Cloud-based Deep Learning Neural Networks

Blog Date:  8/11/2016
Author:  Ray Coulombe

How your favorite computer apps might surprise you.

In case you missed it, Facebook has artificial intelligence (AI). It’s there to help you tag your friends in photo albums by facial recognition and aids in search queries. And they’re not alone. AI is one of the hottest, fastest growing technologies when it comes to making sense of loads of data.

You, too, can now get deep-learning artificial intelligence systems for your office system through a cloud service. With cloud-based deep learning, companies choose a cloud service and its application programming interfaces for software tasks like recognizing images, filling in search queries, or translating.

In an article from IEEE Spectrum, Zachary Chase Lipton said, “Deep-learning algorithms dominate other machine-learning methods when data sets are large.” The deep-learning researcher works in the Artificial Intelligence Group at the University of California, San Diego, and has examined cloud AI services from companies such as Amazon and IBM. “Thus any company or application that has well-formed prediction problems—such as forecasting demand or translating between languages—could benefit from deep learning.”

But that’s not all; you might even believe computers can start to think because these deep learning programs also have a powerful tool called a “recurrent neural network”—basically the AI “learns” as it mines data. With studies from Lipton, Sharad Vikram, and Julian McAuley at UC San Diego, the research shows these recurrent networks can do everything from process language to reply to email messages.

But how does this neural network work? Basically the networks consist of artificial neurons, which, in biology, are known as the building blocks of the cell. They fire off, or don’t fire off, electrical signals based on signals received from the other neurons attached to them. In your brain, a neuron is connected by a synapse to other neurons. Through these connections, one neuron’s firing can start or stop the firing of other neurons. So, similar to biological neurons, artificial neural network’s stimulated neurons work together. Between each connection in artificial neurons, there is a value assigned called a weight. This weight represents the strength of the connection, where a positive number is a stimulating connection while a negative number is a inhibiting connection. To determine whether this artificial neuron will fire or not, the weight is calculated by the sum of the activations of al the neurons feeding into it. Then that sum is run through an activation function, outputting the desired activation.

Okay now that all the science is behind us, what does this mean for security? For starters, it helps with better analytics. Everything from facial recognition to license plate recognition to non-rules-based algorithms will be analyzed better and faster. Not to mention that there are better analytic measures employed in nearly all aspects of risk analysis.

But it also can better predict events and deployment of security assets by “learning” how the system has reacted to previous events. Finally, there is more effective cyber security overall (due to the AI and other security passes like biometrics) and post-event analysis of the data logs.

 

Resource Blogs

Most Recent Blog List for Blog Author: Ray Coulombe

Security Specifier Blog List Image for  Stay Safe! While Traveling This Summer

Stay Safe! While Traveling This Summer

It’s summer vacation time! The last thing you need to worry about it is getting your identity stolen while you’re sitting on a beach somewhere exotic. In 2016, more than 15 million Americans were victims of identity theft, up 16 percent from the previous year, according to Experian. Plus, about 33 percent of that fraud took place when people were traveling. Here’s a few tips to staying safe all summer while traveling...
read more -->

Security Specifier Blog List Image for Rethinking Cabling

Rethinking Cabling

Cat 5e became an ANSI/TIA/EIA standard in 2001, Cat 6 in 2002, and Cat 6a in 2008. However, it may be extremely useful to consider taking advantage of other existing cabling infrastructure in lieu of running new. Read more to learn how to approach cabling.
read more -->

Security Specifier Blog List Image for Off the Beaten Path at ISC West

Off the Beaten Path at ISC West

This year at ISC (the International Security Conference and Exposition), I was determined to try to see the latest iStechnologies hiding in the nooks and crannies—literally! I visited booths in the back, the basement, small kiosks hidden inside larger vendor books, and throughout the Emerging Technology Zone.

In case you missed the show, I’ll round up some of the best new technologies and companies to keep an eye on. Read more.
read more -->

Security Specifier Blog List Image for Cyber Crime Taking Down Cities

Cyber Crime Taking Down Cities

Earlier this year, in March, the City of Atlanta’s nearly 8,000 employees heard words they never thought they would hear: “It’s okay to turn your computers on.” Their computers were powered off for five days. In those five days Atlanta residents could not pay traffic tickets, water bills, or report city issues. Read how ransomware impacted this metropolitan area.
read more -->

Security Specifier Blog List Image for A Few Thoughts on K-12 School Security

A Few Thoughts on K-12 School Security

There is no one size fits all when it comes to K-12 school security. Schools vary in so many ways: size, age, local environment, affluence, culture, governance, and more. Read some helpful tips and resources that might just help your school be better prepared.
read more -->


Copyright Ⓒ 2010 SecuritySpecifiers™
>