Wheelie bad end to 2019 for Canyon Bicycles as hackers puncture IT systems – The Register

German cycle-maker Canyon Bicycles GmbG has confirmed it was the victim of a security break-in over the holiday period that has all the hallmarks of a ransomware attack with parts of the infrastructure padlocked by the perpetrators.

The digital burglars gained access to IT systems shortly before the turn of the year, the bike maker said in a statement (PDF): Software and servers were encrypted and thus locked in places.

The website remained unaffected, meaning that online orders were placed as normal, it added, and that attack had been identified and stopped to the best of its current state of knowledge.

The attack shows massive criminal intent, said Canyon founder and CEO Roman Arnold. Due to the encryption of our IT infrastructure, work and business processes were temporarily massively affected.

The Koblenz HQ in west Germany and nearly all of the international operations were directly impacted, with the exception of the US subsidiary because it runs a separate IT system.

Arnold made no reference to ransomware, if a ransom has been demanded, the size of the ransom or if it had been paid. The Register called the UK operations to pose these questions but was told by the head of customer services that no further comment will be made.

It is a very sensitive business-related matter, the rep said.

We have also emailed a bunch of questions to the HQ in Germany as no telephone number is available.

The CEO did say that Canyon expects delays to customer orders and delivery in the next few weeks but it making every effort to lessen the impact on punters get back to normal operations as quickly as possible.

We regret this incident very much and apologise that Canyon us currently not able to offer its usual standard of service, Arnold added.

Since the incident occurred, Canyon said it has worked closely with local and state criminal investigators, and has informed the commissioner for the state of Rhineland-Palatinate. The company said: Criminal charges will be filed against the perpetrators.

Experts from the fields of IT, forensics and cyber security were able to quickly analyse and control the attack and have already initiated solutions and countermeasures, Canyon added.

Arnold and his brother Franc, who is no longer involved with the business, set up Radsport Arnold GmbH in 1985 as a supplier of bike components, and in 2001 it changed its moniker and became a finished cycle maker.

In 2016, the firm had to apologise for delayed orders and "missing information" for customers after it implemented a new ERP system and opened a new production site in late 2015.

Here is the original post:
Wheelie bad end to 2019 for Canyon Bicycles as hackers puncture IT systems - The Register

Protecting Your Internet Usage Privacy With A VPN – The Boca Raton Tribune

In todays digital age, privacy concerns are more important than they have ever been before. Just because you have a password for all of your most important sites, doesnt mean you should skimp out on the tools needed for internet browsing privacy. In this article, well go over how you can make sure your internet search is safe from foreign viruses and prying government eyes with the use of a top-quality VPN. Additionally, well learn more about some of the best VPNs you can use that can work all over the world.

A VPN or Virtual Privacy Network is a tool that allows you to connect to the internet via an encrypted network that has the ability to bypass many of the geographic-based restrictions for internet usage placed by the country you are currently in. Additionally, a VPN can hide your current IP address and display the IP address of a server that you are not connected to. But how does it work?

When you think about an internet connection, the first thing that likely comes to your mind is a connection to the WiFi via an ISP or Internet Service Provider. Typically this connection is completely unencrypted with data and information like your IP address open to the public. As a result, your ISP and anyone else with the means can monitor what you are doing online (even if you are on incognito mode).

When you use a VPN, you scramble or encrypt the data connection to the ISP while traveling along the same information highway an unencrypted data connection would go. As a result, you have access to the information or content that is blocked by a country that would have otherwise been able to recognize the IP address you were coming from and then block the website you were looking to access.

Depending on the country you are in, you will see a range of views regarding VPNs. While some countries in the west including the US, Canada, United Kingdom, and many countries in Europe are rather lax on the use of VPNs, other countries in Asia and the Middle East like North Korea, China, and Iraq are extremely strict and have limited the use of VPNs. Russia is extremely strict and has outright banned the use of these encryption tools for users to get to the sites that the state has explicitly blocked.

Before you decide to use a VPN in a foreign country, make sure to read the fine print and determine whether it is ok to use in that country. Chances are that it is but you might be in a country that has extremely strict laws regarding their use. If this is the case, then you will want to know your specific rights when it comes to protecting your privacy as you browse in a foreign country.

