by Dr. Fun Wey, Principal Lecturer & Consultant, Artificial Intelligence Practice, NUS ISS for the NUS-ISS SkillsFuture Series Seminar: Harnessing the power of Intelligent Software Agents (9 April 2019)
AI – một khái niệm không mới cũng chẳng cũ, nhưng chắc chắn là phức tạp!
Kiến thức vỡ lòng đơn giản nhất về AI – AI là gì, hoạt động ra sao, áp dụng như thế nào, dành cho tất cả mọi người kể cả khi không có chút khái niệm hay ký ức nào về AI cũng có thể hiểu được.
Introduction Artificial Intelligence a modern approach by Russel and Norvig 1Garry D. Lasaga
In computer science, artificial intelligence, sometimes called machine intelligence, is intelligence demonstrated by machines, in contrast to the natural intelligence displayed by humans and animals. - Wikipedia
Why does artificial intelligence not replace humans venkatvajradhar1
Speaking of Artificial Intelligence (A.I.), it is the result of a set of multiple programming algorithms with high technologies, progress, and frequency.
AI – một khái niệm không mới cũng chẳng cũ, nhưng chắc chắn là phức tạp!
Kiến thức vỡ lòng đơn giản nhất về AI – AI là gì, hoạt động ra sao, áp dụng như thế nào, dành cho tất cả mọi người kể cả khi không có chút khái niệm hay ký ức nào về AI cũng có thể hiểu được.
Introduction Artificial Intelligence a modern approach by Russel and Norvig 1Garry D. Lasaga
In computer science, artificial intelligence, sometimes called machine intelligence, is intelligence demonstrated by machines, in contrast to the natural intelligence displayed by humans and animals. - Wikipedia
Why does artificial intelligence not replace humans venkatvajradhar1
Speaking of Artificial Intelligence (A.I.), it is the result of a set of multiple programming algorithms with high technologies, progress, and frequency.
W poniższym wpisie zamieszczam materiały do gościnnego wykładu, wygłoszonego 18.04.2018, w Instytucie Informatyki na Akademii Górniczo-Hutniczej w Krakowie. Wykład, pt.: Cognitive technologies.
Cognitive computing refers to the development of computer system modeled after the human brain.
This technology was introduced by IBM as 5 in 5.
In next five years IBM is planning to develop kind of Applications which will have capabilities of the right side of the human brain.
New technologies makes it possible for machines to mimic and augment the senses.
This Presentation will give you an overview about Artificial Intelligence : definition, advantages , disadvantages , benefits , applications .
We hope it to be useful .
To evaluate an intelligent answer, we need to assess the broader or narrower meaning of smart, which is rightly defined by J. P. Guilford. The psychologist has divided thinking into two aspects: divergent thinking and convergent thinking. The convergent thinking means answering given questions correctly, which displays logic and memory. However, the divergent memory is forming various answers for one problem statement, displaying the presence of curiosity – the ability of extraordinary thinking.
Conversational AI versus AI Data ScienceRazorthink
Uncover the difference between a conversational AI and AI data science in this informative presentation, as well as how AI is being used on the Enterprise level.
Artificial intelligence (ai) will radically transform the way we do business in the future, and the way we live. That’s a strong statement, but i believe it’s true. Ai has many faces. As we are increasingly exposed to it, it’s important to understand what it can and can’t do and how companies can pivot wisely to this still evolving reality without overlooking the ethical, human and regulatory questions it raises.
W poniższym wpisie zamieszczam materiały do gościnnego wykładu, wygłoszonego 18.04.2018, w Instytucie Informatyki na Akademii Górniczo-Hutniczej w Krakowie. Wykład, pt.: Cognitive technologies.
Cognitive computing refers to the development of computer system modeled after the human brain.
This technology was introduced by IBM as 5 in 5.
In next five years IBM is planning to develop kind of Applications which will have capabilities of the right side of the human brain.
New technologies makes it possible for machines to mimic and augment the senses.
This Presentation will give you an overview about Artificial Intelligence : definition, advantages , disadvantages , benefits , applications .
We hope it to be useful .
