Google hopes to draw more cloud customers by making A.I. easier to use

more cloud customers

more cloud customers

Google‘s growing cloud business is trying to bring artificial intelligence to the masses, not just to the experts.

The move follows a pattern of cloud players attempting to use ready-to-go AI services as a way to lure companies to use more of their services. Google has used AI in several parts of its business, and now the company is looking to make the technology easier for many people to adopt, which could boost Google’s cloud effort as a whole.

On Wednesday the company introduced a tool that’s designed to simplify the process of deploying AI in business applications. It’s called Cloud AutoML, and it’s already being used by companies including Disney and Urban Outfitters to make search and shopping on their websites more relevant.

Cloud AutoML is starting with image recognition, allowing customers to drag in images and train their systems to recognize them on Google’s cloud.

“Currently, only a handful of businesses in the world have access to the talent and budgets needed to fully appreciate the advancements of ML and AI,” Jia Li, head of research and development for Google’s cloud AI unit, and Fei-Fei Li, the group’s chief scientist, wrote in a blog post. “We believe Cloud AutoML will make AI experts even more productive, advance new fields in AI and help less-skilled engineers build powerful AI systems they previously only dreamed of.”

Cloud AutoML Vision can figure out what’s inside images that users upload, train a model based on those images, provide analysis of the model, and then start to make sense of new images as they come in, based on what it has learned. The new service joins Google’s Cloud Machine Learning Engine and its Cloud Vision application programming interface but unlike those products, the Cloud AutoML portfolio wasn’t designed just with developers in mind.

Two months ago, cloud market leader Amazon Web Services introduced Amazon SageMaker for building and launching their own AI models. And last May, Microsoft introduced a service for customizing image recognition models. Google had 12 percent public cloud market share in the fourth quarter, KeyBanc analysts said last week.

Read More Here

Article Credit: CNBC

Go to Source

Ai and Recruitment

Ai and Recruitment

Ai and Recruitment

Ai and Recruitment

Artificial intelligence (AI) is vibrating the recruitment procedure, adjusting the manner recruitment sources and agencies detect and seek the services of technician ability.

AI and machine learning how empower pros to swiftly analyze massive quantities of information and also make conclusions and forecasts based on this, Today, sources and recruiters have been setting AI to function to aid identify a project putting up’s “excellent suit,” far better powerful applicants out of hunt swimming pools, and also boost their capacity to fulfill career openings immediately.

Shortening upward the window

Unfilled project postings certainly are an important drain on organizational growth. To be certain the most suitable recruitment tools have been employed in completing a specific project launching, a few sources have a hint from your medical marketplace’s utilization of survival investigation.

In healthcare, survival examination can be actually a machine learning procedure which assesses the time for an occasion, like for instance an individual’s estimated time previous to recurrence of the disorder or even a passing.

Reverse-engineering that the ‘Great match’

Some forward-thinking Programmers and hiring supervisors are now utilizing AI and machine Learning How to Reverse Engineer Prospect “match,” Also also to forecast a Possible Applicant’s operation at the Part

“The very optimal/optimally usage instance is resolving the exact fitting problem, therefore, you are minding the technician to discover the optimal/optimally candidate to get your own company and vice-versa. The inquiry every one’s attempting to respond together with of the interviews, screenings, technology and communicating struggles, is, ‘How do I forecast an individual operation?’ Thus, the cleverest recruiters and hiring supervisors might Begin collecting résumés, functionality testimonials, function merchandise, some advice Whatsoever about tremendously effective individuals that currently Do the Job for these and plug into an algorithm to Discover What You Want,
Preferably, every company Would Have the Capacity to Make calculations customized to your own One of Kind requirements of the own organizations, Considering the Various methods of Succeeding