Additionally, youll want to keep on the lookout for companies that utilize suspicious and malicious business practices in order to get people to download their proxy tool. Sometimes these companies claim to have a free VPN but once you download it, they can take all of your information and sell it to a third party. Sometimes a third party could be a government entity. You wont want that 3 am knock on your hotel room door when you are trying to get some sleep before visiting Bosnias city-scapes the next morning.

If you want to download a VPN, then it is best to be informed of the different kinds of VPNs that are actually out there. The last thing you want is for your own ignorance to lead you down the road towards downloading a VPN that delivers a virus or tags your device for prying government eyes.

Allows for remote access to files that might be located in a blocked site within the geographic region.

This is used in mainly corporate settings and allows companies with sites in different locations to communicate through the geographic limitations that have been set up.

Also known as Internet Protocol Security, IPSec offers a transport or tunneling mode to protect the data that is transferred between two different networks.

Layer 2 Tunneling Protocol creates a tunnel between two connection access points. Combined with the IPSec, it is a very secure VPN because the IPSec encrypts the data while the L2TP creates the tunneling mechanism.

PPTP or Point to Point Tunneling Protocol encrypts the data between the network connections. It encapsulates the data within an encryption packet before sending it down the information network.

Secure Socket Layer and Transport Layer Security together create a connection that allows the user to browse the website when access is limited within the geographic location.

One of the most common VPNs in use today, OpenVPN uses an open-source method for creating VPN connections. This means that anyone with knowledge of VPN coding can edit the internal structure to make updates to the Point to Point and Site to Site connections.

Also known as Secure Shell, SSH has an encrypted tunnel through which data transfer can occur. An SSH client creates this tunnel where data is transferred from a local port onto a remote server. It is how you are able to access a Netflix show only available in one region when you are located in another that would not have access to the show.

If you are traveling to a foreign country and need to use the internet for business or personal reasons, it might be time to look into downloading a VPN that can protect you as you browse freely. However, it is important to know what kind of VPN you are looking to download and what the legality is from country to country. Armed with this knowledge, you will be able to surf the internet as if you are surfing it from home.

The rest is here:
Protecting Your Internet Usage Privacy With A VPN - The Boca Raton Tribune

Bluefin and Retail inMotion Partner to Provide PCI-Validated Point-to-Point Encryption (P2PE) – PR Web

We are excited to lead the airline industry in providing this important security solution to our clients, said Jan Blanchard, Chief Commercial Officer, Retail inMotion.

ATLANTA and DUBLIN (PRWEB) January 07, 2020

Bluefin, the leading provider of payment security technologies and PCI-validated point-to-point encryption (P2PE) solutions for retail, hospitality, healthcare, and higher education today announced its partnership with Irish-based Retail inMotion, the LSG Groups onboard retail expert brand. Through this partnership, users of the Retail inMotion onboard retail management platform will benefit from Bluefins PCI-validated P2PE solution.

Retail inMotion specializes in the development and procurement of onboard retail products, complete management of buy-on-board programs, and end-to-end IT support of these programs through proprietary software solutions. The company serves major brands in the airline industry, including Cathay Pacific and more than 40 others worldwide.

Bluefins PCI-validated P2PE technology secures credit and debit card transactions by encrypting all data within a PCI-approved point of entry device. This prevents clear-text cardholder data from being available within the device, or in the merchants system where exposure to malware is possible. Data decryption always occurs offsite in a Bluefin hardware security module (HSM), ensuring the highest level of security.

Retail inMotion is a best in class provider to some of the largest airlines in the world, who will benefit from the security, PCI scope reduction and brand protection of PCI-validated P2PE, said Greg Cornwell, head of global sales for Bluefin. As we have seen from breaches this year, the travel and hospitality industries are a major target for hackers, and we are very pleased to partner with Retail inMotion to secure payments for their travel industry clients.

Bluefin enables PCI-validated P2PE on partner platforms using their Decryptx Decryption as a Service (DaaS) product. More than 125 connected partners including gateways, ISVs, and processors interact directly with Bluefin for the P2PE service.