To evaluate an intelligent answer, we need to assess the broader or narrower meaning of smart, which is rightly defined by J. P. Guilford. The psychologist has divided thinking into two aspects: divergent thinking and convergent thinking. The convergent thinking means answering given questions correctly, which displays logic and memory. However, the divergent memory is forming various answers for one problem statement, displaying the presence of curiosity – the ability of extraordinary thinking.
Conversational AI versus AI Data ScienceRazorthink
Uncover the difference between a conversational AI and AI data science in this informative presentation, as well as how AI is being used on the Enterprise level.
Artificial intelligence (ai) will radically transform the way we do business in the future, and the way we live. That’s a strong statement, but i believe it’s true. Ai has many faces. As we are increasingly exposed to it, it’s important to understand what it can and can’t do and how companies can pivot wisely to this still evolving reality without overlooking the ethical, human and regulatory questions it raises.
Introduction–Definition - Future of Artificial Intelligence – Characteristics of Intelligent Agents– Typical Intelligent Agents – Problem Solving Approach to Typical AI problems.
Discussion - Weeks 1–2COLLAPSETop of FormShared Practice—Rol.docxcuddietheresa
Discussion - Weeks 1–2
COLLAPSE
Top of Form
Shared Practice—Role of Business Information Systems
Note: This Discussion has slightly different due dates than what is typical for this program. Be mindful of this as you post and respond in the Discussion. Your post is due on Day 7 and your Response is due on Day 3 of Week 2.
As a manager, it is critical for you to understand the types of business information systems available to support business operations, management, and strategy. As of 2013, these include, but are certainly not limited to the following:
· Supply Chain Management (SCM)
· Accounting Information System
· Customer Relationship Management (CRM)
· Decision Support Systems (DSS)
· Enterprise Resource Planning (ERP)
· Human Resource Management
These types of systems support critical business functions and operations that every organization must manage. The effective manager understands the purpose of these types of systems and how they can be best used to manage the organization's data and information.
In this Discussion, you will share your knowledge and findings related to business information systems and the role they play in your organization. You will also consider your colleagues' experiences to explore additional ways business information systems might be applied in your colleagues' organizations, or an organization with which you are familiar.
By Day 7
· Describe two or three of the more important technologies or business information systems used in your organization, or in one with which you are familiar.
· Discuss two examples of how these business information systems are affecting the organization you selected. Be sure to discuss how individual behaviors and organizational or individual processes are changing and what you can learn from the issues encountered.
· Summarize what you have learned about the importance of business information systems and why managers need to understand how systems can be used to the organization's advantage.
You should find and use at least one additional current article from a credible resource, either from the Walden Library or the Internet. Please be specific, and remember to use citations and references as necessary.
General Guidance: Your initial Discussion post, due by Day 7, will typically be 3–4 paragraphs in length as a general expectation/estimate. Refer to the rubric for the Week 1 Discussion for grading elements and criteria. Your Instructor will use the rubric to assess your work.
Week 2
By Day 3
In your Week 1 Discussion you described how business information systems have been applied in an organization with which you are familiar. Read through your colleagues' posts and by Day 3 (Week 2), respond to two of your colleagues in one or more of the following ways:
· Examine how the business information systems described by your colleague could be or are being used by your organization. Offer additional ways either organization might take advantage of these systems.
· Examine how the b ...
Principles of Artificial Intelligence & Machine LearningJerry Lu
Artificial intelligence has captivated me since I worked on projects at Google that ranged from detecting fraud on Google Cloud to predicting subscriber retention on YouTube Red. Looking to broaden my professional experience, I then entered the world of venture capital by joining Baidu Ventures as its first summer investment associate where I got to work with amazingly talented founders building AI-focused startups.
Now at the Wharton School at the University of Pennsylvania, I am looking for opportunities to meet people with interesting AI-related ideas and learn about the newest innovations within the AI ecosystem. Within the first two months of business school, I connected with Nicholas Lind, a second-year Wharton MBA student who interned at IBM Watson as a data scientist. Immediately recognizing our common passion for AI, we produced a lunch-and-learn about AI and machine learning (ML) for our fellow classmates.
