• U.S President Donald Trump’s Chief Of Staff’s Personal Phone Was Hacked, With The Retrieved Information Used To Contact Influential Individuals And Officials

    White House Chief of Staff Susie Wiles uses a phone as she attends a National Day of Prayer event hosted by President Donald Trump in the Rose Garden at the White House, May 1, 2025 in Washington / Image credits - Andrew Harnik/Getty Images

    The personal phone of Susie Wiles, the U.S. President Donald Trump’s chief of staff, was allegedly hacked, with the individual responsible obtaining access to a bevy of contacts, including high-profile officials. According to the latest report, a federal probe has been launched, but there is no confirmation on how the phone was compromised in the first place.
    The contacts present in Susie Wiles’ phone grew suspicious after the impersonator asked to move the conversation to Telegram, risking the leaking of sensitive information
    Shortly after gaining access to the White House chief of staff’s personal phone, the hackers leveraged AI to impersonate Wiles’ likeness and sent multiple contacts voice and text messages from a different number. It was only after the person or persons on the other end recommended continuing the conversation to a private platform like Telegram that the contacts realized that something was off. FBI Director Kash Patel shared the following statement with CBS News regarding the incident.
    “The FBI takes all threats against the President, his staff, and our cybersecurity with the utmost seriousness; safeguarding our administration officials’ ability to securely communicate to accomplish the President's mission is a top priority.”
    As for how Wiles’ phone was compromised, TechCrunch asked White House spokesperson Anna Kelly if a cloud account associated with the chief of staff’s device was compromised, or if her handset was a part of a more sophisticated attack involving government-grade spyware. Unfortunately, the outlet did not receive a meaningful response, suggesting that the investigation is still ongoing.
    This is the second incident in which Wiles has been targeted by hackers, with the first instance transpiring in 2024, when it was reported that Iranian cyber-espionage experts attempted to obtain access to her personal email account. A separate report claims that these individuals were successful in bypassing the security as they obtained a dossier on Vice President JD Vance, who was Donald Trump’s running mate at the time.
    Going over a few images, we realized that the U.S. President’s chief of staff is currently in possession of an iPhone, which should cause even more concern because Apple prides itself on its robust security and privacy.
    News Source: The Wall Street Journal
    #president #donald #trumps #chief #staffs
    U.S President Donald Trump’s Chief Of Staff’s Personal Phone Was Hacked, With The Retrieved Information Used To Contact Influential Individuals And Officials
    White House Chief of Staff Susie Wiles uses a phone as she attends a National Day of Prayer event hosted by President Donald Trump in the Rose Garden at the White House, May 1, 2025 in Washington / Image credits - Andrew Harnik/Getty Images The personal phone of Susie Wiles, the U.S. President Donald Trump’s chief of staff, was allegedly hacked, with the individual responsible obtaining access to a bevy of contacts, including high-profile officials. According to the latest report, a federal probe has been launched, but there is no confirmation on how the phone was compromised in the first place. The contacts present in Susie Wiles’ phone grew suspicious after the impersonator asked to move the conversation to Telegram, risking the leaking of sensitive information Shortly after gaining access to the White House chief of staff’s personal phone, the hackers leveraged AI to impersonate Wiles’ likeness and sent multiple contacts voice and text messages from a different number. It was only after the person or persons on the other end recommended continuing the conversation to a private platform like Telegram that the contacts realized that something was off. FBI Director Kash Patel shared the following statement with CBS News regarding the incident. “The FBI takes all threats against the President, his staff, and our cybersecurity with the utmost seriousness; safeguarding our administration officials’ ability to securely communicate to accomplish the President's mission is a top priority.” As for how Wiles’ phone was compromised, TechCrunch asked White House spokesperson Anna Kelly if a cloud account associated with the chief of staff’s device was compromised, or if her handset was a part of a more sophisticated attack involving government-grade spyware. Unfortunately, the outlet did not receive a meaningful response, suggesting that the investigation is still ongoing. This is the second incident in which Wiles has been targeted by hackers, with the first instance transpiring in 2024, when it was reported that Iranian cyber-espionage experts attempted to obtain access to her personal email account. A separate report claims that these individuals were successful in bypassing the security as they obtained a dossier on Vice President JD Vance, who was Donald Trump’s running mate at the time. Going over a few images, we realized that the U.S. President’s chief of staff is currently in possession of an iPhone, which should cause even more concern because Apple prides itself on its robust security and privacy. News Source: The Wall Street Journal #president #donald #trumps #chief #staffs
