Page 3,246«..1020..3,2453,2463,2473,248..3,2603,270..»

Special Operations Strives to Use the Power of Artificial Intelligence – Department of Defense

U.S. Special Operations Command hopes to increasingly use artificial intelligence and machine learning in all aspects of warfare, its commander said.

Army Gen. Richard D. Clarke spoke virtually today with Hudson Institute scholars.

Clarke noted that Project Maven jump-started the employment of AI. Project Maven was initially executed to automate the processing and exploitation of full-motion video collected by intelligence, instead of relying on humans to sort through all of it.

With AI's ability to shift quickly through terabytes of data to find relevant pieces of intelligence, it allows the human to make faster and better informed decisions, he said.

AI can also be incredibly effective at monitoring the information environment, he said.

During a recent visit with a special operations commander in Afghanistan, Clarke noted that the commander said influencing the population in a positive way can mean the difference between winning and losing.

Socom has been using AI for logistics, and the maintenance piece in particular, for more than two years now, he said. It saves money in terms of, for example, predicting engine life or failure on a tank or aircraft. And it allows better use of those assets.

AI-powered health care can predict injuries or point to treatments to get operators in the fight more quickly, he mentioned.

In the realm of mission command, AI will power the Joint All-Domain Command and Control system, which will allow commanders to better communicate and make decisions, he said.

While Socom is forging ahead quickly with AI, Clarke mentioned that his organization is also working closely with the military services and organizations like the Joint Artificial Intelligence Center, as well as with industry, allies and partners.

Clarke emphasized that it's important that commanders set the tone and set the conditions to allow innovation and encourage people to come up with great ideas.

Humans are more important than the hardware, he said. "It's the talented people that we have to help foster. You've got to invest the human capital into this space."

Looking to the future, Clarke said he is optimistic that AI will be successfully leveraged by the Defense Department to maintain the lead against peer competitors China and Russia. It will require updating policy and infrastructure, using cloud computing and having the right people who are enabled with the right leadership.

See original here:
Special Operations Strives to Use the Power of Artificial Intelligence - Department of Defense

Read More..

How the Role of Artificial Intelligence is Changing During the Pandemic – MarketScale

Seasoned technology executives host a weekly discussion to highlight how IT teams and leaders can prepare to be agile and scalabale in an ever changing world.

To say 2020 has been a year of change is a monumental understatement. Everything from the way we socialize, to how we receive health care, to how we work, has changed massively. The hosts of The Suite Spot Carlos Vargas,Howard HoltonandPaul Lewis spoke with Michael Davidson, Senior Data Scientist, Microsoft about some of the changes that businesses had no choice but to make.

Davidson feels that these challenges provided learning opportunities for businesses. He presented companies shifting to remote work as an example, The hardest gap to overcome is the one you mentioned and thats accepting that its even possible. And once youve done it a few times, it doesnt become rote. I mean every project has its own challenges, but just the belief that you can do it, I think is probably the biggest hurdle for most leadership teams to overcome, Davidson said.

He feels that once companies have seen the positive outcomes of change, it becomes easier to enact more change. Especially when you have to react to some sort of catastrophic change in the operating environment. Davidson suspects that a lot of the workplace changes weve seen may remain, even once social distancing guidelines are a thing of the past. As much Covid is obviously a tragedy of proportions we havent seen, but at the same time like anything in life, hopefully we can learn from it, Davidson noted. He finds it hard to believe that workers will be eager to resume long, inconvenient, and expensive commutes, when working remotely has suited them just fine especially in the tech industry. Its nonsensical, right? Were showing most, many of these jobs can be done at home. And for those that cant Fair enough, but certainly in most of our lines of work, its probably 95% of what it was, Davidson stated.

Read the original:
How the Role of Artificial Intelligence is Changing During the Pandemic - MarketScale

Read More..

What is machine learning? Here’s what you need to know – Business Insider – Business Insider

Machine learning is a fast-growing and successful branch of artificial intelligence. In essence, machine learning is the process of allowing a computer system to teach itself how to perform complex tasks by analyzing large sets of data, rather than being explicitly programmed with a particular algorithm or solution.

In this way, machine learning enables a computer to learn how to perform a task on its own and to continue to optimize its approach over time, without direct human input.

In other words, it's the computer that is creating the algorithm, not the programmers, and often these algorithms are sufficiently complicated that programmers can't explain how the computer is solving the problem. Humans can't trace the computer's logic from beginning to end; they can only determine if it's finding the right solution to the assigned problem, which is output as a "prediction."

There are several different approaches to training expert systems that rely on machine learning, specifically "deep" learning that functions through the processing of computational nodes. Here are the most common forms:

Supervised learning is a model in which computers are given data that has already been structured by humans. For example, computers can learn from databases and spreadsheets in which the data has already been organized, such as financial data or geographic observations recorded by satellites.

Unsupervised learning uses databases that are mostly or entirely unstructured. This is common in situations where the data is collected in a way that humans can't easily organize or structure it. A common example of unstructured learning is spam detection, in which a computer is given access to enormous quantities of emails and it learns on its own to distinguish between wanted and unwanted mail.

Reinforcement learning is when humans monitor the output of the computer system and help guide it toward the optimal solution through trial and error. One way to visualize reinforcement learning is to view the algorithm as being "rewarded" for achieving the best outcome, which helps it determine how to interpret its data more accurately.

The field of machine learning is very active right now, with many common applications in business, academia, and industry. Here are a few representative examples:

Recommendation engines use machine learning to learn from previous choices people have made. For example, machine learning is commonly used in software like video streaming services to suggest movies or TV shows that users might want to watch based on previous viewing choices, as well as "you might also like" recommendations on retail sites.

Banks and insurance companies rely on machine learning to detect and prevent fraud through subtle signals of strange behavior and unexpected transactions. Traditional methods for flagging suspicious activity are usually very rigid and rules-based, which can miss new and unexpected patterns, while also overwhelming investigators with false positives. Machine learning algorithms can be trained with real-world fraud data, allowing the system to classify suspicious fraud cases far more accurately.

Inventory optimization a part of the retail workflow is increasingly performed by systems trained with machine learning. Machine learning systems can analyze vast quantities of sales and inventory data to find patterns that elude human inventory planners. These computer systems can make more accurate probability forecasting for customer demand.

Machine automation increasingly relies on machine learning. For example, self-driving car technology is deeply indebted to machine learning algorithms for the ability to detect objects on the road, classify those objects, and make accurate predictions about their potential movement and behavior.

Continued here:
What is machine learning? Here's what you need to know - Business Insider - Business Insider

Read More..

Facebook, other partners using artificial intelligence to forecast future COVID-19 trends – WGRZ.com

Unlike data released by the federal or state government, Facebook is releasing potential COVID-19 trends at the county level.

BUFFALO, N.Y. Every day we are inundated with data as it pertains to COVID-19. Whether it be state or federal data even county data but the data released on a daily basis only paints the picture of what has happened and doesn't necessarily speak to what may happen.

Facebook, along with partners at Carnegie Mellon, the University of Maryland, and many more, are using artificial intelligence, aggregated mobility statistics, and user surveys to forecast future COVID-19 trends.

"Our AI forecast is really just using artificial intelligence to predict what COVID-19 will look like two weeks out using both this information from public health systems," said Laura McGorman, public policy manager at Data For Good, a program spearheaded by Facebook.

McGorman says that Facebook uses readily available public health data as part of its AI-powered forecasting. The big question you probably have; however, is Facebook and its partners looking at your profile information to see if you went to Aunt Ginny's at Thanksgiving in order to lump you into their forecast?

The answer is no, not by default at least.

"It's completely separate, the Data For Good program takes sort of user control very seriously," McGorman said. "In the case of the mobility statistics that we generate for COVID-19, that's only being generated from people who choose to share their location information with Facebook when they use the app on their phone."

If you opt in to sharing your location while using the Facebook app, the app will track you. By tracking you Facebook will know if you're in a particular area that has seen recent spikes in COVID-19 cases. This information is only part of the complete picture that Facebook's AI is trying to paint.

"We train this model alongside 15 other forecasts," McGorman said. "On average, at a county level on a daily basis, we were within about 20 or so cases from the actual number."

Facebook is releasing this data in conjunction with the Humanitarian Data Exchange and Direct Relief.

The dashboard, updated multiple times a day, allows uses to look at the two-week forecast for each county in the United States. According to McGorman, this allows local leaders to analyze the data to make decisions on responding to spikes, and what the future may hold.

"What we're able to offer Erie County is a view into their county in particular," McGorman said. "In terms of what case count is going to look like over the next two weeks, we are trying to be more detailed than the average forecast here."

2 On Your Side reached out to four Department of Health offices in Western New York. None of them knew about this tool, the data it contained or didn't respond to our inquiry.

Read more here:
Facebook, other partners using artificial intelligence to forecast future COVID-19 trends - WGRZ.com

Read More..

Congress wants to boost the prominence of Pentagon’s AI center – C4ISRNet

WASHINGTON Congress signaled its confidence in the Pentagons young artificial intelligence office through a series of measures to increases its standing in the agency, including giving its director acquisition authority.

The annual defense policy bill, called the fiscal 2021 National Defense Authorization Act, would alter the reporting structure of the Joint Artificial Intelligence Center, raising the office to report directly to the deputy secretary of defense, instead of the departments chief information officer. The bill, which still needs President Donald Trumps approval, establishes a board of advisers to give the center strategic advice and technical expertise on AI matters.

The measures to bolster the importance of the Joint Artificial Intelligence Center come as the organization pivots from focusing on artificial intelligence projects to identifying and solving problems within the services using AI. The JAIC was established in 2018 to increase the adoption of AI across the Pentagon.

Until now, the office hasnt had acquisition authority. The NDAA would authorize a maximum of $75 million for the JAIC director for the development, acquisition and sustainment of artificial intelligence technologies, services and capabilities through fiscal year 2025. This year the JAIC has repeatedly mentioned the challenges that the current acquisition process causes. Its contract awards usually relied on the General Services Administration or Defense Innovation Unit, an entity also meant to speed up the acquisition process.

More autonomy over acquisitions could streamline the process to get the services AI technology faster, said Lindsey Sheppard, a fellow at the Center for Strategic and International Studies.

Finding available contracting vehicles can be a big challenge for technology development efforts, she said in an email. You may have identified a mission need and have a great solution, but no available contract vehicle. And it can take years to get something in place. This NDAA would clear that roadblock by giving the JAIC its own acquisition authorities to get technology in the door.

Air Force Lt. Gen. Jack Shanahan, former director of the JAIC until he retired in June, called for the authority back in May. At the time, he said the lack of acquisition authorities was slowing the agency down when it needed to go faster.

Martijn Rasser, a senior fellow at the Center for a New American Security, told C4ISRNET that the new authority would help bring nontraditional contractors into the fold.

Sign up for the C4ISRNET newsletter about future battlefield technologies.

(please select a country) United States United Kingdom Afghanistan Albania Algeria American Samoa Andorra Angola Anguilla Antarctica Antigua and Barbuda Argentina Armenia Aruba Australia Austria Azerbaijan Bahamas Bahrain Bangladesh Barbados Belarus Belgium Belize Benin Bermuda Bhutan Bolivia Bosnia and Herzegovina Botswana Bouvet Island Brazil British Indian Ocean Territory Brunei Darussalam Bulgaria Burkina Faso Burundi Cambodia Cameroon Canada Cape Verde Cayman Islands Central African Republic Chad Chile China Christmas Island Cocos (Keeling) Islands Colombia Comoros Congo Congo, The Democratic Republic of The Cook Islands Costa Rica Cote D'ivoire Croatia Cuba Cyprus Czech Republic Denmark Djibouti Dominica Dominican Republic Ecuador Egypt El Salvador Equatorial Guinea Eritrea Estonia Ethiopia Falkland Islands (Malvinas) Faroe Islands Fiji Finland France French Guiana French Polynesia French Southern Territories Gabon Gambia Georgia Germany Ghana Gibraltar Greece Greenland Grenada Guadeloupe Guam Guatemala Guinea Guinea-bissau Guyana Haiti Heard Island and Mcdonald Islands Holy See (Vatican City State) Honduras Hong Kong Hungary Iceland India Indonesia Iran, Islamic Republic of Iraq Ireland Israel Italy Jamaica Japan Jordan Kazakhstan Kenya Kiribati Korea, Democratic People's Republic of Korea, Republic of Kuwait Kyrgyzstan Lao People's Democratic Republic Latvia Lebanon Lesotho Liberia Libyan Arab Jamahiriya Liechtenstein Lithuania Luxembourg Macao Macedonia, The Former Yugoslav Republic of Madagascar Malawi Malaysia Maldives Mali Malta Marshall Islands Martinique Mauritania Mauritius Mayotte Mexico Micronesia, Federated States of Moldova, Republic of Monaco Mongolia Montserrat Morocco Mozambique Myanmar Namibia Nauru Nepal Netherlands Netherlands Antilles New Caledonia New Zealand Nicaragua Niger Nigeria Niue Norfolk Island Northern Mariana Islands Norway Oman Pakistan Palau Palestinian Territory, Occupied Panama Papua New Guinea Paraguay Peru Philippines Pitcairn Poland Portugal Puerto Rico Qatar Reunion Romania Russian Federation Rwanda Saint Helena Saint Kitts and Nevis Saint Lucia Saint Pierre and Miquelon Saint Vincent and The Grenadines Samoa San Marino Sao Tome and Principe Saudi Arabia Senegal Serbia and Montenegro Seychelles Sierra Leone Singapore Slovakia Slovenia Solomon Islands Somalia South Africa South Georgia and The South Sandwich Islands Spain Sri Lanka Sudan Suriname Svalbard and Jan Mayen Swaziland Sweden Switzerland Syrian Arab Republic Taiwan, Province of China Tajikistan Tanzania, United Republic of Thailand Timor-leste Togo Tokelau Tonga Trinidad and Tobago Tunisia Turkey Turkmenistan Turks and Caicos Islands Tuvalu Uganda Ukraine United Arab Emirates United Kingdom United States United States Minor Outlying Islands Uruguay Uzbekistan Vanuatu Venezuela Viet Nam Virgin Islands, British Virgin Islands, U.S. Wallis and Futuna Western Sahara Yemen Zambia Zimbabwe

Subscribe

By giving us your email, you are opting in to the C4ISRNET Daily Brief.

This will enable JAIC to speed up the process and gives them the opportunity to level the playing field for small and nontraditional tech companies, which is key to ensuring DoD has access to the broadest array of AI solutions as possible, Rasser said.

Elevating the JAIC to a direct report of the deputy secretary is an important step in recognizing the offices importance, experts said, especially as tech priorities could change under a new presidential administration.

The JAIC reporting directly to the deputy secretary of defense says that regardless of how that shuffling comes out in the next few months, AI will still be a significant priority and its place on the org chart reflects that, Sheppard said.

The NDAA also would direct the defense secretary to establish a board of advisers for the JAIC on technical issues, ethical challenges and workforce issues related to AI use. The board, appointed by the secretary and made up of industry and academic experts, also would guide long-term AI studies and strategies. It would meet at least once a quarter and submit a report annually summarizing its work.

This has been an important year for the JAIC as it started its first warfighting initiative and pivoted to play a role in the DoDs COVID-19 response. The center also had a change in leadership this year after Marine Corps Lt. Gen. Michael Groen took over from Shanahan.

Meanwhile, the JAIC also rolled out JAIC 2.0, a realignment of its AI programs, called national mission initiatives, to better match warfighting needs and identify challenges in the services where AI can help.

What we want to do is seek out problems, Groen said last month. If in JAIC 1.0, we built technologies and then tried to find a market for them, [then] in JAIC 2.0, were going to be problem-pull. Were going to build the relationships across the department to help us understand where the most compelling problems are so then we can pull our technology development and enablement in that direction.

Read more here:
Congress wants to boost the prominence of Pentagon's AI center - C4ISRNet

Read More..

Trump Signs Executive Order on Artificial Intelligence, How Not to Wreck the FCC, Broadband Performance in Europe – BroadbandBreakfast.com

On Thursday, President Donald Trump signed an executive order aiming to guide how federal agencies adopt artificial intelligence, as part of an ongoing effort to build public trust in government use of AI.

The order includes four important actions by the Trump Administration. The order itself directs federal agencies to be guided by nine principles when designing, developing, and using AI. These principles emphasize that AI use by federal agencies be lawful, purposeful and performance-driven, responsible and traceable, regularly monitored, and transparent.

The order also aims to establish a process for implementing these principles through common policy guidance across agencies, by directing the Office of Management and Budget to create a roadmap by the end of May 2021 for how the government will better support the use of AI.

This roadmap will include a schedule for engaging with the public and timelines for finalizing relevant policy guidance.

Thirdly, the order directs each federal agency to prepare an inventory of AI use cases by the agency, and review and assess these use cases for consistency with the order.

Finally, the executive order directs the General Services Administration to establish an AI track within the Presidential Innovation Fellows program to attract experts from industry and academia to work within agencies to further the design, development, acquisition, and use of AI in government.

This order recognizes the potential for AI to improve government operations, such as by reducing outdated or duplicative regulations, enhancing the security of federal information systems, and streamlining application processes, said Trump in a statement.

It also directs agencies to ensure that the design, development, acquisition, and use of AI is done in a manner that protects privacy, civil rights, civil liberties, and American values.

During Trumps time in the White House, he has issued various initiatives on AI, with the most recent one, excluding the newest executive order, being a guidance on how to regulate AI applications that are produced in the US. Trump also signed a separate executive order almost two years ago, which was created with the intent of fast-tracking the development and regulation of artificial intelligence in the United States.

The upcoming Presidential transition has many broadband industry experts wondering what the shift will mean for telecommunications policy, as a change in administration will bring along with it a change at the FCC, with the agencys majority swinging from Republican to Democratic.

The approaching transition has many telecom enthusiasts, such as Doug Dawson, president of CCG Consulting, airing their regulatory wish lists. Dawson listed what he hopes the public will see out of the new FCC in his most recent POTs and PANs blog post.

Among other recommendations, Dawson urges the new FCC to keep politics out. He references talk of the new Congress refusing to seat a new Chairman and a fifth commissioner in an attempt to thwart any attempt to re-regulate broadband. A partisan FCC with no voting majority is going to accomplish very little and will deadlock on most issues, says Dawson, noting that it would be a disaster for the industry.

He further urges the Biden FCC to say no to big internet service providers. The current FCC approved everything on the big ISPs regulatory wish lists, he writes. The role of a regulator is to strike a balance between the companies it regulates and the public we need to get back to a balance between those two interests.Dawson further urges the incoming FCC to drop 5G rhetoric. The FCC has no business pushing 5G as the solution to everything, writes Dawson. The FCC is supposed to be a neutral regulator and has no business supporting 5G over other technologies. The cellular companies behind 5G are extremely well-funded and we should let 5G play out as the market sees fit.

Finally, Dawson calls for the Biden FCC to bring broadband regulation back, following the Trump FCCs attempt to gut the agencys ability to regulate broadband. The FCC currently cant even scold big ISPs for abusing customers, says Dawson, adding that one of the most important industries in the country needs a cop at the top to protect citizens against monopoly abuses.

American internet users had aspeedy2020.According to research performed by Fair Internet Report, median U.S.internet speeds in 2020 doubled to 33.16Megabytes per second, up from 17.34Mbps in 2019.

Covering the five years of 2016, 2017, 2018, 2019, and 2020, this is the largest speed increaseseenin the U.S., with speeds staying essentially the samebetween2016 and 2017,at8.91Mbps and 9.08Mbps respectively, and 2018 recording a median speed of 12.83Mbps.

Average US broadband speeds overtook western European Union countries like the United Kingdom, France, and Germany for the first time in 5 years, although U.S. speeds still lag behind some of the most covered European nations, including Denmark, Sweden, Switzerland, and the Netherlands.

This years internet speed test data showed an interesting correlation between population and broadband speeds.Achart comparing a countrys population against the median download speed experienced by its users,revealed an emerging pattern. According to FIR, thedataimpliesthat if you live in a country with a small population, you are vastly more likely to experience faster internet speeds.

FIR generated this custom dataset using NDT5 and NDT7 speed test datasets from Measurement Lab covering the years 2016 to 2020.

Read more here:
Trump Signs Executive Order on Artificial Intelligence, How Not to Wreck the FCC, Broadband Performance in Europe - BroadbandBreakfast.com

Read More..

Top 10 Artificial Intelligence Inventions in 2020 – Analytics Insight

The inventions in Artificial Intelligence are thriving the pace of invention despite the existing pandemic.

The year 2020 has surprised humans in many ways. From encountering a pandemic, addressing a global recession, and witnessing the global geopolitical changes, humanity is standing in ambiguous times. However, not everything is uncertain. Throughout the year, emerging technologies such as artificial intelligence, robotics, Internet of Things, and augmented/virtual reality, amongst others have spearheaded innovation with a promising future. These technologies have validated that despite the crisis, technology will transform the world.

Henceforth, Analytics Insight brings you the major inventions of 2020 that has shaped the world.

BrainBox AIis the most revolutionary technology gifted to humanity. It utilizes self-adapting artificial intelligence technology which proactively optimizes the energy consumption of buildings, which are the largest climate change contributors. Its AI engine supports a self-operating building that requires no human intervention. It optimizes the control of heating, ventilation and air-conditioning, with the use of deep learning, cloud-based computing and automation to create maximum impact on energy consumption. By using BrainBox AI, commercial buildings can reduce the total energy costs by 25%, and improves occupant comfort by 60%.

Additionally, keeping in mind about the current crisis, the AI is designed in a manner, where it reduces the carbon footprint by 20-40%.

There are some diseases which have been detrimental to human health, even before coronavirus surfaced the earth. Cancer is listed amongst the most-deadliest disease, impacting human health. So far there have been no specific techniques that can detect cancer in its early stage. But researchers have made an AI system through which the patients can track the symptoms. TrailJectory uses artificial intelligence to empower patients to own their cancer journey and analyze its global patient communitys accumulated data so that cancer patients take informed decisions. It analyzes all relevant treatment options and instantly presents only what is a relevant treatment plan concerning the patients condition.

Children have witnessed countless incidents of social chaos and apathy this year. The changing societal diaspora, increase in the incidents of hatemongering and racism poses a threat to the childrens learning of compassion and empathy. However, robotic advancements have led to the innovation of a tool that helps the children being kind and compassionate.Emboddied Moxieis a robot that allows the children to be more empathic, kind and develop advanced human skills. Moxie can perceive, process, and respond to natural conversation, eye-contact, facial expressions and other behaviour to create a unique and personalized learning experience for the child. It helps to build verbal confidence amongst children and helps in picking the social-emotional concepts, the theory of mind and comprehension with the help of NLP. Tailor-made for the overall development of children, this nascent robotic tool helps in improving the physical health of the children with activities like breathing, and guided meditation to help develop emotion and self-regulation skills.

The uncertain times inflict melancholic feelings and mental distress, which is detrimental for the overall development of an individual. Especially, if this distress seeps through personal relationships it causes chaos. To eliminate the incidents of disruptive relationship,LOVOTis designed to bring emotional peace at home. This emotional robotic model is a model that it senses the mood of an individual and reacts accordingly for elevating the mood. This is a perfect addition for having a peaceful, lovable and homey environment. The technology uses more than 50 sensors to create a behaviour which is very much like a human being.

The importance of getting reliable data is felt in every business across every sector during COVID-19. Owing to the remote working, it has become impossible for organizations to rely on the traditional methods of data mining. Thats whereApache Hadoopcomes to the scene. Commonly termed as Hadoop Ecosystem, Apache Hadoop crunches the data in a manner that allows distributed processing of large data sets across clusters of computers using simple programming models. Designed to scale up from single servers to thousands of machines, it offers local computation and storage. It is designed to detect and handle failures at the application layer, for delivering a highly-available service on top of a cluster of computers, each of which may be prone to failures.

Widely used by the big techs such as Google and Amazon, the NoSQL database is a mechanism through which a variety of models can access and manage the data. This database is designed specifically for managing and monitoring large data volume, low latency, and flexible data models. It is designed for addressing the limitations in data consistency. It is used in applications such as mobile, web, and gaming that require flexible, scalable, high-performance, and highly functional databases to provide great user experiences.

As the name suggests HTC Vive Pro Eye is a virtual reality component tailored for precision eye-tracking, giving users a premium immersive experience. Like any sci-fi movie, this VR component allows eye movements and blinks in virtual avatars. It shows expressive, non-verbal interactions in conferences, chat groups and remote collaboration, thus bringing customized experiences for the user.

Developed by the beauty brand,LOreal Persois a virtual reality tool that provides personalised beauty care for the user. The LOreal Perso app analyses the overall skin condition which gets alluded by human vision. This includes deep wrinkles, fine lines, the appearance of dark circles and pore visibility. It also assesses the factors such as geographic location, climate situation of the user, and environmental conditions which are impacting the human skin. The app also presents the assortment of LOreal products improving self-care.

In the year 2020, most meetings and conferences have shifted to online platforms. But network connectivity is the major limitation with remote working. Henceforth,Meeting Owlis an Internet of Things integrated robotic owl, custom made for working together from different locations. The Meeting Owl is the best tool for remote working set-up. Consisting of a mic, camera and speaker in only one robotic device, the user just needs to connect it with the laptop for a better experience.

The year 2020 has been a year where everyone got an opportunity to stay with their family, and to spend quality time. To enhance this experience, Kuri Mobile Robots is a home robot integrated with IoT sensors that interact with the user and the family members, and capture moments of every day with sensor-enabled cameras.

Originally posted here:
Top 10 Artificial Intelligence Inventions in 2020 - Analytics Insight

Read More..

Advanced Artificial Intelligence Adopters Attributed 12% Points of Revenue Gain Directly to AI Integrations: Report – Crowdfund Insider

The COVID-19 pandemic has led to businesses or companies adopting artificial intelligence (AI) based solutions. Firms operating in nearly every sector have integrated AI and automation software according to a new survey of professionals working in the financial services sector.

Nearly 66% or two-thirds of financial services professionals surveyed revealed that the Coronavirus crisis had caused their business or organization to look into potential uses of AI and automation technology. As first reported by the American Banker, almost 75% or three-quarters of respondents considered AI to be very important or critical to their gradual recovery from the pandemic.

A separate survey from IBM found that over 85% of advanced adopters have been able to cut down operating costs with AI. Senior management professionals reported operating cost savings from AI across many different areas. Approximately 47% have seen cost improvement in process efficiency, 41% in supply chain and production, and 39% in headcount efficiency improvements.

The extensive report from IBM further noted:

Advanced AI adopters attribute 10-12% points of revenue gains (or erosion offset) to AI. Companies report 6.3% points of direct revenue gains directly attributable to AI on average, which offset revenue erosion for those hit hard by the pandemic or helped capitalize on new growth opportunities for those seeing greater demand.

The report added:

Virtual agent technology alone accounts for significant financial and operational benefits. 99% of companies report reduction in cost per contact from using virtual agent technologyestimated at $5.50 cost savings per contained conversation. This corresponds with a 12 percentage point rise in customer satisfaction and a 9 percentage point rise in agent satisfaction, along with 3% revenue gain.

The report also mentioned that a core set of technologies with AI at its center have proven especially vital during the Coronavirus crisis. As confirmed in other recent studies, digital transformation is accelerating: approximately 60% of C-suite executives say theyre accelerating digital transformation during the COVID-19 health crisis, and fully two-thirds say the pandemic has allowed them to advance specific transformation initiatives that were previously encountering organizational resistance.

The report revealed:

Tech-savvy companies are outperforming: Organizations that had already embedded technology deeply and meaningfully into business operations and processes have consistently outperformed peers in revenue growth by 6 percentage points, on average, during the pandemic.

Businesses in almost every industry leverage AI or machine learning to streamline operations. As reported recently, an engineer working at Coinbase explains how the digital asset exchange leverages machine learning to maximize business impact.

Here is the original post:
Advanced Artificial Intelligence Adopters Attributed 12% Points of Revenue Gain Directly to AI Integrations: Report - Crowdfund Insider

Read More..

The Top 19 Internet of Things(IoT) Security Solutions – Security Boulevard

For years, smartphones have been the epicenter of innovative technology. Is the torch being passed to IoT? If you ask consumers and enterprises alike, the answer is yes.

