Google Wants To Mimic The Human Brain

Researchers from Google and the University of Toronto has released an academic paper titled “One Model to Learn Them All,” and they were pretty quiet about it. What Google is proposing is a template for how to create a single machine learning model that can address multiple tasks.

Google calls this MultiModel. The model was trained on a variety of tasks, including translation, language parsing, speech recognition, image recognition and object detection. What Google found was the machine slowly but incrementally learned how to do the tasks better with each iteration. Machine translation, for example, improved with each pass.

More significant, Google’s MultiModel improved its accuracy with less training data. That’s important because sometimes you just might not have all the data you need or available to train the computer to learn. One of the problems with deep/machine learning is you have to prime the pump, so to speak, with a ton of information before learning can begin. Here, it did it with less.

The challenge, the researchers note, is to create a single, unified deep learning model to solve tasks across multiple domains. Because right now, each task requires significant data preparation for learning.

IBM and US Air Force Super-Computer Research

In the case of IBM and the US Air Force Research Lab, the two have announced plans to build a supercomputer based on IBM’s TrueNorth neuromorphic architecture. Neuromorphic architectures are very-large-scale integration (VLSI) systems containing electronic analog circuits designed to mimic the neurological architectures in the nervous system. The chips are a mix of analog and digital, so they do more than the usual binary on/off mode of digital processors, again to mimic the complexity of cells.

IBM’s TrueNorth chips first came out in 2014 after several years of research in the DARPA SyNAPSE program. Interest has picked up because people are realising that x86 processors and even FPGAs just are not up to the task of mimicking human cells.

There are quite a few efforts behind neuromorphic design, including Stanford, The University of Manchester, Intel, Qualcomm, Fujitsu, NEC and IBM.

The new super-computer will consist of 64 million neurons and 16 billion synapses, while using just 10W of wall power (less than a lightbulb). The new system will fit in a 4U standard server rack with 512 million neurons in total per rack. A single processor in the system consists of 5.4 billion transistors organised into 4,096 neural cores, creating an array of 1 million digital neurons that communicate with one another via 256 million electrical synapses.

So, what will they do with it? Well, the Air Force operates military systems that must recognise and categorise data from multiple sources (images, video, audio and text) in real time. Some of those systems are ground-based, but others are installed in aircraft. So, the Air Force would like deep neural learning both on the ground and in the air.

The real advance in these neural processors is they stay off until they are actually needed, so they can have a ridiculously low power draw like the IBM chip. That would be welcomed in the super-computing world where those monstrosities use power in the mega-watts.

NetworkWorld:

You Might Also Read:

Five Things AI Can Do Better Than Humans:

The Cusp Of Merging Human With Machine:

Machines Versus Human Brains – Who Wins?:

 

« Russia Suspected As Hackers Breach Power Plant Systems
The Insider Threat »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Social-Engineer

Social-Engineer

Social-Engineer is a team of outside–the–box thinkers that share a common focus on human-to-human social engineering.

Site24x7

Site24x7

Site24x7 is an AI-powered observability platform for DevOps and IT operations.

AdNovum Informatik

AdNovum Informatik

AdNovum Informatik provides a full set of IT services, ranging from consulting, the conception and implementation of customized business and security solutions to maintenance and support.

Attivo Networks

Attivo Networks

Attivo Networks is an award winning provider of deception for in-network threat detection, attack forensic analysis, and continuous threat response.

KZ-CERT

KZ-CERT

KZ-CERT is the national Computer Emergency Response Team for Kazakhstan.

ENEA Qosmos Division

ENEA Qosmos Division

Qosmos, a division of Enea, leads the market for IP traffic classification and network intelligence technology used in physical, SDN and NFV architectures.

CIRISK

CIRISK

CIRISK offers a wide range of services from consulting to audit or project management to help you develop your cyber security or information security strategy.

Data Destruction London

Data Destruction London

Data Destruction London offers fast, confidential and compliant expert data destruction services to businesses and organisations in London.

Banshie

Banshie

Banshie is an independent cyber security company with a small team of recognized specialist that are among the best in their field.

GroupSense

GroupSense

GroupSense helps governments and enterprises take control of digital risk with cyber reconnaissance, counterintelligence and monitoring for breached credentials.

Depth Security

Depth Security

Depth Security assessment services provide organizations with real-world visibility into threats facing their infrastructure and applications.

Centre for Cyber Security Research and Innovation (CSRI) - Deakin University

Centre for Cyber Security Research and Innovation (CSRI) - Deakin University

CSRI solves the cyber security threats of tomorrow, today. We work with industry and government leaders on innovative research that has real-world impact.

Liberman Networks

Liberman Networks

Liberman Networks is an IT solutions provider company that provides security, management, monitoring, BDR and cloud solutions.

Apex Systems

Apex Systems

Apex Systems is a world-class technology services business that incorporates industry insights and experience to deliver solutions that fulfill our clients’ digital visions.

Indian Cyber Security Solutions (ICSS)

Indian Cyber Security Solutions (ICSS)

Indian Cyber Security Solutions is an Enterprise Cyber Security Platforms company offering Cyber Security & Technical Education and Compliance & Penetration Testing Services.

Secure Halo

Secure Halo

Secure Halo has been protecting the intellectual assets and sensitive information of the federal government and private sector for 20+ years, through our proactive approach to risk and cybersecurity.