    WCCFTECH.COM
    U.S President Donald Trump’s Chief Of Staff’s Personal Phone Was Hacked, With The Retrieved Information Used To Contact Influential Individuals And Officials
    White House Chief of Staff Susie Wiles uses a phone as she attends a National Day of Prayer event hosted by President Donald Trump in the Rose Garden at the White House, May 1, 2025 in Washington / Image credits - Andrew Harnik/Getty Images The personal phone of Susie Wiles, the U.S. President Donald Trump’s chief of staff, was allegedly hacked, with the individual responsible obtaining access to a bevy of contacts, including high-profile officials. According to the latest report, a federal probe has been launched, but there is no confirmation on how the phone was compromised in the first place. The contacts present in Susie Wiles’ phone grew suspicious after the impersonator asked to move the conversation to Telegram, risking the leaking of sensitive information Shortly after gaining access to the White House chief of staff’s personal phone, the hackers leveraged AI to impersonate Wiles’ likeness and sent multiple contacts voice and text messages from a different number. It was only after the person or persons on the other end recommended continuing the conversation to a private platform like Telegram that the contacts realized that something was off. FBI Director Kash Patel shared the following statement with CBS News regarding the incident. “The FBI takes all threats against the President, his staff, and our cybersecurity with the utmost seriousness; safeguarding our administration officials’ ability to securely communicate to accomplish the President's mission is a top priority.” As for how Wiles’ phone was compromised, TechCrunch asked White House spokesperson Anna Kelly if a cloud account associated with the chief of staff’s device was compromised, or if her handset was a part of a more sophisticated attack involving government-grade spyware. Unfortunately, the outlet did not receive a meaningful response, suggesting that the investigation is still ongoing. This is the second incident in which Wiles has been targeted by hackers, with the first instance transpiring in 2024, when it was reported that Iranian cyber-espionage experts attempted to obtain access to her personal email account. A separate report claims that these individuals were successful in bypassing the security as they obtained a dossier on Vice President JD Vance, who was Donald Trump’s running mate at the time. Going over a few images, we realized that the U.S. President’s chief of staff is currently in possession of an iPhone, which should cause even more concern because Apple prides itself on its robust security and privacy. News Source: The Wall Street Journal
    0 Yorumlar 0 hisse senetleri
  • Mysterious Marvel TV Project Vision Quest Staffs Up With Team of Star Trek Veterans

    Marvel's under-wraps TV project Vision Quest — another spin-off from hit MCU series WandaVision — is being made by a team of veteran Star Trek writers and production staff.The series, which has quietly been in development now for over a year, was previously announced as having gained Star Trek: Picard writer and later showrunner Terry Matalas.Matalas took over running Star Trek: Picard for its thirdseason, and quickly set about reuniting the character with more of his former Star Trek: The Next Generation cast. PlayNow, Matalas will act as showrunner for the Paul Bettany-starring Vision Quest — and reunite with a number of other Star Trek writers in the process.As detailed this week by Vision Quest's listing on the Writer's Guild of America website, fellow Picard writers Chris Monfette, Cindy Appel, and Matt Okumura have also joined the new Marvel project.Most interesting of all, perhaps, is confirmation that Battlestar Galactica, Star Trek: Deep Space 9, and Star Trek: Voyager writer Michael Taylor is also working on Vision Quest. The 25 Best MCU HeroesTaylor wrote more than a dozen episodes of Voyager and is responsible for some of the very best episodes of DS9, including In the Pale Moonlight and The Visitor, the latter of which featured the late Tony Todd as a grown-up alternate version of Jake Sisko in an alternate timeline.Filming for Vision Quest began earlier this spring, primarily based at Pinewood Studios in London.Marvel is yet to detail the series' story, though fans expect it will reveal the fate of Paul Bettany's White Vision, last seen flying away at the end of WandaVision. Curiously, the series is also expected to include the return of James Spader's Ultronand the character of Raza from the original Iron Man, who kidnapped Tony Stark and stuck him in a cave.Vision Quest is expected to be released on Disney+ at some point in 2026. And, if you're keeping track, that means it'll almost certainly now arrive before the delayed Avengers: Doomsday — although after Spider-Man: Brand New Day.Tom Phillips is IGN's News Editor. You can reach Tom at tom_phillips@ign.com or find him on Bluesky @tomphillipseg.bsky.social
