AI Wizards for Troubleshooting and Solving Problems computationally and automatically with AIWEB Data IO Ninjaneers™
The history of Artificial Intelligence is long, but it’s only been recently that technology companies and markets have begun to get excited about it… Why? Because now it works.
After a few decades of exploration of symbolic AI methods, the field shifted toward statistical approaches, that have as of late started working in a broad array of tasks due to the explosion of data and computing power, this in turn has led to machine learning and, most importantly, enabled deep learning.
As the AI wave becomes transformational across end-markets from enterprise to consumer platforms, from cyber-security to robotics, the demand for data scientists is growing exponentially. The role of data scientists in this technology will assume a new level of importance and will evolve in a similar fashion to what we saw happen in the field of computer sciences with the development of computing.
AI technologies are creating a real need for data scientists with demand far ahead of the supply of qualified talent. In the long run, as AI advances to establish and analyze causation’s as well as correlations, software rather than humans will perform these analyses. And, data scientists – at least the successful ones – will evolve from their current roles to becoming machine learning experts or some other new category of expertise, yet to be given a name.
This is a story about just such a tale, we will be using the following abstract as the main premise of this discovery.
” In one aspect of the invention, a system for sharing resources in an ad-hoc peer-to-peer network is presented. The ad-hoc peer-to-peer network includes a host device that is associated with a resource. A security application of the host device allows the user of the host device to share the resource with other devices in the network. The security application also allows the user to establish access policies for certain known devices within the network. An access policy established for a known device specifies what rights the known device has with respect to accessing the resource. The access policy has the characteristics of inheritance. Thus, when a device requests to access the resource, the security application of the host device determines an access policy for the device based on access policies of one or more of the known devices.”
“Three Laws of Robotics”
1. A robot may not injure a human being or, through inaction, allow a human being to come to harm.
2. A robot must obey orders given it by human beings except where such orders would conflict with the First Law.
3. A robot must protect its own existence as long as such protection does not conflict with the First or Second Law.
APART and ASIDE:
Currently I am looking at adding post as contracts to the Blockchain and also, adding EthereumICO as an adopted funding. Also, applying an app that uses the Blockchain to stamp events, documents, payments, pictures, blog posts, comments on social media.
Lookin at smalls, for autonomous robot vehicles. Lookin at feeding lyrics to an algorithm, based on style and have it create a wave or mp3 file with some rhythm.
One of the best Sources of information for AI can be found on Siraj Raval’s Youtube Channel.
The entrepreneurial spirit isn’t just about money. It’s about building wealth through resources that only great relationships can bring. It’s about connecting the dots: those connection points of intelligence, wisdom, desire and ability that are innate to people. It’s about having the intuition not only to know that they exist but also to know what to do with them to continuously cultivate innovation and initiative.