• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Home
  • Contact Us

iHash

News and How to's

  • The 2023 Adobe Creative Cloud Beginner to Advance Bundle for $59

    The 2023 Adobe Creative Cloud Beginner to Advance Bundle for $59
  • The Complete 2023 Business Accounting Mastery Bundle for $49

    The Complete 2023 Business Accounting Mastery Bundle for $49
  • Universal VR Set Glasses Goggle Bundle for PC Android Phone for iPhone for $125

    Universal VR Set Glasses Goggle Bundle for PC Android Phone for iPhone for $125
  • Scanner Device Detector for GPS Tracker Wireless Listening Device Camera Finder 5 Levels Sensitivity 25H Working Time for $44

    Scanner Device Detector for GPS Tracker Wireless Listening Device Camera Finder 5 Levels Sensitivity 25H Working Time for $44
  • VYSN RockinPods TWS Waterproof Bluetooth Earbuds for $24

    VYSN RockinPods TWS Waterproof Bluetooth Earbuds for $24
  • News
    • Rumor
    • Design
    • Concept
    • WWDC
    • Security
    • BigData
  • Apps
    • Free Apps
    • OS X
    • iOS
    • iTunes
      • Music
      • Movie
      • Books
  • How to
    • OS X
      • OS X Mavericks
      • OS X Yosemite
      • Where Download OS X 10.9 Mavericks
    • iOS
      • iOS 7
      • iOS 8
      • iPhone Firmware
      • iPad Firmware
      • iPod touch
      • AppleTV Firmware
      • Where Download iOS 7 Beta
      • Jailbreak News
      • iOS 8 Beta/GM Download Links (mega links) and How to Upgrade
      • iPhone Recovery Mode
      • iPhone DFU Mode
      • How to Upgrade iOS 6 to iOS 7
      • How To Downgrade From iOS 7 Beta to iOS 6
    • Other
      • Disable Apple Remote Control
      • Pair Apple Remote Control
      • Unpair Apple Remote Control
  • Special Offers
  • Contact us

2023 Trends in Artificial Intelligence and Machine Learning: Generative AI Unfolds  

Nov 28, 2022 by iHash Leave a Comment

At present, the potential for generative Artificial Intelligence—the variety of predominantly advanced machine learning that analyzes content to produce strikingly similar new content—is boundless.

These technologies have transcended Natural Language Generation, in which they achieved much of their early renown via paradigms such as Bidirectional Encoder Representations from Transformers (BERT), Generative Pre-trained Transformer 3 (GPT3), and deep neural networks. Although it’s still utilized to create verbal summaries of documents and analytics results, generative AI is now widely employed to compose poetry, music, visual arts, and many other things once thought relegated to the realm of human ingenuity.  

A closer examination of the technological underpinnings driving these applications reveals a number of poignant findings that impact their sway on enterprise AI for the New Year:

  • Statistical Techniques: Generative AI primarily relies on AI’s statistical foundation, not its knowledge foundation. It excels in machine learning, eschews machine reasoning, and doesn’t actually understand the underlying domains to which it’s applied.
  • Deep Learning: Generative AI models are predicated on the massive scale and compute required for deep learning. Conversely, they’re prey to the same caveats espoused about this form of AI for years, in terms of applications for which it is and isn’t suitable. The latter involves transparency, explainability, and interpretability.
  • Neural Networks: Because of its reliance on deep neural networks such as Generative Adversarial Networks and others, generative AI tends to forsake simpler machine learning models that are still highly relevant for business cases like fraud detection, information security, and recommendations.

Still, generative AI’s benefits of automation, time-to-action, and scalability are the very reasons organizations rely on AI in the first place. Prudent companies will adopt these advantages within broader frameworks for mitigating the shortfalls of advanced machine learning to provide tangible business value for decision support, customer satisfaction, workload optimization, and cost reductions.

By tempering the use of deep neural networks within highly reliable constructs such as rules-based systems, ensemble modeling, graph techniques, and others, generative AI may prove the vast leap forward its champions proclaim it is.

GPT3

There are innumerable deployments of Natural Language Generation that are directly attributed to both generative AI and its advanced machine learning methods. “GPT3 can sometimes generate, given a context and a particular bound scenario, specific boilerplate code or boilerplate text that can be useful for… summaries,” posited Ignacio Segovia, Altimetrik Head of Product Engineering. Consequently, there are increasing numbers of use cases for implementing these deep learning approaches to deliver a rapid synopsis of interactions between customers and bots, company representatives, and system interfaces. On the one hand, this approach benefits customer segments because “this person who’s looking for a retirement plan might be actually a better candidate to be in this other type of retirement plan, just because that particular summarization of a conversation indicated that,” Segovia remarked.

On the other hand, when transformer architecture is involved, it’s possible to provide summaries of unthinkable quantities of data that behooves an organization’s employees. “Copilot takes GitHub’s entire known space of code, imagine that, and renders that very quickly into boilerplate code where the developer can simply worry about the validity of it, formulate it, and fine-tune it,” Segovia commented. Although this particular use case doesn’t involve writing code from scratch, GPT3’s synopsis of code, at scale, is remarkable for developers fostering innovative applications, or simply bettering existent ones.

Algorithmic Rules

As Segovia alluded to, one of the most desired outputs of generative AI is the capability to produce code for developers writing new applications or designing web pages. At present, however, there are methods by which AI can improve code to lower costs and increase efficiency for universal needs—like cloud computing. By coupling AI’s knowledge foundation and its statistical foundation (which Gartner has termed composite AI), intelligent systems can optimize cloud workloads, find the most expensive queries in popular tools like Snowflake, and determine how to decrease their costs. According to Bluesky CEO Mingsheng Hong, there are “computer algorithms [that] do what human experts used to do; they can scale up and analyze not just 10, 100 queries, but millions of queries.”

What’s significant about this application is it doesn’t rely on deep learning, but on what Hong described as “rules-based algorithms”. Employing rules with supervised learning approaches enables the system to refine human-created queries to optimize their cost-efficiency by providing “tuning recommendations across changing the query code and changing the data layout,” Hong revealed. Although AI isn’t used to create the code for querying cloud sources, it still modifies it, as need be, to boost its cost efficiency and workload optimization. The horizontal applicability of this use case is as noteworthy as the fact that the composite AI approach it relies on is not typically considered part of generative AI. However, it’s still assistive for writing code, which is one of the primary deployments of generative AI for practical business utility.

Classic Machine Learning 

The pervasiveness of advanced machine learning has not, nor likely will, obsolete the merit of traditional machine learning. It’s not uncommon to provide fraud detection, Anti-Money Laundering measures, and cyber security via classic machine learning, while fortifying much needed explainability in the process. Ensemble modeling techniques, which combine the predictive prowess of multiple machine learning models to aggrandize them, are instrumental in maximizing the value of traditional machine learning algorithms for use cases involving generative AI. With this approach, simple machine learning models analyze one aspect of a transaction (like its device or amount). Fusing them preserves their traceability while covering an enlarging scope of fraudulent activity. Thus, organizations can “easily have a textual output next to a [fraud detection] score saying the size of this transaction is way too high for this economic sector,” mentioned Martin Rehak, Resistant AI CEO.

In this use case, NLG facilitates the explanation of classic machine learning models that are inherently traceable. Those algorithms are pivotal to success because they are readily explained and don’t require as much example data for sufficient training as deep learning does without representation learning techniques. What’s critical about this application is it suggests classic and advanced machine learning aren’t mutually exclusive. “You start with simpler models, and as you build the expertise you transition in the…middle…in the ensemble to deep learning principles as soon as you can,” Rehak noted. “We can alternate between traditional models and deep learning, and flip between them based on the needs of the rest of the ensemble.”

Graph Analysis 

Graph techniques are particularly influential for AI applications in which “you have relationships and you want to exploit those relationships,” observed Suman Bera, Senior Software Engineer at Katana Graph. Whether assessing aspects of loan origination, healthcare treatments, information security or fraud, graphs can uncover even minute relationships between data to improve analytics. According to Rehak, it’s not uncommon for “in the ensemble, some of the algorithms are based on graphs, and these are some of those that get the highest weight.” Graph neural networks will continue to impact enterprise AI next year by excelling in high dimensionality spaces for use cases involving predictions about nodes and their links.

Additional approaches predicated on embedding, which is similar to the word embeddings involved in model-based methods for natural language technologies, identify relationships in data that users otherwise wouldn’t see. These capabilities are ideal for expediting certain aspects of feature detection for building machine learning models. Moreover, graph neural networks are primed for taming the rigors of unstructured data—even for the most unwieldy use cases. “Graph neural networks work on things that are graph structures,” Bera explained. “There’s still a structure to it, but not your conventional grid structure.” The grid structures Bera referenced are applicable to forms of computer vision. Graph neural networks are of some use for such deployments, but also for pinpointing irregular structures found in life sciences use cases, for example, like spurring new pharmaceuticals to market.

Benchmarks 

In many ways, generative AI has already become a formidable instrument in the toolset for enterprise applications of machine learning and Artificial Intelligence. It’s usefulness for NLG, which frequently involves aspects of Natural Language Understanding, is fairly widespread. However, it’s important not to sequester generative AI capabilities from more time-honored approaches involving traditional machine learning, symbolic AI, and graph technologies. Tempering generative AI’s deep neural networks with these other methods for AI and machine learning can only bolster its productivity—resulting in more transparent and accountable applications in core enterprise use cases.

“How standards are setting up benchmarks for accuracy is constantly changing,” Segovia reflected. “Things that were relatively accurate three or four years ago are completely out of date. Most of the industry, if you go to any of the research papers that are out there, are essentially outdated benchmarks. That’s one area that I think needs to be improved considerably: the standardization for benchmarking.”

About the Author

Jelani Harper is an editorial consultant servicing the information technology market. He specializes in data-driven applications focused on semantic technologies, data governance and analytics.

Sign up for the free insideBIGDATA newsletter.

Join us on Twitter: https://twitter.com/InsideBigData1

Join us on LinkedIn: https://www.linkedin.com/company/insidebigdata/

Join us on Facebook: https://www.facebook.com/insideBIGDATANOW

Source link

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn

Filed Under: BigData

Special Offers

  • The 2023 Adobe Creative Cloud Beginner to Advance Bundle for $59

    The 2023 Adobe Creative Cloud Beginner to Advance Bundle for $59
  • The Complete 2023 Business Accounting Mastery Bundle for $49

    The Complete 2023 Business Accounting Mastery Bundle for $49
  • Universal VR Set Glasses Goggle Bundle for PC Android Phone for iPhone for $125

    Universal VR Set Glasses Goggle Bundle for PC Android Phone for iPhone for $125
  • Scanner Device Detector for GPS Tracker Wireless Listening Device Camera Finder 5 Levels Sensitivity 25H Working Time for $44

    Scanner Device Detector for GPS Tracker Wireless Listening Device Camera Finder 5 Levels Sensitivity 25H Working Time for $44
  • VYSN RockinPods TWS Waterproof Bluetooth Earbuds for $24

    VYSN RockinPods TWS Waterproof Bluetooth Earbuds for $24

Reader Interactions

Leave a Reply Cancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Primary Sidebar

  • Facebook
  • GitHub
  • Instagram
  • Pinterest
  • Twitter
  • YouTube

More to See

Dotan Horovits

Is Kubernetes Monitoring Flawed? | Logz.io

Feb 7, 2023 By iHash

New Survey Finds Consumers Give Chatbots a Failing Grade in Customer Experience

Feb 7, 2023 By iHash

Tags

* Apple Cisco computer security cyber attacks cyber crime cyber news cybersecurity Cyber Security cyber security news cyber security news today cyber security updates cyber threats cyber updates data breach data breaches google hacker hacker news Hackers hacking hacking news how to hack incident response information security iOS 7 iOS 8 iPhone Malware microsoft network security ransomware ransomware malware risk management Secure security security breaches security vulnerabilities software vulnerability the hacker news Threat update video Vulnerabilities web applications

Latest

The Power of Relationships: Executive Buy-In and Security Culture for Bolstering Resilience

The Power of Relationships: Executive Buy-In and Security Culture for Bolstering Resilience

“Where do we start?” This is the question every CISO asks about every new program. In fact, I ask and answer that question many times a month. There’s a reason for this, of course. A strong start to any project builds momentum, reassures stakeholders, and sets the stage for what’s to come. Security resilience initiatives […]

Cisco Secure at Cisco Live EMEA 2023

Cisco Secure at Cisco Live EMEA 2023

Cisco Live is the premier destination for Cisco customers and partners to gain knowledge and build community. Our teams work hard to deliver education and inspiration, ignite creativity, deliver practical know-how, and accelerate the connections that fuel your digital future. The Cisco Secure team is excited to share our expertise to help power the strategies […]

The 2023 Adobe Creative Cloud Beginner to Advance Bundle for $59

Expires November 25, 2122 23:59 PST Buy now and get 97% off Adobe Acrobat Pro DC (Beginner) KEY FEATURES Workplace demand for digital media skills including creating, managing, and integrating PDF documents is on the rise. In this course, students will learn the basics of creating PDF documents and modifying PDFs within Adobe Acrobat DC […]

Implementing AI into Enterprise Search to Make It Smarter

AI has the potential to be a game-changer for businesses that are experiencing a digital transformation, provided that it is correctly applied. While the economy is still struggling to recover, the value of technology like Machine Learning (ML) and Natural Language Processing (NLP) is on the rise. These technologies assist businesses in initiating and accelerating […]

GuLoader Malware Using Malicious NSIS Executables to Target E-Commerce Industry

Feb 06, 2023Ravie LakshmananCyber Attack / Endpoint Security E-commerce industries in South Korea and the U.S. are at the receiving end of an ongoing GuLoader malware campaign, cybersecurity firm Trellix disclosed late last month. The malspam activity is notable for transitioning away from malware-laced Microsoft Word documents to NSIS executable files for loading the malware. […]

Scanner Device Detector for GPS Tracker Wireless Listening Device Camera Finder 5 Levels Sensitivity 25H Working Time for $44

Expires January 31, 2123 18:01 PST Buy now and get 61% off PRODUCT SPECS Batteries Required? Yes Power Source Battery Powered Item Dimensions LxWxH 4.1 x 0.97 x 0.58 inches Battery Life 25 Hours function logProductOverviewMetric(metric) { if(typeof window.csa !== ‘undefined’) { var myEvents = csa(“Events”, {producerId: “dppinfo”}); myEvents(“log”, { schemaId: “dppinfo.productOverviewClientSideEvents.1”, eventName: metric }, […]

Jailbreak

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.2.0

Pangu has updated its jailbreak utility for iOS 9.0 to 9.0.2 with a fix for the manage storage bug and the latest version of Cydia. Change log V1.2.0 (2015-10-27) 1. Bundle latest Cydia with new Patcyh which fixed failure to open url scheme in MobileSafari 2. Fixed the bug that “preferences -> Storage&iCloud Usage -> […]

Apple Blocks Pangu Jailbreak Exploits With Release of iOS 9.1

Apple has blocked exploits used by the Pangu Jailbreak with the release of iOS 9.1. Pangu was able to jailbreak iOS 9.0 to 9.0.2; however, in Apple’s document on the security content of iOS 9.1, PanguTeam is credited with discovering two vulnerabilities that have been patched.

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.1.0

  Pangu has released an update to its jailbreak utility for iOS 9 that improves its reliability and success rate.   Change log V1.1.0 (2015-10-21) 1. Improve the success rate and reliability of jailbreak program for 64bit devices 2. Optimize backup process and improve jailbreak speed, and fix an issue that leads to fail to […]

Activator 1.9.6 Released With Support for iOS 9, 3D Touch

  Ryan Petrich has released Activator 1.9.6, an update to the centralized gesture, button, and shortcut manager, that brings support for iOS 9 and 3D Touch.

Copyright iHash.eu © 2023
We use cookies on this website. By using this site, you agree that we may store and access cookies on your device. Accept Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT