Why Amazon Alexa (and other voice assistants) aren’t making money

Amazon's $10-billion loss Alexa is a reminder of the gap between creating an impressive technology and building a business around it.

Democratizing the hardware side of large language models

Cerebras CEO Andrew Feldman discusses the hardware challenges of LLMs and his vision to reduce the costs and complexity of training and running large neural networks.

A gentle introduction to model-free and model-based reinforcement learning

Neuroscientist Daeyeol Lee discusses different modes of reinforcement learning in humans and animals, AI and natural intelligence, and future directions of research.

DataRobot’s vision to democratize machine learning with no-code AI

Nenshad Bardoliwalla, chief product officer at DataRobot, discusses challenges machine learning in different sectors and how no-code platforms are helping democratize AI.

Tribit MoveBuds H1: Arguably the best earbuds for intense workouts

Image source: 123RF (with modifications) In today’s market where one can find dozens of earbuds...

What is Google’s generative AI strategy?

In this week’s AI@ ’22 conference, Google showed a glimpse of its roadmap for leveraging generative models in its products.

7 ways to promote creative liberty in the workplace

By Luke Fitzpatrick Image source: 123RF Businesses always look for new ways...

The truth about the AI alphabet soup (ANI, AGI, ASI)

AI is not three things. AI is one thing: a singular and unprecedented goal to recreate intelligence ex nihilo. However, this goal is permanently misaligned with business.

The power of wide transformers models

Switching transformer models from deep to wide architecture results in significant improvements in speed, memory, and interpretability.

Multi-factor authentication fatigue attacks: How to shield your users?

The rising instances of compromised credentials and weak passwords have pushed organizations to incorporate multi-factor authentication (MFA) into their platforms, adding extra security layers. However, over a few years, cybercriminals have found loopholes in the current MFA security practices for exploiting customer information and sensitive business details. And one of the most prominent threats to MFA is the MFA fatigue attack. This article hightlights the aspects of MFA fatigue attacks and helpful measures to ensure robust authentication security.

7 ways to promote creative liberty in the workplace

By Luke Fitzpatrick Image source: 123RF Businesses always look for new ways...

Multi-factor authentication fatigue attacks: How to shield your users?

The rising instances of compromised credentials and weak passwords have pushed organizations to incorporate multi-factor authentication (MFA) into their platforms, adding extra security layers. However, over a few years, cybercriminals have found loopholes in the current MFA security practices for exploiting customer information and sensitive business details. And one of the most prominent threats to MFA is the MFA fatigue attack. This article hightlights the aspects of MFA fatigue attacks and helpful measures to ensure robust authentication security.

An introduction to different types of SSL certificates

The thrill and excitement of starting your new venture can shake your focus on the most pivotal aspect of your site, i.e., site security. Site security is essential to keep cyber-criminals away from your website.