SlideShare a Scribd company logo
1 of 26
SACON 2020
ARTIFICIAL 

INTELLIGENCE

Past, Present and Future
Monojit Choudhury
Microsoft Research Lab India
monojitc@microsoft.com
SACON
SACON International 2020
India | Bangalore | February 21 - 22 | Taj Yeshwantpur
SACON 2020
I am a Homo
sapiens, not a
machine.
SACON 2020
“You want to know how super-intelligent
cyborgs might treat ordinary flesh-and-
blood humans?
Better start by investigating how humans
treat their less intelligent animal cousins.
It’s not a perfect analogy, of course, but
it is the best archetype we can actually
observe rather than just imagine.”
SACON 2020
Agenda
Deconstruction
• What is AI?
• What AI can (not) do
today?
• What’re the recent
trends?
• Critical Synthesis
• Limitations of current
techniques
• What we should be
worried about
• The way forward
What is
Artificial
Intelligence?
SACON 2020
What is Artificial
Intelligence?
PREDICTIVE ADAPTIVE
USES MACHINE
LEARNING
SACON 2020
AI can …
• Beat grandmasters in Chess, Backgammon and Go
• Understand images as well as humans (computer vision)
• Predict diseases from radiology images better than experts (-
do-)
• Transcribe speech as well as humans (speech recognition)
• Beat world champions in Jeopardy (information extraction/
NLP)
• Translate text as well as humans (machine translation/NLP)
SACON 2020
This, AI cannot solve
মােদর গরব মােদর আশা, আ -মির বাংলা ভাষা
Our pride our hope is our Bengali language
Checked on 21st Feb 2020, International Mother
Language Day
SACON 2020
The trophy did not fit in the suitcase. It was too big.
It = trophy or suitcase?
Source:The Winograd Schema Challenge
This, AI cannot solve
SACON 2020
What can AI
solve today?
McKinsey Global institute analysis
SACON 2020
Unlike chess or
backgammon, the rules
of the LANGUAGE
GAME are defined and
redefined by the
language users every
time a game is played.
Ludwig Wittgenstein
(1889-1951)
SACON 2020
A brief
history of
AI
1950s – 1980s: Rule based systems
Domain experts ruled the world
1990s – 2000s: Basic statistical learning
Domain insights with some data
2000s – 2010s: Large scale supervised
and semi-supervised
learning
Big data with some domain
insight
2010s - : Deep learning
ONLY DATA
Domain
knowledge
Data
SACON 2020
DATA-driven AI
DATA
Training
or
Learning
AI System
or Model
Users
User interaction generates data that
feeds back into the system.
SACON 2020
Learning

Techniques
DECISIONTREES REGRESSION SUPPORTVECTOR
MACHINES
MAXIMUM
ENTROPY MODEL
BAYESIAN BELIEF
NETWORKS
…
SACON 2020
DEEP
LEARNING

THE ALCHEMY 

OF THE 

21ST CENTURY
SACON 2020
Benefits of 

Deep 

Learning





Thinking fast

vs. Thinking slow.
Universal Approximator
Great at Generalization
No need to define features
Accuracy does not seem to
saturate
SACON 2020
March 2018
SACON 2020
When it comes to languages, AI is not
inclusive ☹Languages sorted by amount of useful
resources (and therefore, technology)
English
Arabic
Chinese
Spanish
German
French
Japanese
Korean
Portuguese
Hindi-Urdu
Bengali
Italian
Greek
Swedish
English
Chinese
French
Hindi-Urdu
Telugu
Project ELLORA: Enabling
Low Resource Language
Speakers
SACON 2020
Fairness 

Accountability 

Transparency 

Explainability
Data Privacy in the age of AI
SACON 2020
“What determines vulnerability to automation
is not so much whether the work concerned is
manual or white-collar but whether or not it is
routine”
SACON 2020
Challenges of Human-Aware AI Systems
Our Systems seem
happiest
• Either far away
from humans
• Or in an
adversarial
stance with
humans
Subbarao
Kambhampati:
AAAI 2018 Presidential
Address
SACON 2020
A 20 year community roadmap for AI research in the US.August 2019
SACON 2020
Thank You



monojitc@microsoft.com

What is
Artificial
Intelligence?
A phrase that you use to
attract your customers and
funders
Make sound like you work on
cool, sexy and cutting-edge
stuff
Anything for which neither
the developer nor the user
understands what’s going on.
SACON 2020
How much
DATA?
POS Tagging
(#annotated
words)
Machine
Translation
(#parallel
sentences)
Speech
Recognition
(hours of
speech)
1950s-1980s
Rule-based
As much as needed for linguistic analysis
1990s-2000s
Linguistic
insights +
Statistical
10k – 100k 10k-100k 10-100
2000s – 2010s
Big data
100k – 100M 100k – 1M 1o-1000
2010s –
Deep Learning
1M – 1B 1M – 1B 1000 – 10k
Natural languages are fascinating.
Adj Noun Verb Adj
Natural languages are fascinating.
⾃自然语⾔言是迷⼈人的。
Na-tu-ral lan-gua-ges are fa-sci-na-ting
SACON 2020
“It is not difficult to devise a paper machine which will play a not
very bad game of chess… Are there imaginable digital computers
which would do well in the imitation game?"
AlanTuring, 1950
“The biggest breakthrough in AI will be when computers
can read and understand information like humans do."
Bill Gates, 2017

More Related Content

What's hot

IOT Platform as a Service
IOT Platform as a ServiceIOT Platform as a Service
IOT Platform as a Servicekidozen
 
LIFT OFF 2017: IoT and MSS Deep Dive
LIFT OFF 2017: IoT and MSS Deep DiveLIFT OFF 2017: IoT and MSS Deep Dive
LIFT OFF 2017: IoT and MSS Deep DiveRobert Herjavec
 
IoT and Blockchain Challenges and Risks
IoT and Blockchain Challenges and RisksIoT and Blockchain Challenges and Risks
IoT and Blockchain Challenges and RisksAhmed Banafa
 
Naxolink AI Concepts
Naxolink AI ConceptsNaxolink AI Concepts
Naxolink AI Conceptsprateek verma
 
Business models for IoT and Wearables
Business models for IoT and WearablesBusiness models for IoT and Wearables
Business models for IoT and WearablesJoseph Wei
 
NUS-ISS Learning Day 2018- Productization exploiting it for digital transfo...
NUS-ISS Learning Day 2018- Productization   exploiting it for digital transfo...NUS-ISS Learning Day 2018- Productization   exploiting it for digital transfo...
NUS-ISS Learning Day 2018- Productization exploiting it for digital transfo...NUS-ISS
 
NUS-ISS Learning Day 2018- A chain is only as strong as the weakest link _Do ...
NUS-ISS Learning Day 2018- A chain is only as strong as the weakest link _Do ...NUS-ISS Learning Day 2018- A chain is only as strong as the weakest link _Do ...
NUS-ISS Learning Day 2018- A chain is only as strong as the weakest link _Do ...NUS-ISS
 
Operationalize analytics through modern data strategy
Operationalize analytics through modern data strategyOperationalize analytics through modern data strategy
Operationalize analytics through modern data strategyNagarro
 
NUS-ISS Learning Day 2018- Designing software to make the most of cloud platf...
NUS-ISS Learning Day 2018- Designing software to make the most of cloud platf...NUS-ISS Learning Day 2018- Designing software to make the most of cloud platf...
NUS-ISS Learning Day 2018- Designing software to make the most of cloud platf...NUS-ISS
 
Enterprise IoT solution in 30 days
Enterprise IoT solution in 30 days Enterprise IoT solution in 30 days
Enterprise IoT solution in 30 days Manolis Nikiforakis
 
AI is the Catalyst of IoT
AI is the Catalyst of IoTAI is the Catalyst of IoT
AI is the Catalyst of IoTAhmed Banafa
 
NUS-ISS Learning Day 2018-Autonomous vehicles for the smart nation trends and...
NUS-ISS Learning Day 2018-Autonomous vehicles for the smart nation trends and...NUS-ISS Learning Day 2018-Autonomous vehicles for the smart nation trends and...
NUS-ISS Learning Day 2018-Autonomous vehicles for the smart nation trends and...NUS-ISS
 
Top10 Emerging Technologies Report (June 2016)
Top10 Emerging Technologies Report (June 2016)Top10 Emerging Technologies Report (June 2016)
Top10 Emerging Technologies Report (June 2016)Turlough Guerin GAICD FGIA
 
Pakistan CIO Summit and Expo 2013-Post Event Presentation
Pakistan CIO Summit and Expo 2013-Post Event PresentationPakistan CIO Summit and Expo 2013-Post Event Presentation
Pakistan CIO Summit and Expo 2013-Post Event PresentationSolutions Inc Pakistan
 
