Key Concepts For Understanding Artificial Intelligence

Artificial intelligence (AI) is taking the world by storm, with innovative use cases being applied across all industry segments.

We are decades away from replacing a doctor with an AI robot, but AI is helping experts across all industries diagnose and solve problems faster, enabling consumers to do amazing things, like find songs with a voice command.

Most people focus on the results of AI. But for those of us who like to look under the hood, there are four foundational elements to understand: categorization, classification, machine learning, and collaborative filtering. These four pillars also represent steps in an analytical process.

Categorisation involves creating metrics that are specific to the problem domain (e.g. finance, networking). Classification involves determining which data is most relevant to solving the problem. Machine learning involves anomaly detection, clustering, deep learning, and linear regression. Collaborative filtering involves looking for patterns across large data sets.

Categorisation

AI requires a lot of data that is relevant to the problem being solved. The first step to building an AI solution is creating what I call “design intent metrics,” which are used to categorize the problem. Whether users are trying to build a system that can play Jeopardy, help a doctor diagnose cancer, or help an IT administrator diagnose wireless problems, users need to define metrics that allow the problem to be broken into smaller pieces.

In wireless networking, for example, key metrics are user connection time, throughput, coverage, and roaming. In cancer diagnosis, key metrics are white cell count, ethnic background, and X-ray scans.

Classification

Once users have the problem categorised into different areas, the next step is to have classifiers for each category that will point users in the direction of a meaningful conclusion.

For example, when training an AI system to play Jeopardy, users must first classify a question as being literal in nature or a play on words, and then classify by time, person, thing, or place.

In wireless networking, once users know the category of a problem (e.g. a pre- or post-connection problem), users need to start classifying what is causing the problem: association, authentication, dynamic host configuration protocol (DHCP), or other wireless, wired, and device factors.

Machine learning

Now that the problem is divided into domain-specific chunks of metadata, users are ready to feed this information into the magical and powerful world of machine learning. There are many machine learning algorithms and techniques, with supervised machine learning using neural networks (i.e. deep learning) now becoming one of the most popular approaches.

The concept of neural networks has been around since 1949, and I built my first neural network in the 1980s. But with the latest increases in compute and storage capabilities, neural networks are now being trained to solve a variety of real-world problems, from image recognition and natural language processing to predicting network performance.

Other applications include anomaly feature discovery, time series anomaly detection, and event correlation for root cause analysis.

Collaborative filtering

Most people experience collaborative filtering when they pick a movie on Netflix or buy something from Amazon and receive recommendations for other movies or items they might like. Beyond recommenders, collaborative filtering is also used to sort through large sets of data and put a face on an AI solution.

This is where all the data collection and analysis is turned into meaningful insight or action. Whether used in a game show, or by a doctor, or by a network administrator, collaborative filtering is the means to providing answers with a high degree of confidence. It is like a virtual assistant that helps solve complex problems.

AI is still very much an emerging space, but its impact is profound and will be felt even more keenly as it becomes an ever larger part of our daily lives. When choosing an AI solution, like when buying a car, we’ll need to understand what is under the hood to make sure we are buying the best product for our needs.

InfoWorld

You Might Also Read:

The Impact Of AI On Employmnet Demands New Thinking:

Artificial Intelligence Is A Fascist's Dream:

Afraid Of AI Taking Your Job?:

« US Steps Up Its Cyberwar Capability
NSA Has Done Little To Prevent The Next Edward Snowden »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Chubb

Chubb

Chubb is the world’s largest publicly traded property and casualty insurer. Commercial services include Cyber Risk insurance.

Ilex International

Ilex International

Ilex International is a European software vendor which specialises in Identity & Access Management solutions.

Dragos

Dragos

Dragos has built the first industrial cybersecurity ecosystem, the ultimate security defense.

Seric Systems

Seric Systems

Seric is a technology business specialising in security, infrastructure and data management.

Entel CyberSecure

Entel CyberSecure

Entel CyberSecure is a portfolio of Cybersecurity solutions and services for the protection, defense, risk management and regulatory compliance of ICT Systems for corporations and Government.

Navaio IT Security

Navaio IT Security

Navaio helps clients with IT Security related challenges with a primary focus on Identity and Access Management, Data Governance, User Awareness and Cyber Resilience Services.

Imageware

Imageware

Imageware is a leader in biometric cybersecurity. Protect against costly, damaging ransomware hacks by employing biometric cybersecurity solutions.

eCloudvalley Digital Technology

eCloudvalley Digital Technology

eCloudvalley Digital Technology is a born-in-the-cloud partner focused entirely on AWS services across APAC region.

Cloud4C

Cloud4C

Cloud4C is a leading automation-driven, application focused cloud Managed Services Provider.

Deutsche Gesellschaft für Cybersicherheit (DGC)

Deutsche Gesellschaft für Cybersicherheit (DGC)

As a leading provider of cyber security, DGC supports companies in taking advantage of the opportunities offered by the digital transformation – and in minimizing the associated risks.

Bit Sentinel

Bit Sentinel

Bit Sentinel is an information security company. We help companies like yours discover, prioritize, and effectively remediate potential cybersecurity risks.

ResilientX

ResilientX

ResilientX is an All-In-One Security Testing Platform designed to help MSPs and SMBs to perform their security testing and assessments without having to outsource IT.

iNovex

iNovex

iNovex is a community of innovators that work together to solve hard problems. We partner with you to meet problems head-on and push boundaries with technology solutions.

Telit Cinterion

Telit Cinterion

Telit Cinterion is a global enabler of the intelligent edge providing highly secure IoT solutions, modules and services.

View

View

View is the leader in smart building technologies including OT cybersecurity to securely connect buildings to the cloud and manage building networks and OT devices.

Abstract Security

Abstract Security

Abstract Security has created a revolutionary platform, equipped with an AI-powered assistant, to better centralize the management of security analytics.