September 12, 2015

Baidu’s Duer Joins the Virtual Assistant Party

Duer’s success will depend on how well it can parse naturally spoken language. This is notoriously difficult, although researchers have been making significant progress in recent years in both speech recognition and, to a lesser degree, natural language processing thanks to a powerful machine-learning technique known as deep learning. Companies such as Facebook see natural language as a key challenge for mining information and communicating with users. According to Baidu, Duer will mine meaning from written information on the Web. Baidu will collect information about a restaurant, for example, and Duer will infer whether it is pet-friendly or has outdoor seating.


Aggressive Android ransomware spreading in the USA

After a successful installation, the malware tries to obtain Device Administrator privileges. This trick is being used by Android malware authors more and more, as it makes it more difficult to remove the infection. Earlier versions of this Android/Locker family do this in just the same way as all other Android Trojans – they rely on the user willingly activating the elevated privileges. In the latest versions, however, the Trojan obtains Device Administrator rights much more covertly. The activation window is overlaid with the Trojan’s malicious window pretending to be an “Update patch installation”. As the victims click through this innocuous-looking installation they also unknowingly activate the Device Administrator privileges in the hidden underlying window.


Think your meeting's important? 25 years ago, this one spawned Wi-Fi

Most important, for anyone today who wants to buy an inexpensive Wi-Fi router and connect almost any portable device to it, NCR decided from the beginning that its WLAN technology should become an industry standard. The group that would develop that standard, called IEEE 802.11, first met 25 years ago Thursday.  ... Out of that initial impulse grew one of the most successful examples of open standards in action. Wi-Fi, which got its name from the industry group that certifies 802.11 products for interoperability, has gone into more than 10 billion devices and is used in home and business networks and public hotspots around the world. Even many mobile operators with their own licensed frequencies rely on Wi-Fi to better serve subscribers.


Peter Thiel Explains Biotech Investing Rationale: Get Rid of Randomness

The question is, can you change those probabilities into different numbers? The reason we invested in Stemcentrx at a valuation that would have been higher than many other biotechs we looked at is that we felt the whole company was designed to get these probabilities as close to one as possible at every step, to get rid of as much of this randomness or contingency as possible. That is something that we found deeply reassuring. One of the very unusual things they do is graft human cancer into the mice. It’s a somewhat more expensive way to do this than studying cancer in cell culture. It’s a somewhat harder structure to build. But drugs tested this way are much more likely to work in humans.


Machine Learning and Its Impact on Cyber-Security

First, the collection and storage of large volumes of data has been steadily adopted as a best practice, particularly in financial services and defense industries. However, a typical challenge faced by these organizations is the approach and tooling required to sort, mine and interpret the insights and patterns from the aggregated data. Secondly, the talent pool to deal with these tasks has been continually on the decline. This leaves opportunities for things to fall through the proverbial crack and cause security incidents to increase. These two points are illustrations of why machine learning can improve the security posture of an organization.


How to Balance the Five Analytic Dimensions

So many data scientists select an analytic technique in hopes of achieving a magical solution, but in the end, the solution simply may not even be possible due to other limiting factors. It is important for organizations working with analytic capabilities to understand the various constraints of implementation most real-world applications will encounter. When developing a solution one has to consider: data complexity, speed, analytic complexity, accuracy & precision, and data size. Data Scientists, nor the organizations they work for, will be able to be the best in each category simultaneously; however, it will prove necessary to understand the trade-offs of each.


OpenText Delivers Big Data Analytics in the OpenText Cloud

OpenText Big Data Analytics is a complete advanced analytics solution, combining advanced analytics software and maintenance with professional and learning services to accelerate big data initiatives. The solution is available as a managed cloud service to offer users complete management within the OpenText cloud. With this new Analytics-as-a-Service offering, the power of big data analytics is now accessible to business users and analysts in marketing, financial, and operational functions, driving a better understanding of customers, markets and operations to deliver more targeted campaigns, create more relevant products and offers and or discover opportunities for performance improvements.


Meeting Developer Demands with WebRTC and CloudRTC Platforms

Developers are quickly adopting WebRTC and cloud communications platforms as vendors bringing to market new offerings with a variety of tools and features. The primary focus of cloud communications platforms is to enable developers to integrate communication capabilities such as voice, messaging, and video chat into their applications using REST APIs and SDK’s. By providing access to communications services through the use of simple web based technologies, cloud communications platforms are abstracting away the complexity of telecommunications infrastructure and making communications much more flexible and extensible. These platforms provide a much larger and more creative population of developer’s access to interconnectivity technology, setting the foundation for an ecosystem that will redefine how we think about communications.


Do Containers Change Enterprise IT?

A highly distributed cloud-native application has built into it business continuity capability, as such applications are designed to be resilient within themselves. If one part dies, another piece takes over automatically. Where these components live is not much of an issue. However, the data created and used by the containers needs to be stored not in each container, but within some centralized and distributed database to ensure the data is available at all times to all components. The containers themselves become stateless, yet the application may be stateful within various layers of the application. For that, we need to store data somewhere outside the container.


How Data Center Providers Have Become Cloud Leaders

The cloud obviously lives in the data center. In today’s ever-changing IT environment, more emphasis is being placed on the data center. In fact, almost all new technologies being deployed today require a place to reside. This location is the data center. It’s no wonder that the modern data center is being referred to as the data center of everything. In using advanced data center technologies your organizations would literally have a secure slice of the cloud to manage and control. Although the workload is considered to be cloud-based, there is still a very real physical point to all of that information. In creating a data center platform ready for the cloud, administrators must take a few important details into consideration.



Quote for the day:

"Truly successful decision-making relies on a balance between deliberate and instinctive thinking." -- Malcolm

No comments:

Post a Comment