ForgeRock Open Identity Stack Summit - Kick-off by Mike Ellis
ForgeRock Open Identity Stack Summit - Kick-off by Mike EllisForgeRock Open Identity Stack Summit - Kick-off by Mike Ellis
ForgeRock Open Identity Stack Summit - Kick-off by Mike EllisForgeRock
 
Advantages Of Using Cyber Security Solution
Advantages Of Using Cyber Security SolutionAdvantages Of Using Cyber Security Solution
Advantages Of Using Cyber Security SolutionCyber Infrastructure INC
 

What's hot (20)

IOT Platform as a Service
IOT Platform as a ServiceIOT Platform as a Service
IOT Platform as a Service
 
LIFT OFF 2017: IoT and MSS Deep Dive
LIFT OFF 2017: IoT and MSS Deep DiveLIFT OFF 2017: IoT and MSS Deep Dive
LIFT OFF 2017: IoT and MSS Deep Dive
 
IoT and Blockchain Challenges and Risks
IoT and Blockchain Challenges and RisksIoT and Blockchain Challenges and Risks
IoT and Blockchain Challenges and Risks
 
The IOT scenario in the digital age
The IOT scenario in the digital ageThe IOT scenario in the digital age
The IOT scenario in the digital age
 
Naxolink AI Concepts
Naxolink AI ConceptsNaxolink AI Concepts
Naxolink AI Concepts
 
Business models for IoT and Wearables
Business models for IoT and WearablesBusiness models for IoT and Wearables
Business models for IoT and Wearables
 
AI as a Catalyst for IoT
AI as a Catalyst for IoTAI as a Catalyst for IoT
AI as a Catalyst for IoT
 
Security - A Digital Transformation Enabler
Security - A Digital Transformation EnablerSecurity - A Digital Transformation Enabler
Security - A Digital Transformation Enabler
 
NUS-ISS Learning Day 2018- Productization exploiting it for digital transfo...
NUS-ISS Learning Day 2018- Productization   exploiting it for digital transfo...NUS-ISS Learning Day 2018- Productization   exploiting it for digital transfo...
NUS-ISS Learning Day 2018- Productization exploiting it for digital transfo...
 
NUS-ISS Learning Day 2018- A chain is only as strong as the weakest link _Do ...
NUS-ISS Learning Day 2018- A chain is only as strong as the weakest link _Do ...NUS-ISS Learning Day 2018- A chain is only as strong as the weakest link _Do ...
NUS-ISS Learning Day 2018- A chain is only as strong as the weakest link _Do ...
 
AGC Networks Security Solutions - Cyber-i
AGC Networks Security Solutions - Cyber-iAGC Networks Security Solutions - Cyber-i
AGC Networks Security Solutions - Cyber-i
 
Operationalize analytics through modern data strategy
Operationalize analytics through modern data strategyOperationalize analytics through modern data strategy
Operationalize analytics through modern data strategy
 
NUS-ISS Learning Day 2018- Designing software to make the most of cloud platf...
NUS-ISS Learning Day 2018- Designing software to make the most of cloud platf...NUS-ISS Learning Day 2018- Designing software to make the most of cloud platf...
NUS-ISS Learning Day 2018- Designing software to make the most of cloud platf...
 
Enterprise IoT solution in 30 days
Enterprise IoT solution in 30 days Enterprise IoT solution in 30 days
Enterprise IoT solution in 30 days
 
AI is the Catalyst of IoT
AI is the Catalyst of IoTAI is the Catalyst of IoT
AI is the Catalyst of IoT
 
NUS-ISS Learning Day 2018-Autonomous vehicles for the smart nation trends and...
NUS-ISS Learning Day 2018-Autonomous vehicles for the smart nation trends and...NUS-ISS Learning Day 2018-Autonomous vehicles for the smart nation trends and...
NUS-ISS Learning Day 2018-Autonomous vehicles for the smart nation trends and...
 
