AI Attack

Phishing, ransomware, DDoS, Viruses, and Attack vectors are the most common cyber attack type(1). With the expansion of using AI in It’s predictable, we see more and more AI attacks shortly. 

These “AI attacks” are fundamentally different from traditional cyberattacks(2), and current approaches are using against current cyberattacks that may not be appliable. AI Attacks may follow below goals:

  • Cause Damage: the attacker wants to cause damage by having the AI system malfunction. An example of this is an attack to cause an autonomous vehicle to ignore stop signs.
  • Hide Something: the attacker wants to evade detection by an AI system.
  • Degrade Faith in a System: the attacker wants an operator to lose faith in the AI system

Currently, The most common method used in AI Attacks is input attack, which makes a compromised AI system. It refers to manipulating what is fed into the AI system to alter the system’s output to serve the attacker’s goal(2).

We may see the following products in the near future:

  • Data Anomaly Detector made by computer security companies
  • AI training security certificate that ensures the quality of the AI System. (Five Star AI System ).






Input Attack to make Compromised AI






Fast Data Analytics

According to IBM, “Fast data (actionable data) is real-time data that typically comes in from streaming — such as through Internet of Things (IoT) technologies and event-driven applications.”

Some expert argue that   the argument is that big isn’t necessarily better when it comes to data, and that businesses don’t use a fraction of the data they have access too. Instead, the idea suggests companies should focus on asking the right questions and making use of the data they have — big or otherwise.

This approach requires:

  • powerful systems for real time analysis
  • Algorithms that detect the differences between noises and emerging  signals
  • New Visualization Techniques

If this trend continue to grow:

  • Fast Data Services
  • Fast Data Neural networks

Question to ask:

Which insignificant events in the past had dramatic impacts on your organization? How fast data could help you on these cases?







Rise of DC

The current war  was the most famous ddebate between Nikola Tesla vs Thomas Edison. We may see the rise of these debates again, because:

  • These days we use more batter enabled devices.
  • Batteries operate with DC power and we consume DC power more and more. We even rent DC power( by renting power banks). The combination of next generation of batteries with and home power plants.
  • DC motors and appliances have higher efficiency and power to size characteristics and push for green economy would facilitate  the rise of DC.
  • Auto Manufacturers like GM and Tesla spends billions of dollars in battery cell plants.


Factual Information


No Book!


Information technology allows us to have access to millions of books, will enable us to read books written in different countries, but can we read all the books? The answer is obvious. For an Iranian person, Shahname is the most popular mythical book. We may refer to Shahname many times. But should an expat in Iran read the whole Shahnameh? I don’t think so.
There are other cases to amplify the benefits of summary in knowledge sharing. I think the blue ocean strategy book provides an essential point of view for every business owner; the book is not too long. The authors present their point of view in 240 pages. But I know many people who use the idea of the blue ocean strategy just by reading the Wikipedia page.

In other words, with the boom of information, we can’t consume whole the information, we may need details of books, but we can’t read all books. Businesses like getAbstract and Blinkist use this gap between demand and supply in information markets.
I suggest that this would be a more significant trend in the future. And there would be a marketplace that credible person, sell single page books. There would be two version of many book:
Single Page and expanded edition



Factual Informations and Sources :