    #mysterious #marvel #project #vision #quest
    Mysterious Marvel TV Project Vision Quest Staffs Up With Team of Star Trek Veterans
    Marvel's under-wraps TV project Vision Quest — another spin-off from hit MCU series WandaVision — is being made by a team of veteran Star Trek writers and production staff.The series, which has quietly been in development now for over a year, was previously announced as having gained Star Trek: Picard writer and later showrunner Terry Matalas.Matalas took over running Star Trek: Picard for its thirdseason, and quickly set about reuniting the character with more of his former Star Trek: The Next Generation cast. PlayNow, Matalas will act as showrunner for the Paul Bettany-starring Vision Quest — and reunite with a number of other Star Trek writers in the process.As detailed this week by Vision Quest's listing on the Writer's Guild of America website, fellow Picard writers Chris Monfette, Cindy Appel, and Matt Okumura have also joined the new Marvel project.Most interesting of all, perhaps, is confirmation that Battlestar Galactica, Star Trek: Deep Space 9, and Star Trek: Voyager writer Michael Taylor is also working on Vision Quest. The 25 Best MCU HeroesTaylor wrote more than a dozen episodes of Voyager and is responsible for some of the very best episodes of DS9, including In the Pale Moonlight and The Visitor, the latter of which featured the late Tony Todd as a grown-up alternate version of Jake Sisko in an alternate timeline.Filming for Vision Quest began earlier this spring, primarily based at Pinewood Studios in London.Marvel is yet to detail the series' story, though fans expect it will reveal the fate of Paul Bettany's White Vision, last seen flying away at the end of WandaVision. Curiously, the series is also expected to include the return of James Spader's Ultronand the character of Raza from the original Iron Man, who kidnapped Tony Stark and stuck him in a cave.Vision Quest is expected to be released on Disney+ at some point in 2026. And, if you're keeping track, that means it'll almost certainly now arrive before the delayed Avengers: Doomsday — although after Spider-Man: Brand New Day.Tom Phillips is IGN's News Editor. You can reach Tom at tom_phillips@ign.com or find him on Bluesky @tomphillipseg.bsky.social #mysterious #marvel #project #vision #quest
    WWW.IGN.COM
    Mysterious Marvel TV Project Vision Quest Staffs Up With Team of Star Trek Veterans
    Marvel's under-wraps TV project Vision Quest — another spin-off from hit MCU series WandaVision — is being made by a team of veteran Star Trek writers and production staff.The series, which has quietly been in development now for over a year, was previously announced as having gained Star Trek: Picard writer and later showrunner Terry Matalas.Matalas took over running Star Trek: Picard for its third (and best) season, and quickly set about reuniting the character with more of his former Star Trek: The Next Generation cast. PlayNow, Matalas will act as showrunner for the Paul Bettany-starring Vision Quest — and reunite with a number of other Star Trek writers in the process.As detailed this week by Vision Quest's listing on the Writer's Guild of America website, fellow Picard writers Chris Monfette, Cindy Appel, and Matt Okumura have also joined the new Marvel project. (It's worth noting that all of these people worked on the latter half of Picard, alongside Matalas, rather than the show's shakier first season.)Most interesting of all, perhaps, is confirmation that Battlestar Galactica, Star Trek: Deep Space 9, and Star Trek: Voyager writer Michael Taylor is also working on Vision Quest. The 25 Best MCU HeroesTaylor wrote more than a dozen episodes of Voyager and is responsible for some of the very best episodes of DS9, including In the Pale Moonlight and The Visitor, the latter of which featured the late Tony Todd as a grown-up alternate version of Jake Sisko in an alternate timeline.Filming for Vision Quest began earlier this spring, primarily based at Pinewood Studios in London (though a location shoot in Scotland has also been spotted).Marvel is yet to detail the series' story, though fans expect it will reveal the fate of Paul Bettany's White Vision, last seen flying away at the end of WandaVision. Curiously, the series is also expected to include the return of James Spader's Ultron (last seen being destroyed at the end of 2015's Avengers: Age of Ultron) and the character of Raza from the original Iron Man, who kidnapped Tony Stark and stuck him in a cave.Vision Quest is expected to be released on Disney+ at some point in 2026. And, if you're keeping track, that means it'll almost certainly now arrive before the delayed Avengers: Doomsday — although after Spider-Man: Brand New Day.Tom Phillips is IGN's News Editor. You can reach Tom at tom_phillips@ign.com or find him on Bluesky @tomphillipseg.bsky.social
    0 Yorumlar 0 hisse senetleri
  • What CIOs Need to Know About the Technical Aspects of AI Integration