Top10 Emerging Technologies Report (June 2016)
Top10 Emerging Technologies Report (June 2016)Top10 Emerging Technologies Report (June 2016)
Top10 Emerging Technologies Report (June 2016)
 
Pakistan CIO Summit and Expo 2013-Post Event Presentation
Pakistan CIO Summit and Expo 2013-Post Event PresentationPakistan CIO Summit and Expo 2013-Post Event Presentation
Pakistan CIO Summit and Expo 2013-Post Event Presentation
 
ForgeRock Open Identity Stack Summit - Kick-off by Mike Ellis
ForgeRock Open Identity Stack Summit - Kick-off by Mike EllisForgeRock Open Identity Stack Summit - Kick-off by Mike Ellis
ForgeRock Open Identity Stack Summit - Kick-off by Mike Ellis
 
Advantages Of Using Cyber Security Solution
Advantages Of Using Cyber Security SolutionAdvantages Of Using Cyber Security Solution
Advantages Of Using Cyber Security Solution
 

Similar to (SACON) Dr. Monojit Choudhury - Evolution Of AI : Past, Present, Future

Artificial Intelligence and Machine Learning
Artificial Intelligence and Machine LearningArtificial Intelligence and Machine Learning
Artificial Intelligence and Machine LearningMykola Dobrochynskyy
 
Will Artificial Intelligence Take Over Human.pdf
Will Artificial Intelligence Take Over Human.pdfWill Artificial Intelligence Take Over Human.pdf
Will Artificial Intelligence Take Over Human.pdfVkmath
 
Artificial Intelligence: Predictions for 2017
Artificial Intelligence: Predictions for 2017Artificial Intelligence: Predictions for 2017
Artificial Intelligence: Predictions for 2017NVIDIA
 
Introduction to Artificial Intelligence.pptx
Introduction to Artificial Intelligence.pptxIntroduction to Artificial Intelligence.pptx
Introduction to Artificial Intelligence.pptxRSAISHANKAR
 
The Digital Econosphere: Being Your Own Boss:
The Digital Econosphere: Being Your Own Boss:The Digital Econosphere: Being Your Own Boss:
The Digital Econosphere: Being Your Own Boss:Write a Writing
 
Can human intelligence be replaced by artificial intelligence?
Can human intelligence be replaced by  artificial intelligence?Can human intelligence be replaced by  artificial intelligence?
Can human intelligence be replaced by artificial intelligence?karpagamacademy
 
Can human intelligence be replaced by artificial intelligence.pptx
Can human intelligence be replaced by artificial intelligence.pptxCan human intelligence be replaced by artificial intelligence.pptx
Can human intelligence be replaced by artificial intelligence.pptxkarpagamacademy
 
artificialintelligence-170409073037.pdf
artificialintelligence-170409073037.pdfartificialintelligence-170409073037.pdf
artificialintelligence-170409073037.pdfpreethajoseph5
 
AI EXPLAINED Non-Technical Guide for Policymakers
AI EXPLAINED Non-Technical Guide for PolicymakersAI EXPLAINED Non-Technical Guide for Policymakers
AI EXPLAINED Non-Technical Guide for PolicymakersBranka Panic
 
Unit 1 introduction
Unit 1 introductionUnit 1 introduction
Unit 1 introductionDhana malar
 
Commercialization of AI 3.0
Commercialization of AI 3.0Commercialization of AI 3.0
Commercialization of AI 3.0APPANION
 
The Neuron - Issue 2. Artificial Intelligence Magazine
The Neuron - Issue 2. Artificial Intelligence MagazineThe Neuron - Issue 2. Artificial Intelligence Magazine
The Neuron - Issue 2. Artificial Intelligence Magazineamolpalekar
 
Ai recent trends in technology v3
Ai   recent trends in technology v3Ai   recent trends in technology v3
Ai recent trends in technology v3Sibasish Chowdhury
 
IBM Watson & Cognitive Computing - Tech In Asia 2016
IBM Watson & Cognitive Computing - Tech In Asia 2016IBM Watson & Cognitive Computing - Tech In Asia 2016
IBM Watson & Cognitive Computing - Tech In Asia 2016Nugroho Gito
 

Similar to (SACON) Dr. Monojit Choudhury - Evolution Of AI : Past, Present, Future (20)

Artificial Intelligence and Machine Learning
Artificial Intelligence and Machine LearningArtificial Intelligence and Machine Learning
Artificial Intelligence and Machine Learning
 
MOOCS AI 1.pptx
MOOCS AI 1.pptxMOOCS AI 1.pptx
MOOCS AI 1.pptx
 
AI PPT.pptx
AI PPT.pptxAI PPT.pptx
AI PPT.pptx
 
Will Artificial Intelligence Take Over Human.pdf
Will Artificial Intelligence Take Over Human.pdfWill Artificial Intelligence Take Over Human.pdf
Will Artificial Intelligence Take Over Human.pdf
 
Artificial Intelligence: Predictions for 2017
Artificial Intelligence: Predictions for 2017Artificial Intelligence: Predictions for 2017
Artificial Intelligence: Predictions for 2017
 
Introduction to Artificial Intelligence.pptx
Introduction to Artificial Intelligence.pptxIntroduction to Artificial Intelligence.pptx
Introduction to Artificial Intelligence.pptx
 
IoT Geeks & Internet of Things
IoT Geeks & Internet of ThingsIoT Geeks & Internet of Things
IoT Geeks & Internet of Things
 
The Digital Econosphere: Being Your Own Boss:
The Digital Econosphere: Being Your Own Boss:The Digital Econosphere: Being Your Own Boss:
The Digital Econosphere: Being Your Own Boss:
 
Can human intelligence be replaced by artificial intelligence?
Can human intelligence be replaced by  artificial intelligence?Can human intelligence be replaced by  artificial intelligence?
Can human intelligence be replaced by artificial intelligence?
 
Can human intelligence be replaced by artificial intelligence.pptx
Can human intelligence be replaced by artificial intelligence.pptxCan human intelligence be replaced by artificial intelligence.pptx
Can human intelligence be replaced by artificial intelligence.pptx
 
AI101 guide
AI101 guideAI101 guide
AI101 guide
 
AI101 Guide
AI101 GuideAI101 Guide
AI101 Guide
 
artificialintelligence-170409073037.pdf
artificialintelligence-170409073037.pdfartificialintelligence-170409073037.pdf
artificialintelligence-170409073037.pdf
 
AI EXPLAINED Non-Technical Guide for Policymakers
AI EXPLAINED Non-Technical Guide for PolicymakersAI EXPLAINED Non-Technical Guide for Policymakers
AI EXPLAINED Non-Technical Guide for Policymakers
 
Unit 1 introduction
Unit 1 introductionUnit 1 introduction
Unit 1 introduction
 
Commercialization of AI 3.0
Commercialization of AI 3.0Commercialization of AI 3.0
Commercialization of AI 3.0
 
The Neuron - Issue 2. Artificial Intelligence Magazine
The Neuron - Issue 2. Artificial Intelligence MagazineThe Neuron - Issue 2. Artificial Intelligence Magazine
The Neuron - Issue 2. Artificial Intelligence Magazine
 
Aritificial intelligence
Aritificial intelligenceAritificial intelligence
Aritificial intelligence
 
Ai recent trends in technology v3
Ai   recent trends in technology v3Ai   recent trends in technology v3
Ai recent trends in technology v3
 
IBM Watson & Cognitive Computing - Tech In Asia 2016
IBM Watson & Cognitive Computing - Tech In Asia 2016IBM Watson & Cognitive Computing - Tech In Asia 2016
IBM Watson & Cognitive Computing - Tech In Asia 2016
 

More from Priyanka Aash

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsPriyanka Aash
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfPriyanka Aash
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfPriyanka Aash
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfPriyanka Aash
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfPriyanka Aash
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfPriyanka Aash
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfPriyanka Aash
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdfPriyanka Aash
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfPriyanka Aash
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfPriyanka Aash
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfPriyanka Aash
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldPriyanka Aash
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksPriyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Priyanka Aash
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsPriyanka Aash
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security GovernancePriyanka Aash
 

More from Priyanka Aash (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Recently uploaded

Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 

Recently uploaded (20)

Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 

(SACON) Dr. Monojit Choudhury - Evolution Of AI : Past, Present, Future

  • 1. SACON 2020 ARTIFICIAL 
 INTELLIGENCE
 Past, Present and Future Monojit Choudhury Microsoft Research Lab India monojitc@microsoft.com SACON SACON International 2020 India | Bangalore | February 21 - 22 | Taj Yeshwantpur
  • 2. SACON 2020 I am a Homo sapiens, not a machine.
  • 3. SACON 2020 “You want to know how super-intelligent cyborgs might treat ordinary flesh-and- blood humans? Better start by investigating how humans treat their less intelligent animal cousins. It’s not a perfect analogy, of course, but it is the best archetype we can actually observe rather than just imagine.”
  • 4. SACON 2020 Agenda Deconstruction • What is AI? • What AI can (not) do today? • What’re the recent trends? • Critical Synthesis • Limitations of current techniques • What we should be worried about • The way forward
  • 6. SACON 2020 What is Artificial Intelligence? PREDICTIVE ADAPTIVE USES MACHINE LEARNING
  • 7. SACON 2020 AI can … • Beat grandmasters in Chess, Backgammon and Go • Understand images as well as humans (computer vision) • Predict diseases from radiology images better than experts (- do-) • Transcribe speech as well as humans (speech recognition) • Beat world champions in Jeopardy (information extraction/ NLP) • Translate text as well as humans (machine translation/NLP)
  • 8. SACON 2020 This, AI cannot solve মােদর গরব মােদর আশা, আ -মির বাংলা ভাষা Our pride our hope is our Bengali language Checked on 21st Feb 2020, International Mother Language Day
  • 9. SACON 2020 The trophy did not fit in the suitcase. It was too big. It = trophy or suitcase? Source:The Winograd Schema Challenge This, AI cannot solve
  • 10. SACON 2020 What can AI solve today? McKinsey Global institute analysis
  • 11. SACON 2020 Unlike chess or backgammon, the rules of the LANGUAGE GAME are defined and redefined by the language users every time a game is played. Ludwig Wittgenstein (1889-1951)
  • 12. SACON 2020 A brief history of AI 1950s – 1980s: Rule based systems Domain experts ruled the world 1990s – 2000s: Basic statistical learning Domain insights with some data 2000s – 2010s: Large scale supervised and semi-supervised learning Big data with some domain insight 2010s - : Deep learning ONLY DATA Domain knowledge Data
  • 13. SACON 2020 DATA-driven AI DATA Training or Learning AI System or Model Users User interaction generates data that feeds back into the system.
  • 14. SACON 2020 Learning
 Techniques DECISIONTREES REGRESSION SUPPORTVECTOR MACHINES MAXIMUM ENTROPY MODEL BAYESIAN BELIEF NETWORKS …
  • 15. SACON 2020 DEEP LEARNING
 THE ALCHEMY 
 OF THE 
 21ST CENTURY
  • 16. SACON 2020 Benefits of 
 Deep 
 Learning
 
 
 Thinking fast
 vs. Thinking slow. Universal Approximator Great at Generalization No need to define features Accuracy does not seem to saturate
  • 18. SACON 2020 When it comes to languages, AI is not inclusive ☹Languages sorted by amount of useful resources (and therefore, technology) English Arabic Chinese Spanish German French Japanese Korean Portuguese Hindi-Urdu Bengali Italian Greek Swedish English Chinese French Hindi-Urdu Telugu Project ELLORA: Enabling Low Resource Language Speakers
  • 19. SACON 2020 Fairness 
 Accountability 
 Transparency 
 Explainability Data Privacy in the age of AI
  • 20. SACON 2020 “What determines vulnerability to automation is not so much whether the work concerned is manual or white-collar but whether or not it is routine”
  • 21. SACON 2020 Challenges of Human-Aware AI Systems Our Systems seem happiest • Either far away from humans • Or in an adversarial stance with humans Subbarao Kambhampati: AAAI 2018 Presidential Address
  • 22. SACON 2020 A 20 year community roadmap for AI research in the US.August 2019
  • 24. What is Artificial Intelligence? A phrase that you use to attract your customers and funders Make sound like you work on cool, sexy and cutting-edge stuff Anything for which neither the developer nor the user understands what’s going on.
  • 25. SACON 2020 How much DATA? POS Tagging (#annotated words) Machine Translation (#parallel sentences) Speech Recognition (hours of speech) 1950s-1980s Rule-based As much as needed for linguistic analysis 1990s-2000s Linguistic insights + Statistical 10k – 100k 10k-100k 10-100 2000s – 2010s Big data 100k – 100M 100k – 1M 1o-1000 2010s – Deep Learning 1M – 1B 1M – 1B 1000 – 10k Natural languages are fascinating. Adj Noun Verb Adj Natural languages are fascinating. ⾃自然语⾔言是迷⼈人的。 Na-tu-ral lan-gua-ges are fa-sci-na-ting
  • 26. SACON 2020 “It is not difficult to devise a paper machine which will play a not very bad game of chess… Are there imaginable digital computers which would do well in the imitation game?" AlanTuring, 1950 “The biggest breakthrough in AI will be when computers can read and understand information like humans do." Bill Gates, 2017