Artificial Intelligence by Charles Jennings

Artificial Intelligence by Charles Jennings

Author:Charles Jennings [Jennings, Charles]
Language: eng
Format: epub
Publisher: Rowman & Littlefield Publishers
Published: 2019-03-28T16:00:00+00:00


Rule 2: Run with the Bulls

I have noted that in AI, big is beautiful. Barriers to entry are steep. Among the requirements to produce world-class AI are big data, big compute, big money, and big-brain humans.

In that other AI marketplace (artificial insemination), the strongest bulls sire the healthiest offspring. The same is true with the bulls of AI—the big, strong companies for whom the barriers of entry were surpassed long ago. You and I are little calves in the AI race, so we need to find big bulls to run with, bulls who have the time and resources to keep up with changing cyberthreats and help us keep up on the ever-accelerating AI treadmill.

Being a Northwesterner, I am partial to two old local bulls: Intel and Microsoft. These high-tech giants have been cranking out highly secure and reliable products fairly consistently for decades now. They are not without their own security lapses, of course, but overall their security track records are pretty damn good.4 Intel hardware, Microsoft software, and especially the Azure cloud (which is a combination of the two) are the cornerstones of my personal privacy and security plan. Each company has been investing heavily in cybersecurity for more than a decade. Microsoft has an entire tall building full of security geeks on its Redmond campus—geeks who recently have been outperforming NSA and the FBI in catching Russian hackers in political mischief. Intel practically invented strong hardware security (e.g., the history of the trusted computing module, now a trusted computing platform).5 Security vulnerabilities having to do with the storage of trusted keys have recently been found in Intel semiconductors, and though serious, they have not resulted in any reported data loss. These security flaws, named by their discoverers Foreshadow, Spectre, and Meltdown, received significant publicity even without any known system breach, which just underscores Intel’s long-standing role as a leader in computing security.6

Microsoft and Intel are certainly not the only big bull options. Apple has long had a serious and effective commitment to security, privacy, and product safety. Amazon, and especially its Amazon Web Services (AWS) cloud, have been an amazing engine of technology growth—with a solid security record. IBM, Oracle, Cisco, and such leading security vendors as Symantec, FireEye, and Sophos serve many enterprise customers well.

I am convinced no other cybersecurity measures—short of unplugging the service—would have stopped the hacker hordes. But the hackers couldn’t take us down because they couldn’t find us.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.