Clearly, why is someone a leading worker at the same business is not likely to interpret to every single additional business? Thus, it truly is just a little like ‘Moneyball, ” at which you are searching for certain abilities, faculties, and expertise which may complete where you’re missing. The Issue is, many firms are Utilizing the Erroneous ones, and that is Not Just damaging them normally, but in Addition It results in this Deficiency of diversity and addition
“guaranteed, possibly Stanford amounts, tenure at Google, snowy, man, been communicating since youth performs for several businesses, however maybe not just have you been currently excluding hundreds, possibly tens of tens of thousands of men and women who have those parameters, but everybody is currently pursuing those individuals, also. They are likely to Be Pricey, they are Likely to be inaccessible, they are not Likely to Supply You with the Results That You Require.

AI and machine learning technologies can also help ascertain exactly how so if resources and recruiters want Assistance by Making Use of Their workloads by studying who’s a disproportionate share of moderate- into high-risk requisitions Which May require Additional resources or time to satisfy.

I hope you like our article on Ai and Recruitment


Go to Source

IoT Is Changing the Cybersecurity Industry

IoT Is Changing the Cybersecurity Industry

IoT Is Changing the Cybersecurity Industry

It’s odd that the Internet of Things (IoT) industry — an industry with a dismal record of cyber breaches — would be the one moving cybersecurity forward, but that is exactly what is happening. With regulation looming and the bad press from recent breaches, there is no longer a choice: Better IoT security is a must. I will be speaking at the IoT Evolution Expo in Orlando this month on this very subject, and thought I’d give you a sneak peek.

IoT Security Gets a Failing Grade

If I remember correctly, 50 percent is a failing grade and yet, nearly 50 percent of IoT companies reported some type of security breach in recent memory. This shocking reality confirms that something needs to be done to improve IoT cyberdefense — and quickly. I cover a lot of areas in cybersecurity and know of no other industry with such a bad track record of breaches. Though these hacks expose data, not all of it has value. Sometimes an IoT hack garners useless data and offers no intelligence to use in an exploit, denial of service or machine control attack. The better news is that there are, at last, cyberdefenses coming to market that can address the need for solid IoT security.

New Cyberdefense Technologies Needed for IoT

IoT is different and has the potential to change everything. It is the new extended edge that allows unprecedented applications and intelligence with tremendous economics and accuracy.  These tiny devices are the next step in physical artificial intelligence (AI). I stress “physical.” They are out in the real world telling both people and machines what they need to know and need to do. If hacked, they can manipulate or destroy physical things with impacts that can extend to entire economies or worse cause loss of life. IoT is not just a database. IoT it is an actuary in the physical world that must be authenticated, validated and secured or risk the potential for very real danger.

Deep IoT Needs Deep Security

There’s no room for a standard encryption file sizes or even simple processor updates patches in IoT. These tiny devices were built around minimal battery life that required tiny low-powered processors with minimal flash memory. This limitation has pushed the entire cybersecurity industry to rethink how we currently secure all digital technologies. We are beginning to see the successful deployment of these new security technologies today. If we are going to have deep learning in artificial intelligence and IoT we need to have deep security as well. IoT is pushing new security technologies toward achieving this goal.

The Enhanced Blockchain IoT Security Fit.

Today’s centralized security models require high infrastructure and maintenance cost associated with centralized clouds, large server farms and networking equipment. The sheer amount of communications that will have to be handled when IoT devices grow into the tens of billions will create bottlenecks and points of failure that can disrupt the entire network. Decentralized blockchain technologies could address these limitations, though blockchain alone is not a complete solution. As a principal in a company offering enhanced blockchain security, I am aware that blockchain alone is promising, but it is not the total answer. Just like current layered security architectures today, what we need in blockchain is a secure and safe IoT where privacy is protected. Enhanced blockchain-layered security technologies can offer this.

Go to Source

The state of Israel’s cybersecurity market

The state of Israel’s cybersecurity market

The state of Israel’s cybersecurity market

The Equifax breachWannaCryNotPetyathe NSA leak, and many more cyber incidents – 2017 was certainly a busy year for hackers, illustrating yet again just how vital innovative cybersecurity solutions are in the fight against cyber threats.

Second only to the U.S., in terms of cybersecurity investment 2017 was another excellent year for Israeli cybersecurity startups, with dozens of companies being formed, breaking fundraising records and producing solid exits. The 2017 data also suggest that the Israeli cybersecurity industry is maturing, as we see a shift in funding towards later stage companies.

More Capital, Fewer Startups

In 2017 we witnessed 60 newly founded cybersecurity startups emerge in Israel, a 28% decrease from the 83 companies founded in 2016. Conversely, the average 2017 seed round increased 16% YoY, growing from $2.85 million to $3.3 million. This is Israel’s fourth consecutive year of increasing round sizes at the seed stage – a trend that we are observing and contributing to as we write larger checks to invest in great cybersecurity entrepreneurs.

One might think that the decrease in the number of cybersecurity startups is an alarming signal, warning of an industry in decline. Our view is that this is a positive indicator of a maturing industry. Cybersecurity is a crowded space, in which thousands of companies operate. CISOs are bombarded with dozens of solutions every day, each of which promises to stop the next big attack. Given this dynamic, it is getting harder for “me too” cybersecurity companies to receive funding, as investors are looking for more differentiated and broader solutions that address the increasingly complex needs of customers.

Those who do manage to raise money tend to convey a grander vision, while aiming to build robust products that require more capital. The result is fewer startups being funded by more capital. This is a positive development for the entrepreneurs who want to build sustainable companies, the investors backing those ideas, and the customers who need more sophisticated solutions. 

Read More Here

Article Credit: TechCrunch

Go to Source

Who should be responsible for cybersecurity?

Who should be responsible for cybersecurity

Who should be responsible for cybersecurity

The news today is flush with salacious stories of cyber-security breaches, data held hostage in brazen ransomware attacks, and compromised records and consumer information. So too has the fallout become increasingly familiar: broken trust, ruined brands, class-action lawsuits, and prolonged periods of finger pointing.

In September 2017, news broke that consumer credit reporting agency Equifax had suffered a catastrophic breach the preceding May. Hackers gained access to the personal data of nearly 150 million American citizens – roughly two thirds of the country’s population – including full names, Social Security numbers, addresses, and dates of birth. The swiftly unfolding scandal sent the company’s stock plummeting 33%, a market value loss of approximately ten billion dollars. Currently, three Equifax C-Suite managers are under federal investigation for allegedly dumping stock prior to disclosing the breach.

The digital sphere has always been rife with pathogens. Elk Cloner ravaged Apple IIs by way of contaminated floppy disks in 1981, and Brain infected IBM PCs in 1986. Initially little more than nuisances concocted to spread chaos and frustration, today malware is a primary tool of lucrative (if fragmented and decentralized) criminal enterprises whose foremost goal is financial gain through extortion and embarrassment.

The high-profile nature of certain attacks – Equifax, Anthem, Home Depot, Yahoo, Sony, and Uber, to name a few – obscures the fact that while the form, scale, and intent of attacks tend to vary, the threat looms over organizations of every stripe and size – private, public, and not-for-profit alike – in every corner of the globe. Colleges and universities have fallen prey to costly ransomware attacks, havoc has been wreaked on banks in Italy, Canada, and Bangladesh, and Russian hackers hijacked the 2016 federal election through a simple phishing scam. Such attacks are alarmingly easy to design and deploy. Phishing, for example, requires only a single distracted click on a link in an email or text. Once the automated malware has gained a toehold, systems and networks can be crippled in a matter of minutes.

