Articles about AI

Tweak your settings in X if you don't want Elon Musk using your data to train Grok AI

Grok AI

Artificial intelligence is underpinned by the data used to train it, and even in this early stage of the game this has already proved controversial. In addition to complaints about the use of copyrighted content to train AIs, concern has also been voiced about the use of personal data.

Elon Musk, unsurprisingly, wants a slice of the AI pie, and is looking to train up the Grok AI model. The social platform formerly known as Twitter, X, is being used as a source of training data, meaning that your tweets (sorry, posts) are, by default, being sucked up for this very purpose.

Continue reading

How to optimize AI at the edge and retain data sovereignty

Artificial intelligence (AI) is fundamentally transforming the way businesses operate and the value they can deliver to customers. Industry body techUK cites estimates that the UK’s GDP could be up to 10 percent higher by 2030 thanks to AI adoption. But first there are major cost, efficiency and data governance challenges to solve. This is where edge computing comes into its own -- offering a fast, resilient and cost-effective way to run transformative AI applications. Even better, it can help organizations to meet requirements around sustainability and data sovereignty.

The key will be finding a database platform that can seamlessly support both traditional cloud and edge computing environments in this context.

Continue reading

Get 'ChatGPT for Cybersecurity Cookbook' (worth $39.99) for FREE

ChatGPT for Cybersecurity Cookbook takes you on a journey toward enhancing your cybersecurity skills, whether you’re a novice or a seasoned professional. By leveraging cutting-edge generative AI and large language models such as ChatGPT, you'll gain a competitive advantage in the ever-evolving cybersecurity landscape.

This book shows you how to automate and optimize various cybersecurity tasks, including penetration testing, vulnerability assessments, risk assessment, and threat detection.

Continue reading

Get Winxvideo AI V2.0 -- AI-powered video/image enhancer & converter for Windows (worth $69.95) for FREE!

Download a free licensed copy of Winxvideo AI to enhance your images and videos, as well as process any 4K/8K/HDR video as you want.

Powered by CineAI technology, Winxvideo AI can enhance and restore old, blurry, noisy, low-quality or low-resolution videos/images/photos, and upscale to HD/4K/8K visual quality for sharing on social network or playing on widescreen. More than an AI image/video enhancer, it is also a complete video toolkit to stabilize shaky video, boost frame rate to 120/240fps, convert, compress, record, and edit 4K/8K/HDR video with best balance between quality, speed and size.

Continue reading

The top challenge when implementing AI for business: Lack of high-quality data

AI growth and adoption in the UK are surging, with the market valued at more than £16.8 billion and expected to reach £801.6 billion in the next decade. Approximately 15 percent of UK businesses are already using AI technologies such as data management and analysis, natural language processing, machine learning, and computer vision. And across the pond in the US, AI is expected to contribute a significant 21 percent net increase to US GDP by 2030, showcasing its substantial impact on the economy.

Growth in any new technology is never without its challenges. For AI, these include ensuring data privacy, addressing ethical concerns, and navigating the complexity of integrating with existing IT infrastructure. Data quality is central to resolving these challenges. To be useful, the data used for AI must be high-quality, well-structured, and from trusted sources. These properties are the foundation for all AI models and determine their effectiveness and reliability.

Continue reading

The potential opportunities and challenges of decentralized identity in mitigating AI threats

In an age where cyber threats are becoming increasingly sophisticated, the management and verification of digital identities are at a critical juncture. As various sectors rapidly evolve, decentralized identity (DCI) systems emerge as a revolutionary approach to managing and verifying user identities. These autonomous systems promise to change how we access and use online services. However, many organizations need help with adopting this promising technology.

A recent survey by Ping Identity, which included responses from 700 IT decision-makers worldwide, highlights these challenges. In the UK, 82 percent of IT decision-makers see value in decentralized identities for their customers and employees, yet only about a third (34.5 percent) currently offer this option. A significant reason for this gap is the need for more clarity about the benefits, with 31 percent of respondents unsure what advantages decentralized IDs would bring.

Continue reading

Why you need data guardrails, not guidelines [Q&A]

Often described as the lifeblood of an organization, data drives business operations and decision-making. But while the raw data itself is valuable, it’s the intelligence and insights that can be gleaned from it that truly fuel innovation and growth. This vital intelligence is the foundation on which organizations build long-term strategies, optimise processes, and identify new opportunities.  

However, with IoT and AI creating volumes of data at an unprecedented rate, it has come to a point where many large enterprises have data lakes and warehouses overflowing with untapped potential. 

Continue reading

Get 'AI for Absolute Beginners' (worth $9.99) for FREE

AI for Absolute Beginners begins with an engaging introduction to the world of Artificial Intelligence, making it approachable for those with little to no knowledge on the subject.

The book unravels the mysteries of AI's evolution, from its historical roots to the cutting-edge technologies shaping our future. By explaining complex concepts in simple terms, this guide aims to illuminate the path for those curious about how AI impacts our world.

Continue reading

Microsoft brings new archive format support, Copilot improvements and new emoji to Windows 11 with the KB5040442 update

Windows 11 screen with reflection

This month’s update for Windows 11 is pretty impressive. There are the typical bug fixes that you would expect, but there are also lots of additions and improvements to the operating system.

Like Windows 10, Windows 11 Copilot now offers a more app-like experience, and there is the very welcome return of the Show Desktop button on the taskbar. Other improvements mean that it is now possible to create 7-Zip and Tape Archive (TAR) files using the context menu, and there is newly added support for Emoji 15.1. But that’s just for starters.

Continue reading

Microsoft releases KB5040427 update to fix bugs and make significant changes to Copilot in Windows 10

Windows 10 laptop

Copilot being added to Windows 10 was something of a surprise for an operating system that is very much breathing its last. And more than just bringing the AI-powered assistant to Windows 10, Microsoft is continuing to update it with big changes.

The release of the KB5040427 update for Windows 10 this Patch Tuesday is a good example. Microsoft has used this update to fix lots of OS bugs -- including an infuriating taskbar niggle – and also tweaked Copilot to make it function like an app.

Continue reading

Anticipating tomorrow's threats: AI, evolving vulnerabilities, and the 'new normal'

Artificial-Intelligence-threat

Modern cybersecurity leaders are expected to balance an almost comical number of responsibilities. Threat intelligence, vulnerability management, asset tracking, identity management, budgeting, third-party risk -- and that’s just what the company is willing to put in the job description.

To be a cybersecurity expert is to spend your entire career deepening your well of knowledge in one or a few domains. To be a cybersecurity leader, on the other hand, is to spend your career attempting to drink an ocean through a straw. What makes this moment in cybersecurity so interesting is that generative artificial intelligence (AI) brought a fundamental change to both the ocean and the straw.

Continue reading

Google maps mouse brain

Researchers on Google's Connectomics team have achieved the largest AI-assisted digital reconstruction of human brain tissue to date. Now, they are turning their attention to the mouse brain to further unravel the mysteries of neural connections.

The recent accomplishment involved mapping just 1 cubic millimeter of human brain tissue, a task that required an astounding 1.4 petabytes of data. This tiny section, equivalent to half a grain of rice, revealed unexpected structures within neurons. "We found some of the wires will wrap themselves into these giant knots," says Google Research Scientist Viren Jain. "We have no idea why -- nobody's ever seen it before."

Continue reading

How the rush to regulate AI could bring new cyber security challenges

Artificial-intelligence, AI

Since the arrival of generative AI, its potential to increase challenges associated with privacy and cyber security has become a major concern. As a result, government bodies and industry experts are hotly debating how to regulate the AI industry.

So, where are we heading and how is the crossover between AI and cyber security likely to play out? Looking at the lessons learnt from previous efforts to regulate the cyber security market over the past few decades, achieving anything similar for AI is a daunting prospect. However, change is essential if we are to create a regulatory framework that guards against AI's negative potential without also blocking the positive uses that AI is already delivering.

Continue reading

Why AI is essential to securing software and data supply chains

Supply-chain vulnerabilities loom large on the cybersecurity landscape, with threats and attacks such as SolarWinds, 3CX, Log4Shell and now XZ Utils underscoring the potentially devastating impact of these security breaches. The latter examples of Open Source Software (OSS) attacks are a growing attack vector. In fact, nearly three-quarters (74 percent) of UK software supply chains have faced cyber attacks within the last twelve months.

Expect attacks on the open source software supply chain to accelerate, with attackers automating attacks in common open source software projects and package managers. Many CISOs and DevSecOps teams are unprepared to implement controls in their existing build systems to mitigate these threats. In 2024, DevSecOps teams will migrate away from shift-left security models in favor of “shifting down” by using AI to automate security out of the developers’ workflows.

Continue reading

Get 'Artificial Intelligence Programming with Python'(worth $24.00) for FREE

In Practical Artificial Intelligence Programming with Python: From Zero to Hero, veteran educator and photophysicist Dr. Perry Xiao delivers a thorough introduction to one of the most exciting areas of computer science in modern history.

The book demystifies artificial intelligence and teaches readers its fundamentals from scratch in simple and plain language and with illustrative code examples.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.