    An AI integration modifies a business process and how employees work, but it also requires an integration with IT infrastructure and systems. This is where some of IT’s most technically savvy staff will be working, and they will want to discuss technology integration approaches and ideas. Most CIOs aren’t software engineers, but they are responsible for having a working knowledge of all things IT so they can hold meaningful dialogues with their most technical employees to assist in defining technology direction. What do CIOs need to know about the technical side of AI integration? 1. AI technical integration is about embedding AI in systems and workflows The assumption here is that by the time your staff is getting into technical design and tooling decisions, that the business case and application for AI have already been decided. Now the task is deciding how to effect a technical embedding and integration of the AI into the IT infrastructure and applications that will support the business process. 2. Modeling is first and foremost AI systems are built around models that utilize data stores, algorithms for query, and machine learning that expands the AI’s body of knowledge as the AI recognizes common logic patterns in data and assimilates knowledge from them. There are many different AI models to choose from. In most cases, companies use predefined AI models from vendors and then expand on them. In other cases, companies elect to build their own models “from scratch.”  Related:Building from scratch usually means that the organization has an on-board data science group with expertise in AI model building. Common AI model frameworks, provide the software resources and tools. These AI model-building technologies are not familiar to most IT staffs. The technologies use data graphs to build dataflows and structures that define how the data will move through the graph. Operational flows for the logic that operates on data must be defined. The model-building software also provides for algorithm development, model training, business rule definitions, and the machine learning that the model executes on its own as it “learns” from the data it ingests. IT might not know this stuff, but it can’t afford to ignore it. IT and CIOs need at least a working knowledge of how these opensource model building technologies work, because inevitably, these models must interface with IT infrastructure and data.  3. IT Infrastructure comes next Related:How to integrate an AI system with existing IT infrastructure is where CIOs can expect significant dialogue with their technical staffs. The AI has to be integrated seamlessly with the top to bottom tech stack if it is going to work. This means discussing how and where data from the AI will be stored, with SQL and noSQL databases being the early favorites. Middleware that enables the AI to interoperate with other IT systems must be interfaced with. Most AI models are open source, which can simplify integration --  but integration still requires using middleware APIslike REST, which integrates the AI system with Internet-based resources; or GraphQLwhich facilitates the integration of data from multiple sources. It’s IT that decides how to deploy the optimal data stores, infrastructure storage and connectors needed to support the AI, and there are likely to be different optionsfor deployment. This is where the CIO needs to dialogue with technical staff. 4. Data quality The AI group will rely on IT to provide quality data for the AI. This is accomplished in two ways: 1) by ensuring that all data incoming into the AI data repository is “clean”, and it is accurate and it is able to interact with other data in the AI data repository; and the data is secure. Whether it is working with outside vendors, vetting vendors for clean, secure data and periodically auditing them; or defining the data transformations and security technology and operations that must be put in place internally, it is all IT’s responsibility. The CIO will need to dialogue on technical levels with vendors, and with the IT database, storage, security, systems, applications and networking groups. Related:5. AI security The datain and to AI must be secure at all times. To arrive at this point, security must be enacted on multiple levels, and it will entail technical discussions and decision making to get there.  First and foremost is data security. Much of this has already been discussed under data quality, and it will involve most IT departmental teams. Second is user access authorities and activity monitoring. Who gets access to what, and how will you monitor user activities? The users can define their own authorization lists and IT can implement these -- but complication occurs when it comes to monitoring user activities. If for example, the user activities occur only with onsite data repositories, sites can use a technology like IAM, which gives IT granular visibility of every user activity. However, if cloud-based access is involved, IAM won’t be able to monitor this activity at any level of detail. It might become necessary to use CIEMsoftware instead to gain granular observation of user activity in the cloud. Then there are “umbrella” technologies like IGAthat can serve as an over-arching framework for both IAM and CIEM.  The IT security groupmust decide which strategy to adopt for comprehensive protection of AI. Finally, there are malware threats that are unique to AI. Yes, you can use standard malware detection to ward off attacks from bad actors on AI data, just as you would on standard data and applications -- but the plot thickens from there. For example, there are malware injections into AI systems that can inject inaccurate data or change the labels and features of data. These skew the results derived from that data and result in erroneous recommendations and decisions. The practice is known as “data poisoning.”  