Daily Tech Digest - March 29, 2021

Artificial Intelligence: Blazing A Trail For The Future

With AI gaining momentum across multiple industries, its efficient use largely depends on businesses' necessity and opportunity to introduce innovation. When trying to understand whether it's a fit-for-purpose improvement, two criteria matter ― the nature of tasks and the cost of an error. First, automation is not always the best match for tasks that demand compromising, setting priorities or emotion-based decision-making. However, if your company collects, stores and processes big data, AI may become your first choice; handling huge data volumes at a high pace can streamline a business model. Second, human intelligence is the only way out (at least today) when it comes to making strategic choices like planning further guides for business development, as even a single mistake may lead to decreasing revenues or brand image deterioration. ... Data inside of a neural network is divided into three sectors. A training set ― the kit of input images of, for instance, printed circuit boards in which your neural network should identify defects, thus learning. A development set ― a new set for tuning your network depending on how well it performs on this set.

Why certificate automation is no longer just “nice to have”

Manually provisioning or registering a certificate at the right time for the right purpose is an incredibly time-intensive task. Merely deploying an SSL certificate on just one server could take up to 2 hours! And that’s just the beginning – subtasks such as documenting each certificate’s location and purpose, configuring certificates according to a myriad of endpoint devices and varying operating systems, and then confirming that each performs correctly adds to the required time and effort. Today’s enterprises need to be quick-moving and agile to keep up with constant flux and rapid change. Beyond time saved, automated deployment means reduced human-error and increased reliability and consistency. ... Certificates include the requirements and policies that enterprises use to define trust within their organization, extending the security of using only highly trusted key architectures. To ensure a certificate is always in its best possible state, organizations need to be able to quickly and efficiently revoke and replace certificates on demand and without a hefty time-intensive process. Spending 2+ hours per certificate is unreasonable: it needs to happen seamlessly and at scale.

How do I select a bot protection solution for my business?

First, it’s important to understand what bot operators are attempting to accomplish. Are they trying to deplete inventory from your site? Scrape prices to better compete? Test stolen credentials to commit fraud? By understanding the full impact bots have on your business, you can make sure the solution puts an end to your specific problems. For example, many solutions are architected to require multiple requests before detecting a bot – if so, it’s not designed to effectively stop scraping and account takeover attempts that quickly move ‘in and out.’ History has shown that attackers will adapt to your defenses. A successful bot mitigation solution has to be effective immediately, stopping new bots and never seen before attack methods. It must also stand the test of time by stopping bots months and years later. You should ask what steps are being taken towards long-term efficacy, such as deterring reverse engineering and R&D to detect new automated threats. You should seek as little configuration, maintenance and support as possible. Does the solution make your life easier or not?

7 Hiring Mistakes Companies Make While Recruiting Data Scientists

Most companies like to call a range of job roles data scientists when in reality, it could be machine learning engineer, big data developer, business intelligence analyst, data engineer, and so on. Recruiting for data scientists’ role but assigning tasks that do not sync with expectations is a big turn-off for candidates, which may lead to them quitting the job. Companies often put them in roles where, for example, only a data analyst is required. It quickly demotivates the data scientist and erodes their skill sets. The companies should be transparent on roles and responsibilities and the kind of project engagements the candidates will have. Setting the right expectation is crucial. Data science is quite popular, and many companies tend to create data science roles without knowing how data science can help the organisation. In such companies, the data scientists will have no clue as to what they are expected to do because the companies have not defined the roles in the first place. The confusion can lead to demotivation and, finally, result in the quitting or firing of the data scientist.

5G: Time to get real about what it will be used for

Private 5G? Has your company set aside funding for spectrum auctions? You’re bidding against big telcos who have spent billions, but think big. Anyway, you could use public spectrum or shared spectrum, right? Of course, you’d still need to build your own network, including towers and radios, wherever you expect to use that spectrum. Maybe the billions for spectrum wasn’t the big financial issue after all. Once you’ve deployed, everything will be great as long as nobody else on the spectrum plays dirty. Sell that to the CFO. There are companies that could justify private 5G, but it’s not a mainstream opportunity. Then there’s IoT. In pure marketing terms, it makes sense to turn devices into cellular customers when you start depleting the market among humans, but do we really think people or companies are going to pay for sensor connection via 5G on a large scale, when we already connect sensors in other ways (like Wi-Fi) for free? How many “things” have we managed to “internet” without 5G, and why wouldn’t those old ways continue to work, without adding 5G “thing-plans” to “family plans?”

