyber-security refers to the safeguarding of web servers, computers, networks, and any persons identity against data leakage, theft, or damage to the equipment, software, or electronic data. Cyber-security can also involve information leakage, for example, you sign up for the Xfinity Package Deals because you heard it is better than your provider now, so you input your credentials to pay and it gets hacked. This is entirely possible because of a poorly protected and non-encrypted internet connection giving access to everyone out there for your information.

Learning and understanding cyber-security can be a little complex because you have togo through quite a lot of technical terms and buzzwords. Following are listed some basic terms for you to understand to know about cyber-security:

A data breach is a technical term for an occurrence when any personal data of a person or information of any office or bank is stolen by hacking. Hackers frequently try to steal the personal information of different corporate or authorities to steal their money and important resources.

Back-up is a term used for storing data somewhere safe in a different file or a different device in case of any theft or misplacement. iCloud is the most common application used as a backup.

A device thatis designed to interrupt a devices operations is known as Malware. Since technology is so advanced today, there are several date malware. Some malware is so strong that they even grant access to the hackers from afar. Hence, we need to install anti-virus software to protect our devices from hackers.

The term cloud simply refers to online networks. It has a significant difference from the local storage systems that just contain the hard drive of a PC. Cloud helps you store your important data and files on several other servers and keep it safe from malware and hackers.

Hacking is not just a mere threat to sensitive information today. In a world where everything is linked with technology, hacking can cause major destruction to a company or an individual. Hacking can sabotage a companys relationship with its customers and put a company in serious trouble. The threats of cybercrime are becoming even more serious as new technology emerges. It is important to protect our online identity as well. Hackers can take advantage of our personal information.

Parenting filters are something that was designed through advanced technology. Parenting filters can help with your childs security on the internet as well. Parents can use these and install filters on their kids devices so they can view informational and beneficial content only. Even some smartphones have come up with the feature that lets parents control what their child views so they can just have access to limited content.

It is no secret that there are all sorts of content on the internet and not all of them are appropriate for the children to view. But hackers have come up with such malware that even resist parents to do so too. Parents should have a keen eye and teach their children not to talk to random strangers on the internet.

Teenage is the peak age that can teach children a lot of things. Not all of those things can be appropriate and safe for them. Parents should spread awareness among their children and let them know about the dos and donts of the internet. Some steps can be taken to avoid any inconvenience among teens:

Instead of providing each child with a solo device, you can just keep a single device for every use. Usage of the internet among the children will now be easier to monitor. Ground rules can be set for the whole family and implemented. Request that your children charge their gadgets in one room and set up a space for internet use. Allowing your children to use devices before going to bed can disrupt their sleep cycle.

Allow your children to use technology in a very limited way as it can waste their time as well. Instead, encourage your children to do something productive. Once they get addicted to technology, it will be harder to stop them.

Spreading awareness among your children can be very effective too. They should know why they are being restricted to the unlimited use of technology. They should be aware of the dangers ad threats on the internet. Educate them about the disadvantages and the steps for protection.

You should prepare your kids for the future and make them knowledgeable. For protection, children rely on their parents. You must make certain that they have a thorough perception of self-defense. Inform them of the benefits of internet banking and data transfer. Check to see if theyre doing something lawful.

Hackers find senior citizens the most easier to exploit. Many of them have a lifetimes worth of savings, a home, and other valuable assets so it is easier for them to take advantage of them. Senior citizens are more vulnerable to online ruses and deceptions. Since they may not know how to report a trick or maybe be humiliated about being the victim of a trick, there are very low chances of them reporting such cases. Make sure elders, as well as their friends, family, and parental figures are aware of standard network security best practices and ways to stay secure online for them to stay protected from hackers and con artists.

In todays world, internet security is critical. We must adapt to evolving technology and continue to learn as much as possible about cyber security. Online security is important for keeping hackers and cyber stealers of information from accessing sensitive information. Without an active security strategy, businesses risk the spread and continuous rise of malware, attacks on other websites, networks, and other IT Infrastructures leading to vulnerabilities in the virtual world.

The rest is here:
Overview of Internet Security and Protection - Social Telecast

Read More..

‘We have to stay in front of our kids’ | Experts advocate for parental involvement to strengthen cyber security – ABC10.com KXTV

The suggestion comes after a 24-year-old Sacramento man is behind bars, being accused of directing more than 80 underage victims to produce porn across the world.

SACRAMENTO, Calif. Investigators believe 24-year-old Demetrius Davis has at least 80 victims between the ages of 6 to 13 in the U.S., and many more overseas, after posing as an 11-year-old girl named Lizzy online, directing dozens of children to create child pornography online.

"On their siblings, other relatives and other kids that they know and then film it and send that video to our suspect," Sgt. Rod Grassman, a spokesman for the Sacramento County Sheriff's Office said.