Internet has made us from consumers to producers

The world of Internet has turned us from consumers to producers, in short ‘prosumers’. “New hybrid terms such as ‘produser’ and ‘co-creator’ have meanwhile entered academic parlance to accentuate users’ increased production prowess.”(Dijck, 2008, p.42). Not everyone who has access to internet contributes substantially to it but even if we don’t create, we take part by viewing, sharing and commenting. Many argue that because of sites like YouTube, much power has been given to amateurs. Hence, there is less left for the professionals. It is true to some extent but that is what this era of internet is all about. We have the skills and now have got a medium to help us. It is not just a tool in the hand of amateurs it is there for everyone which makes it multi-diverse. This society of internet opens us to a new world. Web developers attract people in such a way that we want to participate in the UGC activities. We are not just limited to viewing now; and this is what makes web more powerful than the television. The ‘produser’ feature is the very essence of the internet. When we go to any stage-show, celebrities invite the audience to the stage to make them feel part of the show. People die to go on the stage to shake a leg or sing with them. They feel elated. This is the exact feeling we get when we can be a part of the internet. We feel as if we own it.

Another aspect of internet which Eli Pariser talks about is, internet should show us what we need rather than what we want. It creates a filter bubble which limits us to things we like, in fact it should be like the newspaper with all the relevant information. We may skip the news we don’t like but it should be present/visible. Search engines limit our results based on the history of links we viewed or clicked. It should provide us with options with what we want to see ( a standard form). If we were only given food which we liked since the age of twelve, we would never have got the taste of other dishes. It is important to explore. Internet should give us this option. Else we will be stuck in a circle and this is unhealthy for our growth as individuals and as a nation on a whole.


1. Dijck, J 2008, ‘Users like you? Theorizing agency in user-generated content’, Media, Culture & Society, vol. 31, no. 1, pp. 41-58, sage publications, viewed 30th September, 2012.

2. Pariser, E 2011, ‘Beware online “filter bubbles”’(video) , TED, viewed 30th  September,2012, <>

3. Publicado 2013, ‘Internet’ (image) , viewed 22nd March, 2014,

Go to Source

Fog computing architecture

Fog computing architecture

Fog computing architecture

Fog computing architecture

Exactly enjoy the blur, fog computing is predicted to open up new small business versions. However, what really is it?
Its first days on its Internet of Things and lots of men and women assume that it really is being organized as a mechanical blossom, using apparatus and detectors feeding info into fundamental hubs which perform complex algorithms and analytics at a trunk space.

The IoT mightn’t look like that in the slightest.

Instead, the IoT will be encouraged with “fog computing,” by that storage, computing, handle and media power can exist anyplace across the structure, possibly from data centres, the cloud computing, advantage devices like gateways or routers, and advantage equipment itself as for instance, for instance, a system, or even from detectors.

Conventional networks that nourish data out of apparatus or trades to some fundamental memory facility– even that the older “information warehouse” version cannot stay informed about the info quantity and speed made by IoT apparatus. Nor can the info warehouse version match up with the very low latency answer instances that end users desire.

The Cloud has been assumed to become a response. But delivering the info to this cloud to get investigation additionally presents a possibility of info bottlenecks, in addition to stability worries. New small business units, but have to have info analytics in an instant or not (with any usage circumstances of much at the usual moment). The issue of information congestion will just become worse since IoT software and apparatus are still proliferating.

Whilst including fog calculating into an IoT system might appear to incorporate sophistication, which sophistication may be needed. In some usage circumstances, fog calculating simplifies the inadequacies of both cloud-only versions, that include deep struggles with latency, network bandwidth, geographical attention and security, and reliability.

Any extra sophistication “can be essential to aid empower the purposes of key IoT software,” Antunes states. “One analysis discovered that forty percent of IoT targeted visitors tends to move across advantage computing apparatus or even fog pathways. OpenCog is shooting ways to control the incremental power boost in programs thanks to fog, by producing typical components and software programs, along with incredibly complex orchestration, direction, setup, and system analytics capacities to automate the performance of systems that are fog”
He adds he considers “the accession of fog to IoT networks will thus greatly raise their capacities and profits possibility the buy and setup of this fog system is going to possess an exact brief payback period”

OpenCog along with IoT configurations since they exist now might be exceptionally harmonious in addition to fog grows. “Dumb apparatus may stay dumb, but might feed info to centralized or regionalized fog software which can be near to these and hence could satisfy certain prerequisites that cannot be fulfilled by inexplicable centered software,” states Antunes. “In reality, fog may enable more apparatus to become idiotic and on occasion maybe harder when they have been now.” In addition, he notes “in a few instances, by glancing in the degree, you could possibly spend less utilizing dumber detectors and into nature ditch those capacities towards the fog nodes”
Long Term of Allergic Computing

Antunes sees a range of fresh growth is as and on occasion even businesses appearing from with the particular initiative. “a single very intriguing perspective is Fog-as-a-Service — even FaaS — by which a fog supplier, that might possibly be described as a municipality, telecom system operator, or even Web-scale firm, equaling a community of sewer nodes into blanket a regional agency field,” he describes.
As cloud has established new small business units, expansion, and businesses, “fog may finally do exactly the exact same,” states Antunes, that foresees the “exhilaration of owning fresh vendors new businesses, brand new organizations models emerge with such whilst the business, functioning along with academia to deal with the troubles and resolve concrete small business issues using those brand new architectural strategies”

Fog computing “will offer considerable chances for producing innovative services and applications which can’t be readily encouraged from the present host-based and cloud-based app programs,” Antunes carries on. “As an instance, brand new fog-based stability services are going to have the ability to assist handle many struggles we’re confronting in aiding protect the Web of points”

We Hope You Find our article (Fog computing architecture) informative.


Go to Source

London cyber security careers fair highlights opportunities

A cyber security careers fair in London on 17 January 2018 is aimed at anyone thinking of a career in the field, including experienced professionals and students

Cyber security is a viable and interesting option for anyone interested in the field, as either a starter career or a mid-career alternative.

The cyber security industry’s top employers will be represented at a day-long cyber careers fair aimed at students, professionals and anyone else considering a career in cyber security.

With demand for cyber security skills set to rocket in the next five years, there is an increasing and wide range of varied and lucrative roles on offer.

Anxiety about the impact and frequency of hacking attacks as well as the rise of digitisation and automation in the workplace have put cyber defenders in serious demand across all industries.

The event, which if free of charge to anyone who registers, is to be hosted by the Institution of Engineering and Technology (IET) and the Cyber Security Challenge UK at Savoy Place in London.

Cyber security employers to be represented at the event include IBM, BAE Systems, BT, Dark Trace, NCC Group, BAE, ROKE, PwC, QinetiQ, Contextis, the NCA and the UK government

Exhibitors also include Cyber Security Challenge UK, CompTIA, Abertay University, E&T Jobs, and Royal Holloway University.

Cyber security job advice

The event features presentations from guest speakers throughout the day on a wide variety of topics related to cyber security. The sessions include practical guidelines on how to apply for a job in cyber security and information about what cyber security professionals do on a day-to-day basis.

Scheduled to run from 9:30 to 21:30, the event also features an evening programme from 18:30, aimed specifically at those looking to change careers.

According to the event organisers, the cyber career fair will provide the opportunity to meet industry employers and find out more about the broad spectrum of roles available.

Nick Coleman, IET fellow and chair of the IT Panel at the IET, said the world is increasingly becoming digitally connected, which makes companies and infrastructure incredibly vulnerable to cyber hacks.

“This has created a rapid rise in the demand for cyber security roles, with most of the UK’s largest companies devoting more resource to their digital defence,” he said.

Shortages expected for the industry

According to (ISC)2, there will be will be nine million global public and private sector cyber security jobs by 2019 and shortages at every level in the industry.