IT is expected to come up with a data validation technique for incoming data that can detect possible poisoning attempts and stop them. This could involve data sanitization technologies, or data source verifications, and it is possible that inserting these technologies could slow down data transport. The technical staff needs to weigh these options, and CIOs should insert themselves into the discussions. The Bottom Line The bottom line is clear: CIOs must be able to dialogue and participate in decisions at multiple AI levels: the strategic, the operational and the technical. Even if companies have dedicated data science groups, both data scientists and users will ultimately wend their way to IT, which still must make the whole thing happen. CIOs can help both their staffs and their companies if they develop a working knowledge of how AI works, in addition to understanding the strategic and operational aspects of AI -- because companies, employees and business partners all need to hear the CIO’s voice. 
    #what #cios #need #know #about
    What CIOs Need to Know About the Technical Aspects of AI Integration
    An AI integration modifies a business process and how employees work, but it also requires an integration with IT infrastructure and systems. This is where some of IT’s most technically savvy staff will be working, and they will want to discuss technology integration approaches and ideas. Most CIOs aren’t software engineers, but they are responsible for having a working knowledge of all things IT so they can hold meaningful dialogues with their most technical employees to assist in defining technology direction. What do CIOs need to know about the technical side of AI integration? 1. AI technical integration is about embedding AI in systems and workflows The assumption here is that by the time your staff is getting into technical design and tooling decisions, that the business case and application for AI have already been decided. Now the task is deciding how to effect a technical embedding and integration of the AI into the IT infrastructure and applications that will support the business process. 2. Modeling is first and foremost AI systems are built around models that utilize data stores, algorithms for query, and machine learning that expands the AI’s body of knowledge as the AI recognizes common logic patterns in data and assimilates knowledge from them. There are many different AI models to choose from. In most cases, companies use predefined AI models from vendors and then expand on them. In other cases, companies elect to build their own models “from scratch.”  Related:Building from scratch usually means that the organization has an on-board data science group with expertise in AI model building. Common AI model frameworks, provide the software resources and tools. These AI model-building technologies are not familiar to most IT staffs. The technologies use data graphs to build dataflows and structures that define how the data will move through the graph. Operational flows for the logic that operates on data must be defined. The model-building software also provides for algorithm development, model training, business rule definitions, and the machine learning that the model executes on its own as it “learns” from the data it ingests. IT might not know this stuff, but it can’t afford to ignore it. IT and CIOs need at least a working knowledge of how these opensource model building technologies work, because inevitably, these models must interface with IT infrastructure and data.  3. IT Infrastructure comes next Related:How to integrate an AI system with existing IT infrastructure is where CIOs can expect significant dialogue with their technical staffs. The AI has to be integrated seamlessly with the top to bottom tech stack if it is going to work. This means discussing how and where data from the AI will be stored, with SQL and noSQL databases being the early favorites. Middleware that enables the AI to interoperate with other IT systems must be interfaced with. Most AI models are open source, which can simplify integration --  but integration still requires using middleware APIslike REST, which integrates the AI system with Internet-based resources; or GraphQLwhich facilitates the integration of data from multiple sources. It’s IT that decides how to deploy the optimal data stores, infrastructure storage and connectors needed to support the AI, and there are likely to be different optionsfor deployment. This is where the CIO needs to dialogue with technical staff. 4. Data quality The AI group will rely on IT to provide quality data for the AI. This is accomplished in two ways: 1) by ensuring that all data incoming into the AI data repository is “clean”, and it is accurate and it is able to interact with other data in the AI data repository; and the data is secure. Whether it is working with outside vendors, vetting vendors for clean, secure data and periodically auditing them; or defining the data transformations and security technology and operations that must be put in place internally, it is all IT’s responsibility. The CIO will need to dialogue on technical levels with vendors, and with the IT database, storage, security, systems, applications and networking groups. Related:5. AI security The datain and to AI must be secure at all times. To arrive at this point, security must be enacted on multiple levels, and it will entail technical discussions and decision making to get there.  First and foremost is data security. Much of this has already been discussed under data quality, and it will involve most IT departmental teams. Second is user access authorities and activity monitoring. Who gets access to what, and how will you monitor user activities? The users can define their own authorization lists and IT can implement these -- but complication occurs when it comes to monitoring user activities. If for example, the user activities occur only with onsite data repositories, sites can use a technology like IAM, which gives IT granular visibility of every user activity. However, if cloud-based access is involved, IAM won’t be able to monitor this activity at any level of detail. It might become necessary to use CIEMsoftware instead to gain granular observation of user activity in the cloud. Then there are “umbrella” technologies like IGAthat can serve as an over-arching framework for both IAM and CIEM.  The IT security groupmust decide which strategy to adopt for comprehensive protection of AI. Finally, there are malware threats that are unique to AI. Yes, you can use standard malware detection to ward off attacks from bad actors on AI data, just as you would on standard data and applications -- but the plot thickens from there. For example, there are malware injections into AI systems that can inject inaccurate data or change the labels and features of data. These skew the results derived from that data and result in erroneous recommendations and decisions. The practice is known as “data poisoning.”  IT is expected to come up with a data validation technique for incoming data that can detect possible poisoning attempts and stop them. This could involve data sanitization technologies, or data source verifications, and it is possible that inserting these technologies could slow down data transport. The technical staff needs to weigh these options, and CIOs should insert themselves into the discussions. The Bottom Line The bottom line is clear: CIOs must be able to dialogue and participate in decisions at multiple AI levels: the strategic, the operational and the technical. Even if companies have dedicated data science groups, both data scientists and users will ultimately wend their way to IT, which still must make the whole thing happen. CIOs can help both their staffs and their companies if they develop a working knowledge of how AI works, in addition to understanding the strategic and operational aspects of AI -- because companies, employees and business partners all need to hear the CIO’s voice.  #what #cios #need #know #about
    WWW.INFORMATIONWEEK.COM
    What CIOs Need to Know About the Technical Aspects of AI Integration
    An AI integration modifies a business process and how employees work, but it also requires an integration with IT infrastructure and systems. This is where some of IT’s most technically savvy staff will be working, and they will want to discuss technology integration approaches and ideas. Most CIOs aren’t software engineers, but they are responsible for having a working knowledge of all things IT so they can hold meaningful dialogues with their most technical employees to assist in defining technology direction. What do CIOs need to know about the technical side of AI integration? 1. AI technical integration is about embedding AI in systems and workflows The assumption here is that by the time your staff is getting into technical design and tooling decisions, that the business case and application for AI have already been decided. Now the task is deciding how to effect a technical embedding and integration of the AI into the IT infrastructure and applications that will support the business process. 2. Modeling is first and foremost AI systems are built around models that utilize data stores, algorithms for query, and machine learning that expands the AI’s body of knowledge as the AI recognizes common logic patterns in data and assimilates knowledge from them. There are many different AI models to choose from. In most cases, companies use predefined AI models from vendors and then expand on them. In other cases, companies elect to build their own models “from scratch.”  