Page 2,735«..1020..2,7342,7352,7362,737..2,7402,750..»

FTSE 100 posts best week in over a month as economy strengthens – Reuters UK

People walk through the lobby of the London Stock Exchange in London, Britain August 25, 2015. REUTERS/Suzanne Plunkett/File photo

London's FTSE 100 index ended higher on Friday, helped by gains in mining and financial stocks, while a record annual jump in domestic economic output in April strengthened views of a stronger recovery from last year's pandemic-driven disruption.

The blue-chip index (.FTSE) rose 0.7%, with precious metal miners (.FTNMX551030) and base metal miners (.FTNMX551020) jumping 0.7% and 1.8%, respectively, while insurance stocks (.FTNMX303010) rose 1.3%.

The index was up 0.95% for the week, its biggest percentage gain since the week ending May 7.

Miners including Rio Tinto (RIO.L), Anglo American (AAL.L), Glencore (GLEN.L) and BHP (BHPB.L) rose between 0.1% and 2.88%.

"The metal price is back above $1,900 per ounce and if it can maintain its recent momentum, traders may start to eye last year's record highs," said Russ Mould, director at AJ Bell.

The domestically focused mid-cap FTSE 250 index (.FTMC) advanced 0.6%.

Official data showed Britain's recovery from the COVID-19 pandemic sped up in April as lockdown measures eased, and output was a record 27.6% higher than a year earlier when the virus was rampant. read more

"Its all very positive and markets are looking to continue to build on it. We were expecting the central banks to make a move against the inflation, but they doesn't seem to have done that yet and with lower rates, easing of restrictions and more good news coming, sentiments are up at the moment," said Michael Baker, an analyst at ETX Capital.

British indexes have gained more than 10% so far this year as businesses reopened and speedy vaccine rollouts boosted sentiment about economic recovery.

However, they have traded in a tight range since mid-April on fears of rising inflation and concerns that a recent resurgence in domestic COVID-19 cases might delay a complete economic reopening.

Among other stocks, Sanne Group (SNNS.L) jumped 8.8% as it decided to enter into talks with Cinven after the private equity firm made a sweetened offer of 1.42 billion pounds ($2.01 billion) to buy the asset management services provider.

Robert Walters (RWA.L) added 1.7% after it forecast upbeat annual pre-tax profit.

Our Standards: The Thomson Reuters Trust Principles.

More:

FTSE 100 posts best week in over a month as economy strengthens - Reuters UK

Read More..

Rs 12,500 crore of microfinance loans outstanding in Assam – EastMojo

Guwahati: Altogether Rs 12,500 crore of microfinance loans, comprising both principal and interest, are outstanding in Assam till March 31 last, minister Ashok Singhal said on Friday.

Twenty-six lakh customers with 45 lakh bank accounts have taken loans from 40 lenders, Singhal said at a press conference here.

Singhal said that 53 per cent of the outstanding amount of Rs 12,500 crore was lent by banks, 22 per cent by Non-Banking Finance Companies (NBFCs) and microfinance institutions, 26 per cent by small finance banks and 16 per cent by regular NBFCs.

The irrigation and urban development minister is heading a committee formed to assess the financial situation for fulfilling the BJPs election promise for waiving microfinance loans.

Chief Minister Himanta Biswa Sarma had decided to set up the panel in the first cabinet meeting on May 11 with Singhal as the chairman and principal secretaries of the finance and panchayat and rural development departments as members.

Also Read | Bhutan ensures irrigation water for Assam farmers

The chief minister had directed us to prepare a package to provide relief to maximum poor women who had taken loans and are facing immense miseries, Singhal said.

The committee has held three rounds of meetings with the stakeholders that include banks, NBFCs, small cooperatives, microfinance institutions and the RBI.

We had asked for the data which they provided but we realised that more data mining was required and it will be soon provided by the stakeholders. The discussions will continue and we expect to resolve the issue at the earliest, he said.

Certain criterion has to be followed according to RBI guidelines while giving loans to the borrowers but it is certain that norms have been flouted which has created problems for poor women borrowers, he said.

The basic norms to be followed is that a woman cannot be a member of more than one Self Help Groups (SHGs) and not more than two NBFCs should lend to the same borrower.

