Deep Learning Technologies

Computer scientists have developed tiny computers in attempt to make smarter, smaller sensors for medical devices and the Internet of Things, sensors that can do more with less energy.

They used deep learning technologies for enhancing face and voice recognition capabilities. Many of the microphones, cameras, and other sensors that make up the eyes and ears of smart devices are always on alert, and frequently beam personal data into the cloud because they can’t analyse it themselves.

David Blaauw and his colleague Dennis Sylvester, both IEEE Fellows and computer scientists at the University of Michigan have developed the “micromote” computers. By developing tiny, energy-efficient computing sensors that can do analysis on board, they hope to make these devices more secure, while also saving energy.

The micromote designs use only a few Nano watts of power to perform tasks such as distinguishing the sound of a passing car and measuring temperature and light levels. They showed off at a conference a compact radio that can send data from the small computers to receivers 20 meters away.

They also described their work with TSMC (Taiwan Semiconductor Manufacturing Company) on embedding flash memory into the devices, and a project to bring on board dedicated, low-power hardware for running artificial intelligence algorithms called deep neural networks.

According to the IEEE website, the group worked with TSMC to bring flash memory on board because to record video and sound, the tiny computers need more memory. Now they can make tiny computers with 1 megabyte of storage.

Another micromote they presented at the conference incorporates a deep-learning processor that can operate a neural network while using just 288 microwatts.

Neural networks are Artificial Intelligence algorithms that perform well at tasks such as face and voice recognition. They typically demand both large memory banks and intense processing power. The Michigan group brought down the power requirements by redesigning the chip architecture.

The idea is to bring neural networks to the Internet of Things. “A lot of motion detection cameras take pictures of branches moving in the wind, that’s not very helpful,” says Blaauw.

Security cameras and other connected devices are not smart enough to tell the difference between a burglar and a tree, so they waste energy sending uninteresting footage to the cloud for analysis. Onboard deep-learning processors could make better decisions, but only if they don’t use too much power.

The Michigan group imagine that deep-learning processors could be integrated into many other Internet-connected things besides security systems. For example, an HVAC system could decide to turn the air-conditioning down if it sees multiple people putting on their coats.

The Michigan group hopes they will be ready for market in a few years. Blaauw and Sylvester say their startup company, CubeWorks, is currently prototyping devices and researching markets.

The company was quietly incorporated in late 2013. Last October, Intel Capital announced they had invested an undisclosed amount in the tiny computer company.

I-HLS

A Nano Generator To Power New Smart Cities:

Spying With Nano Robots Disguised As Insects:

Montreal’s Future In Smart Sensors And AI:

 

« Dubai Tests Autonomous Aerial Vehicle
Directors Report March 2017. Cloud Computing For Management (£) »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CERT-SE

CERT-SE

CERT-SE is the national and governmental Computer Security Incident Response Team of Sweden.

AVG Technologies

AVG Technologies

AVG is focused on providing home and business computer users with the most comprehensive and proactive protection against computer security threats.

RedLock

RedLock

The RedLock Cloud 360TM platform correlates disparate security data sets to provide a unified view of risks across fragmented cloud environments.

Cyber Seguridad (Cyberseg)

Cyber Seguridad (Cyberseg)

Cyberseg provides specialized Cybersecurity services, including managed services (SOC / CERTs) and solutions for the protection of critical infrastructures.

Romanian Accreditation Association (RENAR)

Romanian Accreditation Association (RENAR)

RENAR is the national accreditation body for Romania. The directory of members provides details of organisations offering certification services for ISO 27001.

UNIDIR Cyber Policy Portal

UNIDIR Cyber Policy Portal

The UNIDIR Cyber Policy Portal is an online reference tool that maps the cybersecurity and cybersecurity-related policy landscape.

Smart Contract Security Alliance

Smart Contract Security Alliance

The Smart Contract Security Alliance supports the blockchain ecosystem by building standards for smart contract security and smart contract audits.

Soffid

Soffid

Soffid provides full Single-Sign-On experience and full Identity and Access Management features by policy-based centralised orchestration of user identities.

Absa Cybersecurity Academy

Absa Cybersecurity Academy

Absa Cybersecurity Academy is an initiative aimed at empowering marginalised South African youths to become certified cybersecurity specialists.

Agile Underwriting

Agile Underwriting

Agile, an underwriting agency, insurtech and Coverholder at Lloyd's, provides niche insurance products across Aviation, Marine & Cargo, Cyber and Financial Lines.

CleanCloud by SEK

CleanCloud by SEK

CleanCloud by SEK is a CSPM product focused on public cloud data protection and security regulations, with over 400 compliance checks for the market's leading frameworks and regulations.

AnyTech365

AnyTech365

AnyTech365 is a leading European IT Security and Support company helping end users and small businesses have a worry-free experience with all things tech.

Vertex Cyber Security

Vertex Cyber Security

Vertex provide Cyber Security Services to small to large businesses including Advise, Consulting, Adding Security Partnership, Penetration Testing, ISO 27001-2 and Audits.

Edge Security

Edge Security

Edge Security is an information security research and consulting firm of expert hackers.

Iron Mountain

Iron Mountain

Iron Mountain Incorporated is a global business dedicated to storing, protecting and managing, information and assets.

Parried

Parried

Parried is a leading Managed IT Services and Cybersecurity provider, known for blending deep technical knowledge with business strategy.