- Russia, China, and the US are engaged in an intensifying race to develop military capabilities based on artificial intelligence technologies like autonomous drones and vehicles.
- These countries see AI as vital to national security and plan to invest heavily in AI research and development to gain strategic advantages in areas like intelligence analysis, cyber operations, and unmanned military systems.
- The development and proliferation of affordable AI-enabled technologies may empower both state and non-state actors with new types of long range strike capabilities and tools for cyber warfare.
Ghana Telecom is the main provider of telecommunications infrastructure in Ghana, which is crucial for the country's economic growth and development. They needed to secure telephone exchanges, equipment rooms, and repeater stations to prevent unauthorized access and ensure the network remained intact. Ghana Telecom implemented a solution using Verid+ biometric fingerprint readers and iCLASS smartcards, which store fingerprint templates on the card. This allows identification without networking, reducing costs and administration. The solution has successfully secured Ghana Telecom's infrastructure sites.
The document discusses security issues in cyber-physical systems and proposes enforcing sensor network theory, information flow-based theory, and control theory to develop security policies and mechanisms for cyber-physical systems. It categorizes different types of attacks based on these three approaches and discusses mitigations to improve cyber-physical system security and allow their continued growth. The document defines cyber-physical systems as integrated computational and physical processes that sense, interact with, and control physical entities using communication, computation, and feedback control.
The document discusses challenges related to internal security threats in India and approaches to address them through enhanced technologies for intelligence and operations management. It notes the changing nature of security threats like naxalism and terrorism and need for better intelligence gathering and analysis. It proposes an Unconventional Conflict and Intelligence Management System (UCIMS) that leverages technologies like data mining, link analysis, geospatial analysis to automate intelligence creation and enable network-centric command and control.
The document discusses the formation of an IoT Security Task Force by the IoT Forum and CISO Platform to develop threat models, controls, and arrangements to improve IoT security. It proposes a "SECURENET" concept involving managed security network providers that would monitor IoT traffic and devices, block suspicious activity, and collaborate to identify security issues. The task force aims to provide fresh thinking around technical and legal approaches to attribute attacks and enable self-defense in IoT networks through a regulatory sandbox and cross-border response protocols. Critiques and improvements are invited.
This document discusses cybersecurity issues related to critical infrastructure. It begins by providing examples of past cyberattacks on industrial systems and infrastructure in countries like the US, Germany, and Israel. It then discusses the challenges of securing industrial control systems and critical infrastructure from cyberattacks. The document calls for coordinated efforts between government and industry to address these challenges through clear roles and responsibilities, information sharing, and public-private partnerships. It emphasizes the need to prioritize cybersecurity and treat it with the same importance as national security issues.
The document announces the 8th Annual Military Radar Summit to be held from February 23-25, 2015 in Washington D.C. The summit will bring together key military branches, government agencies, and defense contractors to discuss strategies to improve radar capabilities and overcome challenges. Some of the topics to be covered include cost effective upgrades to radar systems, maintaining advantages over foreign technologies, and harnessing developments in over-the-horizon radar and MIMO systems. The event will feature presentations from senior leaders at organizations such as Lockheed Martin, Rockwell Collins, and Sandia National Laboratories.
The document presents a project on developing a three-factor authentication (3FA) smart lock system called iSecure. It discusses introducing RFID, PIN, and OTP for secure authentication. The system aims to provide secure access, fast authentication, and logs all attempts. Hardware components include a Raspberry Pi, touch screen, RFID reader, relay module, and electric lock. The system design includes a database to store user data and works through RFID detection, PIN verification, and OTP validation. Future work may include additional authentication methods and improvements to security, notifications, and customization.
Top 5 Emerging Technology Areas that CTOs Should Invest in 2020 and BeyondCloud Analogy
If you have been looking for the top 5 emerging technology areas that CTOs should look at in 2020 and beyond, this presentation would be useful to you in more than just a way. Discover the best of cloud computing, end user experience, 5G environments, and more now!
Ghana Telecom is the main provider of telecommunications infrastructure in Ghana, which is crucial for the country's economic growth and development. They needed to secure telephone exchanges, equipment rooms, and repeater stations to prevent unauthorized access and ensure the network remained intact. Ghana Telecom implemented a solution using Verid+ biometric fingerprint readers and iCLASS smartcards, which store fingerprint templates on the card. This allows identification without networking, reducing costs and administration. The solution has successfully secured Ghana Telecom's infrastructure sites.
The document discusses security issues in cyber-physical systems and proposes enforcing sensor network theory, information flow-based theory, and control theory to develop security policies and mechanisms for cyber-physical systems. It categorizes different types of attacks based on these three approaches and discusses mitigations to improve cyber-physical system security and allow their continued growth. The document defines cyber-physical systems as integrated computational and physical processes that sense, interact with, and control physical entities using communication, computation, and feedback control.
The document discusses challenges related to internal security threats in India and approaches to address them through enhanced technologies for intelligence and operations management. It notes the changing nature of security threats like naxalism and terrorism and need for better intelligence gathering and analysis. It proposes an Unconventional Conflict and Intelligence Management System (UCIMS) that leverages technologies like data mining, link analysis, geospatial analysis to automate intelligence creation and enable network-centric command and control.
The document discusses the formation of an IoT Security Task Force by the IoT Forum and CISO Platform to develop threat models, controls, and arrangements to improve IoT security. It proposes a "SECURENET" concept involving managed security network providers that would monitor IoT traffic and devices, block suspicious activity, and collaborate to identify security issues. The task force aims to provide fresh thinking around technical and legal approaches to attribute attacks and enable self-defense in IoT networks through a regulatory sandbox and cross-border response protocols. Critiques and improvements are invited.
This document discusses cybersecurity issues related to critical infrastructure. It begins by providing examples of past cyberattacks on industrial systems and infrastructure in countries like the US, Germany, and Israel. It then discusses the challenges of securing industrial control systems and critical infrastructure from cyberattacks. The document calls for coordinated efforts between government and industry to address these challenges through clear roles and responsibilities, information sharing, and public-private partnerships. It emphasizes the need to prioritize cybersecurity and treat it with the same importance as national security issues.
The document announces the 8th Annual Military Radar Summit to be held from February 23-25, 2015 in Washington D.C. The summit will bring together key military branches, government agencies, and defense contractors to discuss strategies to improve radar capabilities and overcome challenges. Some of the topics to be covered include cost effective upgrades to radar systems, maintaining advantages over foreign technologies, and harnessing developments in over-the-horizon radar and MIMO systems. The event will feature presentations from senior leaders at organizations such as Lockheed Martin, Rockwell Collins, and Sandia National Laboratories.
The document presents a project on developing a three-factor authentication (3FA) smart lock system called iSecure. It discusses introducing RFID, PIN, and OTP for secure authentication. The system aims to provide secure access, fast authentication, and logs all attempts. Hardware components include a Raspberry Pi, touch screen, RFID reader, relay module, and electric lock. The system design includes a database to store user data and works through RFID detection, PIN verification, and OTP validation. Future work may include additional authentication methods and improvements to security, notifications, and customization.
