• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Home
  • About Us
  • Contact Us

iHash

News and How to's

  • AR Wireless BT Game Gun Safe for $39

    AR Wireless BT Game Gun Safe for $39
  • The Chess Masterclass Bundle with Grandmaster Damian Lemos for $49

    The Chess Masterclass Bundle with Grandmaster Damian Lemos for $49
  • Bluebell Knife for $41

    Bluebell Knife for $41
  • CMPS Folding Knife for $29

    CMPS Folding Knife for $29
  • Linkcard Professional Plan: Lifetime Subscription for $49

    Linkcard Professional Plan: Lifetime Subscription for $49
  • News
    • Rumor
    • Design
    • Concept
    • WWDC
    • Security
    • BigData
  • Apps
    • Free Apps
    • OS X
    • iOS
    • iTunes
      • Music
      • Movie
      • Books
  • How to
    • OS X
      • OS X Mavericks
      • OS X Yosemite
      • Where Download OS X 10.9 Mavericks
    • iOS
      • iOS 7
      • iOS 8
      • iPhone Firmware
      • iPad Firmware
      • iPod touch
      • AppleTV Firmware
      • Where Download iOS 7 Beta
      • Jailbreak News
      • iOS 8 Beta/GM Download Links (mega links) and How to Upgrade
      • iPhone Recovery Mode
      • iPhone DFU Mode
      • How to Upgrade iOS 6 to iOS 7
      • How To Downgrade From iOS 7 Beta to iOS 6
    • Other
      • Disable Apple Remote Control
      • Pair Apple Remote Control
      • Unpair Apple Remote Control
  • Special Offers
  • Contact us

Heard on the Street – 6/20/2022

Jun 20, 2022 by iHash Leave a Comment

Welcome to insideBIGDATA’s “Heard on the Street” round-up column! In this regular feature, we highlight thought-leadership commentaries from members of the big data ecosystem. Each edition covers the trends of the day with compelling perspectives that can provide important insights to give you a competitive advantage in the marketplace. We invite submissions with a focus on our favored technology topics areas: big data, data science, machine learning, AI and deep learning. Enjoy!

Synthetic Data: The Key to Faster and More Efficient AI in a Recession. Commentary by Yashar Behzadi, CEO and Founder of Synthesis AI

Collecting and labeling real data needed to train AI/ML systems is expensive and time-intensive. In the case of complicated computer vision systems like autonomous vehicles, robotics, or satellite imagery, building the hardware to acquire data may be prohibitively high-priced. A single dataset may contain tens of millions of elements and human labeling may cost dollars an image depending on the complexity of the labels. This is simply too much for organizations, especially during a looming recession. Synthetic data is a promising approach that delivers labeled training data at a fraction of the resources and time of current human labeling approaches. Synthetic data aims to simulate real-world scenarios through generative AI and cinematic visual effect technologies to programmatically create labeled data sets. Leading computer vision teams are already embracing synthetic data to reduce costs and accelerate the development of production models. Organizations that embrace new. radically more efficient synthetic data technologies will thrive even in the midst of an economic downturn.  







Need data for your AI? Try Synthetic. Commentary by John Larson, Senior Vice President at Booz Allen

Your AI is only as smart as the data it’s given. The quality of data used to train AI affects how well it performs, and the old adage of “garbage in, garbage out” still rings true today. However, there are  challenges with data that are further compounded by the unique self-learning aspect of AI/ML, which augments potential data bias as algorithms learn and reinforce their decisions with increasing autonomy and speed inside of an AI system. If the initial data quality is poor, the accuracy and performance of the model will gradually decrease, while bias becomes more pervasive. However, we’re finding new ways around data limitations with methods such as the use of synthetic data: artificial data that mimics authentic observations and can be used to enhance the training of machine learning models when an organization lacks sufficient real-world data or needs to ensure the privacy in the training data through use of synthetic data clones. Not only can synthetic data supplement an existing dataset’s volume, it can also be used to round out data to make it more representative of a population to further mitigate bias. This is done by synthetically stitching together data to fill in for data gaps, for example if a dataset includes a disproportionately high sample of respondents of a certain demographic. Reliable AI/ML starts with good data, and innovative approaches such as the use of synthetic data are key to the future of the technology. 

Relationships are really predictive signals into ML. Commentary by Neo4j CEO, Emil Eifrem

Data scientists are leveraging graphs to build their models and use history to predict the future. So much of our life currently relies on machine learning, and Gartner predicts that by 2025, graph-based machine learning models will replace 60 percent of all existing models built on traditional data. 