According to the data made available, 19.10 lakh customers have borrowed from one lender, 5.08 lakh from two lenders, 1.54 lakh from three lenders and 60,000 from more than three lenders.

The minister said that action will be taken against the lenders who have flouted norms within the legal framework as most of the women who had taken loans are not educated and are not aware of the terms and conditions.

He said that discussions are going on the relief provisions and only those loans will be considered which were taken before December 31, 2020.

He said those with a family income of Rs one lakh, paying income tax, owning four-wheelers or any other such guidelines set by the RBI will not be considered for the waiver of loans.

Visit link:

Rs 12,500 crore of microfinance loans outstanding in Assam - EastMojo

Read More..

Aerospace Coatings Market Covers, Future Trends, Past, Present Data and Deep Analysis 2021 IHI Ionbond AG, PPG Industries, Inc., Sherwin-Williams …

The Global Aerospace Coatings Market size valued to USD 1.90 billion in 2019, and it is anticipated to project an elevation of USD 3.42 billion by 2030, growing with a CAGR of 5.4% from 2020-2030.

The global aerospace coatings market held a volumetric sale of 598.5 kilotons in 2019 that is expected to level-up up-to 1,137.3 kilotons by 2030, with a CAGR of 5.9% from 2020-2030. Aerospace coatings offer high protection shield against extreme temperature ranges, intense ultraviolet exposure, and erosion from air drag, corrosion due to humidity and helps in deflecting the impact of high velocity dust particles. Reducing weight of the aircrafts, it helps resist cracking due to fluctuating air pressures as well as contact with aggressive fluids.

Access Full Description of this report at:-

https://www.nextmsc.com/report/aerospace-coating-market

Top Companies: IHI Ionbond AG, PPG Industries, Inc., Sherwin-Williams, AkzoNobel N.V, Zircotec Ltd, LORD Corporation, Saint-Gobain S.A, Hentzen Coatings, Inc., Henkel Corporation, Axalta Coating Systems Ltd, Mapaero, Zircotec Ltd., BryCoat Inc., AHC Oberflchentechnik, BASF SE, NV Specialty Coatings and others.

The aerospace coatings market share analysis is based on resin type, technology, user type, application, end use industry, and geography. Based on type of resin, the market is segmented into epoxy, polyurethane, and others. The others segment further sub segmented into silicone, polyester, and acrylic. Based on technology, the market covers solvent based coatings, water-based coatings, and powder coating. Based on user type, the market is classified into original equipment manufacturer (OEM) and maintenance, repair & overhaul (MRO). Based on end use industry, the aerospace coatings market is divided into commercial aviation, military aviation, and general aviation. Based on application, the market is sub segmented into exterior and interior. Geographic breakdown and analysis of each of the previously mentioned segments include regions comprising North America, Europe, Asia-Pacific, and RoW.

Request sample copy of this report at:-

https://www.nextmsc.com/Aerospace-Coating-Market/request-sample

North America region dominated the global aerospace coatings market in past, and it is anticipated to hold the highest market share during the forecast period. This is attributable to the factors such as thriving aerospace industry, high R&D investments, and technological advancements. The Asia-Pacific region holds the second largest market share in the global aerospace coatings market, and it is expected to grow at the highest CAGR. This is attributable to major investments by the developing countries to develop new air routes, upgradation of existing airports, developing long-haul airline routes as well as increased air defense budget of developing countries majorly India and China.

About Next Move Strategy Consulting:

Next Move Strategy Consulting is an independent and trusted third-platform market intelligence provider, committed to deliver high quality, market research reports that help multinational companies to triumph over their competitions and increase industry footprint by capturing greater market share. Our research model is a unique collaboration of primary research, secondary research, data mining and data analytics.

We have been servicing over 1000 customers globally that includes 90% of the Fortune 500 companies over a decade. Our analysts are constantly tracking various high growth markets and identifying hidden opportunities in each sector or the industry. We provide one of the industrys best quality syndicate as well as custom research reports across 10 different industry verticals. We are committed to deliver high quality research solutions in accordance to your business needs. Our industry standard delivery solution that ranges from the pre consultation to after-sales services, provide an excellent client experience and ensure right strategic decision making for businesses.