Using the following deck, we sought to:
- define artificial intelligence and describe its applications in business
- decode buzzwords such as “deep learning” and “cognitive computing”
- highlight analytical techniques and best practices used in AI / ML
- ultimately, educate future AI leaders
The lunch-and-learn was well received. When it became apparent that it was the topic at hand and not so much the free pizzas that attracted the overflowing audience, I was amazed at the level of interest. It was reassuring to hear that classmates were interested in learning more about the technology and its practical applications in solving everyday business challenges. Nick and I are now laying a foundation to make these workshops an ongoing effort so that more people across the various schools of engineering, design, and Penn at large can benefit.
With its focus on quantitative rigor, Wharton already feels like a perfect fit for me. In the next two years, I look forward to engaging with like-minded people, both in and out of the classroom, sharing my knowledge about AI with my peers, and learning from them in turn. By working together to expand Penn’s reach and reputation with respect to this new frontier, I’m confident that we can all grow into next-generation leaders who help drive companies forward in an era of artificial intelligence.
I’d love to hear what you think. If you found this post or the deck useful, please recommend them to your friends and colleagues!
Semantic, Cognitive, and Perceptual Computing – three intertwined strands of ...Amit Sheth
Keynote at Web Intelligence 2017: http://webintelligence2017.com/program/keynotes/
Video: https://youtu.be/EIbhcqakgvA Paper: http://knoesis.org/node/2698
Abstract: While Bill Gates, Stephen Hawking, Elon Musk, Peter Thiel, and others engage in OpenAI discussions of whether or not AI, robots, and machines will replace humans, proponents of human-centric computing continue to extend work in which humans and machine partner in contextualized and personalized processing of multimodal data to derive actionable information.
In this talk, we discuss how maturing towards the emerging paradigms of semantic computing (SC), cognitive computing (CC), and perceptual computing (PC) provides a continuum through which to exploit the ever-increasing and growing diversity of data that could enhance people’s daily lives. SC and CC sift through raw data to personalize it according to context and individual users, creating abstractions that move the data closer to what humans can readily understand and apply in decision-making. PC, which interacts with the surrounding environment to collect data that is relevant and useful in understanding the outside world, is characterized by interpretative and exploratory activities that are supported by the use of prior/background knowledge. Using the examples of personalized digital health and a smart city, we will demonstrate how the trio of these computing paradigms form complementary capabilities that will enable the development of the next generation of intelligent systems. For background: http://bit.ly/PCSComputing
What is Artificial Intelligence and Machine Learning (1).pptxprasadishana669
Artificial Intelligence refers to the development of computer systems that can perform tasks that typically require human intelligence. These tasks include problem-solving, learning, perception, speech recognition, and language translation, among others. Machine Learning is a subset of AI that focuses on the development of algorithms and statistical models that enable computers to perform tasks without explicit programming.
Similar to How to train smarter robots psychological collaborative systems (20)
Designing Impactful Services and User Experience - Lim Wee KheeNUS-ISS
In this engaging talk, we explore crafting impactful user-centric services, revealing the design principles that drive exceptional experiences. From empathetic customer journeys to innovative interfaces, learn how design can create meaningful connections, inspiring you to revolutionise your approach and drive lasting change in user satisfaction and brand success.
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...NUS-ISS
In today's digital age, the key to true transformation lies in our people. This talk will highlight the importance of digital fluency, emphasizing that everyone in an organization is now a digital professional. By synergizing the fundamental digital skills ranging from an agile mindset to making data-informed decisions and design thinking, we will discuss how a digitally skilled workforce can propel organizations to drive digital transformation with new heights of value creation. Though widespread workforce upskilling presents its challenges, this talk offers innovative organizational learning approaches that may pave the way to success. Join us to find out how to shape the future of your organization where success is defined not just by technology but by a workforce fully equipped with digital competencies, ready to take on whatever the future holds.
How the World's Leading Independent Automotive Distributor is Reinventing Its...NUS-ISS
In this captivating session, we'll unveil the profound impact of AI, poised to revolutionise the business landscape. Prepare to shift your perspective, as we transition from the lens of a data scientist to the visionary mindset of a product manager. We're about to demystify the captivating world of Generative AI, dispelling myths and illuminating its remarkable potential. We will also delve into the pioneering applications that Inchcape is leading, pushing the boundaries of what's achievable. Join us for an exhilarating journey into the future of AI, where professionalism meets unparalleled excitement, and innovation takes center stage!
