Archive for the ‘Quantum Computer’ Category

Research – Stony Brook University

Supartha Podder, an assistant professor in the Department of Computer Sciences, has received a two-year, $400,000 grant from the Department of Energy to study the power of quantum witnesses.

The grant is part of national $15 million initiative by the DOE to fund basic research to explore potentially high-impact approaches in scientific computing and extreme-scale science.

Podder studies quantum advantages in solving computational tasks; awitness is a piece of data that certifies the answer to a computation. Some problems are easy to verify once a little help regarding the solution is provided, like the sudoku puzzle, and a witness can be thought of as such help.

Quantum computation is a type of computational method that uses quantum bits or q-bits and harnesses the phenomenon of quantum mechanics such as superposition, interference and entanglement to solve problems. Classical computing is the traditional way computer science was developed using binary numbers and is governed by classical Newtonian mechanics.

My work looks to see if quantum computing is better than traditional computing types. We will do this by not only comparing quantum with classical in terms of standard resources such as time and space needed for computation but also in terms of broader and more abstract resources such as computational advice and witness, Podder said. Think of it as solving one piece of the bigger quantum advantage puzzle. The ultimate overall goal is to understand when and why quantum computation outperforms traditional classical computation.

The research will examine quantum witnesses through new perspectives to explore and better understand quantum witnesses. To do this involves designing new quantum algorithms, proving optimality of classical witnesses and investigating many different quantum mechanical properties of quantum witnesses.

Podder hopes that this work will shed light on the mystery of quantum advantage, and which can ultimately lead to having exponential quantum advantage for certain types of practical computational problems. If proven correct, such extreme-scale computing would ultimately save time, energy, and space to solve many of the computational problems worldwide that modern computers have difficulty completing.

Read story "Computer Science Faculty Wins DOE Grant to Study Quantum Computing Advantages" on SBU News

Read more:
Research - Stony Brook University

The future of tech relies on humanities degrees – IDG Connect

The tech industry has long been very alluring for young professionals, offering an engaging and potentially lucrative career. Consequently, the technical nature of many roles has started to generate a sentiment that non-technical degrees are not a worthwhile pursuit. Yet with the rate of development of emerging technologies like AI and quantum computing, this is not necessarily accurate.

As the new university year approaches, fewer students will be beginning a degree in arts and humanities subjects than before. Weve seen a fall of 40,000 enrolments over the last decade and Sheffield Hallam University recently suspended its English Literature degree. Members of UK government have been magnifying this belief by speculating about the phasing out of degrees with low-earning potential, with the reasoning that that they dont equip young workers with the necessary skills for our current job market.

In parallel, we are on the brink of a potential quantum age. Quantum computing, with its unprecedented speeds and processing power, promises to transform our computing abilities and further the development of next-gen AI. Naturally, we will need to equip our emerging workforce with complimentary skills, which is driving a rise in popularity for STEM degrees. Acceptances to computer science courses rising by almost 50% in the last decade, and acceptances to the newer AI courses having seen a tremendous 400% rise.

But this isnt the end of humanities degrees, far from it. In fact, humanities degrees are going to be vital in the rapidly advancing world of tech.

Despite once being heralded as technology of movies and science fiction, AI is now a common reality of modern-day life and quantum computing will soon follow suit. Predictions show that by next year, 25% of the Fortune Global 500 will be using some form of quantum computing to gain a competitive advantage. However, many questions remain about what appropriate usage actually looks like.

Regulation in quantum computing and other advancing technologies is going to be key to making sure that they arent being abused or misused. Already, we are facing issues with AI and quantum that need to be addressed for instance, AIs intrinsic bias problem. The effects of bias within datasets are only going to be intensified by quantum computing, and it will become impossible to manually analyse and redress its impact. To deal with the handling and regulation of quantum effectively, we need to be nurturing skills like ethics and decision making valuable skills that arts and humanities degrees intrinsically teach students.

We can already see a plethora of ethical dilemmas emerging. As the trend of quantum computing explodes, how will we make sure that it's used in a socially responsible manner? How will we enable fair access to quantum computing? How will we stop the monopolisation of quantum by companies? There are many issues we cannot predict, but we do know that we will need strict standards in the technology industry, and we need people to decide and enforce them and these are unlikely to come from the pure tech or scientific community, whose focus tends to be solely on progress.

The inherent fast-paced nature of the tech industry means the needs of the job market are constantly changing. For example, right now software developers are in increasingly high demand. There are over 465,700 software development professionals and programmers in the UK, more than doubling the 224,000 that there were a decade ago in 2011. However, as technology continues to rapidly advance, the advent of practical usage of quantum computing will begin to render these software developers' jobs obsolete as the knowledge required evolves.

It has been suggested that the half-life of a specific technical skill is now only 2.5 years. With the intense speed of technological development, any skills being learned now could be redundant a few years after graduating.

Therefore, instead of exclusively focussing on equipping our workforce with specific technical skills, we need to prepare for the longer-term requirements that will be necessary when technology itself supersedes the rate of human development. Supplementing a tech-minded workforce with non-tech workers with different perspectives, such as those with humanities backgrounds, can bring balance and enable teams to navigate these evolving needs more readily, drawing on knowledge that will not become outdated as the sector advances.

As technology progresses, many tech-skilled roles will become automated. We need to start nurturing the skills that we need for our future tech workforce.

Our future workforce will need to have the soft skills that humanities degrees bring to survive the fast-paced sector of technology. Critical thinking and problem-solving skills will be essential to be able to grapple with unprecedented problems and rapid developments. Communication skills involving public speaking, teamwork, professional writing and leadership skills will be indispensable to working with the many companies and groups that will be beginning to work with quantum computing.

In a future where developers jobs may be significantly reduced, those with skills from humanities degrees will be necessary for the future of technology.

Here is the original post:
The future of tech relies on humanities degrees - IDG Connect

The scary future of the internet: How the tech of tomorrow will pose even bigger cybersecurity threats – ZDNet

Yuichiro Chino / GettyImages

While the internet has undoubtedly brought new benefits, it's also brought new problems as cyber criminals look to exploit our seemingly ever-growing reliance on connectivity.

Phishing emails, malware and ransomware attacks, or getting your bank details, passwords and other personal information stolen the internet has provided malicious hackers with a variety of new ways to make money and cause disruption. Just look, for example, at how critical infrastructure, schools and hospitals have been affected by cyberattacks.

We're yet to fully secure networks against today's internet threats, yet technology is moving on already, bringing new threats that we must somehow prepare for.

One of the most significant technological breakthroughs heading our way isquantum computing, which promises to be able to quickly solve complex problems that have defeated classical computers.

While this advance will bring benefits to scientific research and society, it will also create new challenges. Most notably, the power of quantum computing could make quick work of cracking the encryption algorithms we've used for decades to secure a range of areas, including online banking, secure communications and digital signatures.

Currently, quantum computing is expensive and the expertise required to develop it is restricted to large technology companies, research institutions and governments. But like any innovative technology, it will eventually become more commercially available and easier to access and cyber criminals will be looking to take advantage of quantum.

"There's some things over the horizon that you can see coming; notably quantum computing being able to crack current encryption algorithms," says Martin Lee, technical lead of security research at Cisco Talos.

"What was an entirely appropriate encryption key length 20 years ago is no longer appropriate".

The US Cybersecurity and Infrastructure Security Agency (CISA) has already warned that action must be taken now to help protect networks from cyberattacks powered by quantum computing, particularly those that support critical national infrastructure.

But while disruptive cyberattacks powered by quantum computing are a key cybersecurity threat of the future, quantum computers could themselves be a lucrative target of hackers.

SEE:The stakes 'could not be any higher': CISA chief talks about the tech challenges ahead

Let's think of the specific example of crypto-mining malware. This is a form of malware that attackers install on computers and servers to secretly use the power of someone else's network to mine for cryptocurrency and pocket the profits all without needing to pay for the resources or the power being consumed.

Cryptocurrencies, such as Bitcoin, are generated by computers by solving complex mathematical problems the sort of mathematical problems that could be relatively trivial for a network of quantum computers to solve. That means that if cyber criminals were able to plant crypto-mining malware on quantum computers, they could get very rich very quickly at almost no cost to themselves.

"Infecting one of those would allow somebody to start calculating very complex algorithms," says David Sancho, senior antivirus researcher at Trend Micro.

"If you have a crypto miner on a quantum computer, that's going to tremendously speed up your mining capabilities those things becoming a target of trivial cyberattacks, it's a very easy prediction to make."

