Three New Amazon Web Services (AWS) AI Technologies-- Lex, Polly and Rekognition

27 May 2019

Three New Amazon Web Services (AWS) AI Technologies-- Lex, Polly and Rekognition

Amazon offers three artificial intelligence services on Amazon Web Services (AWS); Lex, Polly and Rekognition. These new services give developers more tools to engage with customers. 

Technology advancements have made these services possible through a combination of better algorithms and broad access to massive amounts of data and cost-effective computing power.

Amazon offers three artificial intelligence services on Amazon Web Services (AWS)

Comparing Facebook, Microsoft, Amazon, and Google chatbots to get a read of where the industry is heading

07 May 2019

Comparing Facebook, Microsoft, Amazon, and Google chatbots to get a read of where the industry is heading

Siri and Alexa have now become household names in North America, Xiaoice has become a digital friend to million Chinese, and the term “chatbot” has been an overused buzzword for more than two years.

I'll take ca closer look at the chatbot roadmaps of Microsoft, Google, Facebook, and Amazon to explore following questions:

  • What are the potential business implications of conversational interfaces or “chatbots”?
  • What are the biggest announcements and initiatives of the “big 4” for conversational interfaces?
  • What does the state of the chatbot world today mean for business leaders across industries?
  • Why are these companies betting on this emerging technology?

Amazon’s AI philosophy is to make it easier for non-machine-learning experts to apply AI to solve business problems quickly and affordably.

The Future of Artificial intelligence and Cybersecurity

09 April 2019

The Future of Artificial intelligence and Cybersecurity

While security as a percentage of IT spend continues to grow at a robust rate, the cost of security breaches is growing even faster.

Organizations are spending close to $100 billion on a dizzying array of security products. In fact, it is not uncommon for CISO organizations to have 30 to 40 security products in their environment. However, if you ask chief information security officers how they feel about their security risk, they will express concerns over being highly exposed and vulnerable.

Artificial intelligence (AI) and machine learning (ML) can offer IT security professionals a way to enforce good cybersecurity practices and shrink the attack surface instead of constantly chasing after malicious activity.

Securing Your Wireless Broadband- 4 Recommendations

17 September 2018

Securing Your Wireless Broadband- 4 Recommendations

Wireless broadband internet is, perhaps, the most well-known form of broadband internet connection. Many cafes, restaurants, and offices make use of wireless broadband because it's easy to deploy with minimal cable installation.

This form of broadband, however, has been adapted for home use too. Wireless broadband owners must learn new, and sometimes technically tricky, wireless broadband internet security skills to keep their wireless broadband secured and out of reach from hackers.

Let's cover some important and easy security measures you can implement immediate to keep your wireless broadband safe and secure.

Learn easy tips to secure your wireless network.

Google Assistant Adds New Voices and a Colourful UX

29 August 2018

Google Assistant Adds New Voices and a Colourful UX

Google added 6 new voices to Google Assistant after Google I/O 2017 but the UX that came with it was functional but not elegant. This new UX will arrive for some markets in early-July 2018.

The new Google Assistant UX arrived for some markets in early-July 2018.

How does transit tunnel boring technology work?

12 August 2018

How does transit tunnel boring technology work?

A tunnel boring machine (TBM), also known as a "mole", is a machine used to excavate tunnels with a circular cross section through a variety of soil and rock strata. They may also be used for microtunneling. They can bore through anything from hard rock to sand.

Tunnel boring machines can operates 24 hours a day, 7 days a week. The advantage of this approach is that tunnelling takes place deep underground with minimal disruption to the ground above

Sophisticate tunnel boring technology makes subway construction under congested cities possible.

Kevin William Grant
Innovation Coach

Survival Tools, Techniques, and Strategies for Innovators and Entrepreneurs.

Connect
  • This email address is being protected from spambots. You need JavaScript enabled to view it.

Designed by  SmartAir Media
© Kevin William Grant