Artificial Intelligence

ScadaICSSchneider

Schneider Electric and Microsoft: Water efficiency, industrial safety, energy access, and more

Credit to Author: Jean-Pascal Tricoire| Date: Mon, 10 Jul 2017 13:12:37 +0000

Microsoft’s annual partnership event is inspiring to its 16,000 attendees from 130 countries, showcasing where we’ve been together and, more important, where we’re going. In recent years, Schneider Electric has… Read more »

The post Schneider Electric and Microsoft: Water efficiency, industrial safety, energy access, and more appeared first on Schneider Electric Blog.

Read More
ScadaICSSchneider

To Thrive in the IoT Era, Colocation Providers Must Drink Their Share of IoT Champagne

Credit to Author: Mark Bidinger| Date: Tue, 27 Jun 2017 15:00:27 +0000

IT companies for years have talked – or even bragged – about how they “eat their own dog food,” meaning they use the products they make. Personally I never liked… Read more »

The post To Thrive in the IoT Era, Colocation Providers Must Drink Their Share of IoT Champagne appeared first on Schneider Electric Blog.

Read More
ComputerWorldIndependent

CW@50: Vint Cerf on his 'love affair' with tech and what’s coming next

Credit to Author: Sharon Gaudin| Date: Fri, 19 May 2017 03:00:00 -0700

When internet pioneer Vinton Cerf was 10, he was working on advanced math, and by the time he was 17, he was tinkering at programming at UCLA and beginning a lifelong “love affair” with computing.

Today, Cerf, known as the father of the internet, says software bugs are among the biggest dangers to enterprise IT and warns of the mounting challenges the IT community must face in what he calls the “digital dark age.”

Widely recognized for his contributions to technology, Cerf, 73, was awarded the U.S. National Medal of Technology for co-founding and developing the internet. He also was the recipient of the Presidential Medal of Freedom, the A.M. Turing Award and 29 honorary degrees.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

A.I. faces hype, skepticism at RSA cybersecurity show

Credit to Author: Michael Kan| Date: Wed, 15 Feb 2017 17:10:00 -0800

Vendors at this week’s RSA cybersecurity show in San Francisco are pushing artificial intelligence and machine learning as the new way to detect the latest threats, but RSA CTO Zulfikar Ramzan is giving visitors a reality check.

“I think it [the technology] moves the needle,” he said on Wednesday. “The real open question to me is how much has that needle actually moved in practice?”

It’s not as much as vendors claim, Ramzan warned, but for customers it won’t be easy cutting through the hype and marketing. The reality is that a lot of the technology now being pushed isn’t necessarily new.

In particular, he was talking about machine learning, a subfield in A.I. that’s become a popular marketing term in cybersecurity. In practice, it essentially involves building algorithms to spot bad computer behavior from good.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

IBM Watson: Regular A.I. by day, cybercrime fighter by night

Credit to Author: Rebecca Linke| Date: Tue, 14 Feb 2017 04:11:00 -0800

IBM Watson is an artificial intelligence of many talents. 

It can win Jeopardy!, help find treatment for cancer patients — and now it can find cyberthreats. That’s right, Watson is becoming a cybersecurity expert. So how has IBM helped Watson change hats?

In IT Blogwatch, this reminds us of something.

So what is going on? Alison DeNisco has some background:

IBM Watson has a new job: Cybersecurity specialist. At the RSA Conference…IBM announced the availability of Watson for Cyber Security, with the aim of assisting cybersecurity professionals with threat assessment and mitigation…The company said it is the industry’s first augmented intelligence technology with the ability to power cognitive security operations centers (SOCs).

But what need does Watson fill here? Ian Barker has those details:

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

A.I.-based typing biometrics might be authentication's next big thing

Identifying or authenticating people based on how they type is not a new idea, but thanks to advances in artificial intelligence it can now be done with a very high level of accuracy, making it a viable replacement for other forms of biometrics.

Research in the field of keystroke dynamics, also known as keyboard or typing biometrics, spans back over 20 years. The technique has already been used for various applications that need to differentiate among computer users, but its widespread adoption as a method of authentication has been held back by insufficient levels of accuracy.

Keystroke dynamics relies on unique patterns derived from the timing between key presses and releases during a person’s normal keyboard use. The accuracy for matching such typing-based “fingerprints” to individual persons by using traditional statistical analysis and mathematical equations varies around 60 percent to 70 percent, according to Raul Popa, CEO and data scientist at Romanian startup firm TypingDNA.

To read this article in full or to leave a comment, please click here

Read More