Skip to content

Internet Salmagundi

  • Home
  • Computing & Technology
  • CyberSecurity
  • Climate
  • Weather | Snow | Utah
  • Web Resources
    • – Nielsen Norman Group articles

Tag: Artificial Intelligence

Artificial Intelligence (AI) is a broad term with no single authoritative definition — and frequently, people mean different things when they use it.

However, AI commonly means:

  1. The capability of a non-human system to perform functions typically thought of as requiring human intelligence.
  2. A field of study dedicated to developing these systems.

The term AI is often imprecise. AI is sometimes used interchangeably with machine learning, but the two terms are not identical. Machine learning is one promising set of techniques used to develop AI, but others exist. We disambiguate machine learning and AI more fully [see the link below].

AI is also a moving target. The “AI effect” is a paradox in which problems thought to require AI, once largely solved, are no longer seen as requiring “intelligence.” This dynamic further contributes to ambiguity around the definition of AI.
—CSET Glossary, “Artificial Intelligence”

Generally, [Artificial Intelligence] constitutes a fuzzy term referring to the ability of a machine to perform cognitive functions. Approaches to AI can be subdivided into deductive—that is, model-driven (such as expert systems)—or inductive—that is, data-driven.
—CACM, “There Is No AI Without Data“

pop-up alert stating 'That's totally not a virus, Don't tell your sysadmin' - Credit: Local_Doctor / Shutterstock
Articles / CyberSecurity

Hidden Malware Ratchets Up Cybersecurity Risks

What if cybercriminals could hide pernicious payloads in places where commercial cybersecurity software were unable to detect it? Unfortunately, this approach is both possible and increasingly viable.

Hidden Malware Ratchets Up Cybersecurity Risks Read More
numbered frames around the heads of indefinite figures, illustration - Credit: Varuna
Computing & Technology / Articles

The Troubling Future for Facial Recognition Software

There is promising, if somewhat slow, progress on making facial recognition software less biased.

The Troubling Future for Facial Recognition Software Read More
CMU Professor Jason Hong - Credit: Carnegie Mellon University
Computing & Technology / Articles

Modern Tech Can’t Shield Your Secret Identity

Superheroes worry about having their identities revealed, while the rest of us in the real world worry about surveillance technologies and how they can be easily abused.

Modern Tech Can’t Shield Your Secret Identity Read More
Trustworthy Autonomous Systems Hub logo on blue - Credit: UKRI TAS Hub
Computing & Technology / Articles

Trust, Regulation, and Human-in-the-Loop AI: within the European region

The E.U. is an early mover in the race to regulate AI, and with the draft E.U. AI Act, it has adopted an assurance-based regulatory environment using yet-to-be-defined AI assurance standards.

Trust, Regulation, and Human-in-the-Loop AI: within the European region Read More
digital twins concept - Ms Tech | Getty
Computing & Technology / Articles

How AI digital twins help weather the world’s supply chain nightmare

Just-in-time shipping is dead. Long live supply chains stress-tested with AI digital twins.

How AI digital twins help weather the world’s supply chain nightmare Read More
3D drone satellite view of Pentagon building Washington DC USA - Ms Tech | Getty
Computing & Technology / Articles

The Department of Defense is issuing AI ethics guidelines for tech contractors

The controversy over Project Maven shows the department has a serious trust problem. This is an attempt to fix that.

The Department of Defense is issuing AI ethics guidelines for tech contractors Read More
Logo - Defense Innovation Unit (DIU)
Computing & Technology / Articles

Responsible AI Guidelines

DIU launched a strategic initiative in March 2020 to implement the DoD’s Ethical Principles for Artificial Intelligence (AI) into its commercial prototyping and acquisition programs.

Responsible AI Guidelines Read More
Logo - U.S. Department of Defense
Computing & Technology / News & Information

DOD Adopts Ethical Principles for Artificial Intelligence

The U.S. Department of Defense officially adopted a series of ethical principles for the use of Artificial Intelligence today following recommendations provided to Secretary of Defense Dr. Mark T. Esper by the Defense Innovation Board last October.