For more insights, please visit,https://www.nextmsc.com

Originally posted here:

Aerospace Coatings Market Covers, Future Trends, Past, Present Data and Deep Analysis 2021 IHI Ionbond AG, PPG Industries, Inc., Sherwin-Williams ...

Read More..

Is Artificial Intelligence (AI) prone to threats by which it can be hacked? – EC-Council Blog

Reading Time: 5 minutes

Artificial Intelligence (AI) is changing how businesses used to work which is due to the high adoption of the technology in retail, financial, and technology industries. Business is advocating their efficiency and production rate increasing with artificial intelligence. Executives of organizations see artificial intelligence investment as a product with a high return on investment to the organization. Artificial intelligence is proving itself to be the backbone supporting the economic investments of the country.

In cybersecurity, Artificial Intelligence is the forefront fighter in the battle of saving organizations against hackers. According to MarketsAndMarkets report, artificial intelligence is projected to be a 38.2 billion USD industry by 2026. The prominent market value projection of artificial intelligence in cybersecurity paints a great picture. Yet artificial intelligence is like a double edge sword where hackers trying to gain access to your intelligent AI devices could cause more damage to your organization than the benefits you would have thought of getting from AI. Let us find out in this blog whether Artificial intelligence is threat proof from hackers or not.

Artificial intelligence is the branch of study which focuses on the question if a machine can think? Artificial intelligence tries to develop the capability of a machine to perform and think like a human. Machine are trained to make decisions like a human. This is done to shift the workload from human to machine, thus making peoples lives easier. The low prices of chipset and increase in computing speed of computer have made it possible for a man to have to talk back machine chatbox to self-driving car etc. in the world for an affordable price of the general public. According to finacesonline.com report, around 54% of organizations and leaders think AI tools play a significant role in boosting productivity in the organization. Artificial intelligence is changing industries into the smart industry.

Today every industry is adopting artificial intelligence at a very high rate. Artificial Intelligence is bringing the workload of workers and helping organizations increase productivity with the machine. Some of the applications of AI in the market are:

The sophistication of Artificial intelligence makes it the best technology helping organizations further their goals and ambitions. Yet, suppose the Artificial Intelligence technology installed in an organization is hacked. In that case, this could be hazardous and detrimental to the company and incur loss rather than profit. It is effortless to hack an AI machine by altering the dataset and confusing the machine to predict the wrong object instead of the real object. This might not sound so dangerous, but it is enough to cause disruptive incidents and cause loss of property and lives.

A self-autonomous car dataset being hacked could result in the car unable to identify the green signal from red; it could cause the vehicle to move into the oncoming traffic and cause accidents. The autonomous missiles misidentifying the friendly target for the real target could be disastrous. The security camera fed with the wrong database could mislead face detection to allow access to unauthorized persons in critical places like airports, border checks, etc. The severity of artificial intelligence being hacked create a dilemma in the use of the system. Companies need to invest in robust Artificial intelligence security at a similar pace as the speed of adoption of AI technology. A safe and secure environment for artificial intelligence is actively looked into by governments and organizations.

Its not only cybersecurity specialists using Artificial Intelligence to defend against ethical hacking, but hackers are also using artificial intelligence to conduct dangerous attacks. The robustness in artificial intelligence security is not of primary focus for organizations, as is the adoption of AI. This is a mistake, and there needs to be more focus on the secure and safe adoption of Artificial Intelligence to safeguard ourselves against hackers. Organizations and governments need to focus more on the security aspect of artificial intelligence technology and have a dedicated team of ethical hackers to strengthen their autonomous system and protect it from hackers malicious intent. Ethical hackers are trained cybersecurity experts well-versed in protecting AI technology, computer system, and networks against hackers.

For security enthusiasts reading the blog, to become an Ethical Hacker, EC-Councils Certified Ethical Hacker (CEH) certification is one the best certificates identified by industry leaders and governments worldwide. It is developed by security experts and designed to impart knowledge of becoming an Ethical hacker.

Become a Certified Ethical Hacker Today!

Do hackers use artificial intelligence?

Read more: Artificial Intelligence as Security Solution and Weaponization by Hackers

Will Artificial Intelligence stop hackers?

Read more: The Role of Artificial Intelligence in Ethical Hacking

Original post:

Is Artificial Intelligence (AI) prone to threats by which it can be hacked? - EC-Council Blog

Read More..