You can expect there to be up to 5.8 billion enterprise and automotive IoT devices in use by the end of 2020, with the adoption of utility IoT devices increasing 17% over the previous year. By 2022, the North American IoT market is expected to reach $500 billion. As businesses and their clients get comfortable with the Internet of Things, were likely to see the same explosion of new and ingenious IoT products as we did with smartphones.

However, along with the benefits and value IoT devices provide, they are also uniquely vulnerable to cyberattacks. Fraud and cybercrime is on the rise in 2020, according to security researchers and as many as 57% of IoT devices may be vulnerable to medium or high severity attacks.

For consumers, this combination may mean loss of privacy, as in the case of an incident in Singapore where hackers stole private home security camera footage and distributed it online. For enterprises and corporations, a compromised mission-critical IoT device can have serious and even life-threatening consequences.

What is it that makes IoT devices more vulnerable and attractive to attackers than servers, routers, or other types of endpoint devices? One major factor is the lack of standardization and regulation around IoT security. Moreover (and unlike smartphones), many IoT devices lack the hardware capacity needed to support robust cybersecurity applications. Human error also contributes, amplified by the relative unfamiliarity of IoT technology on behalf of many end-users and operators.

The other consideration is that IoT devices connected to sensitive or critical operations (and confidential data) in a corporate, industrial, or security context can represent extremely high-value targets for some bad actors. Attacks by sophisticated and professional cybercriminals bear the potential for highly costly or dangerous consequences.

In addition to the predictable loss of profits and privacy, breaches to IoT devices may land businesses in hot legal waters. California enacted legislation in 2019 that requires reasonable security features to be installed in all IoT devices, and the UK has proposed a similar law.

Unique vulnerabilities require different solutions. When it comes to connected Internet of Things devices, protection requires a combination of detection, prevention and mitigation solutions across multiple layers.

Weve chosen the best providers for IoT network and device security for 2021 to help you build your IoT device security tech stack.

Offices, data centers, and other facilities outfitted with IoT networks can secure their devices against hostile traffic and attempted breaches with Palo Alto Networks IoT security solution. It dubbs itself a turn-key package that includes both hardware-based and virtual firewalls, device identification tools, and other tools designed to provide visibility and protection for unmanaged IoT devices.

FirstPoint is uniquely focused on protecting cellular IoT devices from attacks that originate from within the cellular network or that communicate through the cellular network, which it does through a device-agnostic agentless security solution. This helps mobile network operators secure vulnerable cellular-connected devices from the unique threats faced by IoT devices on cellular networks including private LTE & 5G networks.

Trustwave offers managed IoT security that analyzes your network for weak points in connected devices and the servers, APIs, and cloud services that interact with them. This enables network administrators to deploy quick fixes and prepare for potential attacks ahead of time, instead of finding out about vulnerabilities only after a successful breach occurs.

Offering device-based protection for industrial IoT deployments, NanoLock aims to block malware, ransomware, denial-of-service attacks, and other cyber threats. Designed to protect devices linked to critical infrastructure, including water and energy utilities, this hardware-level solution acts as a Flash memory gatekeeper to prevent malicious access to critical code.

Critical assets in industries like healthcare, utilities, and manufacturing are the focus of Armiss agentless device security solution. By starting with a complete inventory of connected assets, Armis can then scan all data traffic to and from these devices. Armis processes all this traffic to subsequently identify vulnerabilities, execute automated security policies, and provide continuous monitoring on both managed and unmanaged devices.

This security solution offers cellular and RF threat remediation by detecting, analyzing, and classifying the devices connected to your network and giving you the tools to take the actions needed to protect yourself. Well-suited to providing device security within a specific and contained location, Bastille makes it easy to enforce no-phone policies and other physical security measures.

The physical intersections between IoT devices and human operators are frequent sources of accidental malware infections and other security breaches. Broadcom addresses this with solutions designed to scan and protect USB connections and other vulnerable interfaces. Being on both state-of-the-art deployments as well as older, legacy systems pose unique challenges.

Protected Sessions provides data security for endpoints and gateways across any type of network through a library installed locally on the IoT device. It integrates with all major IoT cloud providers and provides industry-standard encryption to secure your data in transit across private and public networks.

Trusted Objects creates unique digital identities for devices connected to your IoT cloud network. This allows you to protect those devices against both physical and cyberattacks with a combination of proven technologies and advanced security features.

Overwatch gives you active threat mitigation in real-time for all devices connected to your IoT network. Created to be scalable for use with automotive and consumer devices as well as utilities and industrial IoT, this solution uses an algorithmically-based threat assessment tool to provide immediate proactive warnings about potential dangers. With an agent installed on both the IoT device and gateway servers, Overwatch offers an API to connect to threat assessment and mitigation tools.

For airports, banks, corporate campuses, and other facilities with IoT networks that are critical to their operations, SecuriThings Horizon solution lays the groundwork of essential protection against malware, botnets, brute force attacks, internal sabotage, and other threats. Horizon offers endpoint risk detection, predictive monitoring and maintenance, as well as automated mitigation to minimize disruptions and costly downtime. Horizon pulls data from each edge device through software agents or agentless modules then scans the incoming and outgoing data to detect abnormal behaviors.

Designed to improve reliability and reduce the operational costs of your IoT system, SensorHounds suite of products offers automated monitoring for IoT networks and client devices. It traces software failures and intrusions, monitors cloud deployments, and provides forensic diagnostics for every node on your network.

Hospitals and other facilities in need of strong, easy-to-implement IoT network security have a flexible and user-friendly solution in Tempereds Airwall, which can deploy across physical, remote, cloud, or virtual networks. With trusted identities and permission controls, you can enforce security policies that effectively prevent unauthorized access attempts.

Vdoo specializes in integrated device security customized to your industry, whether thats industrial, medical, MNO, utilities, or corporate. Vdoo automatically generates an embedded runtime agent to deploy onto the IoT device that provides threat mitigation capabilities without requiring any modification of existing device code. By proactively detecting vulnerabilities and automating your security processes, Vdoo reduces the chances of hackers and bots causing harm to your operations.

The Atonomi Networks IoT security solution is blockchain-based. It works by providing immutable identities for network assets and tracking the reputations of connected devices, ensuring safe and secure transactions across platforms. Atonomi can be used for small-scale applications such as smart cars or homes as well as larger ones like healthcare systems and industrial facilities.

Designed for use in hospitals, CyberMDX protects healthcare IoT assets with inventory management, vulnerability research, and operational analytics that proactively identify threats and anomalies. With healthcare establishments under relentless threat from ransomware attacks, solutions like this can prevent bad actors from gaining a foothold through IoT endpoint devices.

Another solution created with healthcare facilities in mind is Cynerio. It protects IoT networks by providing inventory and network visualization tools as well as risk detection that takes into account the specific regulations and architecture of healthcare systems. This flexible solution can protect patient information and other sensitive data against persistent attackers.

Because of their reliance on sophisticated technology and the uniquely sensitive data they deal with, healthcare IoT networks have a wealth of options when it comes to security solutions. Medigate offers network-level monitoring and threat response built to combat todays newest and most sophisticated threats.

A scalable, embedded solution that prevents attacks in real-time, Sternum grants protection down the source code level to stop cyberattacks aimed at enterprises and manufacturers. This embedded protection has a high rate of success at stopping attacks and allows for seamless visualization and device tracking.

Securing devices across an IoT network may present new challenges and complications, even for seasoned cybersecurity teams. Because of the unique vulnerabilities of IoT devices and the devastating consequences that can follow a breach, these challenges must be met. With a comprehensive strategy backed up by the right tools, you can build an effective defense against the threats that a mission-critical IoT system needs to be able to withstand.

The post The Top 19 Internet of Things
(IoT) Security Solutions appeared first on FirstPoint.

Recent Articles By Author

*** This is a Security Bloggers Network syndicated blog from Blog FirstPoint authored by Noa Ouziel. Read the original post at: http://www.firstpoint-mg.com/blog/top-19-iot-security-solutions/

Visit link:
The Top 19 Internet of Things(IoT) Security Solutions - Security Boulevard

Read More..

Minim to keep its name in merger with Boston tech company – The Union Leader

MANCHESTER Minim, an internet security platform co-founded by former Dyn CEO Jeremy Hitchcock, will keep its name after officially merging with a Boston hardware company.

The merger with Zoom Telephonics, which makes cable modems and other internet access products under the Motorola brand, was completed on Dec. 4. The merged company will be headquartered in Manchester but expects to have a nationwide footprint.

Javascript is required for you to be able to read premium content. Please enable it in your browser settings.

kAmpD A2CE @7 E96 C63C2?5:?8[ E96 4@>A2?J H:== 368:? EC25:?8 2D |x}| @? %F6D52J]k^Am

kAm(6 ?66565 E@ 492?86 E96 ?2>6 E@ |:?:> @C E@ BF@E6F?BF@E6 ?@E E92E +@@>[ D2:5 vC2J r9J?@H6E9[ ?6H=J 2AA@:?E65 rt~ @7 E96 4@>3:?65 4@>A2?J[ 2?5 7@C>6C sJ? 6I64FE:G6] +@@>[ 2 G:56@ 4@?76C6?4:?8 2AA=:42E:@? 2?5 6?E:C6=J 5:776C6?E 4@>A2?J[ 92D 364@>6 2 A@AF=2C H2J @7 4@>>F?:42E:?8 7@C >2?J 5FC:?8 E96 A2?56>:4]k^Am

kAm+@@> %6=6A9@?:4D C6A@CE65 ?6E C6G6?F6 @7 S`a >:==:@? 😕 E96 E9:C5 BF2CE6C[ :ED 9:896DE BF2CE6C=J C6G6?F6 E@ 52E6[ C6AC6D6?E:?8 2? ``T :?4C62D6 4@>A2C65 E@ E96 D2>6 BF2CE6C 😕 a_`h 2?5 2 `fT :?4C62D6 7C@> E96 D64@?5 BF2CE6C @7 a_a_[ 244@C5:?8 E@ 7:?2?4:2= 5:D4=@DFC6D]k^Am

kAm%96 8=@32= H:C6=6DD E649?@=@8J >2C<6E :D 6IA64E65 E@ 6I4665 S`c` 3:==:@? 8=@32==J 3J a_ad[ 244@C5:?8 E@ p==:65 |2C<6E #6D62C49[ 2 >2C<6E C6D62C49 2?5 25G:D@CJ 4@>A2?J]k^Am

kAm%96 4@>3:?65 4@>A2?J 3C:?8D 2? :?E68C2E65 92C5H2C6 2?5 D@7EH2C6 D@=FE:@? E@ 9@>6 (:u: ?6EH@C6?E[ r9J?@H6E9 D2:5]k^Am

kAm%6? @C `d J62CD 28@[ >2?J 9@>6D EJA:42==J @?=J 925 A9@?6D 2?5 4@>AFE6CD 9:E4965 FA E@ 9@>6 :?E6C?6E 4@??64E:@?D] }@H 56G:46D 9@@<65 FA :?4=F56 %'D[ 82>:?8 4@?D@=6D[ D64FC:EJ DJDE6>D[ G24FF>D 2?5 6G6? E@@E93CFD96D[ r9J?@H6E9 D2:5]k^Am