DOD Adopts Ethical Principles for Artificial Intelligence Read More
Cover Image: Trillions of Questions, No Easy Answers
Computing & Technology / Articles / Books, Reports, Films & Images

Trillions of Questions, No Easy Answers: A (home) movie about how Google Search works

Watch our (home) movie: Trillions of Questions, No Easy Answers

Trillions of Questions, No Easy Answers: A (home) movie about how Google Search works Read More
woman stands under a cloud in an industrial landscape, illustration - Credit: Alberto Andrei Rosu, Shutterstock
Computing & Technology / Articles

There Is No AI Without Data

AI has not yet delivered on the promises in industry practice. The core business of industrial enterprises is not yet AI-enhanced.
We see a major need for future research regarding functional capabilities and realization technologies for an enterprise data marketplace.

There Is No AI Without Data Read More
abstract structure, illustration - Credit: Yurchanka Siarhei
Computing & Technology / Articles

Deep Learning for AI

We believe that deep networks excel because they exploit a particular form of compositionality in which features in one layer are combined in many different ways to create more abstract features in the next layer.
A key question for the future of AI is how do humans learn so much from observation alone?

Deep Learning for AI Read More
computation concept - Andrea Daquino
Computing & Technology / Articles

How AI is reinventing what computers are

Three key ways artificial intelligence is changing what it means to compute.

How AI is reinventing what computers are Read More
Aerial view of civilians walking around destroyed residential neighborhood in Borodianka Ukraine - Photograph: Anastasia Vlasova/Getty Images
Computing & Technology / Articles

The Race to Archive Social Posts That May Prove Russian War Crimes

Painstaking new techniques for archiving social media posts could provide crucial evidence in future prosecutions.

The Race to Archive Social Posts That May Prove Russian War Crimes Read More
Ukrainian soldier standing on top of a seized Russian military tank in the woods - Photograph: Metin Aktas/Getty Images
Computing & Technology / Articles

As Russia Plots Its Next Move, an AI Listens to the Chatter

With vast amounts of data becoming available to intelligence analysts, new tools will help them sift and interpret it all—but they will introduce new risks, too.

As Russia Plots Its Next Move, an AI Listens to the Chatter Read More
Cover - The Artificial Intelligence Database
Computing & Technology / Articles

The Artificial Intelligence Database

The Artificial Intelligence Database: Explore the technology like never before with [WIRED’s] new database, which collects all of our stories on artificial intelligence and filters them by sector, source data, end user, company, and more.

The Artificial Intelligence Database Read More
Computing & Technology / Articles

Non-Traditional Data Sources: Providing Insights into Sustainable Development

Here, we showcase regionally developed projects that explore the use of non-traditional data sources and AI to help measure progress toward the [Sustainable Development Goals].

Non-Traditional Data Sources: Providing Insights into Sustainable Development Read More
medical professional examines MRI - Getty Images
Articles / Computing & Technology

Deep Learning Speeds MRI Scans

Facebook, the Palo Alto, CA-based online social network, has teamed up with radiologists at New York University’s Langone Medical Center in Manhattan to develop an artificial intelligence (AI)-based imaging accelerator for MRI scanners.

Deep Learning Speeds MRI Scans Read More
Pictured in top row from left: Raphael Gontijo Lopes, Deborah Raji, Rediet Abebe. Second row: Joy Buolamwini. Third row from left: William Agnew, Timnit Gebru. - Ricardo Santos
Computing & Technology / Articles

Inside the fight to reclaim AI from Big Tech’s control

For years, Big Tech has set the global AI research agenda. Now, groups like Black in AI and Queer in AI are upending the field’s power dynamics to build AI that serves people.

Inside the fight to reclaim AI from Big Tech’s control Read More
figures interacting with technology and one another, illustration - Credit: Elenabsl / Shutterstock
Computing & Technology / Articles

Responsible AI: Bridging From Ethics to Practice

These recommendations are meant to increase reliability, safety, and trustworthiness while increasing the benefits of AI technologies.

Responsible AI: Bridging From Ethics to Practice Read More
Photo of Joaquin Quiñonero Candela by Winni Wintermeyer
Computing & Technology / Articles

How Facebook got addicted to spreading misinformation

The company’s AI algorithms gave it an insatiable habit for lies and hate speech. Now the man who built them can’t fix the problem. [Not because he doesn’t want to, but because he is not allowed to as it would get in the way of profits.]