Jeep Bets Detroit’s First New Plant in 30 Years Will Address Decades of Customer Complaints – Newsweek

It all started with a single question: "How do we do this better?" From there, Stellantis, then Fiat Chrysler Automobiles (FCA), put the people and plans into place to change the quality of their products for the better.

Initial product quality has been an issue across the board for companies that were formerly under the FCA umbrella (Alfa Romeo, Chrysler, Dodge, Fiat, Jeep, Maserati, and Ram) for years. Dodge made news last year when they tied with Kia for the top spot in the 2020 J.D. Power Initial Quality Study. It was the first time in 34 years that an American automaker had lead the pack.

That study details the problems encountered by owners of current model year vehicles during the first 90 days of ownership. "Owners of Jeep, and Stellantis brands in general, have historically reported more initial quality problems than the average," said Dave Sargent, vice president of automotive quality, J.D. Power.

Stellantis's Mack Plant was idled in 2012 and due for a makeover. As product plans were solidified, Jeep chose the next-generation Grand Cherokee to be the model that would christen the new facility, which lies adjacent to the company's Jefferson Plant on Detroit's north side, together forming the Detroit Assembly Complex.

The Mack Plant site has been an automotive industry manufacturing facility since 1916. Its rise and fall over the last century mirrors the story of Detroit itself. The current iteration is a combination of an overhauled assembly building that was built in the 1990s and new facilities that were constructed as part of a $1.6 billion investment announced in 2019. It is the first new assembly plant built in Detroit in 30 years.

Construction on the new facility began in the second quarter of 2019. It was swift, with completion occurring less than two years later. The three million square feet of floor space sit as part of the larger 266-acre site, which houses the company's Jeep Grand Cherokee L and forthcoming Grand Cherokee Base and 4xe Body Shop, Paint Shop, and General Assembly facilities.

Typical vehicle development follows a series of stages from conceptualization to approval to manufacturing to launch. Jeep's Grand Cherokee L team pulled in the manufacturing team early, a full six months before they typically would, in an effort to put vehicle quality in the spotlight.

Part of that process was having a hand in the design of the company's new Mack Plant layout. Jeep wasn't retrofitting a plant as an automaker typically would with the introduction of a generational redesign. They were starting from a metal and concrete shell, allowing them to fully customize the manufacturing process.

Automotive product planners, engineers, and designers typically work within a pyramid style of reporting with management at the top. Tom Seel, vehicle line executive for the Jeep Grand Cherokee L, explained that for the new generation SUV and the Mack Plant, Jeep flipped the formula on its head, putting the customer first.

Supporting that critical mission are the over 4,900 workers at Mack. Focusing on the customer means crafting an empowered workforce that personally felt responsible for the quality of the product that was on the line. Because the plant and most of its staff were new to the company, Jeep's team has the opportunity to create culture, not just seek to modify it. They want employees to take ownership in the vehicles rolling off the line and have pride in them. "It was an opportunity to set a new precedent," said Mario Holmes, model responsible, Jeep Grand Cherokee L, "This is their car."

This triggered a fundamental change in the approach to the manufacturing process. The company pulled experienced workers from other plants and put them in charge. They hired a workforce that has been slowly completing the on-boarding and training process. First shift was started last summer and second and third shifts began work in March and April, respectively.

Mack Plant staff encourage their workers to not allow anything that isn't perfect to pass. As a reminder of that commitment, signs hang at nearly every station on the plant floor reading "Build no defect. Accept no defect. Ship no defect."

If a worker sees a defect, they're responsible for pulling the andon handle, which halts the production line. The goal is to identify the problem, find out what can be done, and address it then and there rather than waiting for the vehicle to come off the line, go the dealer, be sold, and then be recalled. That formula looks to save time and money for customers, dealers, and Jeep.

Additionally, instead of waiting until the end of production for each vehicle to be tested, workers test them at three separate points, allowing any issues to be caught early on in the production process rather than at the end of the line or when the model reaches a dealership.

There are new tests on each Grand Cherokee L that aren't undertaken on the current generation Grand Cherokee - Buzz, Squeak, and Rattle (BSR) and the Nine Position Water Test. BSR testing allows plant workers to take the vehicle through a series of 11 simulated obstacles (pot holes, manhole covers, rumble strips, cobblestones, speed bumps, and gravel among them) to see if vehicle components fail at any point.

The Nine Position Water Test simulates a variety of terrain including hills and inclines, and weather conditions. Each vehicle goes through these tests, and a series of others. Any that don't pass all criteria are pulled for further inspection and not allowed to proceed to shipping until the issue has been resolved.

These tests are new to the plant as part of the company's redo. BSR testing is only done at one other U.S.-based Stellantis plant - Sterling Heights Assembly, home of the Ram 1500. The water test is similarly unique, only being conducted elsewhere at the Toledo Assembly Complex where the Jeep Wrangler and Gladiator are built.

There is a sense of urgency about the quality of the whole operation. Mack Plant managers huddle at 6 a.m. each morning to discuss downtime and lost time, and try to solve problems rather than wait for a weekly or monthly meeting.

Mechanical engineers have been moved to the plant floor, working at the site where the vehicle they're responsible for is produced, creating a more cohesive partnership from design to manufacturing where teams can work together while being hands-on with the product, meet with the employees who assemble it, and the interact with the supplies that are being delivered.

Data mining is also playing a critical part in the manufacturing quality control process. Jeep contracted with an outside vendor to create My Customer Voice, a data mining system that analyzes repair information sent by dealerships and pushes identifiable trend patterns to managers that are on the production line at Mack Plant. The effort aims to answer questions about installation problems, supplier part defects, and design flaws as soon as possible.

In 2020, J.D. Power reported that, for the first time in 15 years of survey tracking, Jeep performed better than average in initial quality tests, but that score was greatly impacted by the removal of problematic models from the company's lineup. Sargent notes that over the next few years, Jeep will be "introducing multiple significant new products", something that would be a challenge for any automaker and will be a "good test of the progress that the company has made."

The rest is here:

Jeep Bets Detroit's First New Plant in 30 Years Will Address Decades of Customer Complaints - Newsweek

Read More..

Computer science to count as core credit in high schools; What led to the change? – KSNT News

TOPEKA (KSNT) High school students in Kansas will now be able to swap a computer science course for a core math or science class. The state school board voted to pass the proposal on Tuesday.

As technology advances, advocates of the measure said the workforce is also changing, prompting a much-needed change in what students are taught.

Being 25, and Im entering the workforce, and I know now what I would have liked to learn in high school, Sierra Bonn said.

Bonn, who holds the title of Miss Southwest Kansas 2020 and is a passionate technology advocate, spearheads her own non-profit organization, known as Lets go full STEAM ahead.

The organization encourages young women to pursue careers in the fields of science, math and technology. Its something that Bonn had a hard time pursuing herself, with a lack of guidance to help push her forward after graduating high school.

I didnt end up taking a computer science class until my sophomore year of college. I actually ended up failing that class because I had no background knowledge, she said.

Bonn said having computer skills would have made a big difference as she navigates a career in engineering.

Now, some high schoolers across the state wont have to be stuck in the same position. The state school boards decision allows students to prepare for computer science courses early on. An issue some school board members, like State Board of Education Chair Jim Porter, said was hard to address before.

We are so far behind in meeting the needs of businesses, industry, and students when it comes to computer education, Porter said.

Before the decision, Kansas was one of two states Porter agreed with arguments that Kansas was one of only two states that didnt provide the option to have computer science as a core class, as opposed to an elective.

Porter agreed with advocates, who believe that this would help students get ahead of the competition when looking for jobs or pursuing their future career goals. However, some board members opposed the measure, arguing that there are better solutions to solving that problem.

What we need is a broad range of computer education courses in all 286 districts, so we need more trained teachers, robotics clubs, girls who code clubs, said board member Ann Mah.

After the State Boards vote, local school boards can substitute one unit of computer science for either one unit of science or math as long as the student meets the math and science concepts required in regulations and the school district allows it.

Kansas graduation requirements include a minimum of 21 units of credit, including four English language arts units; three history, government and social studies units; three math units; three science units; one physical education unit; one unit of fine arts; and six units of elective courses.

According to the State Board of Education, the approval of the recommendation doesnt change the minimum 21 credits required for graduation, and it doesnt make computer science a required course for graduation. It does, however, put an emphasis on the importance of computer science and increases the flexibility for students, counselors and administrators to count computer science as a core credit.

