Phishing, ransomware, DDoS, Viruses, and Attack vectors are the most common cyber attack type(1). With the expansion of using AI in It’s predictable, we see more and more AI attacks shortly.
These “AI attacks” are fundamentally different from traditional cyberattacks(2), and current approaches are using against current cyberattacks that may not be appliable. AI Attacks may follow below goals:
Cause Damage: the attacker wants to cause damage by having the AI system malfunction. An example of this is an attack to cause an autonomous vehicle to ignore stop signs.
Hide Something: the attacker wants to evade detection by an AI system.
Degrade Faith in a System: the attacker wants an operator to lose faith in the AI system
Currently, The most common method used in AI Attacks is input attack, which makes a compromised AI system. It refers to manipulating what is fed into the AI system to alter the system’s output to serve the attacker’s goal(2).
We may see the following products in the near future:
Data Anomaly Detector made by computer security companies
AI training security certificate that ensures the quality of the AI System. (Five Star AI System ).
According to IBM, “Fast data (actionable data) is real-time data that typically comes in from streaming — such as through Internet of Things (IoT) technologies and event-driven applications.”
Some expert argue that the argument is that big isn’t necessarily better when it comes to data, and that businesses don’t use a fraction of the data they have access too. Instead, the idea suggests companies should focus on asking the right questions and making use of the data they have — big or otherwise.
This approach requires:
powerful systems for real time analysis
Algorithms that detect the differences between noises and emerging signals
New Visualization Techniques
If this trend continue to grow:
Fast Data Services
Fast Data Neural networks
Question to ask:
Which insignificant events in the past had dramatic impacts on your organization? How fast data could help you on these cases?
http://futureportal.org/wp-content/uploads/2021/04/DC.png656762Amir-reza Asadihttp://futureportal.org/wp-content/uploads/2020/05/FuturePortal-300x138.pngAmir-reza Asadi2021-04-16 08:50:212021-04-17 08:15:35Rise of DC
Information technology allows us to have access to millions of books, will enable us to read books written in different countries, but can we read all the books? The answer is obvious. For an Iranian person, Shahname is the most popular mythical book. We may refer to Shahname many times. But should an expat in Iran read the whole Shahnameh? I don’t think so.
There are other cases to amplify the benefits of summary in knowledge sharing. I think the blue ocean strategy book provides an essential point of view for every business owner; the book is not too long. The authors present their point of view in 240 pages. But I know many people who use the idea of the blue ocean strategy just by reading the Wikipedia page.
In other words, with the boom of information, we can’t consume whole the information, we may need details of books, but we can’t read all books. Businesses like getAbstract and Blinkist use this gap between demand and supply in information markets.
I suggest that this would be a more significant trend in the future. And there would be a marketplace that credible person, sell single page books. There would be two version of many book:
Single Page and expanded edition