How Secure is RSA in an Increasingly Connected World? – Hashed Out by The SSL Store – Hashed Out by The SSL Store

KeyFactors latest study shows that many IoT device manufacturers aregenerating insecure RSA keys

1 in 172. Thats the number of RSA public key certificatesavailable through the internet that could be vulnerable to compromise due toshared cryptographic key factors.

These findings are according to a recent report on RSA certificate vulnerability from KeyFactor, a leading provider of secure digital identity management solutions and an established authority in the cybersecurity industry. A team of KeyFactor researchers presented their findings at the First IEEE Conference on Trust, Privacy, and Security in Intelligent Systems and Applications in December. The data indicates that due to improper random number generation, many RSA public keys are at risk of compromise because the researchers were able to use them to derive their private keys through a method known as factoring.

Essentially, the research indicates that RSA is stillsecure, but many companies are implementing it in insecure ways. As such, it underscoresthe importance of organizations and manufacturers being crypto agile andadhering to cryptographic best practices to maintain trust and security.

But just how big of a potential impact would compromising RSA keys have? While theres no single reliable resource we can point you to that shows X% of certificates issued use RSA keys, what we can tell you as a company that sells a lot of them is that its a lot. Considering that Gartner forecasts that there will be 25 billion IoT devices in use by 2021, thats potentially a lot of vulnerable RSA certificate keys in the wild that cybercriminals could exploit.

In this article, well break down the data from the study,rehash what RSA is, and explore the implications of what the research means foryour organization.

Lets hash it out.

KeyFactor, a company we work with at The SSL Store, has made a name for itself as an IoT device security leader in the industry since the companys inception in 2001. A force to be reckoned with, theyre dedicated to empowering enterprises of all sizes through their award-winning PKI-as-a-service platform. Theyre also known for their research collaborations with other respected organizations such as The Ponemon Institute.

This particular report on RSA certificate vulnerabilites,written by JD Kilgallin, states that the company collected and analyzed 175million RSA certificate public keys 75 million they discovered on theinternet, plus 100 million that were available through certificate transparency(CT) logs. They used a single Microsoft Azure cloud-hosted virtual machine and agreatest common divisor (GCD) algorithm for shared factors to conduct their analysis.

Heres what they discovered:

The big takeaway here is that some IoT device manufacturersare using random number generators that lack strong entropy. Its more a matterof operator error than an actual weakness in the RSA algorithm itself. As aresult of using random number generators (RNGs) with low entropy, theyregenerating prime numbers with poor randomness, which leads to the generation ofprivate keys that can be compromised more easily.

But what does this mean in terms of information security?

Kilgallin cautions the following:

In 2019, with the large number of devices on the Internet and in other data sets like Certificate Transparency (CT) logs,this attack presents a serious threat if proper precautions are not in place. As the number of keys grows, it is more likely that weakly generated factors in RSA public keys will be discovered. Coupled with the availability of cheap computing resources and sensitivity of communications, the attack is as potent as ever.

At the most basic level, RSA public keys are the result of two large, randomly generated prime factors. Theyre created using random number generators. This means that the entire security premise of the RSA algorithm is based on using prime factorization as a method of one way encryption. So, in other words, its operating under the assumption that no one can determine two randomly-generated prime numbers within a reasonable amount of time that no one can crack the encryption of an SSL/TLS certificate until long after its replaced or expired.

Well, considering that it took a group of researchers more than 1,500 years of computing time (across hundreds of computers) to factor a 232-digit algorithm, that assumption seems plausible. But in reality, RSA is sometimes not as secure as wed like it to be. Its not that RSA itself is insecure its that some companies implement it in a weak way.

Thats because some random number generators arent reallythat random. Furthermore, considering that the same RNGs are frequently usedtime and again, it reduces their effectiveness. If RSA public keys are generatedwith poor randomness, it means they could be vulnerable to a factoringcyberattack.

In this type of attack, cybercriminals collect large sums ofpublic keys from the internet and analyze them to determine whether any twoshare the same factor. If two RSA moduli share one prime factor, it couldresult in a collision when applied to a large dataset. What this does is allowthe actor to crack the corresponding private key.

All of this leads to this concern:

As the number of keys grows, it is more likely that weakly generated factors in RSA public keys will be discovered. Coupled with the availability of cheap computing resources and sensitivity of communications, the attack is as potent as ever.

Yikes. But there is a bit of light at the end of the tunnel.

According to the report concerning the factoring attacks, only 5 of 100million certificates found in a sample from Certificate Transparency logs arecompromised by the same technique. What this means is that only the fivecompromised certificates found in CT logs were publicly-trusted (and no longerin use online) the rest were self-signed, privately-rooted, or devicecertificates. But, still, thats five too many for our taste.

Weve talked about the risks of using self-signed certificates in external-facing applications in the past. Its one thing to use them on intranets and internal-facing applications; its another to use them to secure sites or devices that are discoverable via the internet.

Thediscrepancy between the number of CA-signed certificates that were compromisedand the others, the researchers say, is likely due to IoT devices being moreeasily accessible on the internet and by the design constraints and entropylimitations of power-restricted devices.

In thereport, Kilgallin says:

These concerning findings highlight the need for device manufacturers, website and network administrators, and the public at large to consider security, and especially secure random number generation, as a paramount requirement of any connected system.

Manage Digital Certificates like a Boss

14 Certificate Management Best Practices to keep your organization running, secure and fully-compliant.

We keep talkingabout RSA encryption, RSA algorithms, and RSA keys. But what exactly is RSAitself? Lets take a moment for a brief review for those of us who arent asfamiliar with this type of cryptography.

RSA, named after the MIT cryptographers who created it (RonRivest, Adi Shamir, and Leonard Adleman), is one of the two most popular publickey encryption algorithms in use today. In SSL/TLS, it can be used for digitalsignatures and key exchange to establish a secure, encrypted communicationchannel. This way, you dont leave your sensitive data at risk by transmittingit through a non-secure channel.

The RSA algorithm is comprised of four essential components:

But, wait, were talking about the RSA algorithm. Ithought we were supposed to be talking about RSA encryption keys?

We are in a roundabout sort of way. RSA refers to both asignature algorithm (a cryptographic operation) and an encryption key pair. TheRSA algorithm is used to generate an RSA key pair that includes both privateand public keys. The first generates digital signatures, whereas the secondverifies those created signatures.

But when we talk about an encryption key, what do we reallymean?

A cryptographic key, in a nutshell, is a string ofrandomly-ordered bits (binary digits) meaning a gargantuan string of hundredsor even thousands of 1s and 0s. Keys are integral to modern day public keyinfrastructure (PKI) and encryption as a whole. Keys in cryptography are like therice to your sushi or the cream filling for your Oreo cookies theyreessential components.

In the olden days (you know, before modern technology), akey was the secret roadmap, if you will, of an encryption technique. Its whatthe sender would use to encrypt the message, and the recipient would use todecrypt the message. Its much the same today, but instead of using hand-writtenkeys that are written in invisible ink or hidden away, theyre digital bits ofinformation that are transmitted electronically.

A key can be either asymmetric or symmetric. RSA keys are asymmetric. Every asymmetric key comes in a pair of mathematically-related but different public and private keys, and each key serves as different purpose to encrypt (public key) and to decrypt (private key) data, as well as to create a shared key.

If a certificates RSA public key that was generated withweak entropy is targeted through a factoring attack, then its shared primenumbers could be used to derive the certificates private key, making RSAessentially useless.

But, thankfully, RSA isnt the only hitter in the game. Theresanother type of key that we havent mentioned yet ECC.

ECC, or elliptic curve cryptography, is an approach to cryptography that offers greater security and performance than RSA. Thats because it doesnt rely on random number generation. Instead of RNG, ECC takes advantage of the math behind elliptic curves. If you dont know what Im talking about, think back to your school days and the joys of plotting using coordinates on the Y- and X- axes (yeah, thats still a thing of nightmares for me, too).

I wont get into the actual calculations of elliptic curveshere you can read more about that in one of our other blogposts on ECC. But the point here is that its a public key cryptosystemthat relies on mathematical calculations based on specific points on anelliptic curve rather than a random number generator that could fail.

Another benefit of ECC over RSA is that ECC scales well. Thatsbecause its keys are smaller, which results in less computational overhead andbetter performance.

See what I mean?

A third advantage ECC has over RSA is that theres a variation of it supersingular elliptic curve isogeny cryptography thats also less vulnerable to concerns that stem from quantum computing. The National Institute of Standards and Technology (NIST) predicts that the public key cryptography we know and use today will fail once quantum computing becomes mainstream.

But the impact of quantum computing on existing cryptosystems is a whole nother conversation in and of itself. And dont worry, the sky isnt falling CAs are ahead of the curve in developing new cryptographic methods that will be quantum secure.

The drawback of ECC is that it isnt frequently used becauseits not as widely supported as RSA. While its supported by most modernoperating systems and web browsers including Chrome, Safari, Firefox, and IE ECC isnt yet supported by a lot of the web hosting control panels (such as cPanel)as of yet. Unfortunately, this means that many website owners cant yet use ECCeven if they want to.

Overall, the KeyFactor research showcases how weak some RSAkeys are that are currently in use across the internet. It also drives home thepoint that organizations and device manufacturers in particular need to do moreto protect the consumers who trust them to protect their sensitive orconfidential information and privacy.

What this means for device manufacturers is that they needto:

KeyFactor researchers define crypto agility as knowingeverywhere cryptography is used across your organization (i.e. certificates,algorithms, protocols, and libraries), and being able to quickly identify andremediate vulnerabilities, without disruption.

To be crypto agile, you need to stay abreast of compromisesand breaches in security and also try to stay one step ahead of cybercriminals.You also need to be responsive to changes. In IoT device security, that meansyou need to be able to maintain trust by keeping your devices secure throughouttheir lifecycles.

In PKI, it in part boils down to using automated certificate management solutions. A reliable certificate management solution provides visibility into your network and helps you to easily track, monitor, and renew your certificates to avoid certificate outages. Throw away the spreadsheets and get rid of your manual tracking processes automation is the name of the game.

So, let us take a moment to summarize everything wevereally touched on in this article. KeyFactor research shows that:

Read more here:
How Secure is RSA in an Increasingly Connected World? - Hashed Out by The SSL Store - Hashed Out by The SSL Store

Police Scotland to roll out encryption bypass technology – Glasgow Live

Technology that allows police officers to gather data from digital devices without the need for a password is to be rolled out from next week.

Police Scotland confirmed on Tuesday that the so-called cyber kiosks - digital triage devices - will be given to officers on January 20.

The kiosks are laptop-sized machines that enable the user to override encryption on devices such as mobile phones and tablets.

Technology was due to be deployed earlier but the roll-out was hit by delays as MSPs called for greater clarity over the legal framework for their use.

A total of 14 kiosks have already been bought by Police Scotland and will be located across all policing divisions.

It is expected all of the kiosks will be operational before May 1.

Police Scotland believe having the kiosks will allow lines of inquiry to be progressed at a faster pace, with officers being able to return mobile devices to their owners when they are having to assess them for potential evidence.

Officers will only examine the device of an individual when there is a legal basis and it is "necessary, justified and proportionate" to the crime under investigation.

They will not be enabled to store data from any devices and when an examination is complete all data will be securely deleted.

Deputy Chief Constable Malcolm Graham said having the ability to quickly assess which devices either do or do not contain evidence on them will minimise the intrusion into people's lives.

"We are committed to providing the best possible service to victims and witnesses of crime," he said.

"This means we must keep pace with society. People of all ages now lead a significant part of their lives online and this is reflected in how we investigate crime and the evidence we present to courts.

"Many online offences disproportionately affect the most vulnerable people in our society, such as children at risk of sexual abuse, and our priority is to protect those people."

He added: "Increases in the involvement of digital devices in investigations and the ever-expanding capabilities of these devices mean that demand on digital forensic examinations is higher than ever.

"Current limitations, however, mean the devices of victims, witnesses and suspects can be taken for months at a time, even if it later transpires that there is no worthwhile evidence on them.

"By quickly identifying devices which do and do not contain evidence, we can minimise the intrusion on people's lives and provide a better service to the public."

Have you downloaded the new and improved Glasgow Live app? Get all the latest news and events at the touch of a button on Android and Apple .

Read the original here:
Police Scotland to roll out encryption bypass technology - Glasgow Live

Apple disagrees with the US government. UU. While the encryption battle restarts – NewsDio

Apple and the US government disagree for the second time in four years by unlocking iPhones connected to a mass shooting, reviving the debate about police access to encrypted devices.

Attorney General Bill Barr said on Monday that Apple did not provide "substantive assistance" by unlocking two iPhones in the shooting investigation of three US sailors in December at a Florida naval station, which he called an "act of terrorism. "

Apple disputed Barr's claim, while arguing against the idea of "back doors" for the police to access their encrypted smartphones.

"We reject the characterization that Apple has not provided substantive assistance in Pensacola's investigation," the company said in a statement.

"Our responses to your many requests since the attack have been timely, thorough and ongoing."

On Tuesday night, President Donald Trump intervened on Twitter and said the government was helping Apple in business matters "but they refuse to unlock phones used by murderers, drug dealers and other violent criminal elements."

"They will have to step forward and help our great country, NOW!" he added.

The confrontation highlighted the debate between the police and the technology sector on encryption, a key way to protect the privacy of digital communications, but that can also hinder investigations, even with a court order.

The last battle is similar to the dispute between Apple and the US Department of Justice. UU. After the mass shooting of December 2015 in San Bernardino, California, when the iPhone manufacturer rejected a request to develop software to enter the shooter's iPhone.

That fight ended in 2016 when the government paid a $ 1 million report to an outside party for a tool that eluded Apple's iPhone encryption.

Last year, Barr asked Facebook to allow authorities to bypass encryption to combat extremism, child pornography and other crimes. The social network has said it would move forward with strong encryption for its messaging applications.

Digital rights activists argue that any privileged access to law enforcement would weaken security and make it easier for hackers and authoritarian governments to intercept messages.

"We have always maintained that there is no backdoor just for the good guys," Apple's statement said.

"The back doors can also be exploited by those who threaten our national security and the security of our customers' data."

Apple and others argue that digital "bread crumbs" make it easier and easier to track people, even without entering personal devices.

The governments latest lawsuit "is dangerous and unconstitutional, and would weaken the security of millions of iPhones," Jennifer Granick of the American Civil Liberties Union said in a statement.

"Strong encryption allows religious minorities facing genocide, such as Uyghurs in China, and journalists investigating powerful drug cartels in Mexico to communicate safely."

Granick added that Apple cannot allow the FBI to access encrypted communications "without also providing it to authoritarian foreign governments and weakening our defenses against criminals and hackers."

Kurt Opsahl, of the Electronic Frontier Foundation, echoed that sentiment and said Apple "is right to provide solid security" for its devices.

"The AG (attorney general) asks Apple to redesign its phones to break that security is poor security compensation and endangers millions of innocent people around the world," Opsahl tweeted.

James Lewis of the Center for Strategic and International Studies, a group of Washington experts, said he believes it is possible to allow police access without sacrificing encryption.

"You are not weakening encryption, you are doing it so that it is not from end to end," Lewis told AFP.

"It means that there is a third party who can see it under the proper authority."

But Lewis said he does not expect either party to win the battle, and that US officials will likely find another outside party to decipher the two iPhones that belong to the shooter, the 2nd lieutenant of the Royal Saudi Air Force Mohammed Saeed Alshamran, who died in the attack

"It's a repeat of the movie we saw in San Bernardino," he said.

"It's going to be more difficult because Apple probably solved the trick that worked in San Bernardino."

. (tagsToTranslate) Apple disagrees with us the government as battle of reactive encryption grindr (t) okcupid (t) tinder

Continue reading here:
Apple disagrees with the US government. UU. While the encryption battle restarts - NewsDio

Artificial intelligence – Simple English Wikipedia, the free …

Artificial intelligence (AI) is the ability of a computer program or a machine to think and learn. It is also a field of study which tries to make computers "smart". They work on their own without being encoded with commands.John McCarthy came up with the name "artificial intelligence" in 1955.

In general use, the term "artificial intelligence" means a programme which mimics human cognition. At least some of the things we associate with other minds, such as learning and problem solving can be done by computers, though not in the same way as we do.[1] Andreas Kaplan and Michael Haenlein define AI as a systems ability to correctly interpret external data, to learn from such data, and to use those learnings to achieve specific goals and tasks through flexible adaptation.[2]

An ideal (perfect) intelligent machine is a flexible agent which perceives its environment and takes actions to maximize its chance of success at some goal or objective.[3] As machines become increasingly capable, mental faculties once thought to require intelligence are removed from the definition. For example, optical character recognition is no longer perceived as an exemplar of "artificial intelligence": it is just a routine technology.

At present we use the term AI for successfully understanding human speech,[1] competing at a high level in strategic game systems (such as Chess and Go), self-driving cars, and interpreting complex data.[4] Some people also consider AI a danger to humanity if it continues to progress at its current pace.[5]

An extreme goal of AI research is to create computer programs that can learn, solve problems, and think logically.[6][7] In practice, however, most applications have picked on problems which computers can do well. Searching data bases and doing calculations are things computers do better than people. On the other hand, "perceiving its environment" in any real sense is way beyond present-day computing.

AI involves many different fields like computer science, mathematics, linguistics, psychology, neuroscience, and philosophy. Eventually researchers hope to create a "general artificial intelligence" which can solve many problems instead of focusing on just one. Researchers are also trying to create creative and emotional AI which can possibly empathize or create art. Many approaches and tools have been tried.

Borrowing from the management literature, Kaplan and Haenlein classify artificial intelligence into three different types of AI systems: analytical, human-inspired, and humanized artificial intelligence.[8] Analytical AI has only characteristics consistent with cognitive intelligence generating cognitive representation of the world and using learning based on past experience to inform future decisions. Human-inspired AI has elements from cognitive as well as emotional intelligence, understanding, in addition to cognitive elements, also human emotions considering them in their decision making. Humanized AI shows characteristics of all types of competencies (i.e., cognitive, emotional, and social intelligence), able to be self-conscious and self-aware in interactions with others.

The first appearance of artificial intelligence is in Greek myths, like Talos of Crete or the bronze robot of Hephaestus. Humanoid robots were built by Yan Shi, Hero of Alexandria, and Al-Jazari. Sentient machines became popular in fiction during the 19th and 20th centuries with the stories of Frankenstein and Rossum's Universal Robots.

Formal logic was developed by ancient Greek philosophers and mathematicians. This study of logic produced the idea of a computer in the 19th and 20th century. Mathematician Alan Turing's theory of computation said that any mathematical problem could be solved by processing 1's and 0's. Advances in neurology, information theory, and cybernetics convinced a small group of researchers that an electronic brain was possible.

AI research really started with a conference at Dartmouth College in 1956. It was a month long brainstorming session attended by many people with interests in AI. At the conference they wrote programs that were amazing at the time, beating people at checkers or solving word problems. The Department of Defense started giving a lot of money to AI research and labs were created all over the world.

Unfortunately, researchers really underestimated just how hard some problems were. The tools they had used still did not give computers things like emotions or common sense. Mathematician James Lighthill wrote a report on AI saying that "in no part of the field have discoveries made so far produced the major impact that was then promised".[9] The U.S and British governments wanted to fund more productive projects. Funding for AI research was cut, starting an "AI winter" where little research was done.

AI research revived in the 1980s because of the popularity of expert systems, which simulated the knowledge of a human expert. By 1985, 1 billion dollars were spent on AI. New, faster computers convinced U.S. and British governments to start funding AI research again. However, the market for Lisp machines collapsed in 1987 and funding was pulled again, starting an even longer AI winter.

AI revived again in the 90s and early 2000s with its use in data mining and medical diagnosis. This was possible because of faster computers and focusing on solving more specific problems. In 1997, Deep Blue became the first computer program to beat chess world champion Garry Kasparov. Faster computers, advances in deep learning, and access to more data have made AI popular throughout the world.[10] In 2011 IBM Watson beat the top two Jeopardy! players Brad Rutter and Ken Jennings, and in 2016 Google's AlphaGo beat top Go player Lee Sedol 4 out of 5 times.

Read the rest here:
Artificial intelligence - Simple English Wikipedia, the free ...

A.I. Artificial Intelligence (2001) – Rotten Tomatoes

Apr 15, 2013

Damn it Spielberg you did it again! I thought you wouldn't get me but once again you made me cry whilst watching one of your films, sheesh!. Right...'A.I.', batten down the hatches mateys, this could be a big one.From the collective minds of Kubrick and Spielberg comes this lavish epic about a little robot boy who is brought into a young couples life. Based on a short story by a writer I admit I've never heard of, yet the idea could easily be mistaken for work from the brains of Arthur C. Clarke, Isaac Asimov or Philip K. Dick.Lets begin, this film gave me a headache, not a bad headache, more of a problematic headache. I was stuck and didn't know what to think. The film is a massive story betwixt two ideas or genres almost, on one hand you have the first half of a film that centres around the human angst and emotion of trying to adapt to adopting a robot child. The pain of a mother who's child is at deaths door from disease, and the decision by her husband to offer her a brand new state of the art robot child that for the first time can learn and express love for its owner.The second half of the film then changes completely, gone is the sentiment and powerful family bound plot as we enter into a more seedy grim world. One could almost say the film adopts many visual concepts from other sci-fi films/genres, which do work on their own, but maybe not together with this story. The story is enthralling and draws you in...but oh so many questions arise Mr Spielberg, where to begin!. Once we leave the comfort of the family orientated first part of the film we pretty much straight away hit the Flesh Fair. Now this really did seem too harsh for me, a completely disjoined idea that harks back to a 'Mad Max' type world. Why would people of the future act like this towards simple machines? the whole sequence looked like some freaky red neck carnival. It also seemed like a huge setup for not very much, just a few minutes of carnage, was all that fan fair really required?.This lead me to the question of why do this to old, lost, outdated Mecha's? (the term for robots in this film which sounds a bit Japanese to me). Now surely these robots cost a lot to make, much time, effort, design etc...went into creating them, so surely destroying them is a complete waste. Wouldn't fixing them up for simple labour tasks like cleaning or whatever, be more useful? maybe selling them on? and even if you did have to shut them down, just do it more humanly, why the need for all the violence?. The whole sequence just didn't seem sensible really, and it was thought up by Spielberg!.Eventually we get to Rouge City, where is this suppose to be? why not use a real city?. Again the whole concept seemed out of place, the city seemed much more futuristic than everything else we have seen, plus the architecture was truly odd. The huge tunnel bridges with a woman's gaping open mouth as the opening? it seemed very 'Giger-esq' to me, quite sexual too, kids film anyone?. Then you had buildings shaped like women's boobs and legs etc...geez!. Its here we meet 'Gigolo Joe' who is superbly played by Jude Law I can't deny, but really at the end of the day, was he needed at all?. He is a nice character, very likeable but virtually bordering on a cartoon character, and why the need for the tap dancing?. The makeup was very good for the Mecha characters, simple yet effective for both Law and Osment. Kudos to Osment of course for his portrayal of the robot 'David', I honestly can say its probably the best performance for a robot I've ever seen. Brilliant casting too I might add, Osment can act but his looks are half the battle won right there, he has this almost perfect plastic looking young face, its all in the eyes I think.Speaking of characters how can I not mention the star of the film, 'Teddy'. Now this little guy was adorable, I still find myself wanting my own Teddy *whimpers*. Every scene this little fellow was in I loved, I loved to see him waddle around and assist David in his simple electronic voice. I found myself caring for all the characters in this film but especially Teddy, he was just awesome. Sure he seemed to have some kind of infinite power source but that made him even cooler damn it!. What really broke my heart was we don't know what happens to lill Teddy, we see him at the end but what becomes of him?? what Steven WHAT??!!. I loved that lill guy *sniff*.As you near the end of the film and its multiple ongoing finales you literately get submerged in questions. 2000 years pass from the time David is trapped under the sea and his rescue (the ferris wheel didn't crush the helicopter/sub thingy??), in that time the planet has gone from global warming jungles to a MASSIVE ice age? I mean a REALLY HEAVY ice age. Now I'm no scientist but that doesn't seem right. I might quickly add, in the future why are all the skyscrapers in New York in tatters? as if they've been burnt out?. Sure the bottom of them has been flooded but they look like skeletons! as if a nuke hit them, eh?.The we get to the evolved Mecha's (or 'Close Encounter' aliens). How would these robots evolve into these angelic liquid-like creatures?? I don't get it, if the human race became extinct tomorrow would computers evolve into alien-like creatures?. Sure these robots can fix themselves and update themselves but that far? really?. Then you gotta ask yourself why would they be digging up old human remains? they know humans created them, OK they might not understand why but does that matter?. They clearly have highly advanced technology so why don't they travel space and look for new similar intelligent life?. Why bother with the human race, of which many despised them anyway, treated them like crap.This then leads onto the resurrection part of the story. I still can't quite work out why David's mother would only live for one day when brought back. There is an explanation from the advanced Mecha's but I couldn't follow it. Again we then have all manner of plot issues...why his mother doesn't recall her husband or son when she wakes, she doesn't question why David is there, she's disorientated but doesn't question anything. She doesn't seem to remember anything like the fact she was probably an old lady when she was last awake, and she doesn't ask to go outside! they stay inside the whole time. You could say the advanced Mecha fixed it so she wouldn't recall anything so not to jeopardize the situation, but when she wakes she acts as if nothing happened and its just a new day.Where the plot really gets silly is the fact this is all possible simply because Teddy kept some strands of cut hair from David's mother about 2000 years prior. Where on earth did he keep these hairs? its not like he has pockets, and what's more...why did he keep the strands of hair??!!. On top of that, and again I'm no scientist, but surely you'd need the roots of human hair for the DNA, not just cut strands, no?.Now there are a lot of whines in there but unfortunately there are a lot of plot issues in the film. I won't and can't say its a bad film, its a truly fantastic bit of sci-fi with some lovely design work and visuals, but there are problems along the way. First half is a decent sci-fi story similar to 'Bicentennial Man', second half is really a rehashed rip off of the classic 'Pinocchio' tale set in the future.The film garnered a lot of interest due to the involvement of Kubrick and Spielberg admittedly but its still a wonderful bit of work. Part sci-fi but all fairytale in the end, the film slowly becomes more of a children's tale the deeper you go, the narration nails that home if you think about it. The very end is kinda tacked on and doesn't feel correct, true, you can see they had trouble ending the film and a weepy ending was required so they made one. But god damn it works *sniff*.The final sequence of David lying besides his motionless mother still brings a lump to my throat as I type this now. We then see Teddy join them on the bed and just sit down to watch over them both, like a guardian. Does David actually die here? does he voluntarily switch himself off somehow? again...what happens to Teddy? I'm not sure. But as the score swells and the lights dim, you can't help but wipe away a tear.

Go here to read the rest:
A.I. Artificial Intelligence (2001) - Rotten Tomatoes

From the Ground Up: Using Artificial Intelligence for Weed Control – KBTX

BRYAN, Tex. (KBTX) - Almost everyone knows what a smartphone is, but there are also new generations of smart machines being built that will be used in agriculture to help manage a crop. Shannon Pickering is a market development manager for Blue River Technology.

We are working on several projects but primarily focused on spraying. So precision spraying using computer vision systems and artificial intelligence in order to be able to identify every plant in the field and determine what is the crop versus the weeds and only spray the weeds.

John Deere acquired Blue River Technology in 2017 to help make its Ag equipment smarter.

We hope to do several things all at once basically. Number one is become more efficient. Utilize resources wisely. Be able to spray less pesticides on crops. If we can identify the weeds in the field and only spray the weeds instead of spraying the entire field then thats a big deal. Thats a lot of chemical savings thats not going into the soil or onto the plant. So being able to provide a more sustainable solution for our farmers going forward is really a big deal for us.

One of their early conceptual sprayers showed up to 95 percent fewer chemicals being sprayed in the field where they were being very precise and applying it only where it needed to go which was on the weeds.

It has to provide value to the grower. It has to provide efficiency to pay for itself, and so thats a must and it will do that for sure. The technology is here. We definitely have the capability of doing this today. Its just a matter of integrating it into the machinery. Were a few years away yet probably from seeing it in a go-to-market form but the potential is there. The technology works and its coming for sure.

Continue reading here:
From the Ground Up: Using Artificial Intelligence for Weed Control - KBTX

Dont set it and forget it: Artificial intelligences role in media buying is taking shape – Digiday

The reality of artificial intelligences role in media buying may be turning out very different from the dream.

Automation and AI could be used, so the theory went, for forecasting, analyzing data and ultimately improving campaign performance, so that marketers could change and reallocate budgets quickly. But despite advancements being made, AIs adoption for media buying is ending up with slightly different use cases.

The AI is there, said Jason Harrison, CEO of North America for WPPs Essence. Youre just not seeing it in the ways you would have expected.

The expectation was that AIs use for media buying otherwise known as automated decision-making would enable machines to tap data about specific audiences so as to create automated campaigns across different digital channels. And this would enable agencies to stop worrying about the minute details of media planning and buying so they could instead spend more time on strategic work and insight delivery for their clients. But so far, that hasnt been the case, as AI has led media buyers, as previously reported by Digiday, to spend added time on campaign reporting and the more difficult aspects of the job.

And AIs role in media buying hasnt been nearly as sexy as pitched: While media agencies have been able to use AI to automate campaigns (mostly for paid search advertising), it has been delivering better targeted audiences for the same amount of money as marketers previously spent and clarifying the gaps in a media plan rather than handling all the minute details.

AIs use for media buying hasnt lived up to the dream for a few reasons. For one, the effects of AIs use on media buying are generally still found in a biddable, programmatic environment where marketers have come to expect automation. And agencies, marketers and platform providers are all still testing the best ways to use AI for media buying. Without a set of standards in place, it difficult to compare marketers use of AI for media buying.

Outside of the current state of programmatic, adoption of AI isnt widespread in a systemic and systematic way across the industry, wrote William Restrepo, svp of business intelligence for Publicis Media, in an email. Different agencies and different vendors (and vendor types) are still in a trial-and-error phase determining what works and doesnt work for them.

At the same time, Facebook and Google have made advancements in the AI media buying capabilities for their platforms, making it appealing for marketers to use those platforms AI rather than continuing to build out their own.

An exclusive, inside look at whats actually happening in the video industry, including original reporting, analysis of important stories and interviews with interesting executives and other newsmakers.

At least, that has been case for Orangetheory Fitness. Just slightly more than two years ago, the high-end gym chainlaunched its own AI platform, enabling the company to slice its cost per lead from $20 to $8 and end up with better leads. With those results, the chain quadrupled its media spend and focused most of those dollars on AI. But although the company once was bullish about its own AI platform, Orangetheory has since pulled the plug on it, opting instead to have its internal teams and its media agency, the Tombras Group, manage more of its media buying and planning decisions.

We were heavily relying our digital media efforts on AI two years ago, said Tammie DeGrasse-Cabrera, the global marketing director for Orangetheory Fitness. Weve shifted back and really made sure the humans on our team, [those on] our media agency, are really doing that for us. Were also using AI thats already being developed in media platforms like Facebook and Google and connecting that and marrying that to the art and science of media buying, she added.

Orangetheory Fitnesss AI journey might be a microcosm of what midlevel marketers have been experiencing when using AI for media buying. Now that Facebooks and Googles AI for media buying has become more advanced, relying on those platforms has become attractive for marketers rather than spending significant resources on building out their own. Thats especially true at this point since the promise that AI would making the job of media buying simpler has not come to fruition.

But thats not the case for larger marketers with the resources to build their own AI solution, according to media executives; they said that major marketers are still vying for custom solutions that tap AI for media buying across a variety of platforms.

We rely on automation, but we dont set it and forget it, said Doug Rozen, chief media officer for 360i, who noted that his company has made significant advancements in use of AI for media buying over the last six months although work still remains. Its the human and the robot working together almost like sometimes the automation is taking a blunt object to something thats more nuanced than just applying the overall algorithmic automation to it.

When it comes to AIs use for media buying, the complexity of whats being accomplished is at times difficult to convey to marketers. And for someone not using the platforms each day, its easy to miss the ways that AI is already changing media buying in a biddable environment. Publishers and platform providers have done a good job of externalizing the technology and interfaces to make it easy for someone to place a media buy and enter constraints, Harrison said. It becomes akin to indicating this is how much Im willing to pay; these are my bid thresholds; this is the outcome I expect; heres how much I have to spend and hitting go, he said.

Added Harrison: Behind the scenes, the work of those platforms has gotten a lot smarter; and the return, the value that advertisers get for that money, is a lot more because in theory its being targeted to the right people; its more precise and all of that is powered by AI decisioning. He said, Its not fair to [say] it hasnt gone anywhere. It has. Youre just not as explicitly seeing it.

As Luke Lambert, OMD USAs head of programmatic advertising, observed, What were really seeing is not the change in output that we were always dreaming about, that we thought AI would produce for us. He added, Instead, its taught us that theres a better way of doing things before we even give the AI a dollar to spend, which is a positive thing. Its a good thing to find process efficiencies. We just expected them to be on the other side.

Even though AIs use for media buying has not to date delivered quite what was expected, media executives are still bullish on its potential and the need for marketers to enlist it. Weve really only scratched the surface, Harrison said. The more complexity you have in the media ecosystem with the number of players, platforms and opportunities, [and] the more complexity you have in the content ecosystem, with options in the way people consume and see content, the harder it is to train machines to anticipate where the next best impression should go. He added, Thats really the challenge now to build AI that can accommodate and contemplate all of that complexity.

And despite the challenges associated with contending with all that complexity, he said, the need for AI to help media buyers manage those players, platforms and channels is clear. Humans are not going to be able to do that decision game much longer and arguably were doing it at a suboptimal way today, Harrison said. The sooner we build AI to do that job the better marketers outcomes will be.

Read more from the original source:
Dont set it and forget it: Artificial intelligences role in media buying is taking shape - Digiday

World’s First ‘Living Machine’ Created Using Frog Cells and Artificial Intelligence – Livescience.com

What happens when you take cells from frog embryos and grow them into new organisms that were "evolved" by algorithms? You get something that researchers are calling the world's first "living machine."

Though the original stem cells came from frogs the African clawed frog, Xenopus laevis these so-called xenobots don't resemble any known amphibians. The tiny blobs measure only 0.04 inches (1 millimeter) wide and are made of living tissue that biologists assembled into bodies designed by computer models, according to a new study.

These mobile organisms can move independently and collectively, can self-heal wounds and survive for weeks at a time, and could potentially be used to transport medicines inside a patient's body, scientists recently reported.

Related: The 6 Strangest Robots Ever Created

"They're neither a traditional robot nor a known species of animal," study co-author Joshua Bongard, a computer scientist and robotics expert at the University of Vermont, said in a statement. "It's a new class of artifact: a living, programmable organism."

Algorithms shaped the evolution of the xenobots. They grew from skin and heart stem cells into tissue clumps of several hundred cells that moved in pulses generated by heart muscle tissue, said lead study author Sam Kriegman, a doctoral candidate studying evolutionary robotics in the University of Vermont's Department of Computer Science, in Burlington.

"There's no external control from a remote control or bioelectricity. This is an autonomous agent it's almost like a wind-up toy," Kriegman told Live Science.

Biologists fed a computer constraints for the autonomous xenobots, such as the maximum muscle power of their tissues, and how they might move through a watery environment. Then, the algorithm produced generations of the tiny organisms. The best-performing bots would "reproduce" inside the algorithm. And just as evolution works in the natural world, the least successful forms would be deleted by the computer program.

"Eventually, it was able to give us designs that actually were transferable to real cells. That was a breakthrough," Kriegman said.

The study authors then brought these designs to life, piecing stem cells together to form self-powered 3D shapes designed by the evolution algorithm. Skin cells held the xenobots together, and the beating of heart tissue in specific parts of their "bodies" propelled the 'bots through water in a petri dish for days, and even weeks at a stretch, without needing additional nutrients, according to the study. The 'bots were even able to repair significant damage, said Kriegman.

"We cut the living robot almost in half, and its cells automatically zippered its body back up," he said.

"We can imagine many useful applications of these living robots that other machines can't do," said study co-author Michael Levin, director of theCenter for Regenerative and Developmental Biologyat Tufts University in Massachusetts. These might include targeting toxic spills or radioactive contamination, collecting marine microplastics or even excavating plaque from human arteries, Levin said in a statement.

Creations that blur the line between robots and living organisms are popular subjects in science fiction; think of the killer machines in the "Terminator" movies or the replicants from the world of "Blade Runner." The prospect of so-called living robots and using technology to create living organisms understandably raises concerns for some, said Levin.

"That fear is not unreasonable," Levin said. "When we start to mess around with complex systems that we don't understand, we're going to get unintended consequences."

Nevertheless, building on simple organic forms like the xenobots could also lead to beneficial discoveries, he added.

"If humanity is going to survive into the future, we need to better understand how complex properties, somehow, emerge from simple rules," Levin said.

The findings were published online Jan. 13 in the journal Proceedings of the National Academy of Sciences.

Originally published on Live Science.

Read the original here:
World's First 'Living Machine' Created Using Frog Cells and Artificial Intelligence - Livescience.com

The global artificial intelligence (AI) in BFSI market was valued at $17,765.2 million in 2018 and is expected to reach $247,366.7 million by 2026,…

Artificial Intelligence in BFSI Market by Offerings (Hardware, Software, and Services), Solution (Chatbots, Fraud Detection & Prevention, Anti-Money Laundering, Customer Relationship Management, Data Analytics & Prediction, and Others), Technology (Deep Learning, Querying Method, Natural Language Processing, and Context Aware Processing) : Global Opportunity Analysis and Industry Forecast, 20192026

New York, Jan. 16, 2020 (GLOBE NEWSWIRE) -- Reportlinker.com announces the release of the report "Artificial Intelligence in BFSI Market by Offerings, Solution, Technology : Global Opportunity Analysis and Industry Forecast, 20192026" - https://www.reportlinker.com/p05836997/?utm_source=GNW

The global artificial intelligence (AI) in BFSI market was valued at $17,765.2 million in 2018 and is expected to reach $247,366.7 million by 2026, registering a CAGR of 38.0% from 2019 to 2026. Artificial intelligence is the recreation of human intelligence that perform tasks like humans. In financial institutions and other major finance industries, AI has become a core adaption and is expected to change the overall scenario of product and service offerings. For instance, insurance companies are improving risk models to maintain customer loyalty and client satisfaction with the help of advanced AI technological platforms.

Various fraud detection, risk mitigation, back-end office works with thousands of people processing customer requests are improved with the help of AI enabled technologies such as chatbots, machine learning, and other such technologies, which boosts the growth of the market. In addition, the reduction in the tendency of human errors by automation of backend processes and enhancement in proactive customer experience is expected to drive the growth of the AI in the BFSI market. However, rise in security concerns, inadequacy of trust while issuing customer data, and higher cost for implementation of AI technologies is expected to restrain the market growth. New entrants like FinTech (Financial Technology) with advance features in the market, new initiatives in government regulations, and existing traditional banking system provides lucrative opportunities for the market growth.

The global artificial intelligence (AI) in BFSI market is segmented on the basis of offerings, solution, technology, and region. On the basis of offerings, it is segmented into hardware, software, and services. By service providers, it is segmented into chatbots, fraud detection & prevention, anti-money laundering, customer relationship management, data analytics & prediction, and others. By technology, it is classified into deep learning, querying method, natural language processing, and context aware processing. Region wise, the market is analyzed across North America, Europe, Asia-Pacific, and LAMEA.

KEY BENEFITS FOR STAKEHOLDERS ? The study provides an in-depth analysis of the global artificial intelligence (AI) in BFSI market along with the current trends and future estimations to elucidate the imminent investment pockets. ? Comprehensive analysis of the factors that drive and restrict the market growth is provided in the report. ? Comprehensive quantitative analysis of the industry from 2019 to 2026 is provided to enable the stakeholders to capitalize on the prevailing market opportunities. ? Extensive analysis of the key segments of the industry helps in understanding the offerings, solution, and technology across the globe. ? Key market players and their strategies have been analyzed to understand the competitive outlook of the market.

KEY MARKET SEGMENTS By Offerings o Hardware o Software o Services By Solution o Chatbots o Fraud Detection & Prevention o Anti-Money Laundering o Customer Relationship Management o Data Analytics & Prediction o Others By Technology o Deep Learning o Querying Method o Natural Language Processing o Context Aware Processing By Region o North America U.S. Canada Mexico o Europe o UK o Germany o France o Rest of Europe o Asia-Pacific o Japan o India o China o Australia o Rest of Asia-Pacific o LAMEA o Middle East o Latin America o Africa

KEY PLAYERS PROFILED Alphabet Inc. (Google) Baidu, Inc. Inbenta Technologies, Inc. Intel Corporation International Business Machines Corporation (IBM) Microsoft Corporation Oracle Corporation Palantir Technologies Inc. SAP SE salesforce.com, inc.

The other players in the market include (profiles not included in the report) the following: Lexalytics Inc. Digital Reasoning Inc. Interaction LLC, Inc. Ipsoft Inc. Zest FinanceRead the full report: https://www.reportlinker.com/p05836997/?utm_source=GNW

About ReportlinkerReportLinker is an award-winning market research solution. Reportlinker finds and organizes the latest industry data so you get all the market research you need - instantly, in one place.

__________________________

Story continues

Clare: clare@reportlinker.comUS: (339)-368-6001Intl: +1 339-368-6001

Continued here:
The global artificial intelligence (AI) in BFSI market was valued at $17,765.2 million in 2018 and is expected to reach $247,366.7 million by 2026,...

Companies Use Artificial Intelligence to Help With Hiring. Korean Consultants Teach You How to Beat It – Inc.

Artificial intelligence is supposed to free the hiring process from prejudices and biases. We can have a totally neutral system that evaluates candidates and selects the best possible one, regardless of race, gender, or any other characteristic.

It sounds fantastic, but it's been an abysmal failure in that matter. Artificial intelligence is only as good as the programmers, who, of course, are actual humans with flaws. Amazon, which, of course, has gobs of money to pour into development, had to scrap its A.I. recruiting process because the bot didn't like women.

HireVue faces pressure from rights groups over its hiring systems, which, according to TheWashington Post,

use video interviews to analyze hundreds of thousands of data points related to a person's speaking voice, word selection and facial movements. The system then creates a computer-generated estimate of the candidates' skills and behaviors, including their "willingness to learn" and "personal stability."

This model of gaming the system has been in place for as long as people have applied for jobs. There are thousands of articles on the internet that tell you how to answer standard interview questions ("Where do you see yourself in five years?") or extol the virtues of a firm handshake. This is really no different than the training these consultants give. Except, instead of trying to convince a human, you're trying to convince a machine.

And that makes this training so much more valuable. I can tell you "firm handshakes are important!" and then you interview with someone who prefers the dead-fish version of shaking hands and my advice harms instead of helps. Butif two companies use the same software, the information from these consultants will help you shine regardless of who the hiring manager is.

That's the goal, of course, to take the human biases out of interviews. But the biases still exist in A.I.--it's just that every job requires you to overcome the same preferences. Which means it will be easier to beat the system. Once the consultants figure out what the algorithms want, they can train you to respond the right way.

While it potentially levels the playing field, people who can afford training will do better in the interviews. Interviewers already discriminate on class, so this doesn't solve that problem at all.

Can artificial intelligence potentially make hiring better? Probably. But, as these consultants understand--anytime there is a system, there is a way to beat it. While humans are fallible, at least we all know they are. Artificial intelligence allows you to think the process is bias-free, but it's not. It just makes for consistent bias.

Published on: Jan 15, 2020

The opinions expressed here by Inc.com columnists are their own, not those of Inc.com.

Read the original post:
Companies Use Artificial Intelligence to Help With Hiring. Korean Consultants Teach You How to Beat It - Inc.