Alibaba Plans An Artificial Intelligence Rival To ChatGPT

Chinese technology giant Alibaba, sometimes known as China’s Amazon, has recently announced plans to roll out its own Artificial Intelligence (AI) ChatGPT-style product called Tongyi Qianwen, which translates to “seeking truth by asking a thousand questions.”

It has been said that their chatbot can switch between Mandarin and English. Its cloud computing unit says it will integrate the chatbot across Alibaba's businesses in the "near future" but has not given details on timing.

Recently technology companies around the world have announced their own so-called generative AI chatbots and earlier this year, Alibaba revealed that it was working on a rival to ChatGPT called Tongyi Qianwen which roughly translates as "seeking an answer by asking a thousand questions", although Alibaba has not given an English version of the name. "We are at a technological watershed moment driven by generative AI and cloud computing," Alibaba's Chairman and chief executive Daniel Zhang said in as Tongyi Qianwen was launched.

The company said Tongyi Qianwen will initially be added to DingTalk, Alibaba's workplace messaging app.  It will be able to perform a number of tasks including turning conversations in meetings into written notes, writing emails and drafting business proposals, the company said.

Alibaba said it will also be integrated into Tmall Genie, which is similar to Amazon's Alexa voice assistant smart speaker.

Interest in generative AI has surged since the release of ChatGPT by Microsoft-backed OpenAI last year. Generative AI is capable of learning from past data to create content indistinguishable from human work and ChatGPT can answer questions using natural, human-like language and it can also mimic other writing styles, using the internet as it was in 2021 as its database.

  • Microsoft has spent billions of dollars on the technology, which was added to its search engine Bing in February. The US software giant also said it will embed a version of ChatGPT in its Office apps, including Word, Excel, PowerPoint and Outlook.
  • Alphabet's Google and Chinese technology group Baidu have also announced their own AI models and released similar chatbots.

On Tuesday, China's cyberspace regulator unveiled draft measures for managing generative AI. Under the proposed rules, companies would be responsible for the legitimacy of data used to train the technology, the Cyberspace Administration of China said. The public has until 10 May to give feedback on the proposals.

DW:       BBC:        CNBC:      Metro:   NewsCrypto:    Analytics Vidhya:

You Might Also Read: 

The Most Important Technology Advance In Decades:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« EU Payroll & HR Services Giant Under Attack
Israeli Hacking Spyware In Widespread Use »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

WEBINAR: How To Build And Implement An Effective Endpoint Detection And Response Strategy

WEBINAR: How To Build And Implement An Effective Endpoint Detection And Response Strategy

Join this webinar to learn how the cloud threat landscape is evolving and organizations are deploying more advanced and capable security controls at scale.

Aurec

Aurec

Aurec provides specialist recruitment and contracting services including ICT professionals.

Bob's Business

Bob's Business

Bob's Business adopts a fresh approach to information security awareness and compliance training, delivering key information through the use of short animated movies.

Grimm Cyber

Grimm Cyber

GRIMM makes the world a more secure place by increasing the cyber resiliency of our client’s systems, networks, and products.

CyberOwl

CyberOwl

CyberOwl's early warning system uses a probabilistic framework to systematically aggregate uncertain and disparate security events to provide real-time visibility of threats to every asset.

Merlin Cyber

Merlin Cyber

Merlin is a premier cybersecurity platform that leverages security technologies, trusted relationships, and capital to develop and deliver groundbreaking security solutions.

Baltimore Cyber Range (BCR)

Baltimore Cyber Range (BCR)

Baltimore Cyber Range provides IT and cybersecurity training, simulation and placement services across the full spectrum of experience and skill levels.

Build38

Build38

Build38 provides the highest levels of security for mobile applications.

Tesorion

Tesorion

Tesorion is a fusion of different enterprises each with its own specialisation in the field of cybersecurity. We have combined these specialisations to create an integrated comprehensive solution.

SensorHound

SensorHound

SensorHound’s mission is to improve the security and reliability of the Internet of Things (IoT).

ThreatSwitch

ThreatSwitch

ThreatSwitch a software platform for cleared federal contractors to get and stay compliant with NISPOM and Conforming Change 2.

Allthenticate

Allthenticate

Allthenticate Single Device Authentication (SDA), enables seamless authentication in both the physical and digital words while unifying management in one easy-to-use interface.

Gorodissky IP Security

Gorodissky IP Security

Gorodissky IP Security is a comprehensive approach to protecting your intellectual property on the Internet and beyond.

Tactic Labs

Tactic Labs

Tactic Labs (part of the Avnon Group) delivers a holistic Cyber-Security Management Platform which provides military-grade protection, safeguarding critical infrastructures and mission-critical data.

Axellio

Axellio

Axellio provides economic, end-to-end cyber security solutions designed for your team, environment, and security objectives, providing packet level visibility across your network.

Valency Networks

Valency Networks

Valency Networks provide cutting edge results in the areas of Vulnerability Assessment and Penetration Testing services for webapps, cloud apps, mobile apps and IT networks.

GuardYoo

GuardYoo

GuardYoo's SaaS platform allows cybersecurity professionals to perform Compromise Assessment remotely from anywhere in the world.