Jeffrey Lee, author of the book, 'Online Predators, an Internet Insurgency,' has more than a decade of experience fighting against online child exploitation. He says the best way to prevent this sort of activity from happening is parental involvement, first and foremost.

"These types of cases are actually quite common, unfortunately," Lee said. "They're more common than you would like to think."

Lee said parents should be teaching their kids that the 'stranger danger' policy needs to apply online too and they should be checking their phones regularly as every app and every URL is a potential destination for victimization.

"You've got to adapt the stranger danger conversation for the 21st century, plain and simple," Lee said. "We have to adjust accordingly, we have to stay in front of our kids and we have to make the topic of online predation, online exploitation, online criminality in general, regular topic, the conversation in the house."

He encourages bringing up this case, which kids may have heard about on the news or from their friends, as a jumping off point to start the conversation. But, Lee says there are warning signs that every parent can be looking out for at anytime.

"Any abrupt changes in behavior, and it's generally going to be for the negative, spending a lot of time, more time isolated in their room, a little more insolent, grades start to slip," Lee said.

And he says this is something than can be avoided with parental involvement.

"Nothing is going to take the place of your involvement and your willingness to stay involved and your willingness to talk to your kids about this stuff," Lee said. "Present to them and show them say, hey, look, if this happens to you, I have a plan."

Lee added if you do find something on your child's phone, stay calm, be a good witness, do not converse with the person on the other end, make sure you have the passcode, don't delete anything and call law enforcement right away.

1/10

1 / 10

Sacramento County man allegedly lured 80 children into making porn

See original here:
'We have to stay in front of our kids' | Experts advocate for parental involvement to strengthen cyber security - ABC10.com KXTV

Read More..

CISA, FBI, NSA, and International Partners Warn Organizations of Top Routinely Exploited C – National Security Agency

WASHINGTON After more than 20,000 common vulnerabilities and exposures (CVEs) were disclosed in 2021, U.S and allied cybersecurity authorities are helping organizations prioritize and mitigate the most exploited vulnerabilities. The Cybersecurity and Infrastructure Security Agency (CISA), along with the National Security Agency (NSA), Federal Bureau of Investigation (FBI), Australian Cyber Security Centre (ACSC), Canadian Centre for Cyber Security (CCCS), New Zealand National Cyber Security Centre (NZ NCSC), and the United Kingdoms National Cyber Security Centre (NCSC-UK) issued a joint Cybersecurity Advisory on the top 15 common vulnerabilities and exposures (CVEs) routinely exploited by malicious cyber actors in 2021, as well as other CVEs frequently exploited.

In 2021, malicious cyber actors aggressively targeted newly disclosed critical software vulnerabilities against broad target sets, including public and private sector organizations worldwide. To mitigate the threats and/or adverse consequences from having vulnerabilities exploited by these actors, the cybersecurity authorities recommend prioritizing and strengthening:

We know that malicious cyber actors go back to what works, which means they target these same critical software vulnerabilities and will continue to do so until companies and organizations address them, said CISA Director Jen Easterly. CISA and our partners are releasing this advisory to highlight the risk that the most commonly exploited vulnerabilities pose to both public and private sector networks. We urge all organizations to assess their vulnerability management practices and take action to mitigate risk to the known exploited vulnerabilities. "The FBI, together with our federal and international partners, is providing this information to better arm our private sector partners and the public to defend their systems from adversarial cyber threats," said FBI's Cyber Division Assistant Director Bryan Vorndran. "Though the FBI will continue to pursue and disrupt this type of malicious cyber activity, we need your help. We strongly encourage private sector organizations and the public to implement these steps to mitigate threats from known vulnerabilities, and if you believe you are a victim of a cyber incident, contact your local FBI field office.""This report should be a reminder to organizations that bad actors don't need to develop sophisticated tools when they can just exploit publicly known vulnerabilities," said NSA Cybersecurity Director Rob Joyce. "Get a handle on mitigations or patches as these CVEs are actively exploited.Malicious cyber actors continue to exploit known and dated software vulnerabilities to attack private and public networks globally, said Abigail Bradshaw, Head of the Australian Cyber Security Centre.The ACSC is committed to providing cyber security advice and sharing threat information with our partners, to ensure a safer online environment for everyone. Organisations can implement the effective mitigations highlighted in this advisory to protect themselves.Cyber security best practices, including patch management, are essential tools for organizations to better protect themselves against malicious threat actors, said Sami Khoury, Head of the Canadian Centre for Cyber Security. We encourage all organizations to take action and follow the appropriate mitigations in this report against known and routinely exploited vulnerabilities, and make themselves more secure.We are seeing an increase in the speed and scale of malicious actors taking advantage of newly disclosed vulnerabilities, said Lisa Fong, Director of the New Zealand Government Communications Security Bureaus National Cyber Security Centre (NCSC). The NCSC works with international partners to provide timely access to critical cyber threat information. This joint advisory underscores the importance of addressing vulnerabilities as they are disclosed and better equips New Zealand organisations to secure their information and systems.The NCSC and our allies are committed to raising awareness of global cyber vulnerabilities and presenting actionable solutions to mitigate them, said Lindy Cameron, CEO of NCSC. This advisory places the power in the hands of network defenders to fix the most common cyber weaknesses within the public and private sector ecosystem. Working with our international partners, we will continue to raise awareness of the threats posed by those which seek to harm us.Globally, malicious cyber actors targeted internet-facing systems, such as email servers and virtual private network (VPN) servers, with exploits of newly disclosed vulnerabilities. To a lesser extent in 2021, these actors continued to exploit publicly known or dated software vulnerabilities some of which were also identified as routinely exploited in 2020 or earlier.All organizations are encouraged to review and implement the recommended mitigations in this detailed joint CSA.

