SlideShare a Scribd company logo
1 of 44
Download to read offline
1
http://www.research.ibm.com/5-in-5/
Pietro Leo
Executive Architect - IBM Italy CTO for Artificial Intelligence
Chief Scientist for IBM Italy Research & Business
IBM Academy of Technology Leadership
Member of ISO/SC42 Artificial Intelligence Standardization Committee
IBM Research 5 in 5
3Quantum Computing
Artificial Intelligence
Biases
AI Robotic Microscope
Lattice
Cryptography
Crypto-anchors
4
Nobody likes
knockoffs.
Crypto-anchors
and blockchain
will unite against
counterfeiters.
Crypto-anchors
5
Crypto-anchors and blockchain will
unite against counterfeiters. Within
five years, we’ll embed crypto-
anchors such as ink dots and tiny
computers smaller than a grain of
salt in everyday products –
everything from medical kits, to
clothing, to car parts and food. We’ll
put real-time information from them
on a blockchain, giving us a
foolproof way to know if a good is
authentic and safe to consume.
Crypto-anchors
6
Crypto-anchors & Blockchain
Source: https://www.youtube.com/watch?v=LUFWk55w5o0
7
Preliminary scientific evidences
IBM Research crypto Anchors for Diagnostic devices: https://www.zurich.ibm.com/st/precision_diagnostics/cryptoanchors.html
Crypto anchors extend
blockchain’s
Value Into the physical realm.
Crypto Anchors address this
challenge by embedding a
security code in microfluidic
diagnostic devices and
“classical” lateral flow tests.
This code can be used to
identify and link products to
highly secured digital
transactions on the Cloud and
using Blockchain.
Crypto anchors come in many
forms. They can even be
embedded into an editable
shade of a magnetic ink, which
can be used to dye a malaria
pill, for example
IBM Research Crypto Anchor for diagnostic devices
8
Hackers
gonna hack.
Until they
encounter
lattice
cryptography.
Lattice
cryptography
9
We are preparing for the day cyber-
attackers will breach most of today’s
cybersecurity methods and quantum
computers will break all current forms of
encryption. Our scientists have already
submitted a post-quantum encryption
method to the U.S. government for
consideration as a potential standard. And
they’ve developed new security methods
based on lattice cryptography, which is
essentially incredibly hard math. This
technique makes it possible to perform
calculations on a file without ever seeing
sensitive data or exposing it to hackers.
Lattice
cryptography
10
Contemporary Cryptography
Source: https://www.youtube.com/watch?v=3b14zPBBzR0
11
Source: G. Gentry, IBM Research, Computing Arbitrary Functions of Encrypted Data – ACM
http://ece.gmu.edu/coursewebpages/ECE/ECE646/F10/project/F10_Project_Resources/Computing_Arbitrary_Functio
ns_of_Encrypted_Data.pdf
Usable Full Homomorphic Encryption
2010 2011 2012 2013 2014
Estimated amortized time
for computing a single bit
operation on encrypted data
Moore’s law
2009-10: Plausibility
[GH’11] A single bit
operation takes 30
minutes
IBM Patent 2013
2011-2012: “Real
Circuits”
[GHS’12] A 30,000-
gate in 36 hours
2013-today: Usability
HElib [HS’14]: IBM’s open-source FHE implementation
Basis for “generic” FHE computation
An “assembly language” for FHE
Implements Brakerski-Gentry-Vaikuntanathan (BGV) scheme
Security based on ring LWE (RLWE)
The same 30,000-gate circuit in 4-15 minutes
www.pieroleo.com
1. How to share genomic data in a way that preserves the privacy of the data donors,
without undermining the utility of the data or impeding its convenient dissemination?
2. How to perform a LARGE--SCALE, PRVIACY--PRESERVING analysis on genomic
data, in an untrusted cloud environment or across multiple users?
• Fast drop in the cost of genome-
-sequencing 2000: $3 billion
• Mar. 2014: $1,000
• Genotyping 1M variations: below
$200
Unleashing the potenDal of the
technology
• Healthcare: e.g., disease risk
detection, personalized
• medicine
• Biomedical research: e.g.,
• geno-phono
• association
• Legal and forensic
• DTC: e.g., ancestry test, paternity
test
Full Homomorphic Encryption
Examples – Genome Analysis
Source: The 2nd Comparison on Critical Assessment of Data Privacy and Protect Secure Genome Analysis
http://www.humangenomeprivacy.org/2015/slides/003_iDASH%20workshop%202015_setStage.pdf
Computing the Hamming distance between two Human Genomes under
a Full Homomorphic Encryption schema
https://arxiv.org/pdf/1512.04965.pdf
“One of our main findings
is that the number of
logical qubits required to
implement a Grover
attack on AES is
relatively low, namely
between around 3000
and 7000 logical qubits.”
“When realizing AES, only SubBytes Involves T-gates. Moreover, SubBytes is called a
minimum of 296 times as in AES-128 and up to 420 times in AES-256. As shown above, for
all three standardized key lengths, this results in quantum circuits of quite moderate
complexity. So it seems prudent to move away from 128-bit keys when expecting the
availability of at least a moderate size quantum computer.”
Source: https://www.iad.gov/iad/customcf/openAttachment.cfm?FilePath=/iad/library/ia-guidance/ia-solutions-for-classified/algorithm-
guidance/assets/public/upload/CNSA-Suite-and-Quantum-Computing-FAQ.pdf
Commercial National SecurityAlgorithm Suite
05 January 2016
Source: https://csrc.nist.gov/news/2016/public-key-post-quantum-cryptographic-algorithms
Source: https://pq-crystals.org/index.shtml
Post-quantum cryptography suite submitted by IBM and other partners to NIST call
Source: https://falcon-sign.info/
Post-quantum cryptography suite submitted by IBM and other partners to NIST call
Source: IBM Researcher comments https://securityintelligence.com/preparing-next-era-computing-quantum-safe-cryptography/
N=pq
gx=y mod p
Factoring is hard
Computing discrete logs is hard
Finding short vectors in
lattices is hard
Assumptions for Quantum-Resilient Public-Key
Cryptography
N=pq
gx=y mod p
Factoring is hard
Finding short vectors in lattices is hard
Computing discrete logs is hard
(f,g) in
Z[x]/(xn+1)
Lattice-Based
Cryptography
22
Our oceans
are dirty. AI-
powered robot
microscopes
may save
them.
AI Robotic Microscope
23
In five years, small,
autonomous AI microscopes,
networked in the cloud and
deployed around the world,
will continually monitor the
activities of plankton, which
are natural, biological sensors
of aquatic health. By
observing certain indicators,
we can anticipate ways to
protect the global water
supply. AI Robotic Microscope
24
Robotic Microscope
Source: https://www.youtube.com/watch?v=mmqyPBQuhaQ
25
Phytoplankton, Why are they important?
Surce: https://www.whoi.edu/main/topic/phytoplankton
Phytoplankton are some of
Earth's most critical
organisms and so it is vital
study and understand
them. They generate about
half the atmosphere's
oxygen, as much per year
as all land plants.
Phytoplankton also form
the base of virtually every
ocean food web. In short,
they make most other
ocean life possible.
Phytoplankton are mostly microscopic, single-celled
photosynthetic organisms that live suspended in water.
26
Simone BiancoIBM Almaden Research Center
http://cellgeometry.ucsf.edu/sites/cellgeometry.ucsf.edu/files/STC_Project_5_CellStateInferenceEngine_final.pdf
Cellular Sentinel Workflow
27
From morphology vectors to cell state
Simone BiancoIBM Almaden Research Center
http://cellgeometry.ucsf.edu/sites/cellgeometry.ucsf.edu/files/STC_Project_5_CellStateInferenceEngine_final.pdf
28
Artificial Intelligence
Biases
AI bias will
explode. But
only the
unbiased AI
will survive.
29
Within five years, we’ll have
new solutions to counter a
substantial increase in the
number of biased AI systems
and algorithms. IBM
researchers developed a method
to reduce the bias that may be
present in a training dataset,
such that any AI algorithm that
later learns from that dataset
will perpetuate as little inequity
as possible.
Artificial Intelligence
Biases
30
Artificial Intelligence Biases
Sorce: https://www.youtube.com/watch?v=q44XUZdCIMM
31
Preliminary scientific evidences
http://www.aies-conference.com/wp-content/papers/main/AIES_2018_paper_65.pdf
http://papers.nips.cc/paper/6988-optimized-pre-processing-for-discrimination-prevention.pdf
Source: Gender Shades: IntersectionalAccuracy Disparities in Commercial Gender Classification,
Buolamwin (MIT) and Gebru (Microsoft) http://proceedings.mlr.press/v81/buolamwini18a/buolamwini18a.pdf
Face++
34.5 (Dark Female)
0.7 (Dark Male)
6.0 (Light Female)
0.8 (Light Male)
Microsoft
20.8 (Dark Female)
6.0 (Dark Male)
1.7 (Light Female)
0.0 (Light Male)
IBM
34.7 (Dark Female
12.0 (Dark Male)
7.1 (Light Female)
0.3 (Light Male)
Error Rates in gender classification
Call to action
4 October
2017
Source: IBM Mitigating Bias in AI Models - https://www.ibm.com/blogs/research/2018/02/mitigating-
bias-ai-models/
Face++ (NO ANSWER)
34.5 (Dark Female)
0.7 (Dark Male)
6.0 (Light Female)
0.8 (Light Male)
Microsoft (WILL ANDWER)
20.8 (Dark Female)
6.0 (Dark Male)
1.7 (Light Female)
0.0 (Light Male)
IBM (ANSWERED - February 6)
3,46 (Dark Female) <- 34.7
1,99 Dark Male) <– 12.0
0,0 (Light Female) <– 7.1
0.25 (Light Male) <– 0.3
Public exposure of AI services is placing new
kind of pressures to be solved quickly
IBM (Production Env.-
Update February 23)
Fairness, accountability and ethics in AI
§ A novel probabilistic formulation of data pre-processing for reducing discrimination.
Source: Calmon, Wei, Ramamurthy& Varshney, “Optimized Data Pre-Processing for Discrimination Prevention,” NIPS 2017
35
Today, quantum
computing is a
researcher’s
playground. In
five years, it will
be mainstream.
Quantum Computing
36
In five years, it will be
mainstream. Quantum computing
will be used extensively by new
categories of professionals,
developers, and students to solve
problems once considered
unsolvable. And given IBM’s
longstanding leadership in
quantum, they will continue to
partner with us on future
applications of this revolutionary
technology.
Quantum Computing
37
Quantum Computing
Source: https://www.youtube.com/watch?v=bhYHto5ss7M
38
The future is quantum
• A 20 qubits available on cloud to our
clients at the end of this year (already
made available 5-16 and 17 qubits)
• A prototype with 50 qubits has been
successful tested with a double of
coherence time with respect previous
systems.
• An open source Quantum Information
software (Qikit)
• Quantum Computing: Breaking Through
the 49 Qubit Simulation Barrier
.Source: https://www.ibm.com/blogs/research/2017/11/the-future-is-quantum
Source: https://www.ibm.com/blogs/research/2017/10/quantum-computing-
barrier/
40
Preliminary scientific evidences
IBM Q Experience
First QC on the cloud
> 75,000 users
All 7 continents
> 2.8 million experiments
60+ external papers
>150 colleges and
universities
41
Simulating molecules on
quantum computers just
got much easier with
quantum hardware.
https://www.ibm.com/blogs/research/2017/09/quantum-molecule/
Article published in Nature, Hardware-efficient
Variational Quantum Eigensolver for Small
Molecules and Quantum Magnets by IBM
Research implement a new quantum algorithm
capable of efficiently computing the lowest
energy state of small molecules.
Preliminary scientific evidences
42
Example of external papers
https://arxiv.org/pdf/1801.03782.pdf
IBM Research: A global research capability
Australia
China
Almaden
Haifa
Zurich
Africa
Ireland
Brazil
Watson
Austin
India
Tokyo
3000 Researchers
6 Nobel Laureates
25 Years of Patent Leadership
10 National Medals of Technology
5 National Medals of Science
3 Kavli Prizes
6 Turing Awards
69 NAE Members
123 IEEE Fellows
28 ACM Fellows
99 IBM Fellows
Cambridge
Singapore
44
http://www.research.ibm.com/5-in-5/
Pietro Leo
Executive Architect - IBM Italy CTO for Artificial Intelligence
Chief Scientist for IBM Italy Research & Business
IBM Academy of Technology Leadership
Member of ISO/SC42 Artificial Intelligence Standardization Committee
@pieroleo
www.pieroleo.com