How Facebook got addicted to spreading misinformation Read More

Posts navigation

1 2 3 Next

sal·ma·gun·di

(săl′mə-gŭn′dē)

n. pl. sal·ma·gun·dis 1. A salad of chopped meat, anchovies, eggs, and assorted fruits and vegetables, often arranged in rows on lettuce and served with vinegar and oil. 2. A mixture or assortment; a potpourri.

A salad of some of the things that interest me most.

About the name:

Salmagundi & Solomon Grundy »

Search

Featured Books »

Books of interest to Internet Salmagundi readers. (Yes, I have read each of these.)

Recent Posts

  • The Bold Plan to Create Cyber 311 Hotlines
  • The Underground History of Russia’s Most Ingenious Hacker Group
  • New Tool Shows if Your Car Might Be Tracking You, Selling Your Data
  • Are You Being Tracked by an AirTag? Here’s How to Check
  • Google Is Rolling Out Password-Killing Tech to All Accounts
  • Millions of PC Motherboards Were Sold With a Firmware Backdoor
  • Hidden Malware Ratchets Up Cybersecurity Risks
  • Spring Avalanche Conditions in Utah
  • These underwater cables can improve tsunami detection
  • Avalanches in Big & Little Cottonwood Canyon Early April 2023

Pages Displaying ALL Posts in a Category

  • Computing & Technology
  • Cybersecurity
  • Climate
  • Weather | Snow | Utah
  • Web Resources

Reference

•    Dictionaries, Glossaries and Other Resources
•    Glossary of Terms (Tag Terms)
•    Links

Categories (Number of Articles in each)

  • — Broad Topics (622)
    • Climate (19)
    • Computing & Technology (306)
    • CyberSecurity (225)
    • Web Resources (38)
      • – Nielsen Norman Group articles (15)
    • Weather | Snow | Utah (38)
      • – WSU Resources (9)
    • Street Art (3)
  • — Form Types (606)
    • Articles (514)
    • Books, Reports, Films & Images (65)
    • News & Information (29)
    • Organizations (4)
  • — General (1)

List of Major Tags

(Count of 5 or more articles, alpha-sorted.)
  • Artificial Intelligence (51)
  • Artificial Intelligence Research (6)
  • Avalanche Awesomeness (5)
  • Avalanche Control & Mitigation (5)
  • Avalanche Education (8)
  • Avalanche Photos (5)
  • Avalanche Safety (5)
  • Backcountry Travel & Safety (11)
  • Bellingcat (6)
  • China (26)
  • CISA (CyberSecurity & Infrastructure Security Agency) (5)
  • CISA Security Tip (10)
  • Classics (10)
  • Coding (10)
  • Computer Chip Manufacture (6)
  • Computer Crimes (5)
  • Computer Science Education (10)
  • Computer Security (17)
  • Coronavirus-Covid19 (14)
  • Cryptography (10)
  • CSS (6)
  • Cyber Crime (17)
  • CyberSecurity (10)
  • CyberSecurity News (5)
  • Cybersecurity Research and Development (6)
  • Cyber Warfare (15)
  • Deep Learning (DL) (5)
  • Disinformation (Coordinated Inauthentic Behavior) (13)
  • Encryption (7)
  • Espionage – Cyber (11)
  • Ethics (30)
  • Ethics of AI (18)
  • Facebook (15)
  • Facebook – Social Aspects (5)
  • Facial Recognition (5)
  • Fiber-optic Cable (7)
  • Geopolitics (9)
  • Google (Firm) (7)
  • Government Policy (11)
  • Government Regulation (11)
  • Guidance (17)
  • Hacker Culture (5)
  • Hackers & Hacking (31)
  • Hacking for Hire (9)
  • High Performance Computing (6)
  • Historical (8)
  • History – Computing (20)
  • History – Internet (15)
  • History – Silicon Valley (8)
  • How To (9)
  • HTML (5)
  • Human Psychology (6)
  • Internet – Government Policy (8)
  • Internet Access (6)
  • Internet Censorship (10)
  • Internet Connectivity (6)
  • Internet of Things (IoT) (5)
  • Internet Safety (6)
  • Internet Security (5)
  • Iran (6)
  • IT – Technological Innovation (15)
  • Law & Policy (6)
  • Machine Learning (12)
  • Malware (10)
  • Misinformation (5)
  • Mobile Device Security (5)
  • National Security (US) (15)
  • National Security Agency (5)
  • NNg-UX (14)
  • North Korea (9)
  • NSO (13)
  • Online Advertising (6)
  • Open Source Intelligence (OSINT) (13)
  • Opinion & Perspective (5)
  • Passwords (8)
  • Pegasus (7)
  • Popular Culture (5)
  • Privacy (28)
  • Privacy & Data Protection (8)
  • Privacy & Personal Information (10)
  • Propaganda (8)
  • Quantum Computing (5)
  • Ransomware (8)
  • Resources (6)
  • Russia (42)
  • Security (9)
  • Security Guidance (7)
  • Security Tips (6)
  • Series: WaPo – Behind the Firewall (6)
  • Social Control (7)
  • Social Interest (6)
  • Social Media (25)
  • Spyware (8)
  • Surveillance (5)
  • Surveillance – Electronic (12)
  • Surveillance – Mass (5)
  • Surveillance – Online (13)
  • Surveillance Capitalism (6)
  • Technological Achievement (8)
  • Technology & Politics (6)
  • Technology & Society (8)
  • Technology & War (5)
  • Technology Policy (7)
  • Ukraine (29)
  • Understanding Your World (6)
  • User eXperience (6)
  • Weather Phenomena (6)
  • Web Accessibility (5)
  • Web Design (8)
  • Web Development (5)
  • Web Usability (7)
  • Zero-Click / Interactionless Attacks (6)
  • Zero-Day Exploits (5)