Originally posted here:

Computer science to count as core credit in high schools; What led to the change? - KSNT News

Read More..

Cybersecurity threats arise when AI is taught to lie – Popular Science

Priyanka Ranade is a PhD Student in Computer Science and Electrical Engineering at the University of Maryland, Baltimore County. Anupam Joshi is a professor of Computer Science & Electrical Engineering at the University of Maryland, Baltimore County. Tim Finin is a professor of Computer Science and Electrical Engineering at the University of Maryland, Baltimore County. This story originally featured on The Conversation.

If you use such social media websites as Facebook and Twitter, you may have come across posts flagged with warnings about misinformation. So far, most misinformationflagged and unflaggedhas been aimed at the general public. Imagine the possibility of misinformationinformation that is false or misleadingin scientific and technical fields like cybersecurity, public safety and medicine.

There is growing concern about misinformation spreading in these critical fields as a result of common biases and practices in publishing scientific literature, even in peer-reviewed research papers. As a graduate student and as faculty members doing research in cybersecurity, we studied a new avenue of misinformation in the scientific community. We found that its possible for artificial intelligence systems to generate false information in critical fields like medicine and defense that is convincing enough to fool experts.

General misinformation often aims to tarnish the reputation of companies or public figures. Misinformation within communities of expertise has the potential for scary outcomes such as delivering incorrect medical advice to doctors and patients. This could put lives at risk.

To test this threat, we studied the impacts of spreading misinformation in the cybersecurity and medical communities. We used artificial intelligence models dubbed transformers to generate false cybersecurity news and COVID-19 medical studies and presented the cybersecurity misinformation to cybersecurity experts for testing. We found that transformer-generated misinformation was able to fool cybersecurity experts.

Much of the technology used to identify and manage misinformation is powered by artificial intelligence. AI allows computer scientists to fact-check large amounts of misinformation quickly, given that theres too much for people to detect without the help of technology. Although AI helps people detect misinformation, it has ironically also been used to produce misinformation in recent years.

Transformers, like BERT from Google and GPT from OpenAI, use natural language processing to understand text and produce translations, summaries, and interpretations. They have been used in such tasks as storytelling and answering questions, pushing the boundaries of machines displaying humanlike capabilities in generating text.

Transformers have aided Google and other technology companies by improving their search engines and have helped the general public in combating such common problems as battling writers block.

Transformers can also be used for malevolent purposes. Social networks like Facebook and Twitter have already faced the challenges of AI-generated fake news across platforms.

Our research shows that transformers also pose a misinformation threat in medicine and cybersecurity. To illustrate how serious this is, we fine-tuned the GPT-2 transformer model on open online sources discussing cybersecurity vulnerabilities and attack information. A cybersecurity vulnerability is the weakness of a computer system, and a cybersecurity attack is an act that exploits a vulnerability. For example, if a vulnerability is a weak Facebook password, an attack exploiting it would be a hacker figuring out your password and breaking into your account.

We then seeded the model with the sentence or phrase of an actual cyberthreat intelligence sample and had it generate the rest of the threat description. We presented this generated description to cyberthreat hunters, who sift through lots of information about cybersecurity threats. These professionals read the threat descriptions to identify potential attacks and adjust the defenses of their systems.

We were surprised by the results. The cybersecurity misinformation examples we generated were able to fool cyberthreat hunters, who are knowledgeable about all kinds of cybersecurity attacks and vulnerabilities. Imagine this scenario with a crucial piece of cyberthreat intelligence that involves the airline industry, which we generated in our study.

This misleading piece of information contains incorrect information concerning cyberattacks on airlines with sensitive real-time flight data. This false information could keep cyber analysts from addressing legitimate vulnerabilities in their systems by shifting their attention to fake software bugs. If a cyber analyst acts on the fake information in a real-world scenario, the airline in question could have faced a serious attack that exploits a real, unaddressed vulnerability.

A similar transformer-based model can generate information in the medical domain and potentially fool medical experts. During the COVID-19 pandemic, preprints of research papers that have not yet undergone a rigorous review are constantly being uploaded to such sites as medrXiv. They are not only being described in the press but are being used to make public health decisions. Consider the following, which is not real but generated by our model after minimal fine-tuning of the default GPT-2 on some COVID-19-related papers.

The model was able to generate complete sentences and form an abstract allegedly describing the side effects of COVID-19 vaccinations and the experiments that were conducted. This is troubling both for medical researchers, who consistently rely on accurate information to make informed decisions, and for members of the general public, who often rely on public news to learn about critical health information. If accepted as accurate, this kind of misinformation could put lives at risk by misdirecting the efforts of scientists conducting biomedical research.

Although examples like these from our study can be fact-checked, transformer-generated misinformation hinders such industries as health care and cybersecurity in adopting AI to help with information overload. For example, automated systems are being developed to extract data from cyberthreat intelligence that is then used to inform and train automated systems to recognize possible attacks. If these automated systems process such false cybersecurity text, they will be less effective at detecting true threats.

We believe the result could be an arms race as people spreading misinformation develop better ways to create false information in response to effective ways to recognize it.

Cybersecurity researchers continuously study ways to detect misinformation in different domains. Understanding how to automatically generate misinformation helps in understanding how to recognize it. For example, automatically generated information often has subtle grammatical mistakes that systems can be trained to detect. Systems can also cross-correlate information from multiple sources and identify claims lacking substantial support from other sources.

Ultimately, everyone should be more vigilant about what information is trustworthy and be aware that hackers exploit peoples credulity, especially if the information is not from reputable news sources or published scientific work.

See original here:

Cybersecurity threats arise when AI is taught to lie - Popular Science

Read More..

QS ranks MIT the world’s No. 1 university for 2021-22 – MIT News

MIT has again been named the worlds top university by the QS World University Rankings, which were announced today. This is the 10th year in a row MIT has received this distinction.

The full 2022 edition of the rankings published by Quacquarelli Symonds, an organization specializing in education and study abroad can be found at TopUniversities.com. The QS rankings were based on academic reputation, employer reputation, citations per faculty, student-to-faculty ratio, proportion of international faculty, and proportion of international students.

MIT was also ranked the worlds top university in 12 of the subject areas ranked by QS, as announced in March of this year.

The Institute received a No. 1 ranking in the following QS subject areas: Architecture; Chemistry; Computer Science and Information Systems; Chemical Engineering; Civil and Structural Engineering; Economics and Econometrics; Electrical and Electronic Engineering; Mechanical, Aeronautical and Manufacturing Engineering; Linguistics; Mathematics; Physics and Astronomy; and Statistics and Operational Research.

MIT also placed second in four subject areas: Accounting and Finance; Biological Sciences; Earth and Marine Sciences; and Materials Science.

We deeply appreciate the recognition of our institution and the faculty, staff, alumni, and students that make MIT what it is and we also tremendously admire the achievements of academic institutions around the globe, says MIT President L. Rafael Reif. The world benefits from a strong higher education network that delivers countless benefits for humanity, from fundamental discoveries to novel solutions to pressing challenges in climate and health, to the education of the next generation of talent. We are proud and grateful to belong to this great human community of scholars, researchers, and educators, striving together to make a better world.

Originally posted here:

QS ranks MIT the world's No. 1 university for 2021-22 - MIT News

Read More..

Talk to explore power of taxonomy and embedding in text mining | Penn State University – Penn State News

Jiawei Han, Michael Aiken Chair Professor in the Department of Computer Science at University of Illinois at Urbana-Champaign.

UNIVERSITY PARK, Pa. Jiawei Han, Michael Aiken Chair Professor in the Department of Computer Science at University of Illinois at Urbana-Champaign, will present a talk as part of the Penn State Center for Socially Responsible Artificial Intelligence Distinguished Lecture Series at 11:30 a.m. on June 14 via Zoom. In the talk, Han will discuss his work to explore the power of taxonomy and embedding in text mining.

This lecture is free and open to the Penn State community. Find the Zoom link for Hans talk and learn more about the CSRAI Distinguished Lecture Series at ai.psu.edu/distinguished-lecture.