Embracing BI through a vendor-agnostic, open lakehouse approach. Commentary by Billy Bosworth, CEO of Dremio

Anyone familiar with the potential of big data analytics in the cloud is likely a fan of data lakehouses. Lakehouses are shaping the future because they combine the scalability of data lakes and the quality of data warehouses. However, ensuring an open architecture is key to unlocking value in data and enabling organizations to effectively deliver insights using SQL and best-of-breed tools for years to come. Without an open approach, developers are locked into vendor-specific approaches, often with costly contracts that add time and complexity. In comparison, an open model enables reliable insights from a single source of truth, and provides maximum flexibility for future technology decisions. Not only does an open data architecture allow for easy access and the ability to analyze data without moving or duplicating it, but it’s vendor-agnostic. This enables enterprises to future-proof their data architecture and choose leading technologies as they see fit. Done correctly, cost savings are also realized due to the elimination of data copies and expensive data movement.

The Big Shift to Data-as-a-Service? Commentary by Varun Villait, Chief Product Officer at People Data Labs

We’re in the middle of a major shift across industries. Every business is either becoming – or has already become – a data business. Data-as-a-service (DaaS) companies will be critical to this transformation, empowering both legacy businesses and a rising generation of data-enabled startups. They have already begun to make themselves essential by building and delivering the data that almost every business will need to create data-driven tools, processes, and insights. The value of DaaS will also become even more apparent in an economic downturn. Businesses looking for greater efficiency can turn to data to better understand the dynamics of a changing market, evaluate competitors, and diligence potential investment targets. In addition, the DaaS model will empower businesses to build data-driven processes and automation and lower the lift required from data-science teams all of which will be valuable in a period of belt-tightening.

Emotion AI & Voice Tech: It’s Not What You Say, But How You Say It. Commentary by Sean Austin, CEO & Co-Founder, Helios Life Enterprises

Emotional intelligence helps humans make better decisions and has been shown to be more helpful than IQ in predicting success. However, emotional intelligence has declined globally over the past 50 years with the rise of technology and a user experience that neglects emotion. AI algorithms have significantly improved in analyzing everything from tone to body language due to advances in emotion detection, NLP as well as a greater combination with linguistics and psychology.  AI has the potential to improve emotional intelligence, communication skills, and soft skills, but falls flat when vital components of human communication are excluded. So, why is it that software can understand human commands but not hear the frustration, excitement or trepidation in the human voice? While the capabilities exist, the majority of today’s technologies are, in essence, tone-deaf. Commands may be heard, but tone is not. Tone of the voice is the number one passive indicator of what someone is thinking and accounts for nearly 40% of human communication. A new frontier of emotional understanding through tonal analytics will become a standard necessity for automated analyses of any future voice communication.  By incorporating tonal AI with other forms of emotion AI, a more comprehensive voice technology and understanding can be created. Together these technologies can intelligently connect all facets of complex and unstructured alternative data to generate a clearer macro picture. It is likely that such tonal analyses will mirror the development of automatic speech recognition (ASR) and natural language processing (NLP)—toolsets that have been in development for decades, and are integrated with most voice platforms that support billions of voice interactions globally. As a result, over the next decade, the world will witness a Cambrian explosion in growth at the cross section of AI ($1,581.70 billion By 2030), voice technology ($27.16 billion), and alternative data ($143.31 billion by 2030).

A New Threat Landscape. Commentary by Josh Stella, chief architect at Snyk and founding CEO of Fugue

Developers and engineers are increasingly using infrastructure as code (IaC) that operates against the cloud provider’s application programming interfaces (APIs) to build and modify their cloud infrastructure, including security-critical configurations, in real time as they work. Change in the cloud is a constant, and every change brings risk of a misconfiguration vulnerability that attackers can exploit quickly using automated detection. The control plane is the API surface that configures and operates the cloud. For example, you can use the control plane to build a container, modify a network route, and gain access to data in databases or snapshots of databases (which are a more popular target for hackers than breaking into live production databases). In other words, the API control plane is the collection of APIs used to configure and operate the cloud. Minimizing the potential blast radius of any successful cloud penetration event means protecting against control plane compromise in architectural design of the environment.