Read More Here

Article Credit: ComputerWeekly 

Go to Source

Fog computing vs edge computing

Fog computing vs edge computing

Fog computing vs edge computing

Fog computing vs edge computing

The growth in attention around the Industrial Internet of Things (IIoT) has released an assortment of new engineering and plans to bargain with most of the current production-related info in the crux of IIoT. While a lot of those technologies aren’t fundamentally fresh, they truly are frequently unknown to business and take somewhat of the explanation. That really is certainly true for the provisions advantage fog and computing.

Newton clarified that “both equally fog computing and computing advantage computing demand shoving processing and intelligence capacities down nearer to exactly where the info arises” by motors, pumps and sensors, relays, etc..
“The essential change between the 2 architectures is whereby that computing and intelligence ability has been set,” he explained.

In accordance with Newton:

Fog computing pushes wisdom towards the neighborhood area network amount of community design, processing info at a fog node or even IoT gateway.

Edge computing drives the intellect, processing capacity and communicating capacities of a border gateway or mill straight to apparatus such as programmable automation controllers (PACs).

Lots of in marketplace really utilize the provisions receivable computing and advantage computing (or border processing) interchangeably,” explained King. “Edge calculating is obviously an old saying which occupies the fog calculating duration. Through qualifications, Cisco established the word snowball computing a long time past to characterize a more coating of calculating in the border of the system which will make it possible for pre-processed info to function fast and safely hauled into your cloud. Whilst Cisco completely mastered the stable shipping elements of fog computing by the first times of IoT, hardly was achieved before recently effectuate the info processing system facets of fog computing in actual life IIoT use instances”

Obtaining in to somewhat greater depth to distinguish both phrases, Newton clarified the method of distributing data from calculating. “the information in the management application has been transmitted to an OPC server or protocol integration, which then transforms the information to some protocol Web methods know such as for instance MQTT or even HTTP (go through telecommunications Planet policy outlining MQTT’s usage within IIoT).

Afterward, a data will be routed into some other platform, like for instance a fog node or even IoT gateway to the LAN, which gathers the info and also implements data processing and investigation. This procedure filters, examines, procedures, and might even save the info to transmitting into the cloud or WAN in a subsequent time. Fog computing structure is based on numerous connections within an communicating series to transfer information out of the actual planet of their resources in to the realm of it. Every one of those links can be an expected point of collapse”
Based on Newton, advantage computing “simplifies that this communicating series and also reduces probable issues of collapse from wiring resources such as motors and pumps right into a smart pa-c to get, examine and process info out of the bodily resources while additionally conducting the management application. PACs subsequently utilize advantage computing capacities to figure out what info ought to be kept individually or shipped into the cloud for more investigation. In advantage computing, intellect has been pushed into the system advantage, exactly where all our physiological resources have been joined jointly and at which IoT info arises.”

When it’s title implies, fog-horn Systems can be an impulse of snowball computing, however together with everything they state is really a brand new spin in the approach. King states that they truly are emphasizing enhancing the snowball computing theory as “border computing isn’t scalable and also you also can’t watch throughout numerous machines procedures using it. Our strategy is always to proceed as near the foundation as potential without even being immobilized in the system”

King has been limited from the sum of depth he managed enough to talk if we talked since the business will probably soon be generating its preliminary item statement over the following handful few weeks. But he described this foghorn’s tech has been deployed in lots of IIoT software with GE (an outcome investor in foghorn’s financing) in addition to together with non-GE spouses and end clients. Other industrial organizations purchasing fog-horn comprise Bosch and Yokogawa.

Admits that foghorn’s tech differs from many other fog or advantage computing supplies on the current market, King mentioned it “goes beyond basic information filtering and data normalization and will not utilize basic regulations motor logic within an abysmal frontend connector for info data analytics. We are employing a brand new smart coating at or close to the supply of the info within a snowball gateway to both filter and then normalize the information prior to passing it directly to your cloud system.

We hope you Find our article (Fog computing vs edge computing)


Go to Source