Defining a Practical Path to Artificial Intelligence

June 28, 2019

In this paper we will evaluate the path to AI for public sector agencies and commercial organizations, identify key questions and options to consider, and determine how to accelerate implementation and management within existing budgets.

Spotlight

Certes Networks

Certes Networks Zero Trust Security solutions protect data and applications in motion with a range of software defined security solutions. Our Zero Trust framework protects application traffic over any environment to any user, device or location; all this without affecting network or application performance whatsoever.

OTHER WHITEPAPERS
news image

AI in Retail Marketing

whitePaper | August 18, 2021

Among retail marketers, a reliance on traditional business intelligence tools has left the intuitive decision-making in the hands of the marketing team. Download this guide to learn how to solve this AI dilemma.

Read More
news image

Embedding AI-powered Analytics Into Your Application

whitePaper | September 28, 2022

Your customers need more than dashboards. They need instant, actionable insights and analytics. And you need to offer more than basic analytics to futureproof your application. Learn how embedding AI-powered analytics gives you a sustainable competitive advantage. Download the complete guide today.

Read More
news image

Deepwave Digital Creates an AI Enabled GPUReceiver for a Critical 5G Sensor

whitePaper | February 11, 2020

Deepwave Digital has leveraged the Artificial Intelligence Radio Transceiver (AIR-T) to create the first deep learning sensor for a 5G network. This network, the Citizens Broadband Radio Service (CBRS), will be the first spectrum sharing service provided by the telecommunications industry that leverages real time RF sensing. Critical to the operation of CBRS is the ability to determine if priority users are active on specific frequency channels. When no priority users are present, the spectrum may be reallocated for commercial networks to provide new enterprise services or additional bandwidth to existing services.

Read More
news image

Four Proven Steps to Integrating Threat Intelligence for Higher-Fidelity Detection and Response

whitePaper | July 20, 2020

Accurate, trustworthy threat intelligence is a boon if you have it – but too much of it becomes a management headache. Analyst group 451 Research, surveying security leaders for its report Tackling the Visibility Gap in Information Security, found that 49% of enterprises using SIEM, EDR, and other security tools were overwhelmed by the day-to-day operation of managing and ingesting threat feeds into their growing technology stack.1

Read More
news image

Machine Learning on Arm Cortex-M Microcontrollers

whitePaper | January 20, 2022

Machine learning (ML) algorithms are moving to the IoT edge due to various considerations such as latency, power consumption, cost, network bandwidth, reliability, privacy and security. Hence, there is an increasing interest in developing neural network (NN) solutions to deploy them on low-power edge devices such as the Arm Cortex-M microcontroller systems. To enable that, we present CMSIS-NN, an open-source library of optimized software kernels that maximize the NN performance on Cortex-M cores with minimal memory footprint overhead. We further present methods for NN architecture exploration, using image classification on CIFAR-10 dataset as an example, to develop models that fit on such constrained devices.

Read More
news image

FLI Position Paper on AI Liability

whitePaper | November 28, 2022

The Future of Life Institute (FLI) welcomes the opportunity to provide feedback to the European Commission on its proposal for an artificial intelligence (AI) Liability Directive1 . Liability is an important instrument for safeguarding the interests of society. It can play a role in catalysing innovation by encouraging organisations to develop risk-mitigating technologies that reduce the likelihood of harm in products and services. At the same time, it prioritises the rights of individuals and can lead to increased trust and uptake in new technologies.

Read More

Spotlight

Certes Networks

Certes Networks Zero Trust Security solutions protect data and applications in motion with a range of software defined security solutions. Our Zero Trust framework protects application traffic over any environment to any user, device or location; all this without affecting network or application performance whatsoever.

Events