This is a great partnership for Retail inMotion and Bluefin," said Jan Blanchard, Chief Commercial Officer, Retail inMotion. We are excited to lead the airline industry in providing this important security solution to our clients.

The benefits of the Bluefin and Retail inMotion P2PE solution include reducing PCI scope from 329 to 33 questions on the P2PE self-assessment questionnaire (SAQ), which in turn provides significant cost and efficiency savings; online management of the P2PE device process with Bluefins P2PE Manager; and seamless integration with Retail inMotions platforms.

About Bluefin

Bluefin provides the leading payment security platform that supports payment gateways, processors and ISVs in 30 countries. Bluefins secure payment platform is key to the holistic approach to data security. Designed to complement EMV and tokenization, Bluefins PCI-validated Point-to-Point (P2PE) solutions provide a solid security defense against current and future data breaches. Bluefin supports point of sale solutions for retail, mobile, call center and kiosk/unattended environments, and secure Ecommerce technologies. Bluefin is a Participating Organization (PO) of the PCI Security Standards Council (SSC) and is headquartered in Atlanta, with offices in New York, Chicago, Tulsa and Waterford, Ireland. For more information, please visit http://www.bluefin.com.

About Retail inMotion

Retail inMotion is an onboard retail expert for the travel industry. Its culture of collaboration and innovation continues to help it steadily strengthen its position in the global onboard-retail industry. Retail inMotion offers proprietary products, solutions and services in onboard-retail IT technology, crew training, product distribution, inflight entertainment and fully outsourced onboard-retail services, https://www.retailinmotion.com/.

Retail inMotion is one of the four expert brands belonging to the LSG Group alongside LSG Sky Chefs (catering and hospitality), SPIRIANT (equipment solutions) and Evertaste (convenience food). The LSG Group is the worlds leading provider of end-to-end onboard products and services. In 2018, the companies belonging to the LSG Group achieved consolidated revenues of EUR 3.2 billion. https://www.lsg-group.com/.

Share article on social media or email:

Go here to read the rest:
Bluefin and Retail inMotion Partner to Provide PCI-Validated Point-to-Point Encryption (P2PE) - PR Web

Optical Encryption Market 2020 Size, Share Metrics, Growth Trends and Forecast to 2026 – ReportsPioneer

New Jersey, United States, Verified Market Research indicates that the Optical Encryption Market is expected to surge at a steady rate in the coming years, as economies flourish. The research report, titled [Global Optical Encryption Market Research Report 2020], provides a comprehensive review of the global market. Analysts have identified the key drivers and restraints in the overall market. They have studied the historical milestones achieved by the Global Optical Encryption Market and emerging trends. A comparison of the two has enabled the analysts to draw a potential trajectory of the Global Optical Encryption Market for the forecast period.

Global Optical Encryption Market was valued at USD 2.62 Billion in 2018 and is projected to reachUSD 5.06 Billion by 2026,growing at aCAGR of 8.54% from 2019 to 2026.

Request a Sample Copy of this report @https://www.verifiedmarketresearch.com/download-sample/?rid=27147&utm_source=RPN&utm_medium=007

Top 10 Companies in the Global Optical Encryption Market Research Report:

Global Optical Encryption Market: Competitive Landscape

Competitive landscape of a market explains strategies incorporated by key players of the market. Key developments and shift in management in the recent years by players has been explained through company profiling. This helps readers to understand the trends that will accelerate the growth of market. It also includes investment strategies, marketing strategies, and product development plans adopted by major players of the market. The market forecast will help readers make better investments.

Global Optical Encryption Market: Drivers and Restrains

This section of the report discusses various drivers and restrains that have shaped the global market. The detailed study of numerous drivers of the market enable readers to get a clear perspective of the market, which includes market environment, government policies, product innovations, breakthroughs, and market risks.

The research report also points out the myriad opportunities, challenges, and market barriers present in the Global Optical Encryption Market. The comprehensive nature of the information will help the reader determine and plan strategies to benefit from. Restrains, challenges, and market barriers also help the reader to understand how the company can prevent itself from facing downfall.