kAm%96? J@FG6 8@E J@FC =2AE@A @C 56D@C6 H@C< @? E9@D6 7C@> 9@>6 E92? 6G6C 367@C6[ 96 D2:5] xE 😀 23D@=FE6=J ECF6 E92E E96 9@>6 😀 364@>:?8 >@C6 4@>A=6I 😕 E6C>D @7 H92E 😀 4@??64E65 E@ J@FC ?6EH@C< 2?5 >@C6 :>A@CE2?E E@ J@FC =:76 2?5 62C?:?8 2 =:G:?8]k^Am

kAm|:?:> H2D 7@F?565 😕 a_`g] %96 :562 42>6 23@FE 27E6C 2 3@E?6E 2EE24< E92E :>A24E65 sJ?D :?E6C?6E 😕 a_`e] sJ? H2D D@=5 E@ ~C24=6 😕 =2E6 a_`e 7@C 2 C6A@CE65 Se__ >:==:@?]k^Am

kAm!6@A=6D 9@>6D ?665 E@ 36 D276[ E96J ?665 E@ 36 D64FC6[ r9J?@H6E9 D2:5] w2G:?8 D64FC6 (:u: 2?5 2 D64FC6 82E6H2J @C 423=6 >@56> 😀 ;FDE 2D :>A@CE2?E 2D 92G:?8 2 =@4< @? J@FC 5@@C]k^Am

kAm|:?:> D@7EH2C6 😀 56D:8?65 E@ 2==@H A6@A=6 E@ 36EE6C >2?286 9@>6 ?6EH@C

kAmq67@C6 E96 >6C86C[ E96 EH@ 4@>A2?:6D A2CE?6C65 E@86E96C E@ =2F?49 E96 |@E@C@=2 |wf_aa >6D9 (:u: DJDE6> E9:D BF2CE6C[ H9:49 😀 D@=5 3J C6E2:=6CD DF49 2D p>2K@? 2?5 q6DE qFJ] %96 >@3:=6 2AA 😀 42==65 |@E@|2?286 A@H6C65 3J |:?:>]k^Am

kAm%96 56>2?5 😀 FA cdT 7@C :ED AC@5F4ED 😕 C6E2:=6C :?G6?E@CJ C6BF6DED[ 244@C5:?8 E@ E96 4@>A2?J]k^Am

kAm%96 4@>A2?J H@C@C6 E92? a >:==:@? DF3D4C:36CD[ 244@C5:?8 E@ E96 4@>A2?J]k^Am

kAm|:<6 $<6=E@?[ AC6D:56?E 2?5 rt~ @7 E96 vC62E6C |2?496DE6C r92>36C[ D2:5 E96 4@>A2?JD DF446DD 😀 2 36?67:E E@ |2?496DE6C]k^Am

kAmxE 😀 2? :?5:42E@C E92E H6 4@?E:?F6 E@ 92G6 2 DEC@?8[ 6>6C8:?8 E649 D64E@C 😕 @FC 4@>>F?:EJ E92E x E9:?< :E :D 8@:?8 E@ 4@?E:?F6 DA2H?:?8 6?EC6AC6?6FCD9:A[ C64CF:E:?8 ?6H E2=6?E 2?5 DEC6?8E96?:?8 @FC H@C<7@C46[ 96 D2:5] xE :D 2 A@D:E:G6 :?5:42E@C E92E x E9:?< H:== 4C62E6 2 =@E @7 G2=F6 7@C J62CD E@ 4@>6]k^Am

kAm%96 4@>A2?J >6C865 5FC:?8 2 E:>6 H96? C6>@E6 H@C<:?8 :D @?=J 6IA64E65 E@ 8C@H[ $<6=E@? D2:5]k^Am

kAm|:?:> H:== 6>A=@J 23@FE f_ 7F==E:>6 6>A=@J66D] %96 4@>A2?J 😀 2=H2JD =@@<:?8 E@ 9:C6 H@C<6CD :? E96 vC2?:E6 $E2E6]k^Am

kAm(6 H:== 2=H2JD 92G6 2 9625BF2CE6CD 2?5 9F3 😕 E96 ?@CE962DE 2?5 😕 |2?496DE6C] (6 2C6 8@:?8 E@ 36 2 8=@32= 4@>A2?J[ r9J?@H6E9 D2:5] (6 2C6 6I4:E65 E@ 92G6 2 8=@32= H@C<7@C46 E92E 42? D@=G6 E96 AC@3=6> @7 9@>6 (:u: 7@C 4@?DF>6CD 2C@F?5 E96 H@C=5]k^Am

kAmw:E494@4< H:== D6CG6 2D |:?:>D 6I64FE:G6 492:CA6CD@?] %96 4@>A2?J 2=D@ 2??@F?465 E96 2AA@:?E>6?E @7 7:G6 ?6H 3@2C5 >6>36CD]k^Am

kAm|F49 @7 E96 E62> 😀 7C@> sJ?]k^Am

kAmx E9:?< H6 D2H H:E9 sJ? E96 :>A24E E92E :E 925 @? C6D92A:?8 |2?496DE6C 2?5 E@ 92G6 E92E D2>6 E62> 4@>:?8 E@86E96C H:E9 2?@E96C 4@>A2?J =:<6 |:?:> 😀 C62==J 6I4:E:?8[ $<6=E@? D2:5] (96E96C D@>6 @7 E96:C E2=6?E 😀 32D65 96C6 @C 2== 24C@DD E96 DE2E6 @C @E96C A2CED @7 E96 4@F?ECJ[ :E 😀 8@:?8 E@ AFE |2?496DE6C @? E96 >2A]k^Am

kAmr9J?@H6E9 28C665]k^Am

kAmxE 😀 4@@= E@ D66 E96 :>A24E @7 E92E 4@>A2?J =:G6 @? 6G6? E9@F89 :ED ?2>6 😀 ?@ =@?86C @? E96 >:== 3F:=5:?8[ 96 D2:5]k^Am

Follow this link:
Minim to keep its name in merger with Boston tech company - The Union Leader

Read More..