How science-fiction AI has become reality

| September 11, 2019

article image
When many of us were growing up, science-fiction books, movies, and television shows explored what was possible using science, technology and intelligent computers. These dreams are now becoming reality. Let’s take a look at some of our favorite real-life manifestations of AI in fiction.

Spotlight

eXate

Exate Technology protects data in order to allow firms to safely use Cloud Technologies, as well as to comply with Cross-Border Data Transfers and Global Data Privacy Regulations. Data is a valuable asset and Exate's patent pending "passport control for data"​ solution allows clients to apply rules which easily and effectively control how data is accessed and reported.

OTHER ARTICLES

The Nuts and Bolts of Deep Learning Algorithms for Object Detection

Article | August 14, 2020

You just got a new drone and you want it to be super smart! Maybe it should detect whether workers are properly wearing their helmets or how big the cracks on a factory rooftop are. In this blog post, we’ll look at the basic methods of object detection (Exhaustive Search, R-CNN, Fast R-CNN and Faster R-CNN) and try to understand the technical details of each model. The best part? We’ll do all of this without any formula, allowing readers with all levels of experience to follow along! Finally, we will follow this post with a second one, where we will take a deeper dive into Single Shot Detector (SSD) networks and see how this can be deployed… on a drone.

Read More

Is Artificial Intelligence (AI) A Threat To Humans?

Article | August 14, 2020

Are artificial intelligence (AI) and superintelligent machines the best or worst thing that could ever happen to humankind? This has been a question in existence since the 1940s when computer scientist Alan Turing wondered and began to believe that there would be a time when machines could have an unlimited impact on humanity through a process that mimicked evolution. When Oxford University Professor Nick Bostrom’s New York Times best-seller, Superintelligence: Paths, Dangers, Strategies was first published in 2014, it struck a nerve at the heart of this debate with its focus on all the things that could go wrong.

Read More

Programming languages: Python and Java VS Code extensions get these new updates

Article | August 14, 2020

Microsoft has launched the March replace for its fashionable Python extension for Visible Studio Code (VS Code), its extensively used cross-platform code editor. It is also launched an replace for Java on VS Code with assist for the IDE extension, SolarLint. Probably the most notable change within the Python for VS Code replace is a brand new Microsoft-built Python debugger called debugpy, an implementation of the Debug Adapter Protocol for Python. The software permits builders to debug script recordsdata and modules from the command line, in addition to allow debugger logging. Till now, VS Code had built-in debugging assist for JavaScript, TypeScript, Node.js, and so forth, whereas extensions from the VS Code market enabled assist for different languages like Python, Go, C# and C++.

Read More

TOP 5 REAL-LIFE MACHINE LEARNING EXAMPLES

Article | August 14, 2020

Machine learning is a subset of artificial intelligence that can be found almost anywhere. Believe it or not, even coffee roasters are beginning to employ machine learning algorithms to better understand when coffee lovers will crave their next cup of joe. The ability to innovate is one of the most highly prized qualities in today’s tech-driven world, which has led to a stunning range of machine learning applications across multiple industries. Here are the top five real-world examples.

Read More

Spotlight

eXate

Exate Technology protects data in order to allow firms to safely use Cloud Technologies, as well as to comply with Cross-Border Data Transfers and Global Data Privacy Regulations. Data is a valuable asset and Exate's patent pending "passport control for data"​ solution allows clients to apply rules which easily and effectively control how data is accessed and reported.

Events