Home Artificial Intelligence

Artificial Intelligence

Artificial intelligence is a part of computer science that aims to create an intelligent machine that works and react like human being. It has become an essential part of the technology companies and robotics industry.

Research associated with artificial intelligence is highly technical and specialized. Artificial intelligence can be categorized in a number of ways, but there are only two specific examples.

Weak AI

Weak AI, also known as narrow AI, is an AI system that is designed and educated for a particular task. Virtual or Personal Digital Assistants, such as Apple’s Siri, and Microsoft’s Cortana are a form of weak AI.

Strong AI

Strong AI, also known as artificial general intelligence, is an AI system with universal human cognitive abilities so that when presented with strange tasks, it has expert intelligence to find a solution. The Turing Test, developed by mathematician Alan Turing in 1950, is a method used to determine if a computer can actually think like a human, although the method is controversial.

At Logical IDEA you will learn AI including futuristic robots with artificial intelligence, machine learning of human intelligence and more.

Apple Face ID
First equal twins and now mask. Is iPhone X Face ID really not safe? Can iPhone X's Face ID get fooled by a face mask? All are questions raised. When a woman sets up her facial recognition as she looks at her Apple iPhone X at an Apple store in New York, U.S., November 3, 2017. From patterns and 4-digit...
Artificial Intelligence
Public insight of artificial intelligence technology, in 2017, seems to lie wherever at the connection of existential fear and vigilant optimism. Yet there’s a growing faction of people who believe AI is crucial to the evolution of our genus. These people aren’t outsiders or outliers — they’re actually directing do research on the cutting edge at companies like Google. Ray...
MongoDB Database
One the major security news stories of 2017 was of a ransomware alternative targeting improperly secured MongoDB Database instances. Here it is in a nutshell: some users of MongoDB by mistake left their databases bare to the internet without any authentication. Predictably, some online ne’er-do-wells determined to take advantage of this, stealing and deleting databases, before leaving a ransom note...
Intuit Capitals
Intuit, the company creators of products like QuickBooks and TurboTax, is triumph into the small business lending space. With QuickBooks Capital, QuickBooks users now get access to small business loans up to $35,000 for up to six months right from within their bookkeeping and accounting software. Its appeal stressing that Intuit is lending its own money here. This is not...
Wireless Security System
Security researcher Mathy Vanhoef shared serious wireless security system vulnerability in the WPA2 encryption protocol. Most devices and routers currently rely on WPA2 for encryption of your WiFi traffic, so probability are high you’re affected. But before any discussion, let’s clarify what an attacker can and cannot do using the KRACK Wi-Fi vulnerability. The attacker can seize some of the...
Pornhub
Have you ever heard about the poor souls that were tasked to watch and tag countless hours of Pornhub footage so, you could have a selection of options to select from when you Google your favorite fetish? You might want to know, that these hidden heroes are about to lose their spots to the AI (Artificial Intelligence) overlords. Pornhub has...
Artificial Intelligencevideo
That’s how does machine learning work? You’ve probably read an introduction or two on the subject, but frequently the best way to understand a thing is to try it out for yourself. Keep in mind; take a look out this little in-browser experiment from Google set Teachable Machine. It’s a perfect two-minute review of what a lot of modern...
Hacking Station
Browsing throughout the Reddit not so long before, my eyes immovable sight of an interesting project called SpyPi: An (un)ethical hacking station exclusively intended to educate people about the importance of data security by putting them in the shoes of the invader. What impressed me more even though was that, in spite of the difficulty and scope of the project,...
Best VPN
What is Great Firewall? Before travelling to China, one should know about the Great Firewall. It is used to filter and censor different websites. These websites may contain some politically sensitive content. Few restricted social media websites in China are YouTube, Facebook, Twitter, and Google. There are many other websites and app which are not allowed to operate in China....
Locky Ransomware
Security researchers are warning of a new 'Locky Ransomware' which is major crypto-ransomware campaign that has been attacked 20 million user inboxes so far. The threat, revealed in the second half of this week, arrives as other similar ransomware attacks do in the form of an unsolicited email. That email is itself spoofed to come from a legitimate source and the...

Most popular

Recent posts