Google's New AI System is 'Machine Learning' Breakthrough

Whether you're trying to translate something into a different language, turn your spoken words into text or sift through thousands of saved photos for that one special snapshot, Google has built a "smarter" artificial intelligence system to help, company representatives announced recently.

Google's new "TensorFlow" system is the backbone of many of the company's core functions, ranging from "Smart Reply," which suggests up to three responses to emails, to speech recognition functions in the Google app. 

"TensorFlow is faster, smarter and more flexible than our old system, so it can be adapted much more easily to new products and research," Google representatives said in the company's blog post announcing the new system. 
The tool is an exciting development for artificial-intelligence enthusiasts and researchers.

"TensorFlow is the first serious implementation of a framework for 'deep learning,' backed by both [a] very experienced and very capable team at Google," said Andrej Karpathy, a Ph.D. student at Stanford University who studies machine learning.  

Deep learning is a concept in artificial intelligence that means computers can learn more abstract concepts that humans traditionally perform better than computers do. For example, a human can recognize an image of the Taj Mahal without thinking much about it; people don't need to be told that it isn't an elephant or another monument. But computers have a lot of trouble with that kind of task — asking a computer to identify the Taj Mahal would require it to go through an entire library of images and hope it gets a match.

It gets even worse when you want a computer to recognize activity, said Aaron Courville, an associate professor of computer science at the University of Montreal. Humans can see in an instant that a person is walking down the street, and make assumptions about the person's destination or purpose. A computer, on the other hand, can only tell which direction the walker is going in, and that's about it — for now.

TensorFlow simplifies a lot of that research, Courville said, and allows researchers to build their machine learning systems more easily. "With TensorFlow, it's a set of tools, or a library, that allows you to construct these things and run them in an efficient way."

It all starts with a concept called a neural network, an idea that dates back to the early days of computing. The simplest neural network consists of three layers: one for input, one for processing and one for output. Each layer consists of nodes connected to all the nodes in the next layer. 

Neural networks are designed to learn by strengthening connections between certain nodes. When a neural network is presented with something to learn — the shape of a letter, for instance — the input nodes send signals to the processing layer, which, in turn, sends signals to the output. If the output is correct, then one set of connections becomes stronger; the threshold for turning "on" gets lower as the connections strengthen. This is similar to the way human and animal brains work, by strengthening connections between neurons.

A search engine could do something similar by tracking a user's preferences. With TensorFlow, the connections between nodes are matrices of numbers. A matrix can be a one-, two-, or multidimensional set of numbers. This allows for more complicated processing because each connection embodies several things that can be measured. For example, instead of just encoding whether there is light or dark on a pixel, it can also encode the color and intensity.

Google was originally inspired by a system created at the University of Montreal called Theano, Courville said. But TensorFlow is an improvement, and the upgraded system fixes a lot of the bugs in what was originally a research project, he added.

Google says TensorFlow will work on just about any machine, including a smartphone, though there are some minimum amounts of processing power necessary. It is most compatible with computers that have good graphics processing units — the kind of machines used by gamers.

Karpathy added that the tool is very flexible. "Due to its generality, you can use TensorFlow for any deep-learning application: image recognition, machine translation, sentiment analysis — there are really very few constraints," he said.

Google also announced that, for the first time, it is making some of its TensorFlow code open-source. By publicly releasing the code, the company is allowing outside researchers to use it and build yet more tools, to solve other kinds of problems.
Livescience: http://bit.ly/1LyY0CN

« UK Crime Rate Rises Sharply as Cybercrime is Included
Did China Authorize Major High Level Hack on US & It’s Allies? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Cyberlytic

Cyberlytic

Cyberlytic applies artificial intelligence to combat the most sophisticated of web application threats, addressing the growing problem of high volumes of threat data.

F-Response

F-Response

F-Response is a software utility that enables an investigator to conduct live Forensics, Data Recovery, and eDiscovery over an IP network using their tools of choice.

Datto

Datto

Datto delivers a single toolbox of easy to use products and services designed specifically for managed service providers and the businesses they serve.

APWG

APWG

APWG is the international coalition unifying the global response to cybercrime across industry, government, law-enforcement and NGO communities.

Adeptis Group

Adeptis Group

Adeptis are experts in cyber security recruitment, providing bespoke staffing solutions to safeguard your organisation against ever-changing cyber threats.

CERT Tonga

CERT Tonga

CERT Tonga is the national Computer Emergency Response Team for Tonga.

Pivot Point Security

Pivot Point Security

Pivot Point Security is a trusted leader in information security consulting. We help clients master their information security management systems.

Predatech

Predatech

A cyber security consultancy offering a range of services, including CREST accredited penetration testing, vulnerability assessments and certifications incl. Cyber Essentials & Cyber Essentials Plus.

Lancera

Lancera

Lancera provides growth accelerating Software Development, Web Presence and Cybersecurity Solutions with a focus on customer happiness.

EasyDMARC

EasyDMARC

EasyDMARC deliver the most comprehensive product for anyone who strives to build the most secure possible defence system for their email ecosystem.

Cyberani Solutions

Cyberani Solutions

Cyberani Solutions was created to fulfill the cybersecurity needs of industry and government in Saudi Arabia, and across the Middle East and North Africa regions.

Avalor

Avalor

Avalor are on a mission to help security teams make faster, more accurate decisions by making sense of their data. With Avalor you can bring in data from anywhere, normalize it and analyze it.

CyBourn

CyBourn

Cybourn's diverse offerings include engineering, analysis, product development, assessment, and advisory services in the cybersecurity space.

Teleskope

Teleskope

Teleskope are on a mission to empower businesses to protect sensitive data by default.

AUCyber

AUCyber

AUCyber is a leading provider of managed cyber security solutions and consultancy services, specialising in supporting Australian organisations and Government agencies.

Upwind Security

Upwind Security

Upwind delivers comprehensive cloud security, precisely when and where it’s most critical.