The Importance of Cybersecurity for Digital TransformationNUS-ISS
In the rapidly evolving landscape of digital transformation, the importance of cybersecurity cannot be overstated. As organizations embrace digital technologies to enhance their operations, innovate, and connect with customers in new and dynamic ways, they simultaneously become more vulnerable to cyber threats.
This talk will discuss the importance of having a well thought through approach in dealing with cybersecurity in the form of a strategy that lays out the various programmes and initiatives that will underpin a secure and resilient digital transformation journey. Not surprisingly, having a pool of well-trained cybersecurity personnel is one of the key ingredient in a cyber strategy as exemplified in Singapore's own national cybersecurity strategy.
Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu...NUS-ISS
Join us for a deep dive into the art of architecting Customer Experience (CX) measurement frameworks and ensuring that CX metrics are precisely tailored for their intended purpose. In this engaging session, you'll walk away with actionable insights and a tangible plan for refining your measurement strategies. Discover how to craft CX measurement frameworks that align seamlessly with your business objectives, ensuring that your metrics deliver meaningful and robust insights. Whether you're seeking to enhance customer satisfaction, optimise processes, or drive innovation, this session will provide you with potential approaches and practical steps to bolster the effectiveness and relevance of your CX metrics. It's your blueprint for creating a customer-centric roadmap to success.
Understanding GenAI/LLM and What is Google Offering - Felix GohNUS-ISS
With the recent buzz on Generative AI & Large Language Models, the question is to what extent can these technologies be applied at work or when you're studying and how easy is it to manage/develop your own models? Hear from our guest speaker from Google as he shares some insights into how industries are evolving with these trends and what are some of Google's offerings from Duet AI in Google Workspace to the GenAI App Builder on Google Cloud.
Digital Product-Centric Enterprise and Enterprise Architecture - Tan Eng TszeNUS-ISS
Enterprises striving to unlock value through digital products face a pivotal shift towards product-centric management, a transformation that carries its share of challenges. To navigate this journey successfully, close collaboration between Enterprise Architects and Digital Product Managers is essential. Together, they can craft the ideal strategy to deliver digital products on a grand scale. Join us in this session as we shed light on the critical interactions and activities that foster synergy between Enterprise Architects and Digital Product Managers. Discover how this collaboration paves the way for effective product-centric management, enabling enterprises to harness the full potential of their digital offerings.
Emerging & Future Technology - How to Prepare for the Next 10 Years of Radica...NUS-ISS
We find ourselves in an era of exponential growth and transformation. The relentless pace of technological advancement is reshaping our world at a rate never seen before, making it increasingly challenging to stay abreast of these rapid developments. Join us for an insightful talk where we embark on a journey to explore the most significant technology trends set to unfold over the next decade. These trends promise to be nothing short of seismic, with the power to reshape every facet of our lives, from the way we work and learn to how we forge relationships and structure our society. Prepare to be enlightened as we delve into a future where the very fabric of our existence is on the brink of transformation. This talk is your compass to navigate the uncharted territory of tomorrow's world, and it's an opportunity you won't want to miss.
Beyond the Hype: What Generative AI Means for the Future of Work - Damien Cum...NUS-ISS
The hottest topic in the tech world right now is generative AI. In this session, we go beyond the hype to delve into honest answers about how generative AI is impacting the future of work. This is an important topic for all digital leaders to have a thorough understanding of when driving digital transformation.
Supply Chain Security for Containerised Workloads - Lee Chuk MunnNUS-ISS
Containers have emerged as an indispensable component of modern cloud-native applications, serving diverse roles from development environments to application distribution and deployment on platforms like Azure's App Service and Kubernetes. In this presentation, we will delve into a suite of powerful tools designed to ensure the adoption of best practices in container management. You'll gain insights into how to scan container images rigorously, identifying and mitigating vulnerabilities effectively. We'll also explore the art of generating comprehensive software bill of materials (SBOM) for your containers and the significance of signing container images for enhanced security. The ultimate goal of this presentation is to empower you with the knowledge and skills necessary to seamlessly integrate these tools and practices into your CI (Continuous Integration) pipelines. By the end of this session, you'll be well-equipped to fortify your container workflows, delivering secure and robust cloud-native applications that thrive in today's dynamic digital landscape.