Cyber Security Playing Greater Role In Energy Companies’ Digital Transformation

Other industry experts agree on the need for energy companies to improve their cyber-security defenses as they begin to rely more heavily on digital technologies such as AI and cloud computing in their operations. “Industrial cyber has become the new risk frontier and in particular, the energy vertical is the most attacked infrastructure vertical,” said Leo Simonovich, global head of Industrial Cyber and Digital Security at Siemens. “The number of attacks is increasing and the sophistication is increasing.” He said an attack against a piece of critical infrastructure such as a power plant could lead to a temporary loss of power, total shutdown of operations or worse, a public safety incident. Siemens, he said, works with its customers to shore up their cyber defenses, “using next-generation built-for-purpose technologies powered by AI to stay ahead of attackers.” Many energy companies are beginning to adopt AI — which mimics human intelligence by analyzing data in order to make decisions — to stay ahead of the cybercriminals and foreign government-backed hackers.

Quantum brain: The hidden answers to the open questions in AI

At present, Khajetoorians and the team have discovered how to connect these cobalt atoms into tailored networks. This, it is believed, can mimic behavior of a model, which is like a human brain. These efforts are centered around the attempts to make artificial intelligence a possibility at a high level of existence. Thus, the researchers have thought of constructing on black phosphorous a network of cobalt atoms. Using this method, it has been claimed that one could design a material that stores and processes information like that of a human brain. One that adapts itself based on the input. The researchers plan to scale up the entire system and come up with a large network of atoms. They also aim to dive into this quantum material that can be of applicability. Eventually, the AI engineers can construct a real machine from the quantum material. Also, they can build a self-learning computing device that turns out to be more energy efficient and smaller in size than today’s technology. But it requires to understand how quantum brain works. This is still a mystery. However, the destination seems nearby.

Women IT leaders reset the CIO-CISO relationship

The relationship between CIO and CISO can be fraught with friction, but Angelic Gibson and Christina Quaine, CIO and CISO of B2B payment service AvidXchange, represent a new emerging dynamic between IT and security, one that relies on open communication, a commitment to diversity, and a strong bond between IT leadership. It’s little secret that security has become a board-level priority for organizations across all industries, with organizations taking risk-adverse approaches to IT to stay ahead of security, compliance, and risk management issues. As security and its relationship to IT grows more complex, a solid relationship between CIOs and their CISO counterparts will be critical to delivering quality services, products, software, and hardware to customers.[ Looking to get ahead in tech?  “It’s all about building trust with our business partners that we’re providing a service to, with our customers, and with one another,” says Quaine, who heads up the cybersecurity portion of the partnership. “The trust aspect is huge for me — it’s really around doing what you say you’ll do and committing to that. ..."

Industry clouds could be the next big thing

Industry clouds are of interest because of their potential to create value for both customers and public cloud providers. Established companies in industries feeling the sting of competition from cloud-native disrupters are especially good prospects for these types of solutions. For these companies, moving their core business applications to general-purpose public clouds can be challenging because they often rely on homegrown legacy applications or industry-specific software designed for on-premise data centers. These companies face a difficult choice. Simply “lifting and shifting” applications to the cloud could result in sub-optimal performance. Yet rewriting or optimizing them for the cloud would be time consuming and costly. Industry clouds have the potential to accelerate and take the risk out of their cloud migrations. An essential component of an industry cloud is that it must address the specific requirements of the industry it is designed to serve. For example, healthcare providers place a high priority on improving the patient experience but also require high levels of security, data protection, and privacy. These are necessary to demonstrate compliance with Health Insurance Portability and Accountability Act (HIPAA) regulations.

Algorithms will soon be in charge of hiring and firing.

Algorithms can currently be tasked with making or informing decisions that are deemed "high-risk" by the TUC; for example, AI models can be used to determine which employees should be made redundant. Automated absence management systems were also flagged, based on examples of the technology wrongfully concluding that employees were absent from work, which incorrectly triggered performance processes. One of the most compelling examples is that of AI tools being used in the first stages of the hiring process for new jobs, where algorithms can be used to scrape CVs for key information and sometimes undertake background checks to analyze candidate data. In a telling illustration of how things might go wrong, Amazon's attempts to deploy this type of technology were scrapped after it was found that the model discriminated against women's CVs. According to the TUC, if left unchecked AI could, therefore, lead to greater discrimination in high-impact decisions, such as hiring and firing employees. The issue is not UK-specific. Across the Atlantic, Julia Stoyanovich, professor at NYU and founding director of the Center for Responsible AI, has been calling for more stringent oversight of AI models in hiring processes for many years.

Quote for the day:

"Every time you are tempted to react in the same old way, ask if you want to be a prisoner of the past or a pioneer of the future." -- Chopra

No comments:

Post a Comment