Visit our full library for more cybersecurity information and technical guidance.

View original post here:
CISA, FBI, NSA, and International Partners Warn Organizations of Top Routinely Exploited C - National Security Agency

Read More..

Common values, shared threats in India-Australia cyber security ties – The Indian Express

Western and media attention may be focused on the conflict between Russia and Ukraine, but countries have not taken their eye off the Indo-Pacific where there is clear evidence of the changing world order. This is manifest in the signing of the India-Australia Economic Cooperation and Trade Agreement in goods and services earlier this month.

The botched US withdrawal from Afghanistan followed by China taking a serious interest in creating new economic, military and political alliances, and the impending energy crisis demand that nations recalibrate their strategic as well as long-term interests. The India-Australia ECTA is a concrete example of the bilateral faith in common values, and understanding of threats and goals. A reflection of this is cooperation in cyber security.

The Russia-Ukraine conflict has shown how cyber threat actors, both state and non-state, have become significant players in hybrid or unrestricted warfare. Both countries have let loose malicious elements in the information as well as operational space, while non-state actors like the hacktivist group Anonymous claimed to have caused significant damage to critical Russian and Belarusian financial and military infrastructure.

China is accused of having amassed a large number of cyber weapons and has allegedly carried out sophisticated operations aimed at espionage, theft of intellectual property, and destructive attacks on internet resources of some countries. Australia and India have been at the receiving end of several such campaigns by the so-called Advanced Persistent Threat (APT) groups, supported by or assumed to be located in China.

At the June 2020 virtual bilateral summit, Prime Minister Narendra Modi and his Australian counterpart Scott Morrison elevated the bilateral relationship to a Comprehensive Strategic Partnership. The new cyber framework includes a five-year plan to work together on the digital economy, cybersecurity and critical and emerging technologies. This will be supported by a $9.7 million fund for bilateral research to improve regional cyber resilience.

An annual Cyber Policy Dialogue, a new Joint Working Group on Cyber Security Cooperation and a joint working group on ICTs have been established. An annual India-Australia Foreign Ministers Cyber Framework Dialogue will be held. India will now be included in a core Australian initiative called the International Cyber Engagement Strategy it began in 2017 to actively conduct capacity-building arrangements in Indonesia, Singapore and Thailand, and support similar activities in Malaysia, Vietnam and Cambodia. In 2021 Australia added critical technologies to the initiative, making it important to the bilateral partnership with India and to the Quad.

India has much to learn from Australias low-key but smart cyber expertise. The Australian Cyber Security Centre (ACSC) in Canberra is the receptacle of the countrys cybersecurity information, advice and assistance efforts. It draws expertise from national law enforcement, intelligence agencies, crime investigation, and national security bodies. ACSC has a partnership programme with the corporate world to facilitate intelligence-sharing on threats. AustCyber, another government effort, aims at establishing an internationally competitive domestic cybersecurity industry.

India has set up the office of the National Cybersecurity Coordinator, a national Computer Emergency Response Team (CERT-IN), a national Critical Information Infrastructure Protection Agency (NCIIPC), and made appropriate amendments to the Information Technology Act and Rules to enhance its cyber security posture. This has upped Indias rank to 10th in the Global Cyber Security Index (GCI) 2020, from 47th just two years earlier. India has capable cybersecurity professionals.

In February, the foreign ministers of India and Australia recognised cooperation in cyber governance, cyber security, capacity building, innovation, digital economy, cyber and critical technologies as an essential pillar of the relations between the two countries. A joint Centre of Excellence for Critical and Emerging Technology Policy, to be located in Bengaluru, will be set up.

India and Australia share common concerns around 5G rollouts, threats by APT groups, cybercrime, information warfare and threats to a democratic order. Deepening cooperation can develop avenues for mutual learning and create complementary markets in cyber tools and technologies, boosting bilateral business and strategic commitments on both continents.

This column first appeared in the print edition on April 27, 2022 under the title Facing a common threat. The writer, Adjunct Distinguished Fellow for Cyber Security at Gateway House, is a senior IPS officer. Views expressed are personal

Visit link:
Common values, shared threats in India-Australia cyber security ties - The Indian Express

Read More..