The future is always uncertain. To be truly future-ready, companies need the ability to quickly learn and adapt and to foster a culture of continuous curiosity and experimentation. But how can we facilitate rapid learning throughout the organisation? What will the future of learning look like for you? How can we ensure our organisations become engines of growth through learning?
The future is always uncertain. To be truly future-ready, companies need the ability to quickly learn and adapt and to foster a culture of continuous curiosity and experimentation. But how can we facilitate rapid learning throughout the organisation? What will the future of learning look like for you? How can we ensure our organisations become engines of growth through learning?
Site Reliability Engineer (SRE), We Keep The Lights On 24/7NUS-ISS
There are many phases in the software development cycle, from requirements to development and testing, but at the tail of the process, is an often overlooked aspect: deployment and delivery. With the paradigm shift of delivering on-site software to offering software-as-a-service, Site Reliability Engineering is beginning to take a greater role in product delivery.
This session aims to give a glimpse of the work that goes into site reliability engineering (SRE) and effort that goes into keeping a service going 24/7.
Product Management in The Trenches for a Cloud ServiceNUS-ISS
More often than not, people’s perception of Product Management is usually centred around the definition, management and prioritisation of software features and functionality. While that is largely true, it is also one of many things that a Product Manager needs to focus on, given limited time and resources.
This session aims to provide an unfiltered view of how Product Management looks like in the context of Enterprise Cloud Applications development, the challenges confronting Product Managers, and the tradeoff decisions to be made in order to overcome these challenges.
All this, while shipping a working product with each release that will surprise and delight the end user.
Overview of Data and Analytics Essentials and FoundationsNUS-ISS
As companies increasingly integrate data across functions, the boundaries between marketing, sales and operations have been blurring. This allows them to find new opportunities that arise by aligning and integrating the activities of supply and demand to improve commercial effectiveness. Instead of conducting post-hoc analyses that allow them to correct future actions, companies generate and analyze data in near real-time and adjust their operations processes dynamically. Transitioning from static analytics outputs to more dynamic contextualized insights means analytics can be delivered with increased relevance closer to the point of decision.
This talk will cover the analytics journey from descriptive, predictive and prescriptive analytics to derive actionable and timely insights to improve customer experience to drive marketing, salesforce and operations excellence.
With the use of Predictive Analytics, companies are able to predict future trends based on existing available data. The actionable business predictions can help companies achieve cost savings, higher revenue, better resource allocation and efficiency. Predictive analytics has been used in various sectors such as banking & finance, sales & marketing, logistics, retail, healthcare, F&B, etc. for various purposes.
Get set to learn more about the different stages of predictive analytics modelling such as data collection & preparation, model development & evaluation metrics, and model deployment considerations will be discussed.
In this digital transformation era, we have seen the rise of digital platforms and increased usages of devices particularly in the area of wearables and the Internet of Things (IoT). Given the fast pace change to the IoT landscape and devices, data has become one of the important source of truth for analytics and continuous streaming of data from sensors have also emerged as one of the fuel that revolutionise the emergence of IoT. These includes health telematics, vehicle telematics, predictive maintenance of equipment, manufacturing quality management, consumer behaviour, and more. With this, we will give you an introduction on how to leverage the power of data science and machine learning to understand and explore feature engineering of IoT and sensor data.
Diagnosing Complex Problems Using System ArchetypesNUS-ISS
In today’s VUCA world, we are faced with problems coming in fast and furious. In order to resolve such problems quickly, we need to first understand the problems. One of the techniques to understand complex problem is through the use of system archetypes. System archetypes are patterns of behaviour of a system. Let’s us explore some of the system archetypes in this session as well as tips on how to resolve them.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
5. Full spectrum of human’s mental activities
1. Rational/logical thinking
2. Sensing
3. Emotions
4. Pragmatics (value-measuring)
5. Intuition
6. Analogical mapping
7. Imagination
8. Aesthetics
9. creativity
Currently in commercialized AI
6. Intuitive
Aesthetic
Analogical mapping
Creative
Speed
Precision
Scale
Repetitive
Aim : to make Human-Machine interactions ≥ instinctive as Human-Human interactions
How these strengths
could be seamlessly
combined in a system?
