• About
  • Archive
  • Contact
  • basefarm.com
Basefarm Blog
  • Big Data blog
  • Cloud blog
  • Security blog
  • DevOps blog
  • Menu

The varieties and opportunities of artificial intelligence

Artificial intelligence (AI) plays a fundamental role in a company’s future success. Its key technologies are being deployed all across the board. These are among the findings of a study we recently published together with Crisp Research and Hewlett Packard Enterprise (HPE). Now let’s look at the details and various facets of AI.

A quick update: According to the often-quoted study, almost two thirds of companies in Germany, Austria and Switzerland are actively concerning themselves with machine learning. One fifth have already implemented corresponding technologies into their processes, while the same proportion of companies are now investing resources in deep learning. 

What are the facets of AI and how do they differ from one another?

Depending on origin, perspective and processes, artificial intelligence systems can be categorized by the following terms: 

  • Machine learning
  • Deep learning
  • Cognitive computing

In order to separate these terms from one another, it is important to differentiate their dimensions: “clarity of purpose” and “degree of autonomy”. The majority of machine learning-based systems are now developed, trained and optimized for a specific task. An example is the recognition of defective products during quality control of a production process. These systems have a clearly defined purpose and little to no autonomy. 

Beyond that, deep learning-based systems enable independent learning. Suitable tasks include the recognition of objects in images or speech recognition during interaction with a smartphone, for example. This technology, which is based on the engineering of neural networks, now allows machines to understand much more than was previously possible. Simulated neurons (similar to those in the human brain) are modelled and arranged in many layers, one after the other. Each layer within the network carries out a small task, such as the recognition of edges, and the features are extracted here. The output of one individual layer serves as an input for the next layer. In combination with a large volume of high-quality training data, the network learns to complete certain tasks.

Humans do not have an insight into the layers of the network, and decisions are made solely by the trained machines. Therefore, deep learning-based systems have a higher degree of autonomy and offer a wide range of application possibilities. An initial, very successful example is in the area of medicine, where cancer cells can be detected in images significantly more quickly and efficiently than before. 

Cognitive computing is when corresponding systems take on certain tasks or make decisions to assist or to replace a human. Possible areas of application include insurance claim management, service hotlines or medical diagnostics.

Cognitive systems are characterized primarily by the taking on of certain “human” characteristics and the ability to deal with ambiguity and vagueness. The degree of autonomy these systems display can be very high – just think of cognitive systems in medicine that suggest a specific treatment, or implementation in national security to decide upon the preventative detention of a crime suspect. 

Real artificial intelligence ultimately denotes machines that possess complete, cognitive abilities and cannot be distinguished as a machine by humans. In the final development stage, these systems have achieved a very high degree of independence. They make their own decisions, determine strategies by themselves and decide on the way they learn and communicate. 

Achieving this level of autonomy is now the focus of many researchers, while companies and their use cases are still exploring other varieties of artificial intelligence.

You might also like

Artificial Intelligence as a Service – AI off the shelf

Future investment in artificial intelligence

Bitkom publishes AI position paper in partnership with *um

Share this entry
  • Share on Facebook
  • Share on Twitter
  • Share on Google+
  • Share on Pinterest
  • Share on Linkedin
  • Share by Mail

Big data consulting

Find undiscovered secrets in your data and on the web: intelligent algorithms provide you with unique knowledge about your customers and your business.

Read more

Data Thinking: A guide to success in the digital age

How to become a sovereign data enterprise – step by step.
Download the white paper here!

Recent Posts

  • 0-days in Microsoft exchange servers
  • Centreon IT monitoring software and Russian Sandworm hackers
  • Microsoft Windows Multiple Security Updates Affecting TCP/IP | CVE-2021-24074, CVE-2021-24094, and CVE-2021-24086
  • Don’t get caught in the cold with ransomware
  • CVE-2021-3156 | Heap-Based Buffer Overflow in Sudo
Subscribe via RSS

Recent Comments

  • kuncham on Oracle fixes vulnerabilities
  • Oracle Appications on Oracle Patch Update April 2013
  • Anudeep on How to install Logstash on Windows Server 2012 with Kibana in IIS.
  • Kumar on How to install Logstash on Windows Server 2012 with Kibana in IIS.
  • Øyvind Dyrnes on December 2 – Regularly download security updates and “patches”

Archive

  • 2021
  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011
© Copyright - Basefarm Security Blog
  • Facebook
  • Twitter
  • Instagram
  • Mail
BF-SIRT Newsletter 2017-16 BF-SIRT Newsletter 2017-17
Scroll to top