A Major Development in Deep-Learning

A software company that’s developed a deep learning network software that makes smart products like robots and drones more autonomous and useful recently announced a major advance in deep learning. 

With the company’s new software that can learn with or without the cloud, the risk of forgetting previous knowledge is eliminated. Neurala’s neural network software uses a bio-inspired approach to mimic the way the human brain learns and analyses its environment. 

The software enables a variety of smart products, from industrial drones to consumer electronics and cameras. For example, toys can learn to identify their owners, security cameras can identify specific threats, drones can “learn” how to diagnose problems at the tops of cell towers, and self-driving cars can be safer and learn to avoid obstacles.

According to the company’s press release on businesswire.com, the new approach means that for the first time a self-driving car can be personalised by each owner or dealer to a specific neighborhood; a parent can teach a toy to recognise a child, without infringing on privacy; and industrial machines can be updated in the field for specific tasks.

Neurala’s breakthrough solves the “catastrophic forgetting” problem for deep learning neural networks instantly at the computing device. New objects can be added to the deep learning AI system on the fly and without a server. Systems don’t need to be retrained from the beginning, and new information can be added without risk. Neurala accomplishes this by combining different neural network architectures in a way that was previously considered impossible.
“Our breakthrough is the enabler that automotive companies, consumer electronics companies and others have needed to make deep learning useful for their customers,” said Massimiliano Versace, CEO of Neurala. “The ability to learn on the fly means that the Neurala approach enables learning directly on the device, without all the drawbacks of cloud learning. In addition, it eliminates network latency, increases real-time performance, and ensures privacy where needed.

Most importantly, it will unlock the development of a sea of cloud-less applications.” Neurala will incorporate the new capability at no additional charge into the Neurala Brains for Bots SDK (software development kit). It is expected to ship in Q3 2017.

Neurala pioneered the development of deep learning neural network software for NASA to use in planetary exploration, where processing power, battery life and communications are limited. Instead of designing deep learning neural networks for super computers, as other companies do, The Neurala Brain was designed to work where the decisions need to be made.

I-HLS

You Might Also Read:

Industrial Robots Are A Security Weak Link:

Around Half Of Human Jobs Can Be Automated Now:

Deep Learning Technologies:

Deep Learning Blows Up Your Data Strategy:

 

 

 

« US Must Project Cyber Warfare Capabilities to Deter Attacks
North Korea's Unit 180 Managed WannaCry Attack »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Galaxkey

Galaxkey

Galaxkey is a data protection product that protects email, documents and any data using access control and an encryption platform.

IPCopper

IPCopper

IPCopper specializes in network packet capture appliances for cybersecurity, cybersurveillance and network monitoring, and encrypted data storage.

EG-CERT

EG-CERT

EG-CERT is the national Computer Emergency Response Team for Egypt.

Wind River

Wind River

Wind River delivers the technology and expertise that enables the deployment of safe, secure, and reliable intelligent connected systems.

Trustlook

Trustlook

Trustlook's SECUREai engine delivers the performance and scalability needed to provide total threat protection against malware and other forms of attack.

CSL Group

CSL Group

CSL solutions provide complete end-to-end connectivity services for Security, Fire, Telecare and other mission critical M2M/IoT applications.

Penningtons Manches Cooper

Penningtons Manches Cooper

Penningtons Manches Cooper is a leading UK law firm providing high quality legal advice in areas including Data Protection, Cyber Security and Cyber Crime.

XPO IT Services

XPO IT Services

XPO IT Services are dedicated to providing secure, high quality IT recycling and asset disposal services.

Rigado

Rigado

Rigado's mission is to enable commercial IoT success by providing high-performance secure and scalable wireless edge connectivity and network infrastructure.

Ten Eleven Ventures

Ten Eleven Ventures

Ten Eleven is a specialized venture capital firm exclusively dedicated to helping cybersecurity companies thrive.

Vortiv

Vortiv

Vortiv Ltd (formerly known as Transaction Solutions International Ltd) is a technology based company focused on the cybersecurity and the cloud services sector.

Schneider Downs

Schneider Downs

Schneider Downs & Co. provides accounting, tax and business advisory services through innovative thought leaders who deliver their expertise to meet the individual needs of each client.

Infuse Technology

Infuse Technology

Infuse Technology provide the highest level of cybersecurity support, implementing practical solutions to protect against cyber-attacks, from simple phishing scams to complex data security breaches.

Siometrix

Siometrix

Siometrix addresses digital identity fraud. It steals your attacker's time and prevents many prevalent attack vectors.

Vector Choice Technologies

Vector Choice Technologies

Vector Choice Technology Solutions has a long standing reputation in cyber security consulting since 2008.

CYNC Secure

CYNC Secure

CYNC boosts cybersecurity remediation by consolidating fragmented data and optimizing operational processes.