Not limited to smart interfacing
“Intelligence
Augmentation”
(IA)
“Intelligent
Infrastructure”
(II)
Replicate
these to
AI
7. Artificial Intelligence — The Revolution
Hasn’t Happened Yet - Michael I. Jordan, April, 2018
• So far we are just refining
the tools – their speeds,
efficiencies, chance of
success, etc.
• We have done very little on
the real core issue – the
ability of machines to
assess relevance,
usefulness, meaningfulness,
etc.
8. Emotional AI
Emotional
AI
Humans’ facial expressions,
voice’s tune, gestures, gaze
directions, etc.
Humans’
modes and
concerns
Behavioural
knowledge
base
Responds
appropriately
Rational AI
(NLP, text-
mining, logical
reasoning)
Humans’ spoken contents,
contextual information, etc.
9. Many ‘partial’ psychological models based on
behavioural modelling
• So far all achieved very limited success with AI feels like ‘schizophrenic’ and ‘super-dumb’
• The key challenge is that humans(except young kids) won’t reveal their real concerns and
intents to others so directly
=> needs something not just ‘superficial’ but deeper and core
e.g.
11. Pragmatic AI
• Traditional engineering is based on creating machine with competence
for fulfilling a pre-fixed set of purpose
• A person’s judgement of what is useful and relevant changes in
different circumstances – but the core beliefs and values remain
relatively consistent
• Needs AI’s auto-detection of what is “useful”, “relevant”, “meaningful”
and “valuable” from point-of-view of humans in an evolving operating
environment
• For creating smarter machines we need to model how human’s
intention is formed from beliefs and values in different contexts
12. Tell my robot servant:"Pass me that cup of water"
• This command by itself is much under–constrained to the robot
• Robot needs to auto-fill in many implicit constraints related to my intents:
1. to take over the cup with my hand => within hand-reachable distance
2. Minimize spillage => minimizing the jerk + maintain the orientation of the cup
3. to avoid collision
4. Within reasonable time
5. Just enough gripping force to hold the cup but not to crush it
6. If I intend to drink the content & content too hot => warn me(empathetic)
7. Prefers left or right-handed (social etiquette)
8. … etc (many more)
Human house maid does this complex ‘intention-sync’ subconsciously
Physical
13. Urgent need for intention-sync in AI
• In 2017 engineers in Google and Facebook shut down some of their
AI machines after the machines created their own interaction rules
that were not within designed scope
• Machines have already advanced to the state where they could no
longer be bounded by their pre-designed functions
• => need a new approach to root the purpose of future-ready AI
system in order to benefit from its auto-evolution
14. New way of “Rooting” the purpose of machines
Current
17. “Human-Emulator” running alongside
Superintelligent AI
“Human Emulator”
Psychological
Collaborative System
Future-ready AI
Output to
operating
environment
(Evolving) Operating Environment
Observeandlearn Monitors the benefits and harm
Stand-alone “human emulator”
softbot running alongside any
automated system, just like a
human constantly giving advice
to its evolution, and closely
watching the benefits or harm it
produces
Auto-discovery of new
algorithms, data structures,
utilizations, etc.
Assesses the usefulness, relevance,
meaningfulness of new competences
18. Kekule’s Dream & Benzene ring
…tried to solve the
geometry of
Benzene molecule
for many years by
equations…
… then had a
dream of a snake
biting its own tail
Benzene ring
Eureka!
19. Model of Analogical mapping in Intuition
Percept of
snake
Percept of Benzene’s
molecular construct
Level of
abstraction
Chain-link
structure
Chain-link
structure
Alternative
Abstract
representation n
Alternative
abstract
representation 1
Alternative
Abstract
representation x
Bridge for two remote
percepts at certain level
of abstraction
Conscious
Sub-conscious
20. Ingredients of Artificial Intuition
1. Analogical mapping
2. Cross-breeding of existing ideas/concepts
3. Extrapolation of real experiences
4. Right mixture of random explorations at
strategic locations
Exploiting
existing knowledge to
find most promising
direction of task-
specific knowledge
acquisition
Exploring
unknown regions of
knowledge space
‘Exploitation-vs-Exploration’ in
new knowledge acquisition