More Related Content

What's hot

The future of AI & ML in Cognitive Discovery
The future of AI & ML in Cognitive DiscoveryThe future of AI & ML in Cognitive Discovery
The future of AI & ML in Cognitive DiscoveryPietro Leo
 
Pietro leo - Active Intelligence
Pietro leo - Active IntelligencePietro leo - Active Intelligence
Pietro leo - Active IntelligencePietro Leo
 
Human tech biota_pietro_leo_2019
Human tech biota_pietro_leo_2019Human tech biota_pietro_leo_2019
Human tech biota_pietro_leo_2019Pietro Leo
 
Era of Artificial Intelligence Lecture 4 Pietro Leo
Era of Artificial Intelligence Lecture 4 Pietro LeoEra of Artificial Intelligence Lecture 4 Pietro Leo
Era of Artificial Intelligence Lecture 4 Pietro LeoPietro Leo
 
A workshop on 'AI transforming Business’
A workshop  on 'AI transforming Business’A workshop  on 'AI transforming Business’
A workshop on 'AI transforming Business’Rubixe
 
IRJET- Managing Social Complaint using Mobile Application with Real-time Trac...
IRJET- Managing Social Complaint using Mobile Application with Real-time Trac...IRJET- Managing Social Complaint using Mobile Application with Real-time Trac...
IRJET- Managing Social Complaint using Mobile Application with Real-time Trac...IRJET Journal
 
