June
Machine learning has the potential to automate many more business processes than are currently automated in enterprise software, based on all the previous generations of software development methods.
June
AI cybersecurity tools are beginning to focus on a rising number of phishing attacks, which involve fraudulent messages aimed at getting the victim to reveal sensitive information or to unwittingly deploy malicious software.
June
Ransomware attacks are ramping up. A former US Attorney suggests that a “surge” in cybersecurity protection is needed to counter the increasing number of attacks from cyber criminals. Other experts say cybersecurity best practices should be applied to plug holes.
June
Two Dartmouth College researchers studied the countries of origin for the Fields Medal, considered the Nobel Prize in mathematics, and found the recipients tend to come from the same group of countries since it was first awarded in 1936.
June
Assuring that the huge volumes of data on which many AI applications rely is not biased and complies with restrictive data privacy regulations is a challenge that a new industry is positioning to address: synthetic data production.
June
AI is not tossing out all the rules and methods of software development learned over the last 50 years, just many of them. Rule-based AI systems borrow from rule-based expert system development, which tapped the knowledge of human experts to solve complex problems by reasoning through bodies of knowledge. Expert systems emerged in the 1970s and 1980s.