Key Concepts For Understanding Artificial Intelligence

Artificial intelligence (AI) is taking the world by storm, with innovative use cases being applied across all industry segments.

We are decades away from replacing a doctor with an AI robot, but AI is helping experts across all industries diagnose and solve problems faster, enabling consumers to do amazing things, like find songs with a voice command.

Most people focus on the results of AI. But for those of us who like to look under the hood, there are four foundational elements to understand: categorization, classification, machine learning, and collaborative filtering. These four pillars also represent steps in an analytical process.

Categorisation involves creating metrics that are specific to the problem domain (e.g. finance, networking). Classification involves determining which data is most relevant to solving the problem. Machine learning involves anomaly detection, clustering, deep learning, and linear regression. Collaborative filtering involves looking for patterns across large data sets.

Categorisation

AI requires a lot of data that is relevant to the problem being solved. The first step to building an AI solution is creating what I call “design intent metrics,” which are used to categorize the problem. Whether users are trying to build a system that can play Jeopardy, help a doctor diagnose cancer, or help an IT administrator diagnose wireless problems, users need to define metrics that allow the problem to be broken into smaller pieces.

In wireless networking, for example, key metrics are user connection time, throughput, coverage, and roaming. In cancer diagnosis, key metrics are white cell count, ethnic background, and X-ray scans.

Classification

Once users have the problem categorised into different areas, the next step is to have classifiers for each category that will point users in the direction of a meaningful conclusion.

For example, when training an AI system to play Jeopardy, users must first classify a question as being literal in nature or a play on words, and then classify by time, person, thing, or place.

In wireless networking, once users know the category of a problem (e.g. a pre- or post-connection problem), users need to start classifying what is causing the problem: association, authentication, dynamic host configuration protocol (DHCP), or other wireless, wired, and device factors.

Machine learning

Now that the problem is divided into domain-specific chunks of metadata, users are ready to feed this information into the magical and powerful world of machine learning. There are many machine learning algorithms and techniques, with supervised machine learning using neural networks (i.e. deep learning) now becoming one of the most popular approaches.

The concept of neural networks has been around since 1949, and I built my first neural network in the 1980s. But with the latest increases in compute and storage capabilities, neural networks are now being trained to solve a variety of real-world problems, from image recognition and natural language processing to predicting network performance.

Other applications include anomaly feature discovery, time series anomaly detection, and event correlation for root cause analysis.

Collaborative filtering

Most people experience collaborative filtering when they pick a movie on Netflix or buy something from Amazon and receive recommendations for other movies or items they might like. Beyond recommenders, collaborative filtering is also used to sort through large sets of data and put a face on an AI solution.

This is where all the data collection and analysis is turned into meaningful insight or action. Whether used in a game show, or by a doctor, or by a network administrator, collaborative filtering is the means to providing answers with a high degree of confidence. It is like a virtual assistant that helps solve complex problems.

AI is still very much an emerging space, but its impact is profound and will be felt even more keenly as it becomes an ever larger part of our daily lives. When choosing an AI solution, like when buying a car, we’ll need to understand what is under the hood to make sure we are buying the best product for our needs.

InfoWorld

You Might Also Read:

The Impact Of AI On Employmnet Demands New Thinking:

Artificial Intelligence Is A Fascist's Dream:

Afraid Of AI Taking Your Job?:

« US Steps Up Its Cyberwar Capability
NSA Has Done Little To Prevent The Next Edward Snowden »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Rubicon Workflow Solutions

Rubicon Workflow Solutions

Rubicon is a leading provider of managed IT support and strategic services, specialising in creative and mixed platform environments.

Communications Authority of Kenya

Communications Authority of Kenya

The Authority is responsible for facilitating the development of the information and communications sectors including; broadcasting, telecommunications, electronic commerce and cybersecurity.

DeepCyber

DeepCyber

DeepCyber supports its customers, with an “intelligence-driven” approach, to improve their proactive detection and response "capability" of cyber threats.

Blaze Information Security

Blaze Information Security

Blaze Information Security is a privately held, independent information security firm born from years of combined experience and international presence.

Next Horizon

Next Horizon

In the Next Horizon incubator, new disruptive models are being developed in Industry 4.0, Automated Driving and Internet-of-Things.

CloudSphere

CloudSphere

CloudSphere’s flagship Cloud Governance Platform enables enterprises and cloud service providers to simplify and optimize cloud migration, management, and governance.

Cypress Data Defense

Cypress Data Defense

Cypress Data Defense helps clients build secure applications by providing training, best practices, and evaluating security during every stage of the Secure Application Development Lifecycle.

Silent Sector

Silent Sector

Silent Sector is a cybersecurity services company that specializes in providing a wide range of managed security services.

Cira Info Tech

Cira Info Tech

Cira InfoTech’s cyber security and network consulting and managed services deliver unmatched talented resources and capabilities required to design and build an agile and adaptive IT environment.

1Password

1Password

1Password combines industry-leading security with award-winning design to bring private, secure, and user-friendly password management to everyone.

Mobileum

Mobileum

Mobileum is a leading provider of Telecom analytics for roaming, security and risk management and end-to-end domestic and roaming testing solutions.

CodeHunter

CodeHunter

CodeHunter is a malware hunting SaaS platform designed to detect all variations of malware, known and unknown, without the need for source code or signatures.

NewAE Technology

NewAE Technology

NewAE Technology is revolutionizing the hardware security market by making every engineer and designer aware of side-channel power analysis and glitching as important attack vectors.

VC3

VC3

VC3 provides a full range of Information Technology Solutions and Services to hundreds of municipalities and organizations throughout the USA.

Roberts & Obradovic Law

Roberts & Obradovic Law

Roberts & Obradovic Law Group is a corporate, privacy, employment and litigation law firm.

Lintu Solutions

Lintu Solutions

Lintu Solutions is a trusted provider of comprehensive cybersecurity and enterprise risk management solutions.