The Business Case for Applied Artificial Intelligence
The Business Case for Applied Artificial IntelligenceThe Business Case for Applied Artificial Intelligence
The Business Case for Applied Artificial IntelligenceOtto Werschitz, MBA
 
Artificial Intelligence explained simplistically
Artificial Intelligence explained simplisticallyArtificial Intelligence explained simplistically
Artificial Intelligence explained simplisticallyNBC Bearings
 
Forward thinking: What's next for AI
Forward thinking: What's next for AIForward thinking: What's next for AI
Forward thinking: What's next for AIIBM
 
From Turing To Humanoid Robots - Ramón López de Mántaras
From Turing To Humanoid Robots - Ramón López de MántarasFrom Turing To Humanoid Robots - Ramón López de Mántaras
From Turing To Humanoid Robots - Ramón López de MántarasMachine Learning Valencia
 
Examples of Innovation Building Blocks in IBM
Examples of Innovation Building Blocks in IBMExamples of Innovation Building Blocks in IBM
Examples of Innovation Building Blocks in IBMPietro Leo
 
IBM Watson: How it Works, and What it means for Society beyond winning Jeopardy!
IBM Watson: How it Works, and What it means for Society beyond winning Jeopardy!IBM Watson: How it Works, and What it means for Society beyond winning Jeopardy!
IBM Watson: How it Works, and What it means for Society beyond winning Jeopardy!Tony Pearson
 
Ibm research 5in5_2019
Ibm research 5in5_2019Ibm research 5in5_2019
Ibm research 5in5_2019Pietro Leo
 
Era of Artificial Intelligence Lecture 3 Pietro Leo
Era of Artificial Intelligence Lecture 3 Pietro LeoEra of Artificial Intelligence Lecture 3 Pietro Leo
Era of Artificial Intelligence Lecture 3 Pietro LeoPietro Leo
 
What does the Future of Work look like
What does the Future of Work look likeWhat does the Future of Work look like
What does the Future of Work look likeNBC Bearings
 
AI - Artificial Intelligence - Implications for Libraries
AI - Artificial Intelligence - Implications for LibrariesAI - Artificial Intelligence - Implications for Libraries
AI - Artificial Intelligence - Implications for LibrariesBrian Pichman
 

What's hot (20)

The future of AI & ML in Cognitive Discovery
The future of AI & ML in Cognitive DiscoveryThe future of AI & ML in Cognitive Discovery
The future of AI & ML in Cognitive Discovery
 
AI and Future Jobs
AI and Future JobsAI and Future Jobs
AI and Future Jobs
 
Pietro leo - Active Intelligence
Pietro leo - Active IntelligencePietro leo - Active Intelligence
Pietro leo - Active Intelligence
 
Human tech biota_pietro_leo_2019
Human tech biota_pietro_leo_2019Human tech biota_pietro_leo_2019
Human tech biota_pietro_leo_2019
 
Artificial intelligence implementation challenges in embedded design
Artificial intelligence implementation challenges in embedded designArtificial intelligence implementation challenges in embedded design
Artificial intelligence implementation challenges in embedded design
 
Era of Artificial Intelligence Lecture 4 Pietro Leo
Era of Artificial Intelligence Lecture 4 Pietro LeoEra of Artificial Intelligence Lecture 4 Pietro Leo
Era of Artificial Intelligence Lecture 4 Pietro Leo
 
A workshop on 'AI transforming Business’
A workshop  on 'AI transforming Business’A workshop  on 'AI transforming Business’
A workshop on 'AI transforming Business’
 
IRJET- Managing Social Complaint using Mobile Application with Real-time Trac...
IRJET- Managing Social Complaint using Mobile Application with Real-time Trac...IRJET- Managing Social Complaint using Mobile Application with Real-time Trac...
IRJET- Managing Social Complaint using Mobile Application with Real-time Trac...
 
The Business Case for Applied Artificial Intelligence
The Business Case for Applied Artificial IntelligenceThe Business Case for Applied Artificial Intelligence
The Business Case for Applied Artificial Intelligence
 
Artificial Intelligence explained simplistically
Artificial Intelligence explained simplisticallyArtificial Intelligence explained simplistically
Artificial Intelligence explained simplistically
 
Forward thinking: What's next for AI
Forward thinking: What's next for AIForward thinking: What's next for AI
Forward thinking: What's next for AI
 
From Turing To Humanoid Robots - Ramón López de Mántaras
From Turing To Humanoid Robots - Ramón López de MántarasFrom Turing To Humanoid Robots - Ramón López de Mántaras
From Turing To Humanoid Robots - Ramón López de Mántaras
 
Examples of Innovation Building Blocks in IBM
Examples of Innovation Building Blocks in IBMExamples of Innovation Building Blocks in IBM
Examples of Innovation Building Blocks in IBM
 
IBM Watson: How it Works, and What it means for Society beyond winning Jeopardy!
IBM Watson: How it Works, and What it means for Society beyond winning Jeopardy!IBM Watson: How it Works, and What it means for Society beyond winning Jeopardy!
IBM Watson: How it Works, and What it means for Society beyond winning Jeopardy!
 
Ai and bots
Ai and botsAi and bots
Ai and bots
 
Ibm research 5in5_2019
Ibm research 5in5_2019Ibm research 5in5_2019
Ibm research 5in5_2019
 
Era of Artificial Intelligence Lecture 3 Pietro Leo
Era of Artificial Intelligence Lecture 3 Pietro LeoEra of Artificial Intelligence Lecture 3 Pietro Leo
Era of Artificial Intelligence Lecture 3 Pietro Leo
 
What does the Future of Work look like
What does the Future of Work look likeWhat does the Future of Work look like
What does the Future of Work look like
 
AI - Artificial Intelligence - Implications for Libraries
AI - Artificial Intelligence - Implications for LibrariesAI - Artificial Intelligence - Implications for Libraries
AI - Artificial Intelligence - Implications for Libraries
 
Salesforce - AI for CRM
Salesforce - AI for CRMSalesforce - AI for CRM
Salesforce - AI for CRM
 

Similar to A reading of the IBM Research 5-in-5 2018 Edition

The Internet of Things: We've Got to Chat
The Internet of Things: We've Got to ChatThe Internet of Things: We've Got to Chat
The Internet of Things: We've Got to ChatDuo Security
 
Open Source Insight: Auto Security & Hackers, Killer Robots, & Containers Gon...
Open Source Insight: Auto Security & Hackers, Killer Robots, & Containers Gon...Open Source Insight: Auto Security & Hackers, Killer Robots, & Containers Gon...
Open Source Insight: Auto Security & Hackers, Killer Robots, & Containers Gon...Black Duck by Synopsys
 
Tec118 Teched2015 IOT use case and examples
Tec118 Teched2015 IOT use case and examplesTec118 Teched2015 IOT use case and examples
Tec118 Teched2015 IOT use case and examplesMarkus Van Kempen
 