Not all cloud-native apps belong in the cloud. Commentary by Jon Toor, CMO, Cloudian

Cloud-native app adoption continues to take off. By 2025, Gartner estimates that over 95% of new digital workloads will be deployed on cloud-native platforms, up from 30% in 2021. However, not all cloud-native workloads will go to the public cloud. Organizations want to run cloud-native apps on their growing on-prem data sets to get more value and insights from that data. For example, they want to leverage on-prem data to support AI, ML and advanced analytics use cases. Because of data gravity, it’s not economically feasible to move all that data to the public cloud – and there are also security, compliance and performance considerations. As a result, many cloud-native workloads will exist on-prem. Public cloud providers are all launching services to support such workloads (e.g., AWS Outposts, Microsoft Azure Stack and Google Distributed Cloud Edge). MSPs are also taking measures to support this trend. These workloads employ cloud APIs that aren’t compatible with traditional IT platforms. Instead, they require modern, cloud-native storage infrastructure that provides the benefits associated with both the public cloud (high-level APIs, limitless scalability, container support) and on-prem environments (cost efficiency, security, performance).

Data Privacy Concerns In AI & Machine Learning. Commentary by Dr. Rami Hashish, Founder of pareIT

There is increasing concern regarding data privacy with AI and machine learning, and frankly, the concern is valid. Regardless of where you stand on the topic, one thing is certain: unethical collection and processing of data can have damaging societal consequences. Stronger, more accurate models require large data sets, resulting in potentially excessive data collections. While varying – and sometimes, limited, or nebulous data regulation policies in certain countries – can allow for a free for all. Indeed, considering that further regulations are inevitable (and undoubtedly required), some may view the current state as effectively promoting expedited misuse until regulations are put in place. And thus, while governments will need to expedite regulations, the onus is ultimately on companies to take responsibility and not collect data improperly and use data maliciously. The problem is that we know that dollars and cents sometimes blur the lines between what’s right and wrong. I am thus hopeful – perhaps naively so – that some sort of governing body is developed, requiring any AI company or product to go through an ethical audit prior to deployment.

International Women in Engineering Day. Commentary by Cindi Howson, Chief Data Strategy Officer, ThoughtSpot

In a world ruled by those who can dominate with data, society needs diversity of experience and talent so that we can all enjoy the most successful outcomes. Women are obviously half the population yet make up a mere 16.5% of engineering talent, according to EngineeringUK. Across all STEM fields and physical and software engineering, such proportions mean that how we design and build simply cannot account for the distinct needs of half the population – nor take advantage of their skills. We need inventors and innovators who can #ImagineTheFuture from all angles. From creating cars with child safety in mind to creating data and AI products that do not accidentally discriminate between male and female job applicants, diversity of thought minimizes bias at scale. Businesses must push for greater diversity to design better products, and more diverse teams also contribute to higher financial performance. As someone who began her career in tech assembling computers, administering a local area network, and coding reports on a mainframe, I’d like to see more women in tech overall, but also more in leadership positions deciding the future of tech for a better world.

Inventory overstock. Commentary by Verte

While a lot of attention is currently focused on product shortages, that’s only one part of the equation. We’re also seeing retailers like Target and Abercrombie trying to get their bloated inventory under control by heavily discounting products. It’s clear this is the year of inventory management — meaning it’s never been more important to leverage data and technology to better manage retail. Of course, these are not tools built overnight. The retailers and brands that invest in data and AI today will be those that rise to the top in the next few years. Retailers should also be aware of Gen Z-conscious shopping habits. For Gen Z, it’s all about the product journey and its environmental and social impact, from pollution and waste to fair labor practices. Building a foundation of sustainable, ethical operations is crucial to a brand’s story.

Sign up for the free insideBIGDATA newsletter.

Join us on Twitter: @InsideBigData1 – https://twitter.com/InsideBigData1

Source link

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn

Filed Under: BigData

Special Offers

  • AR Wireless BT Game Gun Safe for $39

    AR Wireless BT Game Gun Safe for $39
  • The Chess Masterclass Bundle with Grandmaster Damian Lemos for $49

    The Chess Masterclass Bundle with Grandmaster Damian Lemos for $49
  • Bluebell Knife for $41

    Bluebell Knife for $41
  • CMPS Folding Knife for $29

    CMPS Folding Knife for $29
  • Linkcard Professional Plan: Lifetime Subscription for $49

    Linkcard Professional Plan: Lifetime Subscription for $49

Reader Interactions

Leave a Reply Cancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Primary Sidebar