Top 5 Emerging Technology Areas that CTOs Should Invest in 2020 and BeyondCloud Analogy
If you have been looking for the top 5 emerging technology areas that CTOs should look at in 2020 and beyond, this presentation would be useful to you in more than just a way. Discover the best of cloud computing, end user experience, 5G environments, and more now!
Tech USA Government Solutions (TGS) is a premier provider of innovative technology and communications solutions to the Department of Defense, federal agencies, and intelligence community. Headquartered in Maryland with 13 program offices and nearly 1,000 technical employees, TGS has over a decade of experience supporting mission-critical programs through services such as IT, engineering, cybersecurity and more. Their capabilities include classified support up to the Top Secret level.
The document discusses investing in Vietnam through Ascendas, a business space solutions provider. It summarizes Ascendas' experience in Vietnam over 10+ years, and their ability to provide flexible financing and infrastructure. The document also summarizes key challenges to investing in Vietnam like inflation and infrastructure issues, and notes the differences between investing in Northern vs. Southern Vietnam. Finally, it provides details on Ascendas-Protrade Singapore Tech Park, a 500-hectare industrial park joint venture in Vietnam that will offer land and buildings to investors.
Dell NVIDIA AI Powered Transformation in Financial Services WebinarBill Wong
Digital transformation through data analytics and AI can help financial services firms address business, technology, and labor challenges caused by COVID-19. Key trends include increased reliance on remote work and digital platforms, and the importance of data analytics for decision making. By 2025, 90% of new apps will use AI. The document discusses NVIDIA and Dell Technologies' partnership and strategies for providing infrastructure to support AI workloads through solutions like the DGX A100 system, which can support training, inference, and analytics on one platform through technologies like GPUs and MIG. This helps provide a more flexible and efficient infrastructure compared to traditional siloed approaches.
Efficient regular language search for secure cloud storageShakas Technologies
This document proposes an efficient regular language searchable encryption scheme for secure cloud storage. The scheme supports regular language encryption and deterministic finite automata (DFA) based data retrieval. It allows for a large universe where the symbol set does not need to be predefined. The scheme is private, secure against offline keyword guessing attacks, supports multiple users who can generate DFA tokens with their private keys without interacting with a key generation center. It is efficient and provably secure in the standard model. Simulations show it has superior functionality and performance compared to other schemes.
Tracxn - Internet of things infrastructure Startup LandscapeTracxn
The document provides an overview of the internet of things infrastructure sector. It discusses key investment trends such as total funding amounting to $6.4 billion, notable companies in the sector including Sigfox and Samsara, and subsectors like IoT platforms and hardware/software modules that have seen significant investment. The summary also outlines the top markets within IoT infrastructure based on number of companies and funding amounts.
This document provides information about the 8th annual MilSatCom Asia-Pacific conference on increasing military satellite communication capabilities in the Asia-Pacific region through next-generation technologies. The conference will take place on May 14-15, 2018 in Singapore and feature speakers from military and government organizations discussing topics such as developing protected satellite communication capabilities, optimizing assets through international cooperation, and addressing challenges like space debris. The document outlines the conference agenda, speaker details, registration information, and sponsorship opportunities.
How cloud computing is changing the automotive industryZara Watsonn
The document discusses how cloud computing is benefiting the automotive industry. It provides examples such as Google's self-driving car which relies on real-time data processing through cloud computing. The cloud reduces costs by managing IT infrastructure remotely rather than on-site. It also helps meet the automotive industry's complex engineering and data needs through fast data processing. Additional benefits include supporting advanced cabin systems, improving security and reducing risks, and ensuring data protection during natural disasters. The document promotes FuGenX as a company that can help automotive businesses adopt cloud computing and mobility solutions.
Device to Intelligence, IOT and Big Data in OracleJunSeok Seo
The document discusses Internet of Things (IoT) and big data in the context of Oracle technologies. It provides examples of how Oracle solutions have helped companies in various industries like transportation, healthcare, manufacturing, and telecommunications manage IoT and big data. Specifically, it highlights how Oracle technologies allow for efficient processing, analysis and management of large volumes of data from IoT devices and sensor networks in real-time.
IRJET- Artificial Intelligence in Defense SectorIRJET Journal
This document discusses the growing use of artificial intelligence in military and defense applications globally and in India. It provides an overview of AI investments and development efforts by the US, China, and India. Key points include:
- The US and China are leading in developing AI for military uses such as drones, robots, and autonomous weapons. The US invests over $17 billion annually through DARPA.
- India is also increasingly developing AI and robotics for its defense sector through organizations like the DRDO and CAIR. It is working on projects like autonomous drones and a framework for teams of cooperative robots (MARF).
- Both opportunities and ethical concerns exist regarding developing autonomous or lethal weapons using AI. India
“Real Time Machine Learning Architecture and Sentiment Analysis Applied to Fi...Quantopian
Presented at QuantCon Singapore 2016, Quantopian's quantitative finance and algorithmic trading conference, November 11th.
The vast proliferation of data related to the financial industry introduces both new opportunities and challenges to quantitative investors. These challenges are often due to the nature of big data and include: volume, variety, and velocity.
In this talk, Dr. Cheng will take the audience on a tour of the “big-data production line” in InfoTrie and show how the financial news collected from various and customizable sources are transformed into quantitative signals in a real-time manner. The talk will touch on various kind of topics like sentiment analysis, entity detection, topic classification, and big-data tools.
The document discusses machine to machine (M2M) applications as a driver of capacity and infrastructure demand. It notes that M2M is still in its infancy but is already a major force for capacity growth. Examples provided include smartphones, driverless trains, and sensors for oil and gas production. The oil and gas industry in particular stands to benefit from improved connectivity to enable remote and unmanned operations. M2M applications will continue advancing according to Moore's Law and require more resilient, higher capacity backbone networks to support exponential data growth from industrial and scientific applications.
Christopher W. Wright is a retired Army veteran with over 18 years of experience in leadership, management, cyber operations, and network administration. He has a Masters in Political Science and Bachelors in History. Throughout his career he has managed large communication networks supporting military operations, developed security policies, and supervised teams of up to 20 personnel. He has extensive experience in satellite communications, network engineering, and information assurance.
This document discusses potential applications of blockchain technology in the manufacturing industry. It begins by defining distributed ledger technology (DLT) and explaining how it enables new business models through transparency and trust. The document then outlines how DLT could impact areas like smart contracts, auditing, file storage, microgrids, and land title registration. It also notes limitations like lack of clear ROI and immature standards. The document concludes by suggesting DLT could be deployed in supply chain management and mentions potential applications in areas like intellectual property protection and prediction markets.
This document provides an overview of Qraft Technologies, Inc. It introduces the company's leadership team and describes their areas of focus, including developing artificial intelligence systems for asset management, listing AI ETFs on the NYSE, and creating an AI-driven trading execution system called AXE. The document also discusses trends in the asset management industry, such as the emergence of active index funds and smart beta ETFs, and outlines Qraft's vision for transitioning the industry to more AI-driven processes.
Provides a brief overview of the IT Market in Qatar as of September,2015. It covers the following aspects:
1. Size of the IT market(Services, Hardware and Software) in Qatar
2. An outlook on some of the current IT Service Providers in Qatar
3. Major initiatives/projects and key drivers for IT growth in Qatar
4. Key Challenges to the growth
5. Current Ongoing projects in Qatar where scope of IT investment is huge
Provides a brief overview of the IT Market in Qatar. It covers the following aspects:
1. Size of the IT market(Services, Hardware and Software) in Qatar
2. An outlook on some of the current IT Service Providers in Qatar
3. Major initiatives/projects and key drivers for IT growth in Qatar
4. Key Challenges to the growth
5. Current Ongoing projects in Qatar where scope of IT investment is huge
The document is a project report submitted by Shoab Khan detailing the creation of a custom application for Tata Cummins Limited to request and track non-CGD items in Oracle Applications. The project involved designing database tables, developing a form to request items, and a report to view item details. The form allows users to enter item requests which are then routed to approvers. Approved requests are sent to the helpdesk for fulfillment.
Telecom Network & SIEM logs analysis using machine learningALTANAI BISHT
This document summarizes a presentation on analyzing telecom network and SIEM logs using machine learning. The presentation discusses:
1. The growing field of telecommunications technologies and the increased demand during the COVID-19 pandemic.
2. The need for security event management in telecom networks given risks like intrusions, fraud, and ransomware attacks.
3. How to implement dynamic security event management using machine learning by gathering data from various logs and analyzing patterns in real-time to detect anomalies and intrusions.
Tracxn - Data Center Infrastructure Startup LandscapeTracxn
The document provides an overview of the data center infrastructure sector including key metrics on investment trends, subsectors, notable companies, and exits. It summarizes that there are over 922 companies tracked in the sector that have raised $11.4B total with the top markets being data center providers (colocation and modular), equipment (converged infrastructure), and fiber optic networks. Major public companies include Zayo Group, Switch, Nutanix, and Hewlett Packard Enterprise.
This document contains a resume for Ajwad.P.Abu seeking an IT position. It includes contact information, career objective, over 4 years of experience in IT support, various technical skills and certifications, educational background including a Bachelor's Degree in Electronics, and 3 previous IT support roles with descriptions of responsibilities. It also lists personal skills, a personal profile with details, and a reference contact.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Tech USA Government Solutions (TGS) is a premier provider of innovative technology and communications solutions to the Department of Defense, federal agencies, and intelligence community. Headquartered in Maryland with 13 program offices and nearly 1,000 technical employees, TGS has over a decade of experience supporting mission-critical programs through services such as IT, engineering, cybersecurity and more. Their capabilities include classified support up to the Top Secret level.
The document discusses investing in Vietnam through Ascendas, a business space solutions provider. It summarizes Ascendas' experience in Vietnam over 10+ years, and their ability to provide flexible financing and infrastructure. The document also summarizes key challenges to investing in Vietnam like inflation and infrastructure issues, and notes the differences between investing in Northern vs. Southern Vietnam. Finally, it provides details on Ascendas-Protrade Singapore Tech Park, a 500-hectare industrial park joint venture in Vietnam that will offer land and buildings to investors.
Dell NVIDIA AI Powered Transformation in Financial Services WebinarBill Wong
Digital transformation through data analytics and AI can help financial services firms address business, technology, and labor challenges caused by COVID-19. Key trends include increased reliance on remote work and digital platforms, and the importance of data analytics for decision making. By 2025, 90% of new apps will use AI. The document discusses NVIDIA and Dell Technologies' partnership and strategies for providing infrastructure to support AI workloads through solutions like the DGX A100 system, which can support training, inference, and analytics on one platform through technologies like GPUs and MIG. This helps provide a more flexible and efficient infrastructure compared to traditional siloed approaches.
Efficient regular language search for secure cloud storageShakas Technologies
This document proposes an efficient regular language searchable encryption scheme for secure cloud storage. The scheme supports regular language encryption and deterministic finite automata (DFA) based data retrieval. It allows for a large universe where the symbol set does not need to be predefined. The scheme is private, secure against offline keyword guessing attacks, supports multiple users who can generate DFA tokens with their private keys without interacting with a key generation center. It is efficient and provably secure in the standard model. Simulations show it has superior functionality and performance compared to other schemes.
Tracxn - Internet of things infrastructure Startup LandscapeTracxn
The document provides an overview of the internet of things infrastructure sector. It discusses key investment trends such as total funding amounting to $6.4 billion, notable companies in the sector including Sigfox and Samsara, and subsectors like IoT platforms and hardware/software modules that have seen significant investment. The summary also outlines the top markets within IoT infrastructure based on number of companies and funding amounts.
This document provides information about the 8th annual MilSatCom Asia-Pacific conference on increasing military satellite communication capabilities in the Asia-Pacific region through next-generation technologies. The conference will take place on May 14-15, 2018 in Singapore and feature speakers from military and government organizations discussing topics such as developing protected satellite communication capabilities, optimizing assets through international cooperation, and addressing challenges like space debris. The document outlines the conference agenda, speaker details, registration information, and sponsorship opportunities.
How cloud computing is changing the automotive industryZara Watsonn
The document discusses how cloud computing is benefiting the automotive industry. It provides examples such as Google's self-driving car which relies on real-time data processing through cloud computing. The cloud reduces costs by managing IT infrastructure remotely rather than on-site. It also helps meet the automotive industry's complex engineering and data needs through fast data processing. Additional benefits include supporting advanced cabin systems, improving security and reducing risks, and ensuring data protection during natural disasters. The document promotes FuGenX as a company that can help automotive businesses adopt cloud computing and mobility solutions.
Device to Intelligence, IOT and Big Data in OracleJunSeok Seo
The document discusses Internet of Things (IoT) and big data in the context of Oracle technologies. It provides examples of how Oracle solutions have helped companies in various industries like transportation, healthcare, manufacturing, and telecommunications manage IoT and big data. Specifically, it highlights how Oracle technologies allow for efficient processing, analysis and management of large volumes of data from IoT devices and sensor networks in real-time.
IRJET- Artificial Intelligence in Defense SectorIRJET Journal
This document discusses the growing use of artificial intelligence in military and defense applications globally and in India. It provides an overview of AI investments and development efforts by the US, China, and India. Key points include:
- The US and China are leading in developing AI for military uses such as drones, robots, and autonomous weapons. The US invests over $17 billion annually through DARPA.
- India is also increasingly developing AI and robotics for its defense sector through organizations like the DRDO and CAIR. It is working on projects like autonomous drones and a framework for teams of cooperative robots (MARF).
- Both opportunities and ethical concerns exist regarding developing autonomous or lethal weapons using AI. India
“Real Time Machine Learning Architecture and Sentiment Analysis Applied to Fi...Quantopian
Presented at QuantCon Singapore 2016, Quantopian's quantitative finance and algorithmic trading conference, November 11th.
The vast proliferation of data related to the financial industry introduces both new opportunities and challenges to quantitative investors. These challenges are often due to the nature of big data and include: volume, variety, and velocity.
