27 May 2019
Amazon offers three artificial intelligence services on Amazon Web Services (AWS); Lex, Polly and Rekognition. These new services give developers more tools to engage with customers.
Technology advancements have made these services possible through a combination of better algorithms and broad access to massive amounts of data and cost-effective computing power.
Amazon offers three artificial intelligence services on Amazon Web Services (AWS)
07 May 2019
Siri and Alexa have now become household names in North America, Xiaoice has become a digital friend to million Chinese, and the term “chatbot” has been an overused buzzword for more than two years.
I'll take ca closer look at the chatbot roadmaps of Microsoft, Google, Facebook, and Amazon to explore following questions:
- What are the potential business implications of conversational interfaces or “chatbots”?
- What are the biggest announcements and initiatives of the “big 4” for conversational interfaces?
- What does the state of the chatbot world today mean for business leaders across industries?
- Why are these companies betting on this emerging technology?
Amazon’s AI philosophy is to make it easier for non-machine-learning experts to apply AI to solve business problems quickly and affordably.
09 April 2019
While security as a percentage of IT spend continues to grow at a robust rate, the cost of security breaches is growing even faster.
Organizations are spending close to $100 billion on a dizzying array of security products. In fact, it is not uncommon for CISO organizations to have 30 to 40 security products in their environment. However, if you ask chief information security officers how they feel about their security risk, they will express concerns over being highly exposed and vulnerable.
Artificial intelligence (AI) and machine learning (ML) can offer IT security professionals a way to enforce good cybersecurity practices and shrink the attack surface instead of constantly chasing after malicious activity.
17 September 2018
Wireless broadband internet is, perhaps, the most well-known form of broadband internet connection. Many cafes, restaurants, and offices make use of wireless broadband because it's easy to deploy with minimal cable installation.
This form of broadband, however, has been adapted for home use too. Wireless broadband owners must learn new, and sometimes technically tricky, wireless broadband internet security skills to keep their wireless broadband secured and out of reach from hackers.
Let's cover some important and easy security measures you can implement immediate to keep your wireless broadband safe and secure.
Learn easy tips to secure your wireless network.
29 August 2018
Google added 6 new voices to Google Assistant after Google I/O 2017 but the UX that came with it was functional but not elegant. This new UX will arrive for some markets in early-July 2018.
The new Google Assistant UX arrived for some markets in early-July 2018.
12 August 2018
A tunnel boring machine (TBM), also known as a "mole", is a machine used to excavate tunnels with a circular cross section through a variety of soil and rock strata. They may also be used for microtunneling. They can bore through anything from hard rock to sand.
Tunnel boring machines can operates 24 hours a day, 7 days a week. The advantage of this approach is that tunnelling takes place deep underground with minimal disruption to the ground above
Sophisticate tunnel boring technology makes subway construction under congested cities possible.