Artificial Intelligence - People normally think of a robot when AI is mentioned. But it is not the physical appearance of an operation that should trigger attention. Attention is warranted on the hidden aspect which is the process that drives AI, i.e., rules, algorithms, software, etc. The rule that are utilized together create a process where either question can be answered, devices are made to begin operation, or even medical diagnosis can be drawn. AI can learn from itself as inputs of results are noted and assessed form continuous improvement. AI is just not all about robots, but could as well regard bots. Bots can be terms the soft side of AI. One can say that AI is a composition of processes driven by knowledge that can be continuously learned beyond what was initially programmed. The challenge for startups and established business and even for government institutions, is to how to learn the use of AI, and use it ethically.
Big Data - The term is used to describe multiple sourced data accumulation and multiple purpose use data. The former construes the immense obligation to manage what is received and the latter construes the ethics and means of how to use the data. The data can be telling of many things such as customer choices, consumer trends, investment trends, allocation of taxes, misallocation of revenues, frequency of transactions, trends in transactions, inventory adjustments, supply chain trends among vendors, employee computer use, employee attendance and productivity, national grading trends, and the list of uses continues on; it seems endless. What also makes it “big” is the multiple sources for the data. An individual’s everyday life creates data. Data is created by mobile use, web searches, buying gasoline or coffee, checking out a book at the local library, social media communications, forum memberships, newsletter interactions, and again, the list of sources continues.
Malware – The occurrence of intrusions increasingly use malware where this type of software is coded to find vulnerabilities in a target system or network. Gaining access is the initial goal of the malware, which then heightens the importance of personnel training to recognize suspicious emails and links. There are a variety of malware types and they are commonly known as spyware to monitor and steal information, keylogger to trace character strokes on the keyboard, viruses to cease computing operations, worms seeking information inherent in the system, or ransomware seeking extort money by seizure of the computer operation. The carrier of the malware could deceptively be embedded in advertising (adware). Some malware attacks the operation system of the computer or network making the victim take certain predictable steps or forced steps that open the victim up to more harm. The controversial issue for client is if they had proper cyber liability insurance that would cover the cyber incident.
Lorenzo Law Firm is “Working to Protect your Business, Ideas, and Property on the Web." Copyright 2017, all rights reserved Lorenzo Law Firm, P.A.