Apple Is Buying Into Artificial Intelligence

apple-yapay-zeka-gelistiricisi-vocaliqyu-satin-aldi_640x360.png

Apple Inc. has acquired a UK software startup that could give its digital assistant Siri a boost.

VocalIQ, based in Cambridge, England, has built software aimed at making it easier for people to speak to computers in a more natural way, an area in which Siri and other voice-recognition services have struggled. The company has been particularly focused on selling its product to auto manufacturers, including a partnership with General Motors Co., adding to speculation that Apple is developing its own car. Apple confirmed the acquisition. Terms of the deal weren’t disclosed.

VocalIQ’s technology is based on machine learning, an area of artificial intelligence in which a computer improves as it ingests more information. As a person uses VocalIQ’s software, it helps a device become more accurate at predicting what commands to execute. Other technology companies, including Google Inc. and Facebook Inc., have been conducting similar research in this area.

Apple has been steadily improving Siri since its debut in 2011. While at first criticized for understanding only the most rudimentary of requests, the company has been adding features for getting sports scores, setting reminders, searching for an iPhone picture or finding directions.

Small deals are typical for Apple, which often buys a company, shuts down its product and puts its employees to work on a future product Apple is building.

Apple has also confirmed that it has acquired deep learning company Perceptio, which uses artificial intelligence to classify photos on smartphones.

According to an October 2014 article on Re/code, Perceptio’s technology enables phones to do advanced calculations without storing user data in the cloud. Its founders, Nicolas Pinto and Zak Stone also created a photo sharing app called Smoothie.

Pinto’s Twitter bio says he is a research scientist and computer science lecturer at MIT and Harvard, while Stone holds a PhD in computer vision from Harvard.
FT.com: http://bit.ly/1PpQpwJ
Techcrunch: http://tcrn.ch/1OUyAqh

 

« Who Will Step Up To Secure The Internet Of Things?
Only A Short Time Before Cyber-Attack Hits Finance »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ON-DEMAND WEBINAR: Gen AI for Security: Adoption strategies with Amazon Bedrock

ON-DEMAND WEBINAR: Gen AI for Security: Adoption strategies with Amazon Bedrock

Watch this webinar and get a comprehensive roadmap for securely adopting generative AI using Amazon Bedrock, a fully managed service that offers a choice of high-performing foundation models (FMs).

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

ECSC Group

ECSC Group

ECSC is a full-service information security provider, specialising in 24/7/365 security breach detection and Artificial Intelligence (AI).

GFI Software

GFI Software

GFI Software works with System Administrators, IT Professionals and IT Executives to ensure that their IT infrastructures are monitored, managed, secured and compliant.

evoila

evoila

evoila GmbH is one of the leading providers in consulting, analysis, implementation and management of cloud infrastructure.

Cyber 2.0

Cyber 2.0

Cyber 2.0 is the only system in the world that blocks all forms of cyber attack within the organization, including new and unfamiliar attack methods.

OSIRIS Lab - NYU Tandon

OSIRIS Lab - NYU Tandon

The Offensive Security, Incident Response & Internet Security Lab (OSIRIS) is a security research environment where students analyze and understand how attackers take advantage of real systems.

CSIRT-NQN

CSIRT-NQN

CSIRT-NQN is the Computer Incident Response Team for the Argentine province of Neuquen.

Softcat

Softcat

Softcat offer a broad portfolio of IT services and solutions covering Hybrid Infrastructure, Cyber Security, Digital Workspace and IT Intelligence.

Athreon

Athreon

Athreon utilizes a fusion of AI technology, human interpretation, and the latest in cybersecurity to deliver sound business solutions that help our clients make better data-driven decisions.

Secret Intelligence Service (SIS - MI6)

Secret Intelligence Service (SIS - MI6)

The UK’s Secret Intelligence Service, also known as MI6, has three core aims: stopping terrorism, disrupting the activity of hostile states, and giving the UK a cyber advantage.

NASK SA

NASK SA

NASK SA is an integrator of telecommunications services. We provide advanced ICT security services, collocation and hosting, data centre services, and build corporate networks.

Pacific Global Security Group

Pacific Global Security Group

Pacific Global Security Group offers an intelligence-driven focus on all aspects of cybersecurity for IT/ICS/OT.

Nonprofit Cyber

Nonprofit Cyber

Nonprofit Cyber is a first-of-its-kind coalition of global nonprofit organizations to enhance joint action to improve cybersecurity.

Cyber Chasse

Cyber Chasse

Cyber Chasse is an IT consulting and staffing company offering a full range of cybersecurity solutions, contract staffing services and online training courses.

Vanta

Vanta

Vanta helps companies scale security practices and automate compliance for the industry’s most sought after standards - SOC 2, ISO 27001, HIPAA, GDPR, and other security and privacy frameworks.

Mindflow

Mindflow

Mindflow is dedicated to bringing answers to the challenges the cybersecurity field and beyond face today.

HP Wolf Security

HP Wolf Security

HP Wolf Security protects your organization and devices from cyberattacks no matter where, when or how you work.