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...IRJET Journal
 
Faster Time to Market using Scilab/XCOS/X2C for motor control algorithm devel...
Faster Time to Market using Scilab/XCOS/X2C for motor control algorithm devel...Faster Time to Market using Scilab/XCOS/X2C for motor control algorithm devel...
Faster Time to Market using Scilab/XCOS/X2C for motor control algorithm devel...Scilab
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsLabSharegroup
 
The IoT: Internet of Threats?
The IoT: Internet of Threats?The IoT: Internet of Threats?
The IoT: Internet of Threats?TechWell
 
Keynote WFIoT2019 - Data Graph, Knowledge Graphs Ontologies, Internet of Thin...
Keynote WFIoT2019 - Data Graph, Knowledge Graphs Ontologies, Internet of Thin...Keynote WFIoT2019 - Data Graph, Knowledge Graphs Ontologies, Internet of Thin...
Keynote WFIoT2019 - Data Graph, Knowledge Graphs Ontologies, Internet of Thin...Amélie Gyrard
 
Connected Cars - Poster Child for the IoT Reality Check
Connected Cars - Poster Child for the IoT Reality CheckConnected Cars - Poster Child for the IoT Reality Check
Connected Cars - Poster Child for the IoT Reality CheckSecurity Innovation
 
IRJET- Analysis of Forensics Tools in Cloud Environment
IRJET-  	  Analysis of Forensics Tools in Cloud EnvironmentIRJET-  	  Analysis of Forensics Tools in Cloud Environment
IRJET- Analysis of Forensics Tools in Cloud EnvironmentIRJET Journal
 
Machine Learning and Power AI Workshop v4
Machine Learning and Power AI Workshop v4Machine Learning and Power AI Workshop v4
Machine Learning and Power AI Workshop v4LennartF
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
AI, Blockchain and Quantum - Moonshoot for the Enterprise !?
AI, Blockchain and Quantum - Moonshoot for the Enterprise !?AI, Blockchain and Quantum - Moonshoot for the Enterprise !?
AI, Blockchain and Quantum - Moonshoot for the Enterprise !?Thorsten Schroeer
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCloudIDSummit
 
Xprize Think Tank Phoenix IoT Presentation 4/18/16
Xprize Think Tank Phoenix IoT Presentation 4/18/16Xprize Think Tank Phoenix IoT Presentation 4/18/16
Xprize Think Tank Phoenix IoT Presentation 4/18/16Mark Goldstein
 
Data Summer Conf 2018, “Architecting IoT system with Machine Learning (ENG)” ...
Data Summer Conf 2018, “Architecting IoT system with Machine Learning (ENG)” ...Data Summer Conf 2018, “Architecting IoT system with Machine Learning (ENG)” ...
Data Summer Conf 2018, “Architecting IoT system with Machine Learning (ENG)” ...Provectus
 
Architecting IoT with Machine Learning
Architecting IoT with Machine LearningArchitecting IoT with Machine Learning
Architecting IoT with Machine LearningRudradeb Mitra
 
Object Detection Bot
Object Detection BotObject Detection Bot
Object Detection BotIRJET Journal
 
Gdpr encryption and tokenization
Gdpr encryption and tokenizationGdpr encryption and tokenization
Gdpr encryption and tokenizationUlf Mattsson
 

Similar to A reading of the IBM Research 5-in-5 2018 Edition (20)

The Internet of Things: We've Got to Chat
The Internet of Things: We've Got to ChatThe Internet of Things: We've Got to Chat
The Internet of Things: We've Got to Chat
 
Open Source Insight: Auto Security & Hackers, Killer Robots, & Containers Gon...
Open Source Insight: Auto Security & Hackers, Killer Robots, & Containers Gon...Open Source Insight: Auto Security & Hackers, Killer Robots, & Containers Gon...
Open Source Insight: Auto Security & Hackers, Killer Robots, & Containers Gon...
 
Tec118 Teched2015 IOT use case and examples
Tec118 Teched2015 IOT use case and examplesTec118 Teched2015 IOT use case and examples
Tec118 Teched2015 IOT use case and examples
 
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
 
Faster Time to Market using Scilab/XCOS/X2C for motor control algorithm devel...
Faster Time to Market using Scilab/XCOS/X2C for motor control algorithm devel...Faster Time to Market using Scilab/XCOS/X2C for motor control algorithm devel...
Faster Time to Market using Scilab/XCOS/X2C for motor control algorithm devel...
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security Certs
 
The IoT: Internet of Threats?
The IoT: Internet of Threats?The IoT: Internet of Threats?
The IoT: Internet of Threats?
 
Keynote WFIoT2019 - Data Graph, Knowledge Graphs Ontologies, Internet of Thin...
Keynote WFIoT2019 - Data Graph, Knowledge Graphs Ontologies, Internet of Thin...Keynote WFIoT2019 - Data Graph, Knowledge Graphs Ontologies, Internet of Thin...
Keynote WFIoT2019 - Data Graph, Knowledge Graphs Ontologies, Internet of Thin...
 
Connected Cars - Poster Child for the IoT Reality Check
Connected Cars - Poster Child for the IoT Reality CheckConnected Cars - Poster Child for the IoT Reality Check
Connected Cars - Poster Child for the IoT Reality Check
 
IRJET- Analysis of Forensics Tools in Cloud Environment
IRJET-  	  Analysis of Forensics Tools in Cloud EnvironmentIRJET-  	  Analysis of Forensics Tools in Cloud Environment
IRJET- Analysis of Forensics Tools in Cloud Environment
 
Machine Learning and Power AI Workshop v4
Machine Learning and Power AI Workshop v4Machine Learning and Power AI Workshop v4
Machine Learning and Power AI Workshop v4
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
AI, Blockchain and Quantum - Moonshoot for the Enterprise !?
AI, Blockchain and Quantum - Moonshoot for the Enterprise !?AI, Blockchain and Quantum - Moonshoot for the Enterprise !?
AI, Blockchain and Quantum - Moonshoot for the Enterprise !?
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
 
Xprize Think Tank Phoenix IoT Presentation 4/18/16
Xprize Think Tank Phoenix IoT Presentation 4/18/16Xprize Think Tank Phoenix IoT Presentation 4/18/16
Xprize Think Tank Phoenix IoT Presentation 4/18/16
 
Data Summer Conf 2018, “Architecting IoT system with Machine Learning (ENG)” ...
Data Summer Conf 2018, “Architecting IoT system with Machine Learning (ENG)” ...Data Summer Conf 2018, “Architecting IoT system with Machine Learning (ENG)” ...
Data Summer Conf 2018, “Architecting IoT system with Machine Learning (ENG)” ...
 
Architecting IoT with Machine Learning
Architecting IoT with Machine LearningArchitecting IoT with Machine Learning
Architecting IoT with Machine Learning
 
Butler
ButlerButler
Butler
 
Object Detection Bot
Object Detection BotObject Detection Bot
Object Detection Bot
 
Gdpr encryption and tokenization
Gdpr encryption and tokenizationGdpr encryption and tokenization
Gdpr encryption and tokenization
 

More from Pietro Leo

Reading the IBM AI Strategy for Business
Reading the IBM AI Strategy for BusinessReading the IBM AI Strategy for Business
Reading the IBM AI Strategy for BusinessPietro Leo
 
Selected IBM Research projects around "Water"
Selected IBM Research projects around "Water"Selected IBM Research projects around "Water"
Selected IBM Research projects around "Water"Pietro Leo
 
How COVID-19 is accelerating the change of the World.
How COVID-19 is accelerating the change of the World.How COVID-19 is accelerating the change of the World.
How COVID-19 is accelerating the change of the World.Pietro Leo
 
Pietro leo - Active Intelligence
Pietro leo - Active IntelligencePietro leo - Active Intelligence
Pietro leo - Active IntelligencePietro Leo
 
Pietro leo Rome Innovation Summit 2019 - Artificial Risks
Pietro leo Rome Innovation Summit 2019 - Artificial RisksPietro leo Rome Innovation Summit 2019 - Artificial Risks
Pietro leo Rome Innovation Summit 2019 - Artificial RisksPietro Leo
 
Era of Artificial Intelligence Lecture 7 Pietro Leo
Era of Artificial Intelligence Lecture 7 Pietro LeoEra of Artificial Intelligence Lecture 7 Pietro Leo
Era of Artificial Intelligence Lecture 7 Pietro LeoPietro Leo
 
Era of Artificial Intelligence - Lecture 2 - Pietro Leo
Era of Artificial Intelligence - Lecture 2 - Pietro LeoEra of Artificial Intelligence - Lecture 2 - Pietro Leo
Era of Artificial Intelligence - Lecture 2 - Pietro LeoPietro Leo
 
Era of Artificial Intelligence - Lecture1 - Pietro Leo
Era of Artificial Intelligence - Lecture1 - Pietro LeoEra of Artificial Intelligence - Lecture1 - Pietro Leo
Era of Artificial Intelligence - Lecture1 - Pietro LeoPietro Leo
 
CODING... a cosa serve?
CODING... a cosa serve?CODING... a cosa serve?
CODING... a cosa serve?Pietro Leo
 
Augmented intelligence pietro_leo_sole24_ore_school
Augmented intelligence pietro_leo_sole24_ore_schoolAugmented intelligence pietro_leo_sole24_ore_school
Augmented intelligence pietro_leo_sole24_ore_schoolPietro Leo
 
Machine Learning Crash Course 2017 - Genova - DIBRIS - IIT - MIT
Machine Learning Crash Course 2017 - Genova - DIBRIS - IIT - MITMachine Learning Crash Course 2017 - Genova - DIBRIS - IIT - MIT
Machine Learning Crash Course 2017 - Genova - DIBRIS - IIT - MITPietro Leo
 
Creative Computing: how artificial intelligence could augment designer’s deci...
Creative Computing: how artificial intelligence could augment designer’s deci...Creative Computing: how artificial intelligence could augment designer’s deci...
Creative Computing: how artificial intelligence could augment designer’s deci...Pietro Leo
 
WIFUTURE Conference - Artificial Intelligence and ChatBots - Milan
WIFUTURE Conference - Artificial Intelligence and ChatBots - MilanWIFUTURE Conference - Artificial Intelligence and ChatBots - Milan
WIFUTURE Conference - Artificial Intelligence and ChatBots - MilanPietro Leo
 
IBM research 5 in 5 report for 2017
IBM research 5 in 5 report for 2017IBM research 5 in 5 report for 2017
IBM research 5 in 5 report for 2017Pietro Leo
 
Cognitive Computing: Challenges and opportunities in Building an Artificial I...
Cognitive Computing: Challenges and opportunities in Building an Artificial I...Cognitive Computing: Challenges and opportunities in Building an Artificial I...
Cognitive Computing: Challenges and opportunities in Building an Artificial I...Pietro Leo
 
Cognitive Computing
Cognitive ComputingCognitive Computing
Cognitive ComputingPietro Leo
 
Convegno Panorama d'Italia - San Raffaele
Convegno Panorama d'Italia - San RaffaeleConvegno Panorama d'Italia - San Raffaele
Convegno Panorama d'Italia - San RaffaelePietro Leo
 
A cognitive business is a business that thinks
A cognitive business is a business that thinks A cognitive business is a business that thinks
A cognitive business is a business that thinks Pietro Leo
 

More from Pietro Leo (18)

Reading the IBM AI Strategy for Business
Reading the IBM AI Strategy for BusinessReading the IBM AI Strategy for Business
Reading the IBM AI Strategy for Business
 
Selected IBM Research projects around "Water"
Selected IBM Research projects around "Water"Selected IBM Research projects around "Water"
Selected IBM Research projects around "Water"
 
How COVID-19 is accelerating the change of the World.
How COVID-19 is accelerating the change of the World.How COVID-19 is accelerating the change of the World.
How COVID-19 is accelerating the change of the World.
 
Pietro leo - Active Intelligence
Pietro leo - Active IntelligencePietro leo - Active Intelligence
Pietro leo - Active Intelligence
 
Pietro leo Rome Innovation Summit 2019 - Artificial Risks
Pietro leo Rome Innovation Summit 2019 - Artificial RisksPietro leo Rome Innovation Summit 2019 - Artificial Risks
Pietro leo Rome Innovation Summit 2019 - Artificial Risks
 
Era of Artificial Intelligence Lecture 7 Pietro Leo
Era of Artificial Intelligence Lecture 7 Pietro LeoEra of Artificial Intelligence Lecture 7 Pietro Leo
Era of Artificial Intelligence Lecture 7 Pietro Leo
 
Era of Artificial Intelligence - Lecture 2 - Pietro Leo
Era of Artificial Intelligence - Lecture 2 - Pietro LeoEra of Artificial Intelligence - Lecture 2 - Pietro Leo
Era of Artificial Intelligence - Lecture 2 - Pietro Leo
 
Era of Artificial Intelligence - Lecture1 - Pietro Leo
Era of Artificial Intelligence - Lecture1 - Pietro LeoEra of Artificial Intelligence - Lecture1 - Pietro Leo
Era of Artificial Intelligence - Lecture1 - Pietro Leo
 
CODING... a cosa serve?
CODING... a cosa serve?CODING... a cosa serve?
CODING... a cosa serve?
 
Augmented intelligence pietro_leo_sole24_ore_school
Augmented intelligence pietro_leo_sole24_ore_schoolAugmented intelligence pietro_leo_sole24_ore_school
Augmented intelligence pietro_leo_sole24_ore_school
 
Machine Learning Crash Course 2017 - Genova - DIBRIS - IIT - MIT
Machine Learning Crash Course 2017 - Genova - DIBRIS - IIT - MITMachine Learning Crash Course 2017 - Genova - DIBRIS - IIT - MIT
Machine Learning Crash Course 2017 - Genova - DIBRIS - IIT - MIT
 
Creative Computing: how artificial intelligence could augment designer’s deci...
Creative Computing: how artificial intelligence could augment designer’s deci...Creative Computing: how artificial intelligence could augment designer’s deci...
Creative Computing: how artificial intelligence could augment designer’s deci...
 
WIFUTURE Conference - Artificial Intelligence and ChatBots - Milan
WIFUTURE Conference - Artificial Intelligence and ChatBots - MilanWIFUTURE Conference - Artificial Intelligence and ChatBots - Milan
WIFUTURE Conference - Artificial Intelligence and ChatBots - Milan
 
IBM research 5 in 5 report for 2017
IBM research 5 in 5 report for 2017IBM research 5 in 5 report for 2017
IBM research 5 in 5 report for 2017
 
Cognitive Computing: Challenges and opportunities in Building an Artificial I...
Cognitive Computing: Challenges and opportunities in Building an Artificial I...Cognitive Computing: Challenges and opportunities in Building an Artificial I...
Cognitive Computing: Challenges and opportunities in Building an Artificial I...
 
Cognitive Computing
Cognitive ComputingCognitive Computing
Cognitive Computing
 
Convegno Panorama d'Italia - San Raffaele
Convegno Panorama d'Italia - San RaffaeleConvegno Panorama d'Italia - San Raffaele
Convegno Panorama d'Italia - San Raffaele
 
A cognitive business is a business that thinks
A cognitive business is a business that thinks A cognitive business is a business that thinks
A cognitive business is a business that thinks
 

Recently uploaded

Harmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms PresentationHarmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms Presentationtahreemzahra82
 
Pests of Blackgram, greengram, cowpea_Dr.UPR.pdf
Pests of Blackgram, greengram, cowpea_Dr.UPR.pdfPests of Blackgram, greengram, cowpea_Dr.UPR.pdf
Pests of Blackgram, greengram, cowpea_Dr.UPR.pdfPirithiRaju
 
Neurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 trNeurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 trssuser06f238
 
Davis plaque method.pptx recombinant DNA technology
Davis plaque method.pptx recombinant DNA technologyDavis plaque method.pptx recombinant DNA technology
Davis plaque method.pptx recombinant DNA technologycaarthichand2003
 
User Guide: Orion™ Weather Station (Columbia Weather Systems)
User Guide: Orion™ Weather Station (Columbia Weather Systems)User Guide: Orion™ Weather Station (Columbia Weather Systems)
User Guide: Orion™ Weather Station (Columbia Weather Systems)Columbia Weather Systems
 
TOPIC 8 Temperature and Heat.pdf physics
TOPIC 8 Temperature and Heat.pdf physicsTOPIC 8 Temperature and Heat.pdf physics
TOPIC 8 Temperature and Heat.pdf physicsssuserddc89b
 
Pests of castor_Binomics_Identification_Dr.UPR.pdf
Pests of castor_Binomics_Identification_Dr.UPR.pdfPests of castor_Binomics_Identification_Dr.UPR.pdf
Pests of castor_Binomics_Identification_Dr.UPR.pdfPirithiRaju
 
Scheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxScheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxyaramohamed343013
 
Topic 9- General Principles of International Law.pptx
Topic 9- General Principles of International Law.pptxTopic 9- General Principles of International Law.pptx
Topic 9- General Principles of International Law.pptxJorenAcuavera1
 
Grafana in space: Monitoring Japan's SLIM moon lander in real time
Grafana in space: Monitoring Japan's SLIM moon lander  in real timeGrafana in space: Monitoring Japan's SLIM moon lander  in real time
Grafana in space: Monitoring Japan's SLIM moon lander in real timeSatoshi NAKAHIRA
 
FREE NURSING BUNDLE FOR NURSES.PDF by na
FREE NURSING BUNDLE FOR NURSES.PDF by naFREE NURSING BUNDLE FOR NURSES.PDF by na
FREE NURSING BUNDLE FOR NURSES.PDF by naJASISJULIANOELYNV
 
RESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptx
RESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptxRESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptx
RESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptxFarihaAbdulRasheed
 
BUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdf
BUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdfBUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdf
BUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdfWildaNurAmalia2
 
Pests of jatropha_Bionomics_identification_Dr.UPR.pdf
Pests of jatropha_Bionomics_identification_Dr.UPR.pdfPests of jatropha_Bionomics_identification_Dr.UPR.pdf
Pests of jatropha_Bionomics_identification_Dr.UPR.pdfPirithiRaju
 
preservation, maintanence and improvement of industrial organism.pptx
preservation, maintanence and improvement of industrial organism.pptxpreservation, maintanence and improvement of industrial organism.pptx
preservation, maintanence and improvement of industrial organism.pptxnoordubaliya2003
 
OECD bibliometric indicators: Selected highlights, April 2024
OECD bibliometric indicators: Selected highlights, April 2024OECD bibliometric indicators: Selected highlights, April 2024
OECD bibliometric indicators: Selected highlights, April 2024innovationoecd
 
Pests of Bengal gram_Identification_Dr.UPR.pdf
Pests of Bengal gram_Identification_Dr.UPR.pdfPests of Bengal gram_Identification_Dr.UPR.pdf
Pests of Bengal gram_Identification_Dr.UPR.pdfPirithiRaju
 
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptxSTOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptxMurugaveni B
 
Sulphur & Phosphrus Cycle PowerPoint Presentation (2) [Autosaved]-3-1.pptx
Sulphur & Phosphrus Cycle PowerPoint Presentation (2) [Autosaved]-3-1.pptxSulphur & Phosphrus Cycle PowerPoint Presentation (2) [Autosaved]-3-1.pptx
Sulphur & Phosphrus Cycle PowerPoint Presentation (2) [Autosaved]-3-1.pptxnoordubaliya2003
 
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.aasikanpl
 

Recently uploaded (20)

Harmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms PresentationHarmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms Presentation
 
Pests of Blackgram, greengram, cowpea_Dr.UPR.pdf
Pests of Blackgram, greengram, cowpea_Dr.UPR.pdfPests of Blackgram, greengram, cowpea_Dr.UPR.pdf
Pests of Blackgram, greengram, cowpea_Dr.UPR.pdf
 
Neurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 trNeurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 tr
 
Davis plaque method.pptx recombinant DNA technology
Davis plaque method.pptx recombinant DNA technologyDavis plaque method.pptx recombinant DNA technology
Davis plaque method.pptx recombinant DNA technology
 
User Guide: Orion™ Weather Station (Columbia Weather Systems)
User Guide: Orion™ Weather Station (Columbia Weather Systems)User Guide: Orion™ Weather Station (Columbia Weather Systems)
User Guide: Orion™ Weather Station (Columbia Weather Systems)
 
TOPIC 8 Temperature and Heat.pdf physics
TOPIC 8 Temperature and Heat.pdf physicsTOPIC 8 Temperature and Heat.pdf physics
TOPIC 8 Temperature and Heat.pdf physics
 
Pests of castor_Binomics_Identification_Dr.UPR.pdf
Pests of castor_Binomics_Identification_Dr.UPR.pdfPests of castor_Binomics_Identification_Dr.UPR.pdf
Pests of castor_Binomics_Identification_Dr.UPR.pdf
 
Scheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxScheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docx
 
Topic 9- General Principles of International Law.pptx
Topic 9- General Principles of International Law.pptxTopic 9- General Principles of International Law.pptx
Topic 9- General Principles of International Law.pptx
 
Grafana in space: Monitoring Japan's SLIM moon lander in real time
Grafana in space: Monitoring Japan's SLIM moon lander  in real timeGrafana in space: Monitoring Japan's SLIM moon lander  in real time
Grafana in space: Monitoring Japan's SLIM moon lander in real time
 
FREE NURSING BUNDLE FOR NURSES.PDF by na
FREE NURSING BUNDLE FOR NURSES.PDF by naFREE NURSING BUNDLE FOR NURSES.PDF by na
FREE NURSING BUNDLE FOR NURSES.PDF by na
 
RESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptx
RESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptxRESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptx
RESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptx
 
BUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdf
BUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdfBUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdf
BUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdf
 
Pests of jatropha_Bionomics_identification_Dr.UPR.pdf
Pests of jatropha_Bionomics_identification_Dr.UPR.pdfPests of jatropha_Bionomics_identification_Dr.UPR.pdf
Pests of jatropha_Bionomics_identification_Dr.UPR.pdf
 
preservation, maintanence and improvement of industrial organism.pptx
preservation, maintanence and improvement of industrial organism.pptxpreservation, maintanence and improvement of industrial organism.pptx
preservation, maintanence and improvement of industrial organism.pptx
 
OECD bibliometric indicators: Selected highlights, April 2024
OECD bibliometric indicators: Selected highlights, April 2024OECD bibliometric indicators: Selected highlights, April 2024
OECD bibliometric indicators: Selected highlights, April 2024
 
Pests of Bengal gram_Identification_Dr.UPR.pdf
Pests of Bengal gram_Identification_Dr.UPR.pdfPests of Bengal gram_Identification_Dr.UPR.pdf
Pests of Bengal gram_Identification_Dr.UPR.pdf
 
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptxSTOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
 
Sulphur & Phosphrus Cycle PowerPoint Presentation (2) [Autosaved]-3-1.pptx
Sulphur & Phosphrus Cycle PowerPoint Presentation (2) [Autosaved]-3-1.pptxSulphur & Phosphrus Cycle PowerPoint Presentation (2) [Autosaved]-3-1.pptx
Sulphur & Phosphrus Cycle PowerPoint Presentation (2) [Autosaved]-3-1.pptx
 