E-mail Newsletter

  • Facebook
  • GitHub
  • Instagram
  • Pinterest
  • Twitter
  • YouTube

More to See

Video Highlights: The Rise of DeBERTa for NLP Downstream Tasks

Jul 4, 2022 By iHash

Some Worms Use Their Powers for Good

Jul 4, 2022 By iHash

Tags

* Apple Cisco computer security cyber attacks cyber crime cyber news Cyber Security cybersecurity cyber security news cyber security news today cyber security updates cyber threats cyber updates data breach data breaches google hacker hacker news Hackers hacking hacking news how to hack incident response information security iOS iOS 7 iOS 8 iPhone iPhone 6 Malware microsoft network security Privacy ransomware malware risk management security security breaches security vulnerabilities software vulnerability the hacker news Threat update video web applications

Latest

AR Wireless BT Game Gun Safe for $39

Expires June 30, 2122 02:44 PST Buy now and get -114% off PRODUCT SPECS About this item AR technology & incredible gaming experience. AR means Augmented Reality. This is a portable gaming gun designed for cellphones. It combines the real world and the virtual gaming world seamlessly. The AR game gun is returning to a […]

Doron Bargo

Implementing Synthetic Monitoring with Telegraf and Logz.io

In my previous blog post, we explored key questions about Synthetic Monitoring, such as what it is, why it’s important, how it works, and how it compares to Real-User monitoring. Synthetic Monitoring is becoming an increasingly-popular method to continuously monitor the uptime of applications and the critical flows within them so that DevOps, IT, and […]

How to Find the Mythical “Perfect Data Scientist”

There are currently over 400K job openings in the U.S. for data scientists on LinkedIn. And, every single one of these companies wants to hire that magical unicorn of a data scientist that can do it all. What rare skill set should they be looking for? Conor Jensen, RVP of AI Strategy at AI and […]

Phishing QR-code attack on QQ users

Scammers used phishing QR codes to hijack QQ accounts

Folks today are generally mostly aware that clicking links from questionable sources, for example in e-mails, isn’t a good idea. However, when it comes to scanning QR codes, people are often much less vigilant. In fact, QR codes can be even more dangerous: while you can check a link with your own eyes before clicking, […]

Bluebell Knife for $41

Expires July 02, 2122 23:59 PST Buy now and get 40% off KEY FEATURES The Bluebell features a unique drop point blade. A long enough blade for a good reach, this knife is excellent for everything outdoors. This is one of those versatile knives that are very easy to love. Fast opening. Outburst assisted opening […]

TikTok Assures U.S. Lawmakers it’s Working to Safeguard User Data From Chinese Staff

Following heightened worries that U.S. users’ data had been accessed by TikTok engineers in China between September 2021 and January 2022, the company sought to assuage U.S. lawmakers that it’s taking steps to “strengthen data security.” The admission that some China-based employees can access information from U.S. users came in a letter sent to nine […]

Jailbreak

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.2.0

Pangu has updated its jailbreak utility for iOS 9.0 to 9.0.2 with a fix for the manage storage bug and the latest version of Cydia. Change log V1.2.0 (2015-10-27) 1. Bundle latest Cydia with new Patcyh which fixed failure to open url scheme in MobileSafari 2. Fixed the bug that “preferences -> Storage&iCloud Usage -> […]

Apple Blocks Pangu Jailbreak Exploits With Release of iOS 9.1

Apple has blocked exploits used by the Pangu Jailbreak with the release of iOS 9.1. Pangu was able to jailbreak iOS 9.0 to 9.0.2; however, in Apple’s document on the security content of iOS 9.1, PanguTeam is credited with discovering two vulnerabilities that have been patched.

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.1.0

  Pangu has released an update to its jailbreak utility for iOS 9 that improves its reliability and success rate.   Change log V1.1.0 (2015-10-21) 1. Improve the success rate and reliability of jailbreak program for 64bit devices 2. Optimize backup process and improve jailbreak speed, and fix an issue that leads to fail to […]

Activator 1.9.6 Released With Support for iOS 9, 3D Touch

  Ryan Petrich has released Activator 1.9.6, an update to the centralized gesture, button, and shortcut manager, that brings support for iOS 9 and 3D Touch.

Copyright iHash.eu © 2022
We use cookies on this website. By using this site, you agree that we may store and access cookies on your device. Accept Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT