No Need to Have a 'FOBO' for AI
It is a well- known fact that before AI takes your job, someone using AI will
take it. To stay relevant in the job market, it is then absolutely essential to
adopt AI and automation tools to enhance one's productivity to ensure that his
or her job is not rendered obsolete. Here are some strategies, which will help
one stay ahead of the curve and be able to effectively compete and thrive in the
fast paced and dynamic world of employment. ... Being Human: Human beings have
evolved over centuries of evolution to become a superior race and embracing
human emotions like empathy, gratitude, compassion, zeal to strive for the
betterment of our fellow human beings will always keep us ahead of the game.
This is what distinguishes us from machines. Interdisciplinary skills: Consider
developing skills across multiple disciplines and combining them will make one
more versatile and valuable to the employers. Problem Solving: It cannot be
understated more, that problem solving and our ability to think critically to
solve the complex problems around us will make us stay ahead of the
machines.
Driving Digital Transformation Through Model-Based Systems Engineering
Digital engineering is revolutionizing important areas such as the health care
industry. From sophisticated imaging devices and robotic surgical systems to
telemedicine platforms that connect doctors and patients across vast distances,
each of these systems depends on the integration of numerous complex components,
and each must operate seamlessly to ensure optimal performance. A key approach
that relates systems engineering to digital transformation and digital
engineering is model-based systems engineering (MBSE). Whereas traditional
systems engineering relies on document-based approaches to support systems
engineering activities (e.g., text-based requirements and design documents),
MBSE does so by relying on digital system models instead. In essence, MBSE
supports traditional systems engineering. It doesn’t replace it; rather, it
offers an approach that aims to make systems engineering more
efficient.
Optimize Your Observability Spending in 5 Steps
You can’t use an observability agent on its own to put these steps into
practice. Agents are simply neutral forwarders, sending out information to be
processed downstream in the observability analysis tools. You could implement
some of these steps using open source tools and in-house development, but this
comes with increased operational cost and complexity, requiring your team to
build expertise that is not core to your business. Overall, the main challenge
with putting these steps into practice is that the available tools are either
like agents, which simply send information, or like observability tools, which
simply receive it. You need to be able to process telemetry data in stream, to
be able to transform and route it as it passes from agent to tool, to optimize
and shape it for your downstream requirements. Our Mezmo Telemetry Pipelines
were conceived with the goal of helping organizations get better control of
their data in stream. This approach enables you to control the flow between your
data sources and your observability tools, and manage in detail the optimization
of your data before it arrives downstream.
Why AI Regulations Are Needed to Check Risk and Misuse
Adopting a new technology poses certain risks, especially if it has not been
previously deployed. That calls for certain risk mitigation strategies, such as
testing, sandboxing, proof of concepts, and taking smaller steps such as minimum
viable product, before complete adoption. Mahadevan believes there will always
be risks and that we "amplify the risk" to a large extent today. "Companies need
to follow a framework and put together a risk mitigation panel, rather than
focus on the risk itself. I insist that AI and the risk mitigation should become
a part of the blueprint. And this is not a job for a CIO alone, it is a job for
a CHRO, the risk manager, and for operations," Mahadevan said. Deep fake and the
violation of one's privacy is a hotly debated topic in the industry today.
Thomas said deep fake will lead to many scams, causing victims to lose a lot of
money. It is also a violation of one's privacy, and poses a substantial risk at
an individual level. Deep fake technology uses a form of artificial intelligence
called deep learning to create convincing videos, photo or audio clips of a
subject, which are used for misinformation campaigns or to defraud/deceive
relatives or friends.
New kind of quantum computer made using high-resolution microscope
It is unlikely to compete any time soon with the leading approaches to quantum
computing, including those adopted by Google and IBM, as well as by many
start-up companies. But the tactic could be used to study quantum properties
in a variety of other chemical elements or even molecules, say the researchers
who developed it. At some level, everything in nature is quantum and can, in
principle, perform quantum computations. The hard part is to isolate quantum
states called qubits — the quantum equivalent of the memory bits in a
classical computer — from environmental disturbances, and to control them
finely enough for such calculations to be achieved. Andreas Heinrich at the
Institute for Basic Science in Seoul and his collaborators worked with
nature’s ‘original’ qubit — the spin of the electron. Electrons act like tiny
compass needles, and measuring the direction of their spin can yield only two
possible values, ‘up’ or ‘down’, which correspond to the ‘0’ and ‘1’ of a
classical bit.