In this talk, Dr. Cheng will take the audience on a tour of the “big-data production line” in InfoTrie and show how the financial news collected from various and customizable sources are transformed into quantitative signals in a real-time manner. The talk will touch on various kind of topics like sentiment analysis, entity detection, topic classification, and big-data tools.
The document discusses machine to machine (M2M) applications as a driver of capacity and infrastructure demand. It notes that M2M is still in its infancy but is already a major force for capacity growth. Examples provided include smartphones, driverless trains, and sensors for oil and gas production. The oil and gas industry in particular stands to benefit from improved connectivity to enable remote and unmanned operations. M2M applications will continue advancing according to Moore's Law and require more resilient, higher capacity backbone networks to support exponential data growth from industrial and scientific applications.
Christopher W. Wright is a retired Army veteran with over 18 years of experience in leadership, management, cyber operations, and network administration. He has a Masters in Political Science and Bachelors in History. Throughout his career he has managed large communication networks supporting military operations, developed security policies, and supervised teams of up to 20 personnel. He has extensive experience in satellite communications, network engineering, and information assurance.
This document discusses potential applications of blockchain technology in the manufacturing industry. It begins by defining distributed ledger technology (DLT) and explaining how it enables new business models through transparency and trust. The document then outlines how DLT could impact areas like smart contracts, auditing, file storage, microgrids, and land title registration. It also notes limitations like lack of clear ROI and immature standards. The document concludes by suggesting DLT could be deployed in supply chain management and mentions potential applications in areas like intellectual property protection and prediction markets.
This document provides an overview of Qraft Technologies, Inc. It introduces the company's leadership team and describes their areas of focus, including developing artificial intelligence systems for asset management, listing AI ETFs on the NYSE, and creating an AI-driven trading execution system called AXE. The document also discusses trends in the asset management industry, such as the emergence of active index funds and smart beta ETFs, and outlines Qraft's vision for transitioning the industry to more AI-driven processes.
Provides a brief overview of the IT Market in Qatar as of September,2015. It covers the following aspects:
1. Size of the IT market(Services, Hardware and Software) in Qatar
2. An outlook on some of the current IT Service Providers in Qatar
3. Major initiatives/projects and key drivers for IT growth in Qatar
4. Key Challenges to the growth
5. Current Ongoing projects in Qatar where scope of IT investment is huge
Provides a brief overview of the IT Market in Qatar. It covers the following aspects:
1. Size of the IT market(Services, Hardware and Software) in Qatar
2. An outlook on some of the current IT Service Providers in Qatar
3. Major initiatives/projects and key drivers for IT growth in Qatar
4. Key Challenges to the growth
5. Current Ongoing projects in Qatar where scope of IT investment is huge
The document is a project report submitted by Shoab Khan detailing the creation of a custom application for Tata Cummins Limited to request and track non-CGD items in Oracle Applications. The project involved designing database tables, developing a form to request items, and a report to view item details. The form allows users to enter item requests which are then routed to approvers. Approved requests are sent to the helpdesk for fulfillment.
Telecom Network & SIEM logs analysis using machine learningALTANAI BISHT
This document summarizes a presentation on analyzing telecom network and SIEM logs using machine learning. The presentation discusses:
1. The growing field of telecommunications technologies and the increased demand during the COVID-19 pandemic.
2. The need for security event management in telecom networks given risks like intrusions, fraud, and ransomware attacks.
3. How to implement dynamic security event management using machine learning by gathering data from various logs and analyzing patterns in real-time to detect anomalies and intrusions.
Tracxn - Data Center Infrastructure Startup LandscapeTracxn
The document provides an overview of the data center infrastructure sector including key metrics on investment trends, subsectors, notable companies, and exits. It summarizes that there are over 922 companies tracked in the sector that have raised $11.4B total with the top markets being data center providers (colocation and modular), equipment (converged infrastructure), and fiber optic networks. Major public companies include Zayo Group, Switch, Nutanix, and Hewlett Packard Enterprise.
This document contains a resume for Ajwad.P.Abu seeking an IT position. It includes contact information, career objective, over 4 years of experience in IT support, various technical skills and certifications, educational background including a Bachelor's Degree in Electronics, and 3 previous IT support roles with descriptions of responsibilities. It also lists personal skills, a personal profile with details, and a reference contact.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
20 Comprehensive Checklist of Designing and Developing a WebsitePixlogix Infotech
Dive into the world of Website Designing and Developing with Pixlogix! Looking to create a stunning online presence? Look no further! Our comprehensive checklist covers everything you need to know to craft a website that stands out. From user-friendly design to seamless functionality, we've got you covered. Don't miss out on this invaluable resource! Check out our checklist now at Pixlogix and start your journey towards a captivating online presence today.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
1. Asian Tiger Capital Partners, Level 16, UTC Tower, Panthapath, Dhaka-1215, Tel: (880)-2-9114286Asian Tiger Capital Partners, Celebration Point (5th floor), Plot – 03, Road – 113/A, Gulshan – 2, Dhaka-1212, Tel: (880)-2-9852111, Web: www.at-capital.com
AI Defence Strategy
Ifty Islam
Managing Partner
Asian Tiger Capital Partners LTD
Tel: +88 0173 0058920 (Dhaka) +447817932685(London)
E-mail: ifty.islam@at-capital.com ; iftyi@mac.com
Web: www.at-capital.com
2. Asian Tiger Capital Partners, Level 16, UTC Tower, Panthapath, Dhaka-1215, Tel: (880)-2-9114286Asian Tiger Capital Partners, Celebration Point (5th floor), Plot – 03, Road – 113/A, Gulshan – 2, Dhaka-1212, Tel: (880)-2-9852111, Web: www.at-capital.com
AI Core Defence Objective Next Decade
• “Artificial intelligence is the future, not only for Russia but for all humankind. Whoever becomes
the leader in this sphere will become the ruler of the world.” - Russian President Putin
• Putin’s advice is the latest sign of an intensifying race among Russia, China, and the US to
accumulate military power based on artificial intelligence. All three countries have proclaimed
intelligent machines as vital to the future of their national security. Technologies such as software
that can sift intelligence material or autonomous drones and ground vehicles are seen as ways to
magnify the power of human soldiers.
• In July, China’s State Council released a detailed strategy designed to make the country “the front-
runner and global innovation centre in AI” by 2030 that pledges to invest in R&D that will
“through AI elevate national defence strength and assure and protect national security.”
• The Pentagon has been developing a strategy known as the “Third Offset,” intended to give the
US, through weapons powered by smart software, the same sort of advantage over potential
adversaries that it once held in nuclear bombs and precision-guided weapons.
1
3. Asian Tiger Capital Partners, Level 16, UTC Tower, Panthapath, Dhaka-1215, Tel: (880)-2-9114286Asian Tiger Capital Partners, Celebration Point (5th floor), Plot – 03, Road – 113/A, Gulshan – 2, Dhaka-1212, Tel: (880)-2-9852111, Web: www.at-capital.com
Rapid Rise of AI
There are four key drivers behind the rapid progress in AI technology:
• Decades of exponential growth in computing performance
• Increased availability of large datasets upon which to train machine learning
system
• Advances in the implementation of machine learning techniques
• Significant and rapidly increasing commercial investment
There are strong reasons to believe—as many senior U.S. defense and
intelligence leaders do—that rapid progress in AI is likely to impact national
security.