Global Optical Encryption Market: Segment Analysis

This section of the report includes segmentation such as application, product type, and end user. These segmentations aid in determining parts of market that will progress more than others. The segmentation analysis provides information about the key elements that are thriving the specific segments better than others. It helps readers to understand strategies to make sound investments. The Global Optical Encryption Market is segmented on the basis of product type, applications, and its end users.

Global Optical Encryption Market: Regional Analysis

This part of the report includes detailed information of the market in different regions. Each region offers different scope to the market as each region has different government policy and other factors. The regions included in the report are North America, South America, Europe, Asia Pacific, and the Middle East. Information about different region helps the reader to understand global market better.

Ask for Discount @https://www.verifiedmarketresearch.com/ask-for-discount/?rid=27147&utm_source=RPN&utm_medium=007

Table of Content

1 Introduction of Optical Encryption Market

1.1 Overview of the Market 1.2 Scope of Report 1.3 Assumptions

2 Executive Summary

3 Research Methodology of Verified Market Research

3.1 Data Mining 3.2 Validation 3.3 Primary Interviews 3.4 List of Data Sources

4 Optical Encryption Market Outlook

4.1 Overview 4.2 Market Dynamics 4.2.1 Drivers 4.2.2 Restraints 4.2.3 Opportunities 4.3 Porters Five Force Model 4.4 Value Chain Analysis

5 Optical Encryption Market, By Deployment Model

5.1 Overview

6 Optical Encryption Market, By Solution

6.1 Overview

7 Optical Encryption Market, By Vertical

7.1 Overview

8 Optical Encryption Market, By Geography

8.1 Overview 8.2 North America 8.2.1 U.S. 8.2.2 Canada 8.2.3 Mexico 8.3 Europe 8.3.1 Germany 8.3.2 U.K. 8.3.3 France 8.3.4 Rest of Europe 8.4 Asia Pacific 8.4.1 China 8.4.2 Japan 8.4.3 India 8.4.4 Rest of Asia Pacific 8.5 Rest of the World 8.5.1 Latin America 8.5.2 Middle East

9 Optical Encryption Market Competitive Landscape

9.1 Overview 9.2 Company Market Ranking 9.3 Key Development Strategies

10 Company Profiles

10.1.1 Overview 10.1.2 Financial Performance 10.1.3 Product Outlook 10.1.4 Key Developments

11 Appendix

11.1 Related Research

Request Customization of Report @ https://www.verifiedmarketresearch.com/product/Optical-Encryption-Market/?utm_source=RPN&utm_medium=007

Highlights of Report

About Us:

Verified market research partners with clients to provide insight into strategic and growth analytics; data that help achieve business goals and targets. Our core values include trust, integrity, and authenticity for our clients.

Analysts with high expertise in data gathering and governance utilize industry techniques to collate and examine data at all stages. Our analysts are trained to combine modern data collection techniques, superior research methodology, subject expertise and years of collective experience to produce informative and accurate research reports.

Contact Us:

Mr. Edwyne Fernandes Call: +1 (650) 781 4080 Email: [emailprotected]

See the article here:
Optical Encryption Market 2020 Size, Share Metrics, Growth Trends and Forecast to 2026 - ReportsPioneer

What Is Machine Learning? | How It Works, Techniques …

Supervised Learning

Supervised machine learning builds a model that makes predictions based on evidence in the presence of uncertainty. A supervised learning algorithm takes a known set of input data and known responses to the data (output) and trains a model to generate reasonable predictions for the response to new data. Use supervised learning if you have known data for the output you are trying to predict.

Supervised learning uses classification and regression techniques to develop predictive models.

Classification techniques predict discrete responsesfor example, whether an email is genuine or spam, or whether a tumor is cancerous or benign. Classification models classify input data into categories. Typical applications include medical imaging, speech recognition, and credit scoring.

Use classification if your data can be tagged, categorized, or separated into specific groups or classes. For example, applications for hand-writing recognition use classification to recognize letters and numbers. In image processing and computer vision, unsupervised pattern recognition techniques are used for object detection and image segmentation.

Common algorithms for performing classification include support vector machine (SVM), boosted and bagged decision trees, k-nearest neighbor, Nave Bayes, discriminant analysis, logistic regression, and neural networks.

Regression techniques predict continuous responsesfor example, changes in temperature or fluctuations in power demand. Typical applications include electricity load forecasting and algorithmic trading.

Use regression techniques if you are working with a data range or if the nature of your response is a real number, such as temperature or the time until failure for a piece of equipment.

Common regression algorithms include linear model, nonlinear model, regularization, stepwise regression, boosted and bagged decision trees, neural networks, and adaptive neuro-fuzzy learning.

Read more:
What Is Machine Learning? | How It Works, Techniques ...

AI and machine learning trends to look toward in 2020 – Healthcare IT News

Artificial intelligence and machine learning will play an even bigger role in healthcare in 2020 than they did in 2019, helping medical professionals with everything from oncology screenings to note-taking.

On top of actual deployments, increased investment activity is also expected this year, and with deeper deployments of AI and ML technology, a broader base of test cases will be available to collect valuable best practices information.

As AI is implemented more widely in real-world clinical practice, there will be more academic reports on the clinical benefits that have arisen from the real-world use, said Pete Durlach, senior vice president for healthcare strategy and new business development at Nuance.

"With healthy clinical evidence, we'll see AI become more mainstream in various clinical settings, creating a positive feedback loop of more evidence-based research and use in the field," he explained. "Soon, it will be hard to imagine a doctor's visit, or a hospital stay that doesn't incorporate AI in numerous ways."

In addition, AI and ambient sensing technology will help re-humanize medicine by allowing doctors to focus less on paperwork and administrative functions, and more on patient care.

"As AI becomes more commonplace in the exam room, everything will be voice enabled, people will get used to talking to everything, and doctors will be able to spend 100% of their time focused on the patient, rather than entering data into machines," Durlach predicted. "We will see the exam room of the future where clinical documentation writes itself."

The adoption of AI for robotic process automation ("RPA") for common and high value administrative functions such as the revenue cycle, supply chain and patient scheduling also has the potential to rapidly increase as AI helps automate or partially automate components of these functions, driving significantly enhanced financial outcomes to provider organizations.

Durlach also noted the fear that AI will replace doctors and clinicians has dissipated, and the goal now is to figure out how to incorporate AI as another tool to help physicians make the best care decisions possible effectively augmenting the intelligence of the clinician.

"However, we will still need to protect against phenomenon like alert fatigue, which occurs when users who are faced with many low-level alerts, ignore alerts of all levels, thereby missing crucial ones that can affect the health and safety of patients," he cautioned.

In the next few years, he predicts the market will see a technology that finds a balance between being too obtrusive while supporting doctors to make the best decisions for their patients as the learn to trust the AI powered suggestions and recommendations.

"So many technologies claim they have an AI component, but often there's a blurred line in which the term AI is used in a broad sense, when the technology that's being described is actually basic analytics or machine learning," Kuldeep Singh Rajput, CEO and founder of Boston-based Biofourmis, told Healthcare IT News. "Health system leaders looking to make investments in AI should ask for real-world examples of how the technology is creating ROI for other organizations."

For example, he pointed to a study of Brigham & Women's Home Hospital program, recently published in Annals of Internal Medicine, which employed AI-driven continuous monitoring combined with advanced physiology analytics and related clinical care as a substitute for usual hospital care.

The study found that the program--which included an investment in AI-driven predictive analytics as a key component--reduced costs, decreased healthcare use, and lowered readmissions while increasing physical activity compared with usual hospital care.

"Those types of outcomes could be replicated by other healthcare organizations, which makes a strong clinical and financial case to invest in that type of AI," Rajput said.

Nathan Eddy is a healthcare and technology freelancer based in Berlin.Email the writer:nathaneddy@gmail.comTwitter:@dropdeaded209

Original post:
AI and machine learning trends to look toward in 2020 - Healthcare IT News

Chemists are training machine learning algorithms used by Facebook and Google to find new molecules – News@Northeastern

For more than a decade, Facebook and Google algorithms have been learning as much as they can about you. Its how they refine their systems to deliver the news you read, those puppy videos you love, and the political ads you engage with.

These same kinds of algorithms can be used to find billions of molecules and catalyze important chemical reactions that are currently induced with expensive and toxic metals, says Steven A. Lopez, an assistant professor of chemistry and chemical biology at Northeastern.

Lopez is working with a team of researchers to train machine learning algorithms to spot the molecular patterns that could help find new molecules in bulk, and fast. Its a much smarter approach than scanning through billionsand billionsof molecules without a streamlined process.

Were teaching the machines to learn the chemistry knowledge that we have, Lopez says. Why should I just have the chemical intuition for myself?

The alternative to using expensive metals is organic molecules, and particularly plastics, which are everywhere, Lopez says. Depending on their molecular structure and ability to absorb light, these plastics can be converted with chemistry to produce better materials for todays most important problems.

Lopez says the goal is to find molecules with the right properties and similar structures as metal catalysts. But to attain that goal, Lopez will need to explore an enormous number of molecules.

Thus far, scientists have been able to synthesize only about a million molecules. But conservative estimates of the number of possible molecules that could be analyzed is a quintillion, which is 10 raised to the power of 18, or the number one followed by 18 zeros.

Lopez thinks of this enormous number of possibilities as a vast ocean made up of billions of unexplored molecules. Such an immense molecular space is practically impossible to navigateeven if scientists were to combine experiments with supercomputer analysis.

Lopez says all of the calculations that have ever been done by computers add up to about a billion, or 10 to the ninth power. Thats about a million times less than the possible molecules.

Forget it, theres no chance, he says. We just have to use a smarter search technique.

Thats why Lopez is leading a team, supported by a grant from the National Science Foundation, that includes research from Tufts University, Washington University in St. Louis, Drexel University, and Colorado School of Mines. The team is using an open-access database of organic molecules called VERDE materials DB, which Lopez and colleagues recently published, to improve their algorithms and find more useful molecules.

The database will also register newly found molecules, and can serve as a data hub of information for researchers across several different domains, Lopez says. Thats because it can launch researchers toward finding different molecules with many new properties and applications.

In tandem with the database, the algorithms will allow scientists to use computational resources more efficiently. After molecules of interest are found, researchers will recalibrate the algorithm to find more similar groups of molecules.

The active-search algorithm, developed by Roman Garnett at Washington University in St. Louis, uses a process similar to the classic board game Battleship, in which two players guess hidden locations off a grid to target and destroy vessels within a naval fleet.

In that grid, players place vessels as far apart as possible to make opponents miss targets. Once a ship is hit, players can readjust their strategy and redirect their attacks to the coordinates surrounding that hit.

Thats exactly how Lopez thinks of the concept of exploring a vast ocean of molecules.

We are looking for regions within this ocean, he says. We are starting to set up the coordinates of all the possible molecules.

Hitting the right candidate molecules might also expand the understanding that chemists have of this unexplored chemical space.

Maybe well find out through this analysis that we have something really at the edge of what we call the ocean, and that we can expand this ocean out a bit more in that region, Lopez says. Those are things that we wouldnt [be able to find by searching] with a brute force, trial-and-error kind of approach.

For media inquiries, please contact Jessica Hair at j.hair@northeastern.edu or 617-373-5718.

Originally posted here:
Chemists are training machine learning algorithms used by Facebook and Google to find new molecules - News@Northeastern

AI, machine learning, and other frothy tech subjects remained overhyped in 2019 – Boing Boing

Rodney Brooks (previously) is a distinguished computer scientist and roboticist (he's served as as head of MIT's Computer Science and Artificial Intelligence Laboratory and CTO of Irobot); two years ago, he published a list of "dated predictions" intended to cool down some of the hype about self-driving cars, machine learning, and robotics, hype that he viewed as dangerously gaseous.

Every year, Brooks revisits those predictions to see how he's doing (to "self certify the seriousness of my predictions"). This year's scorecard is characteristically curmudgeonly, and shows that Brooks's skepticism was well-warranted, revealing much of the enthusiasm for about AI to have been mere froth: "I had not predicted any big milestones for AI and machine learning for the current period, and indeed there were none achieved... [W]e have seen warnings that all the over-hype of machine and deep learning may lead to a new AI winter when those tens of thousands of jolly conference attendees will no longer have grants and contracts to pay for travel to and attendance at their fiestas"

Some of the predictions are awfully fun, too, like "The press, and researchers, generally mature beyond the so-called 'Turing Test' and Asimov's three laws as valid measures of progress in AI and ML" (predicted for 2022; last year's update was, "I wish, I really wish.").

Brooks is pretty bullish on the web for piercing hype-bubbles, noting that it provides "outlets... for non-journalists, perhaps practitioners in a scientific field, to write position papers that get widely referenced in social media... During 2019 we saw many, many well informed such position papers/blogposts. We have seen explanations on how machine learning has limitations on when it makes sense to be used and that it may not be a universal silver bullet."

Bruce Sterling's actually pretty comfortable with tech hype: "Ive come to see tech-hype as a sign of social health. Its kinda like being young and smitten by a lot of random pretty people, only, youre not gonna really have relationships with most of them, and also, the one you oughta marry and have children with, that is probably not the one who seems most fantastically hot and sexy. Also, if nothing at all seems fantastically hot and sexy, then you probably have a vitamin deficiency. Its all part of the marvelous pageant of life, ladies and gentlemen."

I made my predictions because at the time I saw an immense amount of hype about these three topics, and the general press and public drawing conclusions about all sorts of things they feared (e.g., truck driving jobs about to disappear, all manual labor of humans about to disappear) or desired (e.g., safe roads about to come into existence, a safe haven for humans on Mars about to start developing) being imminent. My predictions, with dates attached to them, were meant to slow down those expectations, and inject some reality into what I saw as irrational exuberance.

Predictions Scorecard, 2020 January 01 [Rodney Brooks]

(via Beyond the Beyond)

(Image: Gartner; Cryteria, CC-BY, modified)

Every year, the AI Now Institute (previously) publishes a deep, thoughtful, important overview of where AI research is and the ethical gaps in AI's use, and makes a list of a dozen urgent recommendations for the industry, the research community, and regulators and governments.

Librecorps is a program based at the Rochester Institute for Technology's Free and Open Source Software (FOSS) initiative that works with UNICEF to connect students with NGOs for paid co-op placements where they build and maintain FOSS tools used by nonprofits.

A team of researchers from Microsoft and Harvard's Berkman Center have published a taxonomy of "Failure Modes in Machine Learning," broken down into "Intentionally-Motivated Failures" and "Unintended Failures."

The best apps of 2019 could be the best deals of 2020. If you missed them last year, here are 10 of our Boing Boing reader favorites all on sale. Take advantage of deep discounts on apps dedicated to language learning, gaming, graphic design and many more. Degoo Premium: Lifetime 10TB Backup Plan With []

Missed that sale in the chaos of the holiday rush? No worries. Weve rounded up 10 of the best deals from the past year on tech, household items, audio gear and much more all still priced way down. LG B8 Series 55 OLED 4K HDR TV Consumer Reports flagged the B8 as one of []

Whatever your resolution is for the new year, youll be able to do it better with more sleep. Modern sleep masks are more than just blindfolds. They incorporate 3D contouring, ambient noise blocking and other features designed to help you shut out the world and slow down your busy, conscious mind. Heres 9 of our []

View post:
AI, machine learning, and other frothy tech subjects remained overhyped in 2019 - Boing Boing

Finally, a good use for AI: Machine-learning tool guesstimates how well your code will run on a CPU core – The Register

MIT boffins have devised a software-based tool for predicting how processors will perform when executing code for specific applications.

In three papers released over the past seven months, ten computer scientists describe Ithemal (Instruction THroughput Estimator using MAchine Learning), a tool for predicting the number processor clock cycles necessary to execute an instruction sequence when looped in steady state, and include a supporting benchmark and algorithm.

Throughput stats matter to compiler designers and performance engineers, but it isn't practical to make such measurements on-demand, according to MIT computer scientists Saman Amarasinghe, Eric Atkinson, Ajay Brahmakshatriya, Michael Carbin, Yishen Chen, Charith Mendis, Yewen Pu, Alex Renda, Ondrej Sykora, and Cambridge Yang.

So most systems rely on analytical models for their predictions. LLVM offers a command-line tool called llvm-mca that can presents a model for throughput estimation, and Intel offers a closed-source machine code analyzer called IACA (Intel Architecture Code Analyzer), which takes advantage of the company's internal knowledge about its processors.

Michael Carbin, a co-author of the research and an assistant professor and AI researcher at MIT, told the MIT News Service on Monday that performance model design is something of a black art, made more difficult by Intel's omission of certain proprietary details from its processor documentation.

The Ithemal paper [PDF], presented in June at the International Conference on Machine Learning, explains that these hand-crafted models tend to be an order of magnitude faster than measuring basic block throughput sequences of instructions without branches or jumps. But building these models is a tedious, manual process that's prone to errors, particularly when processor details aren't entirely disclosed.

Using a neural network, Ithemal can learn to predict throughout using a set of labelled data. It relies on what the researchers describe as "a hierarchical multiscale recurrent neural network" to create its prediction model.

"We show that Ithemals learned model is significantly more accurate than the analytical models, dropping the mean absolute percent error by more than 50 per cent across all benchmarks, while still delivering fast estimation speeds," the paper explains.

A second paper presented in November at the IEEE International Symposium on Workload Characterization, "BHive: A Benchmark Suite and Measurement Framework for Validating x86-64 Basic Block Performance Models," describes the BHive benchmark for evaluating Ithemal and competing models, IACAm llvm-mca, and OSACA (Open Source Architecture Code Analyzer). It found Ithemal outperformed other models except on vectorized basic blocks.

And in December at the NeurIPS conference, the boffins presented a third paper titled Compiler Auto-Vectorization with Imitation Learning that describes a way to automatically generate compiler optimizations in a way that outperforms LLVMs SLP vectorizer.

The academics argue that their work shows the value of machine learning in the context of performance analysis.

"Ithemal demonstrates that future compilation and performance engineering tools can be augmented with datadriven approaches to improve their performance and portability, while minimizing developer effort," the paper concludes.

Read the original post:
Finally, a good use for AI: Machine-learning tool guesstimates how well your code will run on a CPU core - The Register

Tiny Machine Learning On The Attiny85 – Hackaday

We tend to think that the lowest point of entry for machine learning (ML) is on a Raspberry Pi, which it definitely is not. [EloquentArduino] has been pushing the limits to the low end of the scale, and managed to get a basic classification model running on the ATtiny85.

Using his experience of running ML models on an old Arduino Nano, he had created a generator that can export C code from a scikit-learn. He tried using this generator to compile a support-vector colour classifier for the ATtiny85, but ran into a problem with the Arduino ATtiny85 compiler not supporting a variadic function used by the generator. Fortunately he had already experimented with an alternative approach that uses a non-variadic function, so he was able to dust that off and get it working. The classifier accepts inputs from an RGB sensor to identify a set of objects by colour. The model ended up easily fitting into the capabilities of the diminutive ATtiny85, using only 41% of the available flash and 4% of the available ram.

Its important to note what [EloquentArduino] isnt doing here: running an artificial neural network. Theyre just too inefficient in terms of memory and computation time to fit on an ATtiny. But neural nets arent the only game in town, and if your task is classifying something based on a few inputs, like reading a gesture from accelerometer data, or naming a color from a color sensor, the approach here will serve you well. We wonder if this wouldnt be a good solution to the pesky problem of identifying bats by their calls.

We really like how approachable machine learning has become and if youre keen to give ML a go, have a look at the rest of the EloquentArduino blog, its a small goldmine.

Were getting more and more machine learning related hacks, like basic ML on an Arduino Uno, and Lego sortings using ML on a Raspberry Pi.

Follow this link:
Tiny Machine Learning On The Attiny85 - Hackaday