But quantum computing isn't the only emerging technology that cyber criminals will look to take advantage of: we can expect them to exploit developments in artificial intelligence (AI) and machine learning (ML), too.

Like quantum computing, AI and ML look set to power innovations in a range of areas, including robotics and driverless cars, speech and language recognition, healthcare and more.

AI that can adapt and learn can be used for good, but ultimately, once it becomes more widely available, it's only a matter of time before cyber criminals are using it to help make cyberattacks more effective.

"We will start seeing malware campaigns, ransomware operations and phishing campaigns being run totally automated by machine-learning frameworks. It hasn't been done yet but it wouldn't be very hard at all to do," says Mikko Hyppnen, chief research officer at WithSecure.

One means of exploiting this technology would be programming a text-based generation algorithm to send out, and reply to, common spam emails or business email compromise (BEC) campaigns.

Rather than needing a human to take time out to write and reply to messages, criminals could rely on an algorithm that can also analyse which responses are most likely to be real victims that are worth replying to, rather than people who remain unconvinced, or those who send prank replies back to the spammer. That reality means in future you could end up being scammed by a bot.

There's also the potential that cyber criminals could use advancements in ML to develop self-programming smart malware which, rather than needing a developer to support it, could update itself by automatically reacting to the cyber defences it meets to have the greatest chance of being effective.

"You could imagine when self-programming programs become more capable than right now where they can finish functions created by humans that sounds great until you give it ransomware," says Hyppnen.

"It could change the code, make it more complex to understand, make it so it's different every time, it could try to create undetectable versions. All of that is technically doable, we simply haven't seen it yet and I think we will," he warns.

SEE:Spy chief's warning: Our foes are now 'pouring money' into quantum computing and AI

But AI being abused to power cyber threats isn't a just a future problem for the internet it's already happening now, with deep learning being used to power deepfakes, which are videos that look like they're real people or events but are actually fake.

They've been used in political misinformation campaigns, pranks to fool politicians and they're already being used to enhance BEC and other fraud attacks, with cyber criminals using deepfake audio to convince employees to authorise significant financial transfers to accounts owned by the attackers.

"We're entering this brave new world around deepfake video that will be used to commit crimes. Not just manipulation, but also in disinformation and misinformation," says Theresa Payton, CEO of Fortalice Solutions and former CIO at the White House.

Take the example of CEOs who are in the public-facing realm. They appear on television, they give speeches, are there are videos of them online, so it's relatively simple to find recordings of what they sound like and it's already possible for scammers to run those resources through deepfake technology to mimic their voice.

After all, if an employee gets a call from the head of the company telling them to do something, they're likely to do it and the cyber criminals behind these attacks know this fact.

"I already know of three cases where deepfake audio was used to successfully convince somebody to transfer money to a place they shouldn't have transferred it. That is stunning to me that as a sample size of one, I already know of three cases," says Payton.

And as the technology behind deepfakes continues to improve, it means that it will only get harder to tell what's real from what's fake.

"I grow increasingly concerned about our lack of ability to really shut down manipulation campaigns," says Payton.

Deepfakes aren't the only area where cyber threats could impact our everyday lives if the future of the internet isn't secured properly. Increasingly, smart Internet of Things (IoT) devices are becoming a bigger part of our daily existence, with a variety of sensors, appliances, wearable devices and other connected products appearing in homes, offices, factories, and more.

While there are certain advantages to connecting IoT devices to our home and workplace networks, this increased level of networking is also creating a larger attack surface for cyber criminals to try to exploit.

"When you add functionality and connectivity into everyday devices, they become hackable. Devices that were unhackable become hackable. It might be very hard. Nevertheless, it is always doable. There is no secure computer. There is no unhackable device," explains Hyppnen.

"This is the thing that's happening now during our time, and there's no stopping it. It doesn't matter what we think about it, it's going to happen anyway, and it's going to be increasingly invisible."

Think about your home appliances: it's increasingly likely they're 'smart' and connected to the internet. Anything from your television to your toothbrush could now be internet-connected.

But for appliance manufacturers, building internet-connected devices is a relatively new phenomenon and many won't have needed to think about cybersecurity threats before. Some vendors might not even think about it in the design process at all, leaving the products vulnerable to hackers.

While hackers coming after your coffee machine or your fish tank might not sound like a concern, it's a point on the network that can be accessed and used as a gateway to attack more important devices and sensitive data.

SEE: Critical IoT security camera vulnerability allows attackers to remotely watch live video - and gain access to networks

While IoT security should (hopefully) improve as it becomes more widespread, there's also another problem to consider. There'salready millions and millions of IoT devices out there that lack security and these might not even be supported with security updates.

Think about how many smartphones can't receive security updates after just a few years. Then scale that reality up to the fast-growing IoT what's going to happen if devices that aren't regularly replaced, such as a refrigerator or a car, can continue to be used for decades?

"There's no software vendor on the planet that would support software written 20 years ago. It's just not happening," says Hyppnen, who suggests that when manufacturers no longer support updates for their devices, they should open source it to allow others to do so.

"You would get the security patches for your old, outdated legacy things by paying for the service just like you pay for any other service."

Connected devices are already becoming ubiquitous throughout society, with no sign of this trend slowing down whole smart cities will become the norm. But if cybersecurity and compliance isn't a key force driving this trend, it could lead to negative consequences for everyone.

"If you don't resolve these issues, you're going to have attacks happen at a scale and speed you've never seen before bad things will be faster. That is incredibly concerning," says Payton, who believes it's only a matter of timebefore a ransomware attack holds a smart city hostage.

"They will be a target and we will experience some level of sustained disruption," she adds.

Despite the potential threats on the horizon, Payton is optimistic about the future of the internet. While cyber criminals are going to be using new technologies to help improve their attacks, those responsible for defending networks will also be deploying the same technologies to help prevent attacks.

"I'm pretty energized about our continuing ability to model nefarious behaviors, then use artificial intelligence, big data, analytics, and different types of machine learning algorithms to continue to refine technology," she explains

"Now, will it block everything? No, because cyber criminals are always adapting their tactics. But I do have a lot of optimism for being able to block more of the basic-to-medium types of threats that seem to get through today."

That sense of optimism is shared by Hyppnen, who looks back on how technology has evolved in recent years. He believes cybersecurity is improving and that even with new technologies on the horizon, it doesn't mean cyber criminals and other malicious hackers will simply have it easy.

"Computer security has never been in better shape than today. That's a controversial comment people on the street would most likely think that data security has never been worse because they only see the failures. They only see the headlines about yet another hack," he says.

"But the fact is, if you compare the security of our computers today and a decade ago, it's like night and day. We're getting much, much better at security attackers have a much, much harder time breaking through."

Let's hope that situation remains the case the future stability of the internet depends on it being true.

Excerpt from:
The scary future of the internet: How the tech of tomorrow will pose even bigger cybersecurity threats - ZDNet

Are enterprises ready for the next wave of digital change? – Express Computer

By Mahesh Zurale, Senior Managing Director and Lead Advanced Technology Centres in India, Accenture

1. How does Accenture define metaverse?Today, there are various definitions of the metaverse, and a lot of early efforts are being built with the focus on how to get it right each with different platforms, partners, and technologies at the core. Accenture has a distinct view: the metaverse is a continuum that will entirely transform the way we live and work in the future. Today, we increasingly see the convergence of multiple technologies (ranging from gaming engines to digital twins and extended reality) to address real-world problems in new ways and create transformational business value across the enterprise. That is why we define the metaverse as a continuum, as its evolving and expanding across multiple dimensions and transforming every aspectof business.

2. What are the building blocks of Metaverse?We believe the metaverse will impact every part of every business, and organizations have a unique opportunity to act boldly and compete in tomorrows market. In our latest Technology Vision 2022 report, we have highlighted the four building blocks of the Metaverse Continuum that will be foundational to organizations as they set the stage for the future. The first one is WebMe, which looks at the metaverse as the next evolution of the internet where users can not only browse digitally but also participate in a shared experience spanning across both the physical and virtual worlds.

The second trend is called Programmable World, which refers to the infusion of technology into our physical environments. It focuses on how 5G, cloud, and immersive technologies such as augmented reality (AR), extended reality (XR), and virtual reality (VR) are enabling better control, automation, and personalization.

The third trend The Unreal gives an overview of how AI-generated synthetic data and images are blurring the difference between the real and the unreal. While synthetic content will enable more seamless experiences, prioritizing authenticity will be key to preventing deep fakes and malicious attacks. The fourth trend Computing the Impossible is about exploring the outer limit of what is computationally possible and how it is being disrupted as the next generation of machines emerge. These machines quantum, HPC, and biology-inspired will help businesses solve challenges that were deemed impossible earlier.

3. How are AI, quantum computing, Web3, and the metaverse shaping the world of business?AI, quantum computing, Web3, and the metaverse will fundamentally change business processes, including customer interactions, day-to-day operations, working style, and products and services. In fact, 42% of executives surveyed in our Technology Vision 2022 report have cited the metaverse as transformational, whereas 71% believe it will have a positive impact on their organization. Major companies will shift part of their operations to the metaverse to engage with their employees in exciting new ways. At Accenture, we have built what we believe is the largest enterprise metaverse on the planet the Nth Floor to offer new joiners an immersive onboarding experience and employees new ways to learn and collaborate.

Businesses across sectors including retail, consumer products, financial, health, industrial, and manufacturing will use metaverse-related technologies to reimagine and elevate customer experiences. For example, in 2021 Gucci created The Gucci Garden Experience to sell virtual products and sold a virtual-only digital twin of a Gucci purse at a higher price than its real-world counterpart.

4. How can enterprises drive maximum value from the Metaverse?Organizations need to start prioritizing their technology investments to build a foundation in the metaverse. It is important to first identify and close the existing gaps in their digital transformation, whether it is delayed cloud adoption or the lack of a robust security infrastructure. Another area that organizations need to consider is building skills in AI, blockchain, gaming, security, VR, and XR to prepare for the metaverse. The other in-demand skills will include distributed ledger experts and token economists who understand the economics of creating tokenized products. Additionally, strategic partnerships with technology experts will be crucial to support enterprises in their journey towards themetaverse.

5. What are the security measures that companies should incorporate to operate in the Metaverse?As metaverse gains momentum globally, it not only presents new opportunities for businesses to explore, innovate and create new products/services but also brings forth concerns around data, privacy, and safety. Establishing a responsible metaverse from the start is essential to fostering trust in the underlying technology and experiences to drive adoption and user acceptance.

For example, organizations engaging in the metaverse require a comprehensive approach to security. If not, the absence of a standard framework will allow threat actors to take advantage of potential vulnerabilities and gain access to critical user data, which could result in security breaches, ransomware attacks, and identity theft. Organizations need to address the cybersecurity gaps early and proactively map user journeys across the metaverse.

Deploying advanced security solutions that can not only assess the potential risks but also spot and identify threats and breaches will be key to making the new system of place digitally secure. As with any technology, a strategic approach must be taken while deploying solutions in the metaverse to gain the maximum benefit without compromising on security.

6. How Metaverse will change the dynamics of business in the future?Technologies like 5G and cloud that lay the foundation of the metaverse have already proven to deliver improved efficiency, boost operations maturity, and drive business innovation. For instance, Shell, through its AR Remote Assist, enables its workers in the field to get assistance from experienced technicians across the world, allowing real-time, collaborative discussions amongst its teams. This is just one example of how the metaverse will enable the adoption of people-centric technologies to offer new ways of working and collaboration.

With the use of digital twins, companies can create virtual replicas of their physical offices and provide employees the flexibility to work from anywhere. Similarly,extended reality has the potential to make employee learning experiences more immersive, resulting in better retention and improved performance. While the metaverse is still at a nascent stage, it presents immense business potential. Companies need to reimagine their business now to capitalize on the possibilities the future will bring.

See the article here:
Are enterprises ready for the next wave of digital change? - Express Computer

10 Breakthrough Technologies That Is Going To Change The Future – Postoast

2020 has been a hectic year with the coronavirus pandemic affecting our lives in an unprecedented manner. However, with scientists and researchers working tirelessly, it was a great year for technological advancements and achievements. The breakthrough technologies mentioned in the article will surely affect our lifestyle in the years to come.

These are gifts of technology that have been the highlight of the first year of this decade:

You may be aware of the fact that the internet we use today is extremely vulnerable to hacks and exploits by people with questionable intentions. For the past few years, data scientists and analysts have been working on creating the first quantum internet that would be completely secure from hackers.

The Delft University of Technology, one of the big organizations working on this project, has successfully developed this technology. In a presentation, Physicist Ronald Hanson at the Delft University of Technology along with his collaborators linked three devices in such a way that any two devices in the network ended up with mutually entangled quantum bits.