2
4. Asian Tiger Capital Partners, Level 16, UTC Tower, Panthapath, Dhaka-1215, Tel: (880)-2-9114286Asian Tiger Capital Partners, Celebration Point (5th floor), Plot – 03, Road – 113/A, Gulshan – 2, Dhaka-1212, Tel: (880)-2-9852111, Web: www.at-capital.com
What is Artificial Intelligence (AI) ?
• AI is defined as non- human intelligence that is measured by its ability to replicate human
mental skills, such as pattern recognition, understanding natural language (NLP), adaptive
learning from experience, strategizing, or reasoning about others
3
5. Asian Tiger Capital Partners, Level 16, UTC Tower, Panthapath, Dhaka-1215, Tel: (880)-2-9114286Asian Tiger Capital Partners, Celebration Point (5th floor), Plot – 03, Road – 113/A, Gulshan – 2, Dhaka-1212, Tel: (880)-2-9852111, Web: www.at-capital.com
Data – The new “Fortune at the Bottom of the Pyramid”
4
6. Asian Tiger Capital Partners, Level 16, UTC Tower, Panthapath, Dhaka-1215, Tel: (880)-2-9114286Asian Tiger Capital Partners, Celebration Point (5th floor), Plot – 03, Road – 113/A, Gulshan – 2, Dhaka-1212, Tel: (880)-2-9852111, Web: www.at-capital.com
Some Military Applications in AI
• For example, commercially available, AI-enabled technology (such as long-range drone
package delivery) may give weak states and non-state actor’s access to a type of long-
range price- soon strike capability.
• In the cyber domain, activities that currently require lots of high-skill labor, such as
Advanced Persistent read operations, may in the future be largely automated and easily
available on the black market.
• For information superiority, AI will dramatically enhance capabilities for the collection
and analysis of data, and also the creation of data.
• In intelligence operations, this will mean that there are more sources than ever from
which to discern the truth. However, it will also be much easier to lie persuasively.
• AI-enhanced forgery of audio and video media is rapidly improving in quality and
decreasing in cost. In the future, AI-generated forgeries will challenge the basis of trust
across many institutions.
5
7. Asian Tiger Capital Partners, Level 16, UTC Tower, Panthapath, Dhaka-1215, Tel: (880)-2-9114286Asian Tiger Capital Partners, Celebration Point (5th floor), Plot – 03, Road – 113/A, Gulshan – 2, Dhaka-1212, Tel: (880)-2-9852111, Web: www.at-capital.com
AI/Robotics Spending Accelerates
• Boston Consulting Group: 2000-2015, the worldwide spending on military robotics
(narrowly defined as only unmanned vehicles) tripled from $2.4 billion to $7.5 billion
and expected to double again to $16.5 billion by the year 2025.
• In the short term, advances in AI will likely allow more autonomous robotic support to
war gathers, and accelerate it from manned to unmanned combat missions.
• Top U.S. national security officials believe that AI and machine learning will have
transformative implications for cybersecurity and cyberwar.
• Admiral Mike Rogers, former Director of the National Security Agency and Commander
of U.S. Cyber command, said “Artificial Intelligence and machine learning—I would
argue—is foundational to the future of cybersecurity. We have got to work our way
through how we’re going to deal with this. It is not the if, it’s only the when to me.”
6
8. Asian Tiger Capital Partners, Level 16, UTC Tower, Panthapath, Dhaka-1215, Tel: (880)-2-9114286Asian Tiger Capital Partners, Celebration Point (5th floor), Plot – 03, Road – 113/A, Gulshan – 2, Dhaka-1212, Tel: (880)-2-9852111, Web: www.at-capital.com
PC/Drone Cost Declines and Defence Implications
In the 15 years from 1998 to 2013, the
average price of a personal computer fell
by 95%. If a high-quality drone that costs
$1,000 today were available for only $50 in
the future, especially if that drone
possessed improved autonomous
capabilities, it would transform the cost
curve for all sorts of military activity. As
Paul Scharre has written, “Ultra-cheap 3D-
printed mini-drones could allow the United
States to field billions of tiny, insect-like
drones.”
7
9. Asian Tiger Capital Partners, Level 16, UTC Tower, Panthapath, Dhaka-1215, Tel: (880)-2-9114286Asian Tiger Capital Partners, Celebration Point (5th floor), Plot – 03, Road – 113/A, Gulshan – 2, Dhaka-1212, Tel: (880)-2-9852111, Web: www.at-capital.com
AI Potential and its breadth
• As with all automation, AI and machine learning will decrease the number of humans needed to perform
specific tasks in the cyber domain. E.g. The advent of cyber tools dramatically increased the productivity of
individuals engaged in espionage.
• AI will be useful in bolstering cyber defense, since probing for weak- nesses and monitoring systems can be
enhanced with intelligent automation. Cyber defense is currently quite labor intensive and skilled cyber labor
is in short supply. Additionally, AI will enable new paradigms for cyber defense. Most cyber defense systems
today are based on a priori knowledge assumptions, in which the defender has optimized their system to
address known threats, and is less well protected against unknown threats.
• However, the same logic suggests AI advances will enable improvements in cyber defense. Its most
challenging type of cyber-attack, for most organizations and individuals to deal with, is the Advanced
Persistent Threat (APT). As it is a high skilled labor intensive job, it can be automated using AI capabilities.
• Lethal autonomous weapons form the bulk of military forces. AI-based pilot running on computer has
already demonstrated the ability to beat a U.S. Air Force-trained together pilot in a combat simulator.
8
10. Asian Tiger Capital Partners, Level 16, UTC Tower, Panthapath, Dhaka-1215, Tel: (880)-2-9114286Asian Tiger Capital Partners, Celebration Point (5th floor), Plot – 03, Road – 113/A, Gulshan – 2, Dhaka-1212, Tel: (880)-2-9852111, Web: www.at-capital.com
AI Potential and its breadth
• Disruptive swarming technologies render some military platforms obsolete. As of
2013, e United States possessed 14,776 military aircraft , some of which cost more
than $100 million per unit.
• A high-quality quad copter UAV currently costs roughly $1,000, meaning that for
the price of a single high-end aircraft , a military could acquire one million drones.
• Imagine a low-cost drone with the range of a Canada Goose, a bird which can cover
1,500 miles in under 24 hours at an average speed of 60 miles per hour.41 How
would an aircraft carrier battle group respond to an attack from millions of aerial
kamikaze explosive drones
9
11. Asian Tiger Capital Partners, Level 16, UTC Tower, Panthapath, Dhaka-1215, Tel: (880)-2-9114286Asian Tiger Capital Partners, Celebration Point (5th floor), Plot – 03, Road – 113/A, Gulshan – 2, Dhaka-1212, Tel: (880)-2-9852111, Web: www.at-capital.com
Technology Changing Defence Dynamics
• Mobile-robotic-IEDs give low-cost, PGM-like capabilities to terrorists. Improvised Explosive
Devices (IED) posed a significant challenge to U.S. forces in Iraq because they were low-cost,
easily manufactured, and could cause significant damage.
