Key Concepts For Understanding Artificial Intelligence

Artificial intelligence (AI) is taking the world by storm, with innovative use cases being applied across all industry segments.

We are decades away from replacing a doctor with an AI robot, but AI is helping experts across all industries diagnose and solve problems faster, enabling consumers to do amazing things, like find songs with a voice command.

Most people focus on the results of AI. But for those of us who like to look under the hood, there are four foundational elements to understand: categorization, classification, machine learning, and collaborative filtering. These four pillars also represent steps in an analytical process.

Categorisation involves creating metrics that are specific to the problem domain (e.g. finance, networking). Classification involves determining which data is most relevant to solving the problem. Machine learning involves anomaly detection, clustering, deep learning, and linear regression. Collaborative filtering involves looking for patterns across large data sets.

Categorisation

AI requires a lot of data that is relevant to the problem being solved. The first step to building an AI solution is creating what I call “design intent metrics,” which are used to categorize the problem. Whether users are trying to build a system that can play Jeopardy, help a doctor diagnose cancer, or help an IT administrator diagnose wireless problems, users need to define metrics that allow the problem to be broken into smaller pieces.

In wireless networking, for example, key metrics are user connection time, throughput, coverage, and roaming. In cancer diagnosis, key metrics are white cell count, ethnic background, and X-ray scans.

Classification

Once users have the problem categorised into different areas, the next step is to have classifiers for each category that will point users in the direction of a meaningful conclusion.

For example, when training an AI system to play Jeopardy, users must first classify a question as being literal in nature or a play on words, and then classify by time, person, thing, or place.

In wireless networking, once users know the category of a problem (e.g. a pre- or post-connection problem), users need to start classifying what is causing the problem: association, authentication, dynamic host configuration protocol (DHCP), or other wireless, wired, and device factors.

Machine learning

Now that the problem is divided into domain-specific chunks of metadata, users are ready to feed this information into the magical and powerful world of machine learning. There are many machine learning algorithms and techniques, with supervised machine learning using neural networks (i.e. deep learning) now becoming one of the most popular approaches.

The concept of neural networks has been around since 1949, and I built my first neural network in the 1980s. But with the latest increases in compute and storage capabilities, neural networks are now being trained to solve a variety of real-world problems, from image recognition and natural language processing to predicting network performance.

Other applications include anomaly feature discovery, time series anomaly detection, and event correlation for root cause analysis.

Collaborative filtering

Most people experience collaborative filtering when they pick a movie on Netflix or buy something from Amazon and receive recommendations for other movies or items they might like. Beyond recommenders, collaborative filtering is also used to sort through large sets of data and put a face on an AI solution.

This is where all the data collection and analysis is turned into meaningful insight or action. Whether used in a game show, or by a doctor, or by a network administrator, collaborative filtering is the means to providing answers with a high degree of confidence. It is like a virtual assistant that helps solve complex problems.

AI is still very much an emerging space, but its impact is profound and will be felt even more keenly as it becomes an ever larger part of our daily lives. When choosing an AI solution, like when buying a car, we’ll need to understand what is under the hood to make sure we are buying the best product for our needs.

InfoWorld

You Might Also Read:

The Impact Of AI On Employmnet Demands New Thinking:

Artificial Intelligence Is A Fascist's Dream:

Afraid Of AI Taking Your Job?:

« US Steps Up Its Cyberwar Capability
NSA Has Done Little To Prevent The Next Edward Snowden »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Thycotic

Thycotic

Thycotic prevents cyber attacks by securing passwords, protecting endpoints and controlling application access.

Vera Security

Vera Security

Vera is a data security platform that provides 360-degree visibility and control over critical business data, anywhere it's shared or stored.

Praetorian

Praetorian

Praetorian is an offensive cybersecurity company whose mission is to prevent breaches before they occur.

QSecure

QSecure

QSecure specializes in the provision of information security and risk management services.

Synelixis Solutions

Synelixis Solutions

Synelixis Solutions is a high-tech company founded to provide complete telecommunications, networking, security, control and automation solutions.

WiSecure Technologies

WiSecure Technologies

WiSecure Technologies aims to develop cryptographic products meeting requirements in the new economic era.

Neovera

Neovera

Neovera is a trusted provider of managed services including cyber security and enterprise cloud solutions, committed to delivering results through the innovative use of scalable enterprise-grade tech.

Bloc Ventures

Bloc Ventures

Bloc Ventures is an investment company providing long-term, ‘patient’ equity capital to early stage unquoted deep technology companies.

LastPass

LastPass

LastPass provides award-winning password and identity management solutions that are convenient, effortless, and easy to manage.

Elba

Elba

Employee security needs to be reinvented. SaaS security needs to involve end-user and awareness needs to be actionable. Meet elba, the 5-in-one cybersecurity hub with no compromises.

EPAM Systems

EPAM Systems

Since 1993, EPAM Systems has leveraged its advanced software engineering heritage to become a leading global digital transformation services provider.

Evervault

Evervault

Evervault provides engineers easy solutions to complex data security and compliance problems.

ABPGroup

ABPGroup

ABPGroup is Asia’s leading cybersecurity technology provider focusing on providing best-of-breed solutions that address today’s pressing challenges.

Acumen

Acumen

Acumen's cyber security engineers protect your critical systems, in critical moments. We are here when you need us most.

PureID

PureID

Protect your enterprise with PureAUTH #IAMFirewall, Resilient SSO platform, purpose built to provide Passwordless Authentication & Zero Trust Access, by default.

Chorology

Chorology

Chorology is a leading provider of intelligently automated, data compliance and posture enforcement solutions.