These quantum bits are used for transmitting information and communicating with other devices the use of entanglement makes it almost impossible for hackers to snoop around the user devices.

via GIPHY

In this digital age, the use of cash is continuously declining. Cash transactions need intermediaries and in each stage, there is a considerable markup. On the other hand, digital money, like Libra by Facebook exists only in its digital form, which can lead to a breach of financial privacy.

Digital money can be beneficial for instantaneous transactions and may also mean that parties would have to go through minimal or no intermediaries at all. Like cryptocurrencies using blockchain technology, which is decentralized, digital currency can potentially break the global financial system into small fragments.

Though many have dreamed of it, using a quantum computer to outperform classical computers cannot be implemented daily just yet. Google has developed a Sycamore quantum processor, which can be used to achieve quantum supremacy.

In a test, Sycamore could determine a set of randomly distributed numbers in three minutes and 20 seconds, which would have taken 10,000 years for a classical computer. Even though the results of the tests and calculations were impressive, we are still years away from using quantum computers to solve problems that classical computers cannot handle.

via GIPHY

Differential privacy can help organizations collect and share collected user data while keeping their identities private. The 2020 US Census, which is the largest-scale application would use differential privacy while distributing population data.

This technology aims to maximize data usage without disclosing the user identity. Differential privacy ensures the unavailability of raw data to database managers or data scientists and allows organizations to tackle privacy-related problems and build trust.

With the help of improved computing capabilities of newly developed processors, scientists can now make proper reports of how climate changes can affect severe weather events. Civilians and the military can now prepare in advance in case of natural disasters due to weather conditions.

Further, it also gives enough evidence to hold responsible authorities and the government responsible for not taking necessary steps when needed. Climate change can cause immeasurable loss of lives and properties, and proper climate change attributions would help the people take proper and necessary precautionary measures.

via GIPHY

With thousands of people worldwide having unique ailments and disorders, traditional medication cannot help them all. Have you ever wondered how this problem can be solved by producing medication for a particular case? This way, scientists and doctors can help cure rare genetic disorders and rare diseases.

The dream of achieving hyper-personalized medication is not too far and will bring hope and joy to several people all over the world. Medicines tailored to the exact needs of a single patient will treat and cure ailments that went untreated earlier. This was without a doubt, one of the best technological advancements in the field of medicine.

Aiming to provide high-speed internet services all over the world, satellite mega-constellations projects were a great success. It is the much-awaited solution to unreliable WiFi signals and fluctuating cellular networks. Satellite mega-constellations would enable global connectivity for almost everyone with a proper device.

However, the development and implementation of this technology bring a few major concerns. Space will be littered with several small satellite mega-constellations to bring unhindered connectivity to everyone.

Also, in the absence of a set of international rules and regulations and authority to enforce them, major industry leaders can end up exploiting its uses. This would lead to major problems and lead to unbridled chaos.

Long gone are the days when users would have to depend on heavy computer setups to use powerful AI algorithms. Nowadays, handheld devices like mobile phones and household appliances are capable of using AI programs without even interacting with the cloud.

With the development of tiny AI, developers and software enthusiasts can work to shrink the size of existing and new AI models without losing their efficiency and functionalities. Accessing AI models from our devices involve no latency due to the lack of interaction with the cloud and hence there are fewer privacy-related concerns.

Currently, big tech companies like Google, Apple, Amazon as well as IBM are leading the market with the application and implementation of tiny AI technology.

Since ancient times, adventurers, researchers, and philosophers have spent their lives finding the answer to their aging problems. The wait is almost over as doctors and scientists have developed drugs that can help slow down your aging.

These drugs can be very useful for patients suffering from diseases like cancer, dementia, and heart-related problems by slowing down the aging process. Though a lot of research has not been conducted yet, initial trials have proved these drugs to be safe for humans.

via GIPHY

Working with technologies like machine learning and artificial intelligence, scientists and data scientists are using AI to discover molecules that can affect the healthcare industry greatly.

With the discovery of the antibiotic Halicin using Artificial Intelligence, medical science has gained a golden opportunity to develop exponentially. Though using AI for healthcare is not new, this was the first time AI has identified a completely new antibiotic variety without any human intervention or assumptions.

Though this may be a very expensive process due to the rarity of the molecules in question, AI can help bring down the cost of production to a great extent. It can evaluate and use molecules effectively and efficiently, which might not be possible for human scientists.

Visit link:
10 Breakthrough Technologies That Is Going To Change The Future - Postoast