Related:Building from scratch usually means that the organization has an on-board data science group with expertise in AI model building. Common AI model frameworks (e.g., Tensorflow, PyTorch, Keras, and others), provide the software resources and tools. These AI model-building technologies are not familiar to most IT staffs. The technologies use data graphs to build dataflows and structures that define how the data will move through the graph. Operational flows for the logic that operates on data must be defined. The model-building software also provides for algorithm development, model training, business rule definitions, and the machine learning that the model executes on its own as it “learns” from the data it ingests. IT might not know this stuff, but it can’t afford to ignore it. IT and CIOs need at least a working knowledge of how these opensource model building technologies work, because inevitably, these models must interface with IT infrastructure and data.  3. IT Infrastructure comes next Related:How to integrate an AI system with existing IT infrastructure is where CIOs can expect significant dialogue with their technical staffs. The AI has to be integrated seamlessly with the top to bottom tech stack if it is going to work. This means discussing how and where data from the AI will be stored, with SQL and noSQL databases being the early favorites. Middleware that enables the AI to interoperate with other IT systems must be interfaced with. Most AI models are open source, which can simplify integration --  but integration still requires using middleware APIs (application programming interfaces) like REST (representational state transfer application programming interface), which integrates the AI system with Internet-based resources; or GraphQL (graph query language,) which facilitates the integration of data from multiple sources. It’s IT that decides how to deploy the optimal data stores, infrastructure storage and connectors needed to support the AI, and there are likely to be different options (and costs) for deployment. This is where the CIO needs to dialogue with technical staff. 4. Data quality The AI group will rely on IT to provide quality data for the AI. This is accomplished in two ways: 1) by ensuring that all data incoming into the AI data repository is “clean” (i.e., the data has been transformed by software like ETL (extract-transform-load), and it is accurate and it is able to interact with other data in the AI data repository; and the data is secure (i.e., encrypted between transfer points or checked at the edges of each resource the data must traverse). Whether it is working with outside vendors, vetting vendors for clean, secure data and periodically auditing them; or defining the data transformations and security technology and operations that must be put in place internally, it is all IT’s responsibility. The CIO will need to dialogue on technical levels with vendors, and with the IT database, storage, security, systems, applications and networking groups. Related:5. AI security The data (and data access) in and to AI must be secure at all times. To arrive at this point, security must be enacted on multiple levels, and it will entail technical discussions and decision making to get there.  First and foremost is data security. Much of this has already been discussed under data quality, and it will involve most IT departmental teams. Second is user access authorities and activity monitoring. Who gets access to what, and how will you monitor user activities? The users can define their own authorization lists and IT can implement these -- but complication occurs when it comes to monitoring user activities. If for example, the user activities occur only with onsite data repositories, sites can use a technology like IAM (identity access management), which gives IT granular visibility of every user activity. However, if cloud-based access is involved, IAM won’t be able to monitor this activity at any level of detail. It might become necessary to use CIEM (cloud infrastructure entitlement management) software instead to gain granular observation of user activity in the cloud. Then there are “umbrella” technologies like IGA (identity governance administration) that can serve as an over-arching framework for both IAM and CIEM.  The IT security group (and their CIO) must decide which strategy to adopt for comprehensive protection of AI. Finally, there are malware threats that are unique to AI. Yes, you can use standard malware detection to ward off attacks from bad actors on AI data, just as you would on standard data and applications -- but the plot thickens from there. For example, there are malware injections into AI systems that can inject inaccurate data or change the labels and features of data. These skew the results derived from that data and result in erroneous recommendations and decisions. The practice is known as “data poisoning.”  IT is expected to come up with a data validation technique for incoming data that can detect possible poisoning attempts and stop them. This could involve data sanitization technologies, or data source verifications, and it is possible that inserting these technologies could slow down data transport. The technical staff needs to weigh these options, and CIOs should insert themselves into the discussions. The Bottom Line The bottom line is clear: CIOs must be able to dialogue and participate in decisions at multiple AI levels: the strategic, the operational and the technical. Even if companies have dedicated data science groups, both data scientists and users will ultimately wend their way to IT, which still must make the whole thing happen. CIOs can help both their staffs and their companies if they develop a working knowledge of how AI works, in addition to understanding the strategic and operational aspects of AI -- because companies, employees and business partners all need to hear the CIO’s voice. 
    0 Yorumlar 0 hisse senetleri