In 2016 at TechCrunch Disrupt New York, several of the original developers behind what became Siri unveiled Viv, an AI platform that promised to connect various third-party applications to perform just about any task. The pitch was tantalizing — but never fully realized. Samsung later acquired Viv, folding a pared-down version of the tech into its Bixby voice assistant.
Six years later, a new team claims to have cracked the code to a universal AI assistant — or at least to have gotten a little bit closer. At a product lab called Adept that emerged from stealth today with $65 million in funding, they are — in the founders’ words — “build[ing] general intelligence that enables humans and computers to work together creatively to solve problems.”
It’s lofty stuff. But Adept’s co-founders, CEO David Luan, CTO Niki Parmar and chief scientist Ashish Vaswani, boil their ambition down to perfecting an “overlay” within computers that works using the same tools people do. This overlay will be able to respond to commands like “generate a monthly compliance report” or “draw stairs between these two points in this blueprint,” Adept asserts, all using existing software like Airtable, Photoshop, Tableau and Twilio to get the job done.
Mots-clés : cybersécurité, sécurité informatique, protection des données, menaces cybernétiques, veille cyber, analyse de vulnérabilités, sécurité des réseaux, cyberattaques, conformité RGPD, NIS2, DORA, PCIDSS, DEVSECOPS, eSANTE, intelligence artificielle, IA en cybersécurité, apprentissage automatique, deep learning, algorithmes de sécurité, détection des anomalies, systèmes intelligents, automatisation de la sécurité, IA pour la prévention des cyberattaques.
Bots et IA biaisées : une menace silencieuse pour la cybersécurité des entreprises Introduction Les…
Cloudflare en Panne : Causes Officielles, Impacts et Risques pour les Entreprises Le 5 décembre…
Introduction La cybersécurité est aujourd’hui une priorité mondiale. Récemment, la CISA (Cybersecurity and Infrastructure Security…
La transformation numérique face aux nouvelles menaces Le cloud computing s’impose aujourd’hui comme un…
Les attaques par déni de service distribué (DDoS) continuent d'évoluer en sophistication et en ampleur,…
Face à l'adoption croissante des technologies d'IA dans les PME, une nouvelle menace cybersécuritaire émerge…
This website uses cookies.