Net-zero carbon data centers: Expanding capacity amid evolving policy and regulation
The sting in the tail for data center developers, is that emissions
associated with the IT process load are now to be included in the
calculation. Given that the annual energy consumption of even a modestly
sized facility could run to hundreds of thousands of megawatt hours (MWh),
this represents a very substantial cost for developers – unless they can
drive their on-site emissions down below the 35 percent threshold. Outside
of London, there is currently no policy for carbon offsetting, but it seems
likely that other local authorities will follow London’s lead and introduce
similar schemes in the future. In some regions, particularly the Nordic’s,
planning policy has been introduced requiring new data centers to provide
waste heat to local district heating infrastructure, or to be ‘heat network
ready’ for connection to future schemes. Whilst a policy of promoting heat
reuse may not lead to a direct reduction in data center emissions, it is
seen as an important step towards decarbonizing the wider community, by
displacing other, more carbon intensive, sources of heat.
6 Key Personality Traits for Disruptive Innovation Leaders
“Disruptive innovators require a mindset focused on leapfrogging – creating
or doing something radically new or different that produces a significant
leap forward,” said Hightech Partners. “Disruptive leaders ensure that
everything they do adds value to the market.” ... For companies, it is
important that leaders understand how to continually push the limits of
their teams, organizations, and partners. Some believe that disruptive
leaders should also push boundaries. “Leaders who travel a lot, surrounding
themselves with diverse people and entrepreneurs, are able to continually
expand their mindset and creative problem solving abilities,” said the
report. ... Disruptive leaders manage incredible levels of uncertainty.
“Adaptive planning is an approach where actions lead to results and leaders
take the opportunity to reflect on and learn from these actions and
results,” said Hightech Partners. “Then, they can modify their assumptions
and approaches accordingly.” ... The word “normal” doesn’t exist in a
disruptive leader’s vocabulary, says the report. “Once something has become
normal, it’s probably obsolete,” said Hightech Partners.
Enterprise architecture creating sustainable business value
“If you imagine a company with a C-suite in the penthouse and the IT
department maybe in the basement, and then the business department somewhere
in between, enterprise architects are able to ride the elevator and they
have the capability to exit the elevator on every floor. And they are also
able to move around on that floor in a very free manner. “They do have their
own office somewhere. Mostly it's on the floor where the IT department is,
but they're barely in their office because they're constantly sitting in
other people's offices to communicate, collaborate, bring together and
enable people – riding the elevator up and down. ... “Business fluency and
an understanding of how a business works, as well as the ability to have a
holistic perspective on a complex problem, is crucial. It is important to
not only look at one aspect, but also consider how that aspect might
influence another aspect. That is also something that enterprise architects
are trained for like nobody else. Therefore, I believe that the success of
holistic sustainability will be a discipline of enterprise architecture.”
Achieving Scalable, Agile, and Comprehensive Data Management and Governance
“Data governance in general is fairly uneven,” he explained. “In terms of
protecting sensitive data, there’s been improvement, though. Organizations
have been more willing to shut down risky programs that may expose sensitive
data even at the expense of losing competitive advantage rather than run
afoul of regulations.” As a sign of this improvement, he added, 73% of
survey respondents said they were at least somewhat successful at meeting
their regulatory and compliance objectives. Another key concern Stodder
discussed was the highly distributed nature of today’s data environment.
“Creating data silos goes hand in hand with data democratization,” he said.
“Forty-one percent of our survey respondents said managing data silos was
one of their top three challenges.” To address this, he said, many are
turning to solutions such as data virtualization, data fabrics, or data
meshes. He also added that the research showed roughly 30% as already using
data virtualization and about the same number planning to.
Global Cyberespionage Operations Surging, Microsoft Warns
Microsoft reports that when it comes to cyber operations and intelligence
gathering, nominal allies target each other. Despite last month's meeting
between Russian President Vladimir Putin and North Korean hereditary
dictator Kim Jong Un, Pyongyang continues to run Moscow-focused espionage
operations, especially focused on "nuclear energy, defense and government
policy intelligence collection." Alongside the risk posed by nation-state
groups, the threat posed by criminals also continues to intensify.
"Ransomware‐as‐ a-service and phishing-as-a-service are key threats to
businesses, and cybercriminals have conducted business email compromise and
other cybercrimes, largely undeterred by the increasing commitment of global
law enforcement resources," Burt said. Microsoft said that from September
2022 through July, it saw the number of human-operated or "hands on
keyboard" ransomware attacks double compared to less sophisticated, fully
automated attacks. Since last November, it said, it saw the number of
security incidents that appeared to lead to data exfiltration double.
Quote for the day:
''Success is a state of mind. If you
want success start thinking of yourself as a sucess." --
Joyce Brothers
No comments:
Post a Comment