Did you know that learning how to use an application is a two-way process? In fact, your applications learn something new about you after every interaction. They take note of your frequently visited sites and other data points to make your tasks easier so you can avoid repetitive work.
As George Box noted several decades ago, “All Models are essentially wrong, but some are useful”. The work of statistical analysis, and its modern day derivatives of Machine Learning and Deep Learning, continue to be bold attempts at capturing what are essentially complex activities into a much simpler set of equations, even if those equations themselves often seem esoteric and complex.
Movies have always created powerful mystique about artificial intelligence. For example, 2001: A Space Odyssey had the computer, Hal 9000, that recognized astronauts, spoke to them, and even locked the door to prevent an astronaut from entering the spacecraft.
What recent tech fads has your SMB dismissed as silly? 3D printing, internet of things…Pokémon GO? Juvenile as they may seem, these trends helped a lot of businesses make money. Navigating them may seem like a lost cause, but with the right know-how, you can earn profits by exploiting current tech trends.
Technological advancements have a tremendous effect on the healthcare industry. Something called machine learning is the first step toward artificial intelligence (AI) and it’s already streamlining service delivery for those in the medical profession.
There is a recurring theme at Black Hat every year: security researchers come together and show the world how to hack into systems and things. This year was no exception.
The sheer size of the cyber-attack surface becomes more daunting by the day. Networks now connect data centers and on-premise hardware to private and public clouds and IoT devices operating at the network edge, exposing more potential entry points and increasing vulnerability.
We are a long way away from the day when all of InfoSec can run autonomously using machine learning (ML). We, humans, are still the most advanced component in the InfoSec chain, and we will be for some time. We have the experience, analytic skills, and collaboration skills that just aren’t there yet with ML. That said, ML is an extremely powerful tool.
Artificial intelligence (AI) or “machine learning” has quickly transformed from science fiction to reality, and is currently on track to become an integral part of the corporate business environment. According to experts, by 2020 85% of all customer interactions with businesses will occur via machine learning programs.
It’s easy to see why Office 365 is an attractive solution for small and medium-sized businesses already familiar with the Office interface. More and more companies are making the move to the cloud, but there are security issues to consider. Identify your company’s sensitive data… Most files housed within your servers contain sensitive commercial and […]
As SD-WAN adoption matures and moves from “peak of inflated expectation” to “slope of enlightenment”, a question that I hear and many technologist ponder over is whether SD-WAN is the new MPLS. If you asked this question to a distinguished engineer they would violently disagree at a technical level comparing the difference from an OSI layer and packet/protocol formats perspective.