February 19, 2024

February 19, 2024

Why artificial general intelligence lies beyond deep learning

Decision-making under deep uncertainty (DMDU) methods such as Robust Decision-Making may provide a conceptual framework to realize AGI reasoning over choices. DMDU methods analyze the vulnerability of potential alternative decisions across various future scenarios without requiring constant retraining on new data. They evaluate decisions by pinpointing critical factors common among those actions that fail to meet predetermined outcome criteria. The goal is to identify decisions that demonstrate robustness — the ability to perform well across diverse futures. While many deep learning approaches prioritize optimized solutions that may fail when faced with unforeseen challenges (such as optimized just-in-time supply systems did in the face of COVID-19), DMDU methods prize robust alternatives that may trade optimality for the ability to achieve acceptable outcomes across many environments. DMDU methods offer a valuable conceptual framework for developing AI that can navigate real-world uncertainties. Developing a fully autonomous vehicle (AV) could demonstrate the application of the proposed methodology. The challenge lies in navigating diverse and unpredictable real-world conditions, thus emulating human decision-making skills while driving.?


Bouncing back from a cyber attack

In the case of a cyber attack, the inconceivable has already happened – all you can do now is bounce back. The big picture issue is that too often IoT (internet of things) networks are filled with bad code, poor data practices, lack of governance, and underinvestment in secure digital infrastructure. Due to the popularity and growth of IoT, manufacturers of IoT devices spring up overnight promoting products that are often constructed using lower-quality components and firmware, which can have sometimes well-known vulnerabilities exposed due to poor design and production practices. These vulnerabilities are then introduced to a customer environment increasing risk and possibly remaining unidentified. So, there’s a lot of work to do, including creating visibility over deep, widely connected networks with a plethora of devices talking to each other. All too often, IT and OT networks run on the same flat network. For these organisations, many are planning segmentation projects, but they are complex and disruptive to implement, so in the meantime companies want to understand what's going on in these environments and minimise disruption in the event of an attack.


Diversity, Equity, and Inclusion for Continuity and Resilience

As continuity professionals, the average age tends to skew older, so how do we continue to bring new people to the fold to ensure they feel like they can learn and be respected in the industry? Students need to be made aware this is an industry they can step into. Unfortunately, many already have experience seeing active shooter drills as the norm. They may have never organized one, but they have participated in many of these drills in school. Why not take advantage of that experience for the students who are interested in this field? Taking their advice could make exercising like active shooter or weather events less traumatic. Listening to their experience – doing it for at least 13 years – gives them a lot of insight from even Millennials who grew up at the forefront of school shootings, but not actively exercising what to do if it happens while in school. These future colleagues’ insights could change how we do specific exercises and events to benefit everyone. Still, there must be openness to new and fresh ideas and treating them with validity instead pushing them off due to their age and experience. Similarly, people with disabilities have always been vocal about their needs.?


AI’s pivotal role in shaping the future of finance in 2024 and beyond

As AI becomes more embedded in the financial fabric, regulators are crafting a nuanced framework to ensure ethical AI use. The Reserve Bank of India (RBI) and the Securities and Exchange Board of India (SEBI) have initiated guidelines for responsible AI adoption, emphasising transparency, accountability, and fairness in algorithmic decision-making processes. While the benefits are palpable, challenges persist. The rapid pace of AI integration demands a strategic approach to ensure a safe, financial eco-system ... The evolving nature of jobs due to AI necessitates a concerted effort towards upskilling the workforce. A McKinsey Global Institute report indicates that approximately 46% of India’s workforce may undergo significant changes in their job profiles due to automation and AI. To address this, collaborative initiatives between the government, educational institutions, and the private sector are imperative to equip the workforce with the requisite skills for the future. ... The Reserve Bank of India (RBI) and the Securities and Exchange Board of India (SEBI) have recognised the need for ethical AI use in the financial sector. Establishing clear guidelines and frameworks for responsible AI governance is crucial.?


How to proactively prevent password-spray attacks on legacy email accounts

Often with an ISP it’s hard to determine the exact location from which a user is logging in. If they access from a cellphone, often that geographic IP address is in a major city many miles away from your location. In that case, you may wish to set up additional infrastructure to relay their access through a tunnel that is better protected and able to be examined. Don’t assume the bad guys will use a malicious IP address to announce they have arrived at your door. According to Microsoft, “Midnight Blizzard leveraged their initial access to identify and compromise a legacy test OAuth application that had elevated access to the Microsoft corporate environment. The actor created additional malicious OAuth applications.” The attackers then created a new user account to grant consent in the Microsoft corporate environment to the actor-controlled malicious OAuth applications. “The threat actor then used the legacy test OAuth application to grant them the Office 365 Exchange Online full_access_as_app role, which allows access to mailboxes.” This is where my concern pivots from Microsoft’s inability to proactively protect its processes to the larger issue of our collective vulnerability in cloud implementations.?


How To Implement The Pipeline Design Pattern in C#

The pipeline design pattern in C# is a valuable tool for software engineers looking to optimize data processing. By breaking down a complex process into multiple stages, and then executing those stages in parallel, engineers can dramatically reduce the processing time required. This design pattern also simplifies complex operations and enables engineers to build scalable data processing pipelines. ...The pipeline design pattern is commonly used in software engineering for efficient data processing. This design pattern utilizes a series of stages to process data, with each stage passing its output to the next stage as input. The pipeline structure is made up of three components: The source: Where the data enters the pipeline; The stages: Each stage is responsible for processing the data in a particular way; The sink: Where the final output goes Implementing the pipeline design pattern offers several benefits, with one of the most significant benefits in efficiency of processing large amounts of data. By breaking down the data processing into smaller stages, the pipeline can handle larger datasets. The pattern also allows for easy scalability, making it easy to add additional stages as needed.?

Read more here ...
CHESTER SWANSON SR.

Realtor Associate @ Next Trend Realty LLC | HAR REALTOR, IRS Tax Preparer

1 年

Thanks for Sharing.

要查看或添加评论,请登录

Kannan Subbiah的更多文章

  • March 13, 2025

    March 13, 2025

    Becoming an AI-First Organization: What CIOs Must Get Right "The three pillars of an AI-first organization are data…

  • March 12, 2025

    March 12, 2025

    Rethinking Firewall and Proxy Management for Enterprise Agility Firewall and proxy management follows a simple rule:…

  • March 11, 2025

    March 11, 2025

    This new AI benchmark measures how much models lie Scheming, deception, and alignment faking, when an AI model…

  • March 10, 2025

    March 10, 2025

    The Reality of Platform Engineering vs. Common Misconceptions In theory, the definition of platform engineering is…

  • March 09, 2025

    March 09, 2025

    Software Development Teams Struggle as Security Debt Reaches Critical Levels Software development teams face mounting…

  • March 08, 2025

    March 08, 2025

    Synthetic identity blends real and fake data to enable fraud, demanding new protections Manufactured synthetic…

  • March 07, 2025

    March 07, 2025

    Operational excellence with AI: How companies are boosting success with process intelligence everyone can access The…

  • March 06, 2025

    March 06, 2025

    RIP (finally) to the blockchain hype Fowler is not alone in his skepticism about blockchain. It hasn’t yet delivered…

  • March 05, 2025

    March 05, 2025

    Zero-knowledge cryptography is bigger than web3 Zero-knowledge proofs have existed since the 1980s, long before the…

  • March 04, 2025

    March 04, 2025

    You thought genAI hallucinations were bad? Things just got so much worse From an IT perspective, it seems impossible to…

社区洞察

其他会员也浏览了