• Military power grows disconnected from population size and economic strength. South
Korea’s government announced that it would spend nearly $1 billion over the next five years
on AI research and development including government in-kind contributions and
reprogrammed funds,
• South Korea’s annual AI R&D spending may reach $1 billion within the next year or two. If
South Korea does reach such a figure, it would match the 2015 AI R&D budget of the United
States, a country with a nearly twelve-fold larger economy.
• Most actors in cyber space will have no choice but to enable relatively high levels of
autonomy, or else risk being outcompeted by “machine- speed” adversaries.
• The applications of AI to warfare and espionage are likely to be as irresistible as aircraft.
Preventing expanded military use of AI is likely impossible.
10
12. Asian Tiger Capital Partners, Level 16, UTC Tower, Panthapath, Dhaka-1215, Tel: (880)-2-9114286Asian Tiger Capital Partners, Celebration Point (5th floor), Plot – 03, Road – 113/A, Gulshan – 2, Dhaka-1212, Tel: (880)-2-9852111, Web: www.at-capital.com
Use Cases
• Robot Swarms: Uninhabited vehicles, like
the Predator aircraft or the Packbot ground
robot, have already proven invaluable in
today’s conflicts. As uninhabited vehicles
incorporate increasing automation and
become true robotic systems, they will have
tremendous value in future military
operations
• Billions Of Drones : Ultra-cheap 3D-printed
mini-drones could allow the United States to
field billions of tiny, insect-like drones.
Swarms in nature are wholly emergent
entities that arise from simple rules. Bees,
ants, and termites. They are not individually
intelligent, yet their colonies can exhibit
extraordinarily complex behavior. 11
Link
13. Asian Tiger Capital Partners, Level 16, UTC Tower, Panthapath, Dhaka-1215, Tel: (880)-2-9114286Asian Tiger Capital Partners, Celebration Point (5th floor), Plot – 03, Road – 113/A, Gulshan – 2, Dhaka-1212, Tel: (880)-2-9852111, Web: www.at-capital.com
Link
14. Asian Tiger Capital Partners, Level 16, UTC Tower, Panthapath, Dhaka-1215, Tel: (880)-2-9114286Asian Tiger Capital Partners, Celebration Point (5th floor), Plot – 03, Road – 113/A, Gulshan – 2, Dhaka-1212, Tel: (880)-2-9852111, Web: www.at-capital.com
Algorithmic Targeting using AI
• Algorithmic Targeting (A2A) : Another
major use case for AI, of particular value
in a tactical context, is the use of AI in
developing rapid and accurate automatic
target recognition (ATR) systems: start-up
Deep Learning Analytics, for instance, has
developed a machine-learning based ATR
program prototype for DARPA, to trial
systems assisting pilots in finding and
engaging targets.
• Situational Awareness and
Understanding (A2A) : While greatly
supporting force projection in asymmetric
conflicts, UAVs at present still know a
number of operational limitations, such as
a low flying speed and vulnerability to air
defense systems. The enhanced
situational awareness enabled by more
autonomous and survivable drones can
strengthen the security of bases and,
experts have suggested.
13
Link
15. Asian Tiger Capital Partners, Level 16, UTC Tower, Panthapath, Dhaka-1215, Tel: (880)-2-9114286Asian Tiger Capital Partners, Celebration Point (5th floor), Plot – 03, Road – 113/A, Gulshan – 2, Dhaka-1212, Tel: (880)-2-9852111, Web: www.at-capital.com
Cushioning rising cost of defense machinaries
• Rising Costs: Augustine’s Law: In 1984, Norm
Augustine observed as one of “Augustine’s
Laws” that the cost of military aircraft was
growing exponentially, while the defence
budget was only growing linearly.
• Automating Cyber Operations (G2G, D2D) :
There are indications that AI’s ability to sift
through prohibitively large quantities of data,
and pick up on vague cues can strengthen
security: for instance, Distil Networks uses
machine learning algorithms to begin to
defend against Advanced Persistent Threat
bots
14
16. Asian Tiger Capital Partners, Level 16, UTC Tower, Panthapath, Dhaka-1215, Tel: (880)-2-9114286Asian Tiger Capital Partners, Celebration Point (5th floor), Plot – 03, Road – 113/A, Gulshan – 2, Dhaka-1212, Tel: (880)-2-9852111, Web: www.at-capital.com
China AI Strategy
• Intelligent and Autonomous Unmanned Systems: a weapon that utilizes AI to
automatically pursue, distinguish, and destroy enemy targets; often composed of
information collection and management systems, knowledge base systems,
assistance to decision systems, mission implementation systems, etc.,” such as
military-use robotics
• Future Intelligent Unmanned Aerial Vehicles and Swarm Intelligence : Future PLA
swarms could be used for reconnaissance, strike, jamming, and other missions.
• Intelligent Unmanned Ground Vehicles
• Autonomous UUVs
• Defense, Offense, and Command in Information Warfare
• Cyber Defense and Cyber Warfare
• Simulation, War-gaming, and “Actual Combat” Training
• Intelligent zed Command Decision-making and/or Keeping Humans in the Loop 15
17. Asian Tiger Capital Partners, Level 16, UTC Tower, Panthapath, Dhaka-1215, Tel: (880)-2-9114286Asian Tiger Capital Partners, Celebration Point (5th floor), Plot – 03, Road – 113/A, Gulshan – 2, Dhaka-1212, Tel: (880)-2-9852111, Web: www.at-capital.com
Country Case Studies (Russia)
• January 2017, President Putin called for the creation of “autonomous robotic
complexes”
• Russian robotic UGVs are still in development and testing stages, a number of them
have actually seen active combat service: the Uran-6 demining robot saw use by Russian
forces operating in Syria.
• Notably, at present most of these Russian military bots are still designed (or deployed)
to be controlled by remote operator, as the Russian defense establishment remains
somewhat uncomfortable with the notion of fully autonomous military systems
• Russia’s United Instrument Manufacturing Corporation (OPK) is working on using AI
systems for border protection, developing a system which will automatically interact
with video cameras, infrared and seismic sensors, radars and drones, in order to
monitor and observe any type of violations.
• In addition, the new system, to be deployed on Russia’s Eastern and Southern borders,
is intended not only to collect different types of information, but also contains elements
of artificial intelligence which will allow for analysis and forecasting of situations and
work out different solutions
16
18. Asian Tiger Capital Partners, Level 16, UTC Tower, Panthapath, Dhaka-1215, Tel: (880)-2-9114286Asian Tiger Capital Partners, Celebration Point (5th floor), Plot – 03, Road – 113/A, Gulshan – 2, Dhaka-1212, Tel: (880)-2-9852111, Web: www.at-capital.com
Country Case Studies (Israel)
• Self-driving military vehicles to patrol the border with the Palestinian-governed
Gaza Strip.