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
 

A reading of the IBM Research 5-in-5 2018 Edition

  • 1. 1 http://www.research.ibm.com/5-in-5/ Pietro Leo Executive Architect - IBM Italy CTO for Artificial Intelligence Chief Scientist for IBM Italy Research & Business IBM Academy of Technology Leadership Member of ISO/SC42 Artificial Intelligence Standardization Committee
  • 3. 3Quantum Computing Artificial Intelligence Biases AI Robotic Microscope Lattice Cryptography Crypto-anchors
  • 4. 4 Nobody likes knockoffs. Crypto-anchors and blockchain will unite against counterfeiters. Crypto-anchors
  • 5. 5 Crypto-anchors and blockchain will unite against counterfeiters. Within five years, we’ll embed crypto- anchors such as ink dots and tiny computers smaller than a grain of salt in everyday products – everything from medical kits, to clothing, to car parts and food. We’ll put real-time information from them on a blockchain, giving us a foolproof way to know if a good is authentic and safe to consume. Crypto-anchors
  • 6. 6 Crypto-anchors & Blockchain Source: https://www.youtube.com/watch?v=LUFWk55w5o0
  • 7. 7 Preliminary scientific evidences IBM Research crypto Anchors for Diagnostic devices: https://www.zurich.ibm.com/st/precision_diagnostics/cryptoanchors.html Crypto anchors extend blockchain’s Value Into the physical realm. Crypto Anchors address this challenge by embedding a security code in microfluidic diagnostic devices and “classical” lateral flow tests. This code can be used to identify and link products to highly secured digital transactions on the Cloud and using Blockchain. Crypto anchors come in many forms. They can even be embedded into an editable shade of a magnetic ink, which can be used to dye a malaria pill, for example IBM Research Crypto Anchor for diagnostic devices
  • 9. 9 We are preparing for the day cyber- attackers will breach most of today’s cybersecurity methods and quantum computers will break all current forms of encryption. Our scientists have already submitted a post-quantum encryption method to the U.S. government for consideration as a potential standard. And they’ve developed new security methods based on lattice cryptography, which is essentially incredibly hard math. This technique makes it possible to perform calculations on a file without ever seeing sensitive data or exposing it to hackers. Lattice cryptography
  • 11. 11 Source: G. Gentry, IBM Research, Computing Arbitrary Functions of Encrypted Data – ACM http://ece.gmu.edu/coursewebpages/ECE/ECE646/F10/project/F10_Project_Resources/Computing_Arbitrary_Functio ns_of_Encrypted_Data.pdf Usable Full Homomorphic Encryption 2010 2011 2012 2013 2014 Estimated amortized time for computing a single bit operation on encrypted data Moore’s law 2009-10: Plausibility [GH’11] A single bit operation takes 30 minutes IBM Patent 2013 2011-2012: “Real Circuits” [GHS’12] A 30,000- gate in 36 hours 2013-today: Usability HElib [HS’14]: IBM’s open-source FHE implementation Basis for “generic” FHE computation An “assembly language” for FHE Implements Brakerski-Gentry-Vaikuntanathan (BGV) scheme Security based on ring LWE (RLWE) The same 30,000-gate circuit in 4-15 minutes www.pieroleo.com
  • 12. 1. How to share genomic data in a way that preserves the privacy of the data donors, without undermining the utility of the data or impeding its convenient dissemination? 2. How to perform a LARGE--SCALE, PRVIACY--PRESERVING analysis on genomic data, in an untrusted cloud environment or across multiple users? • Fast drop in the cost of genome- -sequencing 2000: $3 billion • Mar. 2014: $1,000 • Genotyping 1M variations: below $200 Unleashing the potenDal of the technology • Healthcare: e.g., disease risk detection, personalized • medicine • Biomedical research: e.g., • geno-phono • association • Legal and forensic • DTC: e.g., ancestry test, paternity test Full Homomorphic Encryption Examples – Genome Analysis
  • 13. Source: The 2nd Comparison on Critical Assessment of Data Privacy and Protect Secure Genome Analysis http://www.humangenomeprivacy.org/2015/slides/003_iDASH%20workshop%202015_setStage.pdf Computing the Hamming distance between two Human Genomes under a Full Homomorphic Encryption schema
  • 14.
  • 15. https://arxiv.org/pdf/1512.04965.pdf “One of our main findings is that the number of logical qubits required to implement a Grover attack on AES is relatively low, namely between around 3000 and 7000 logical qubits.” “When realizing AES, only SubBytes Involves T-gates. Moreover, SubBytes is called a minimum of 296 times as in AES-128 and up to 420 times in AES-256. As shown above, for all three standardized key lengths, this results in quantum circuits of quite moderate complexity. So it seems prudent to move away from 128-bit keys when expecting the availability of at least a moderate size quantum computer.”
  • 18. Source: https://pq-crystals.org/index.shtml Post-quantum cryptography suite submitted by IBM and other partners to NIST call
  • 19. Source: https://falcon-sign.info/ Post-quantum cryptography suite submitted by IBM and other partners to NIST call
  • 20. Source: IBM Researcher comments https://securityintelligence.com/preparing-next-era-computing-quantum-safe-cryptography/ N=pq gx=y mod p Factoring is hard Computing discrete logs is hard Finding short vectors in lattices is hard
  • 21. Assumptions for Quantum-Resilient Public-Key Cryptography N=pq gx=y mod p Factoring is hard Finding short vectors in lattices is hard Computing discrete logs is hard (f,g) in Z[x]/(xn+1) Lattice-Based Cryptography
  • 22. 22 Our oceans are dirty. AI- powered robot microscopes may save them. AI Robotic Microscope
  • 23. 23 In five years, small, autonomous AI microscopes, networked in the cloud and deployed around the world, will continually monitor the activities of plankton, which are natural, biological sensors of aquatic health. By observing certain indicators, we can anticipate ways to protect the global water supply. AI Robotic Microscope
  • 25. 25 Phytoplankton, Why are they important? Surce: https://www.whoi.edu/main/topic/phytoplankton Phytoplankton are some of Earth's most critical organisms and so it is vital study and understand them. They generate about half the atmosphere's oxygen, as much per year as all land plants. Phytoplankton also form the base of virtually every ocean food web. In short, they make most other ocean life possible. Phytoplankton are mostly microscopic, single-celled photosynthetic organisms that live suspended in water.
  • 26. 26 Simone BiancoIBM Almaden Research Center http://cellgeometry.ucsf.edu/sites/cellgeometry.ucsf.edu/files/STC_Project_5_CellStateInferenceEngine_final.pdf Cellular Sentinel Workflow
  • 27. 27 From morphology vectors to cell state Simone BiancoIBM Almaden Research Center http://cellgeometry.ucsf.edu/sites/cellgeometry.ucsf.edu/files/STC_Project_5_CellStateInferenceEngine_final.pdf
  • 28. 28 Artificial Intelligence Biases AI bias will explode. But only the unbiased AI will survive.
  • 29. 29 Within five years, we’ll have new solutions to counter a substantial increase in the number of biased AI systems and algorithms. IBM researchers developed a method to reduce the bias that may be present in a training dataset, such that any AI algorithm that later learns from that dataset will perpetuate as little inequity as possible. Artificial Intelligence Biases
  • 30. 30 Artificial Intelligence Biases Sorce: https://www.youtube.com/watch?v=q44XUZdCIMM
  • 32. Source: Gender Shades: IntersectionalAccuracy Disparities in Commercial Gender Classification, Buolamwin (MIT) and Gebru (Microsoft) http://proceedings.mlr.press/v81/buolamwini18a/buolamwini18a.pdf Face++ 34.5 (Dark Female) 0.7 (Dark Male) 6.0 (Light Female) 0.8 (Light Male) Microsoft 20.8 (Dark Female) 6.0 (Dark Male) 1.7 (Light Female) 0.0 (Light Male) IBM 34.7 (Dark Female 12.0 (Dark Male) 7.1 (Light Female) 0.3 (Light Male) Error Rates in gender classification Call to action 4 October 2017
  • 33. Source: IBM Mitigating Bias in AI Models - https://www.ibm.com/blogs/research/2018/02/mitigating- bias-ai-models/ Face++ (NO ANSWER) 34.5 (Dark Female) 0.7 (Dark Male) 6.0 (Light Female) 0.8 (Light Male) Microsoft (WILL ANDWER) 20.8 (Dark Female) 6.0 (Dark Male) 1.7 (Light Female) 0.0 (Light Male) IBM (ANSWERED - February 6) 3,46 (Dark Female) <- 34.7 1,99 Dark Male) <– 12.0 0,0 (Light Female) <– 7.1 0.25 (Light Male) <– 0.3 Public exposure of AI services is placing new kind of pressures to be solved quickly IBM (Production Env.- Update February 23)
  • 34. Fairness, accountability and ethics in AI § A novel probabilistic formulation of data pre-processing for reducing discrimination. Source: Calmon, Wei, Ramamurthy& Varshney, “Optimized Data Pre-Processing for Discrimination Prevention,” NIPS 2017
  • 35. 35 Today, quantum computing is a researcher’s playground. In five years, it will be mainstream. Quantum Computing
  • 36. 36 In five years, it will be mainstream. Quantum computing will be used extensively by new categories of professionals, developers, and students to solve problems once considered unsolvable. And given IBM’s longstanding leadership in quantum, they will continue to partner with us on future applications of this revolutionary technology. Quantum Computing
  • 38. 38 The future is quantum • A 20 qubits available on cloud to our clients at the end of this year (already made available 5-16 and 17 qubits) • A prototype with 50 qubits has been successful tested with a double of coherence time with respect previous systems. • An open source Quantum Information software (Qikit) • Quantum Computing: Breaking Through the 49 Qubit Simulation Barrier .Source: https://www.ibm.com/blogs/research/2017/11/the-future-is-quantum Source: https://www.ibm.com/blogs/research/2017/10/quantum-computing- barrier/
  • 39.
  • 40. 40 Preliminary scientific evidences IBM Q Experience First QC on the cloud > 75,000 users All 7 continents > 2.8 million experiments 60+ external papers >150 colleges and universities
  • 41. 41 Simulating molecules on quantum computers just got much easier with quantum hardware. https://www.ibm.com/blogs/research/2017/09/quantum-molecule/ Article published in Nature, Hardware-efficient Variational Quantum Eigensolver for Small Molecules and Quantum Magnets by IBM Research implement a new quantum algorithm capable of efficiently computing the lowest energy state of small molecules. Preliminary scientific evidences
  • 42. 42 Example of external papers https://arxiv.org/pdf/1801.03782.pdf
  • 43. IBM Research: A global research capability Australia China Almaden Haifa Zurich Africa Ireland Brazil Watson Austin India Tokyo 3000 Researchers 6 Nobel Laureates 25 Years of Patent Leadership 10 National Medals of Technology 5 National Medals of Science 3 Kavli Prizes 6 Turing Awards 69 NAE Members 123 IEEE Fellows 28 ACM Fellows 99 IBM Fellows Cambridge Singapore
  • 44. 44 http://www.research.ibm.com/5-in-5/ Pietro Leo Executive Architect - IBM Italy CTO for Artificial Intelligence Chief Scientist for IBM Italy Research & Business IBM Academy of Technology Leadership Member of ISO/SC42 Artificial Intelligence Standardization Committee @pieroleo www.pieroleo.com