Intel’s Recommendations for the U.S. National Strategy on Artificial Intelligence

March 11, 2019

Nations that invest in Artificial Intelligence (AI) stand to gain tremendous advantages across industry, government and society at large. On February 11, 2019 the White House issued an Executive Order on Maintaining American Leadership in Artificial Intelligence1 (the Executive Order). The Executive Order is an important first step in acknowledging the importance of U.S. leadership in AI. It’s time for the U.S. to bet big on AI by building on the Executive Order to expand a National AI Strategy that includes specific measures to support and promote AI development and deployment. A comprehensive national AI strategy would earmark funding and resources for AI research and development, outline clear goals and accountability mechanisms, identify and remove barriers, drive public and private development and adoption of AI, and outline a program to mitigate negative or unintended consequences. A national strategy building on the aims of the Executive Order will facilitate and focus current U.S. efforts, paving the way for the future of AI.

Spotlight

Varrow

On 1 May 2015, Sirius Computer Solutions announced it has acquired Varrow, Inc., a technology solution provider headquartered in Greensboro, NC. As a result of this acquisition, Sirius expands its presence in the East and deepens its skills and expertise in strategic IT growth areas such as cloud, storage, converged infrastructure, virtualization, mobility and security.

OTHER WHITEPAPERS
news image

A PERSPECTIVE ON IT COST MANAGEMENT

whitePaper | August 10, 2020

2020 has posed significant, unexpected challenges to the world – and to IT departments in most organizations. Work practices have shifted rapidly and, given the volatile economic climate, many organizations are looking to protect against uncertainty and ensure business continuity by implementing cost savings initiatives. As an IT leader, you and your team are uniquely positioned to deliver added value to the organization by leveraging Technology Intelligence data to find these additional cost savings opportunities.

Read More
news image

Why Better Mac Security Starts with Cloud Identity

whitePaper | August 17, 2020

For years, employees drove to an office, opened their computer, logged onto a corporate network with their username and password and got on with their workday. But working standard hours in a fixed office location is becoming more and more rare. In fact, a report by Gallup found that 43 percent of American employees work remotely.1 This growing mobile workforce requires the same, secure access to resources as their onsite counterparts — without connecting to the corporate network. And both onsite and remote employees need secure ways to access the expanding number of applications and resources that are hosted in the cloud. To accommodate, enterprise technology and IT practices must adapt.

Read More
news image

10 Keys to AI Success in 2021

whitePaper | May 17, 2021

AI will impact every area of our lives, and its applications are virtuallylimitless. From solving society's biggest problems to creating newopportunities in business, AI will help us take huge leaps forward in this next decade.

Read More
news image

How AI Is Transforming IT Service Desk and Customer Service

whitePaper | June 4, 2021

In this fast-paced and competitive world, the need for speed is vital. This is especially true when it comes to IT and customer service desks. There has been a recent surge of interest in conversational AI platforms that build on all the strengths of AI to help make IT service desks and customer service more efficient.

Read More
news image

TOP 5 REASONS TO PUT PRIVILEGE FIRST

whitePaper | July 20, 2020

Privileged access is the gateway to an organization’s most valuable assets and is at the core of nearly every major security breach. Organizations must have a strategy in place to manage and monitor privileged access, as well as detect and respond to threats if they’d like to mitigate risk from today’s advanced attacks. Your application stack and infrastructure is likely quite complex and it can be hard to identify which assets are the most sensitive. And there is a never-ending supply of vendors knocking down your door competing for your time and attention. These two realities make it increasingly difficult to identify which security project to tackle next. When thinking about how to prioritize, it is advantageous to take a step back and think about your businesses goals, albeit in a slightly different way: try to envision what you would be looking for if you were an external attacker or malicious insider looking to steal sensitive data, commit Ransomware, or use your infrastructure for illicit cryptomining.

Read More
news image

LaSalle

whitePaper | April 16, 2020

LaSalle is one of the world’s leaders in real estate investment management, with a history over 40 years long. LaSalle, an independent subsidiary of Jones Lang LaSalle Incorporated, manages over $68 billion in assets across 17 countries.

Read More

Spotlight

Varrow

On 1 May 2015, Sirius Computer Solutions announced it has acquired Varrow, Inc., a technology solution provider headquartered in Greensboro, NC. As a result of this acquisition, Sirius expands its presence in the East and deepens its skills and expertise in strategic IT growth areas such as cloud, storage, converged infrastructure, virtualization, mobility and security.

Events