Beyond Computing

D-Day and Clinton C. Gardner

LIST OF ALL TAGS BY CATEGORY »

Listing of all tags included in this site, segregated by categories.

About Internet Salmagundi

Internet Salmagundi  is a project of Wallace Web Design.

About Me – Contact Me
Site Policies

Copyright © 2020-23 Wallace Web Design, LLC

 

Featured Books

Book Cover - The Ransomware Hunting Team: A Band of Misfits’ Improbable Crusade to Save the World from Cybercrime
Book Cover - A Hacker's Mind: How the Powerful Bend Society’s Rules, and How to Bend them Back
Book Cover - A Biography of the Pixel
Book Cover - Steve Jobs
Book Cover - We Are Bellingcat: Global Crime, Online Sleuths, and the Bold Future of News
Book Cover - In the Plex: How Google Thinks, Works, and Shapes Our Lives
Book Cover - The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution
Book Cover - The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage
Book Cover - A New History of Modern Computing: How the computer became universal
Book Cover - Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
Book Cover - Hackers: Heroes of the Computer Revolution
Book Cover - Electronic Life: How to Think About Computers by Michael Crichton
Book Cover - We Have Root: Even More Advice from Schneier on Security
Book cover: Security Engineering: A Guide to Building Dependable Distributed Systems, 3rd Ed.
Book Cover - Facebook: The Inside Story by Steven Levy
Book Cover - Dark Mirror: Edward Snowden and the American Surveillance State
Book Cover - The Hacker and the State Cyber Attacks and the New Normal of Geopolitics
Book Cover - Tools and Weapons: The Promise and the Peril of the Digital Age
Book Cover - The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power
Book Cover - AI Superpowers: China, Silicon Valley, and the New World Order
Book Cover: Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous Hackers
Book Cover: Mindf*ck: Cambridge Analytica and the Plot to Break America
Book Cover- Permanent Record
Book Cover - The Perfect Weapon
Book Cover - Dawn of the Code War
Book Cover - Zucked
Book Cover - Click Here to Kill Everybody: Security and Survival in a Hyper-connected World by Bruce Schneier
Book Cover - Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World by Bruce Schneier
Book Cover - Beyond Fear: Thinking Sensibly about Security in an Uncertain World by Bruce Schneier
Book Cover - Secrets & Lies: Digital Security in a Networked World by Bruce Schneier
Copyright © 2020-2023 Wallace Web Design, LLC
Scroll to Top