• Israeli contractor Aeronautics Ltd has also produced a range of UAV control
systems which allegedly contain AI-algorithms. System functions include artificial
intelligence-based electronic/mechanical failure prediction; real-time decision
making support; the facilitating of data transfer between systems; and
hierarchical handling of xed/variable order data strings as a function of tool
safety
• The Israeli ‘Harpy’ anti-radiation UAV is claimed to already be able to detect,
target, and engage enemy radaring stallions without any human oversight or
supervision.
17
19. Asian Tiger Capital Partners, Level 16, UTC Tower, Panthapath, Dhaka-1215, Tel: (880)-2-9114286Asian Tiger Capital Partners, Celebration Point (5th floor), Plot – 03, Road – 113/A, Gulshan – 2, Dhaka-1212, Tel: (880)-2-9852111, Web: www.at-capital.com
Country Case Studies (India)
• To study the whole range of issues on the implications of Artificial Intelligence (AI) on
the National security and defense needs, a multi-stakeholder task force on Strategic
Implementation of Artificial Intelligence for National Security and Defense was
constituted in February 2018.
• A Rs 73.9 Cr project has been sanctioned to the Centre for Artificial Intelligence and
Robotics (CAIR), a DRDO based laboratory. The project is to develop Artificial
Intelligence-based solutions to signal intelligence to enhance intelligence collation and
analysis capabilities to the armed forces.
• Another project named, Energy Harvesting Based Infrared Sensor Network for
Automated Human Intrusion Detection (EYESIRa), has been sanctioned for Rs 1.8 crore.
• Artificial Intelligence-based tools would aid the defense forces constructively in areas of
decision support, sensor data analysis, predictive maintenance, situational awareness,
accurate data extraction, security etc.
• These tools will assist the defense personnel in better operations, maintenance and
logistics support.
18
20. Asian Tiger Capital Partners, Level 16, UTC Tower, Panthapath, Dhaka-1215, Tel: (880)-2-9114286Asian Tiger Capital Partners, Celebration Point (5th floor), Plot – 03, Road – 113/A, Gulshan – 2, Dhaka-1212, Tel: (880)-2-9852111, Web: www.at-capital.com
AR/ VR in Military Training in the US
• The U.S. military has constructed a massive virtual
reality platform to help train infantry soldiers in realistic
battlefields filled with millions of artificial intelligence
agents.
• in April, when the U.S. Army published a
whitepaper describing its ability to simulate real cities
in the U.S. and North Korea.
• The goal of the VR platform is to simulate anywhere on
Earth that the army might someday battle, preparing
soldiers for the area’s terrain before they actually ship
out.
• Soon the Army will be able to dramatically scale up the
number of intelligent entities represented in simulation
scenarios to the millions to simulate a real warzone
with random actions of intelligent entities.
19Link
21. Asian Tiger Capital Partners, Level 16, UTC Tower, Panthapath, Dhaka-1215, Tel: (880)-2-9114286Asian Tiger Capital Partners, Celebration Point (5th floor), Plot – 03, Road – 113/A, Gulshan – 2, Dhaka-1212, Tel: (880)-2-9852111, Web: www.at-capital.com
AR/ VR in Military Training in the US
• One will be able to train in a jungle or
desert environment while stationed in
upstate New York or Alaska, no longer
will the military have to spend millions
to move soldiers, sailors and airmen to
national training centers.
• Virtual flight training allows the services
to train pilots faster, safer, and
cheaper. Flying virtually allows pilots to
make mistakes and not risk injury or the
damage to expensive aircraft.
20
Link
22. Asian Tiger Capital Partners, Level 16, UTC Tower, Panthapath, Dhaka-1215, Tel: (880)-2-9114286Asian Tiger Capital Partners, Celebration Point (5th floor), Plot – 03, Road – 113/A, Gulshan – 2, Dhaka-1212, Tel: (880)-2-9852111, Web: www.at-capital.com
Use of VR by Israeli Military in Tunnel Warfare
• Hezbollah planned to use them to abduct
or kill Israeli soldiers or civilians, and to
seize territory in the event of hostilities,
according to the military.
• The Hezbollah tunnels exposed by Israel
have been digitally scanned and appear on
a soldier’s headset as they are in reality.
“The soldier sees what a tunnel looks like,”
says H.
Since it is not always possible to train in
the field, the virtual world allows
personnel to familiarise themselves with a
hostile underground environment without
leaving their base.
21Link
23. Asian Tiger Capital Partners, Level 16, UTC Tower, Panthapath, Dhaka-1215, Tel: (880)-2-9114286Asian Tiger Capital Partners, Celebration Point (5th floor), Plot – 03, Road – 113/A, Gulshan – 2, Dhaka-1212, Tel: (880)-2-9852111, Web: www.at-capital.com
Terrorism Threats
• Artificial Intelligence can help
not only military and defense
strategy, it will also bring new
opportunities for rogue
governments, bad state actors
and terrorist organizations. New
counter- strategy will be needed
to counter those threats through
asymmetric methods and own AI
defense strategy.
• Long video link on autonomous
drones (9 minutes)
22Link
24. Asian Tiger Capital Partners, Level 16, UTC Tower, Panthapath, Dhaka-1215, Tel: (880)-2-9114286Asian Tiger Capital Partners, Celebration Point (5th floor), Plot – 03, Road – 113/A, Gulshan – 2, Dhaka-1212, Tel: (880)-2-9852111, Web: www.at-capital.com
Facial Recognition
• Facial Recognition is a fundamental change that will define
the future security and military landscape. With the advent
of AI capabilities, lots of functionalities will be developed
on top of it. China is already using it for internal security
mechanisms.
• The Army's C5ISR Center has been implementing two face
and voice recognition programs— Video Identification,
Collection and Exploitation (VICE) and Voice Identity
Biometric Exploitation Services (VIBES)—that U.S. Central
Command and the Combined Joint Task Force - Operation
Inherent Resolve use to identify people who may pose a
threat to the DOD's missions.
• In the past year, VICE has been able to create about 25,000
biometric records, process hundreds of watchlist matches,
facially template thousands of individuals, and voice-print
hundreds of "unpictured, unvoiced ISIS fighters" and other
actors.
23Link
25. Asian Tiger Capital Partners, Level 16, UTC Tower, Panthapath, Dhaka-1215, Tel: (880)-2-9114286Asian Tiger Capital Partners, Celebration Point (5th floor), Plot – 03, Road – 113/A, Gulshan – 2, Dhaka-1212, Tel: (880)-2-9852111, Web: www.at-capital.com
Singularity
What is the basic argument? 24
26. Asian Tiger Capital Partners, Level 16, UTC Tower, Panthapath, Dhaka-1215, Tel: (880)-2-9114286Asian Tiger Capital Partners, Celebration Point (5th floor), Plot – 03, Road – 113/A, Gulshan – 2, Dhaka-1212, Tel: (880)-2-9852111, Web: www.at-capital.com
Moore’s Law
Exponential and Non-Exponential Trendsin IT intelligence.org/[…]/exponential-and-non-exponential/
25
5
27. Asian Tiger Capital Partners, Level 16, UTC Tower, Panthapath, Dhaka-1215, Tel: (880)-2-9114286Asian Tiger Capital Partners, Celebration Point (5th floor), Plot–03,Road–113/A, Gulshan –2,Dhaka-1212, Tel: (880)-2-9852111, Web: www.at-capital.com
Definition of Superintelligence
An agent is called superintelligent if it
exceeds the level of current human
intelligence in all areas of interest.
Nick Bostrom: How long before Superintelligence?
www.nickbostrom.com/superintelligence.html
Rock
Mouse
Chimp
Fool
Genius
Superintelligence
26
28. Asian Tiger Capital Partners, Level 16, UTC Tower, Panthapath, Dhaka-1215, Tel: (880)-2-9114286Asian Tiger Capital Partners, Celebration Point (5th floor), Plot – 03, Road – 113/A, Gulshan – 2, Dhaka-1212, Tel: (880)-2-9852111, Web: www.at-capital.com
Advantages of AIs over Brains
Hardware:
– Size
– Speed
– Memory
Software:
– Editability
– Copyability
– Expandability
Effectiveness:
– Rationality
– Coordination
– Communication
Human Brain Modern Microprocessor
86 billion neurons 1.4 billion transistors
firing rate of 200 Hz 4’400’000’000 Hz
120 m/s signal speed
Advantages of AIs, Uploads and Digital Minds
kajsotala.fi/Papers/DigitalAdvantages.pdf
300’000’000 m/s
27
29. Asian Tiger Capital Partners, Level 16, UTC Tower, Panthapath, Dhaka-1215, Tel: (880)-2-9114286Asian Tiger Capital Partners, Celebration Point (5th floor), Plot – 03, Road – 113/A, Gulshan – 2, Dhaka-1212, Tel: (880)-2-9852111, Web: www.at-capital.com
Superintelligence
What are potential outcomes? 28
30. Asian Tiger Capital Partners, Level 16, UTC Tower, Panthapath, Dhaka-1215, Tel: (880)-2-9114286Asian Tiger Capital Partners, Celebration Point (5th floor), Plot – 03, Road – 113/A, Gulshan – 2, Dhaka-1212, Tel: (880)-2-9852111, Web: www.at-capital.com
Definition of Superintelligence
An agent is called superintelligent if it
exceeds the level of current human
intelligence in all areas of interest.
Nick Bostrom: How long before Superintelligence?
www.nickbostrom.com/superintelligence.html
Rock
Mouse
Chimp
Fool
Genius
Superintelligence
29
31. Asian Tiger Capital Partners, Level 16, UTC Tower, Panthapath, Dhaka-1215, Tel: (880)-2-9114286Asian Tiger Capital Partners, Celebration Point (5th floor), Plot – 03, Road – 113/A, Gulshan – 2, Dhaka-1212, Tel: (880)-2-9852111, Web: www.at-capital.com
Takeoff Scenarios
Time
now time until takeoff takeoff duration
Human Level
Intelligence
Physical Limit
Superintelligence
??
Separate Questions!
?
Feedback
30
The Hanson-Yudkowsky AI-Foom Debate
intelligence.org/files/AIFoomDebate.pdf
32. Asian Tiger Capital Partners, Level 16, UTC Tower, Panthapath, Dhaka-1215, Tel: (880)-2-9114286Asian Tiger Capital Partners, Celebration Point (5th floor), Plot – 03, Road – 113/A, Gulshan – 2, Dhaka-1212, Tel: (880)-2-9852111, Web: www.at-capital.com
Military Robots
P.W.Singer
go.ted.com/xe3 31
33. Asian Tiger Capital Partners, Level 16, UTC Tower, Panthapath, Dhaka-1215, Tel: (880)-2-9114286Asian Tiger Capital Partners, Celebration Point (5th floor), Plot – 03, Road – 113/A, Gulshan – 2, Dhaka-1212, Tel: (880)-2-9852111, Web: www.at-capital.com
Books
32
34. Asian Tiger Capital Partners, Level 16, UTC Tower, Panthapath, Dhaka-1215, Tel: (880)-2-9114286Asian Tiger Capital Partners, Celebration Point (5th floor), Plot – 03, Road – 113/A, Gulshan – 2, Dhaka-1212, Tel: (880)-2-9852111, Web: www.at-capital.com
APPENDIX
4TH Industrial Revolution
33
35. Asian Tiger Capital Partners, Level 16, UTC Tower, Panthapath, Dhaka-1215, Tel: (880)-2-9114286Asian Tiger Capital Partners, Celebration Point (5th floor), Plot – 03, Road – 113/A, Gulshan – 2, Dhaka-1212, Tel: (880)-2-9852111, Web: www.at-capital.com
The Fourth Industrial Revolution
• Industry 4.0 is the current trend of automation and data exchange in manufacturing
technologies. It includes cyber-physical systems, the Internet of things and cloud
computing.
• Industry 4.0 creates what has been called a "smart factory". Within the modular
structured smart factories, cyber-physical systems monitor physical processes, create a
virtual copy of the physical world and make decentralized decisions. Over the Internet of
Things, cyber-physical systems communicate and cooperate with each other and with
humans in real time, and via the Internet of Services, both internal and cross-
organizational services are offered and used by participants of the value chain. 34
36. Asian Tiger Capital Partners, Level 16, UTC Tower, Panthapath, Dhaka-1215, Tel: (880)-2-9114286Asian Tiger Capital Partners, Celebration Point (5th floor), Plot – 03, Road – 113/A, Gulshan – 2, Dhaka-1212, Tel: (880)-2-9852111, Web: www.at-capital.com
Speed Of Digital Economy
New Technologies Spreads Ever Faster
Years in 50 Million Users
Radio
TV
iPod
Internet
Facebook
Twitter
Pokemon Go
38 Years
13 Years
4
3
1
9 Months
19 Days
35
37. Asian Tiger Capital Partners, Level 16, UTC Tower, Panthapath, Dhaka-1215, Tel: (880)-2-9114286Asian Tiger Capital Partners, Celebration Point (5th floor), Plot – 03, Road – 113/A, Gulshan – 2, Dhaka-1212, Tel: (880)-2-9852111, Web: www.at-capital.com
Disruptive Technologies = New Economic Opportunities
Disruptive Technologies
Circular Economy
Sharing Economy
Blockchain
Mobile/Cloud
AI, Machine Leaning
IoT, Big Data
Drone, VR/AR
Digital Health
Project Development
FinTech
Climate Changes
Healthcare
Education
Agriculture & Food
Smart & Sustainable City
36
38. Asian Tiger Capital Partners, Level 16, UTC Tower, Panthapath, Dhaka-1215, Tel: (880)-2-9114286Asian Tiger Capital Partners, Celebration Point (5th floor), Plot – 03, Road – 113/A, Gulshan – 2, Dhaka-1212, Tel: (880)-2-9852111, Web: www.at-capital.com
37