Developing Standards for Artificial Intelligence

June 30, 2019

Artificial Intelligence (AI) is not new, having evolved over time. But it promises to unleash many benefits, ranging from improved mobility, greater job opportunities for some, and more efficient use of resources. Many Australians already know AI through Google Home, Siri and Alexa. They know AI through Google Search, Uber and the algorithms that drive LinkedIn and Facebook.

Spotlight

Bricata

Bricata network security solutions deliver innovative next generation intrusion prevention, advanced threat detection and analysis, and threat hunting to enable large organizations to actively pursue and identify advanced, persistent, and coordinated attacks. A specialized component-based approach to today’s attacks has left organizations with a stack of tools to manage that provide a patchwork of uncorrelated data, leaving penetrable gaps and inconsistent security policies.

OTHER WHITEPAPERS
news image

Trusted Artificial Intelligence Towards Certification of Machine Learning Applications

whitePaper | March 30, 2022

Artificial Intelligence is one of the fastest growing technologies of the 21st century and accompanies us in our daily lives when interacting with technical applications. However, reliance on such technical systems is crucial for their widespread applicability and acceptance. The societal tools to express reliance are usually formalized by lawful regulations, i.e., standards, norms, accreditations, and certificates. Therefore, the TÜV AUSTRIA Group in cooperation with the Institute for Machine Learning at the Johannes Kepler University Linz, proposes a certification process and an audit catalog for Machine Learning applications.

Read More
news image

Machine Learning on Arm Cortex-M Microcontrollers

whitePaper | January 20, 2022

Machine learning (ML) algorithms are moving to the IoT edge due to various considerations such as latency, power consumption, cost, network bandwidth, reliability, privacy and security. Hence, there is an increasing interest in developing neural network (NN) solutions to deploy them on low-power edge devices such as the Arm Cortex-M microcontroller systems. To enable that, we present CMSIS-NN, an open-source library of optimized software kernels that maximize the NN performance on Cortex-M cores with minimal memory footprint overhead. We further present methods for NN architecture exploration, using image classification on CIFAR-10 dataset as an example, to develop models that fit on such constrained devices.

Read More
news image

MongoDB and IBM zSystems

whitePaper | May 25, 2022

Modernization of data and applications on the mainframe is a necessary priority for modern organizations. Building a MongoDB Operational Data Layer (ODL) is a pattern widely used to make critical mainframe data available for modern mobile and web applications.

Read More
news image

TOP FIVE WAYS TO PREPARE FOR YOUR NEXT OFFICE 365TENANT MIGRATION

whitePaper | July 31, 2020

With organizations around the world rapidly adopting Office 365, IT pros need to be prepared to perform efficient, effective tenant-to-tenant migrations. Whether you’re undergoing a merger or acquisition, or it’s time to clean up and consolidate your IT infrastructure to drive productivity and growth, a successful migration requires one thing above all else: a tight focus on your users’ needs. In the end, success is not measured by checking off pieces of data moved; it’s about ensuring that everyone remains productive during the project and after migration is complete.

Read More
news image

Why Automation and AI Will Define the Future World of Work

whitePaper | June 16, 2022

As companies continue their digital transformation journey, it’s clear that automation and artificial intelligence (AI) are now a competitive imperative. Companies can no longer ignore the gains intelligent automation solutions deliver. Such solutions free up employees from repetitive tasks, making them available for more valuable work. Automation and AI tools also enable companies to harness the value of their own data for competitive advantage while automating its processing.

Read More
news image

Tame the Boom-and-Bust Cycle of Lending with Low-Code

whitePaper | October 18, 2022

If you have worked in lending for even just the past year, you have already experienced its cyclical nature. Take mortgage lending, for example. Less than a year ago, the main problem facing mortgage originators was how to process high volumes of applications while still observing regulatory compliance and conformance to underwriting policies.

Read More

Spotlight

Bricata

Bricata network security solutions deliver innovative next generation intrusion prevention, advanced threat detection and analysis, and threat hunting to enable large organizations to actively pursue and identify advanced, persistent, and coordinated attacks. A specialized component-based approach to today’s attacks has left organizations with a stack of tools to manage that provide a patchwork of uncorrelated data, leaving penetrable gaps and inconsistent security policies.

Events