About the talk

Real-world big data are largely dynamic, interconnected and unstructured text. It is highly desirable to transform such massive unstructured data into structured knowledge. Many researchers rely on labor-intensive labeling and curation to extract knowledge from text data. Such approaches, unfortunately, may not be scalable, especially when such texts are domain-specific and nonstandard (such as social media). Han and his team envision that massive text data itself may disclose a large body of hidden structures and knowledge. Equipped with domain-independent and domain-dependent knowledge-bases, researchers can explore the power of massive data to transform unstructured data into structured knowledge. In this talk, Han will introduce a set of methods developed recently in his group for such an exploration, including joint spherical text embedding, discriminative topic mining, taxonomy construction, and taxonomy-guided knowledge mining. They show that a data-driven approach could be promising at transforming massive text data into structured knowledge.

About Jiawei Han

Han is the Michael Aiken Chair Professor in the Department of Computer Science, University of Illinois at Urbana-Champaign. He received the ACM SIGKDD Innovation Award (2004), IEEE Computer Society Technical Achievement Award (2005), IEEE Computer Society W. Wallace McDowell Award (2009), and Japan's Funai Achievement Award (2018). He is a Fellow of ACM and Fellow of IEEE and served as the director of the Information Network Academic Research Center (2009-2016) supported by the Network Science-Collaborative Technology Alliance program of the U.S. Army Research Lab, and co-director of KnowEnG, a Center of Excellence in Big Data Computing (2014-2019), funded by the NIH Big Data to Knowledge Initiative.

About the CSRAI Distinguished Lecture Series

The Penn State Center for Socially Responsible Artificial Intelligence Distinguished Lecture Series highlights world-renowned scholars of repute who have made fundamental contributions to the advancement of socially responsible artificial intelligence. The series aims to provoke attendees and participants to have thoughtful conversations and to facilitate discussion among students, faculty and industry affiliates of the center.

Last Updated June 08, 2021

Here is the original post:

Talk to explore power of taxonomy and embedding in text mining | Penn State University - Penn State News

Read More..

Governor recognizes Aparna Bhooshanan for national commendation – The Madison Record – themadisonrecord.com

MADISON A national womens organization has acknowledged the technical initiative of Aparna Bhooshanan, a student at Bob Jones High School. In turn, Gov. Kay Ivey and Alabama State Board of Education also recognized Bhooshanan and issued a state resolution.

Bhooshanan received Honorable Mention as a 2021 awardee in the Aspirations for Computing Initiative with the National Center for Women and Information Technology or NCWIT.

Chartered in 2004 by the National Science Foundation, NCWIT unites approximately 1,500 national organizations invested in change leadership to increase influential participation of girls and women in the field of computing, particularly in terms of innovation and development. (ncwit.org)

In 2021, approximately 4,228 applicants submitted collaterals for Aspirations in Computing awards. Less than 10 percent of applicants across the country succeeded in qualifying.

To congratulate Bhooshanans accomplishment, Gov. Kay Ivey issued a resolution that explained the depth Bhooshanans honor. Now that the highly versatile and sought-after computer science skillset is essential in todays information economy, initiatives that promote computer science awareness and lead to increased college graduates with computing-related degrees are more important than ever, Ivey wrote in the resolution.

Inspiring more girls and young women to choose careers in STEM is not about parity but about a compelling issue of innovation, competitiveness and workforce sustainability, including the ability to design technology that is as broad and creative as the people it serves, the resolution stated.

To qualify for Honorable Mention, Bhooshanan had to display a high aptitude and aspirations in technology and computing. She demonstrated this skill with computing experience, computing-related activities, leadership experience, tenacity in the face of barriers to access and plans for postsecondary education.

The Alabama State Board of Education does hereby commend and congratulate Aparna Bhooshanan upon the honor of being selected as one of Alabamas outstanding young women who display excellence in computer science, the resolution stated.

Bhooshanan accepted her state resolution during a ceremony with Dr. Wayne Reynolds, a member of Alabama State Board of Education. Other state board members attended the presentation.

Bhooshanan frequently earns honors at Bob Jones, such as her 2021 finalist entry in Reflections Fine Arts Contest and a scholarship from U.S. Department of State to study in China. She has received awards for her poetry and for playing chess.

For more information about National Center for Women and Information Technology, visit ncwit.org/about-ncwit.

Go here to read the rest:

Governor recognizes Aparna Bhooshanan for national commendation - The Madison Record - themadisonrecord.com

Read More..