As a former professor in artificial intelligence, one of my favorite–and surely one of the oldest–technological myths is found in the masterpiece, the Iliad.
In Homer’s poem narrating the Trojan War, the God of metalworking, Hephaestus, engineers one of the first robots known to history, a handmaiden designed to assist him in his forge. Not happy with limiting himself to manufacturing, Hephaestus steps it up by designing Talos, an automated bronze giant whose purpose was to protect ancient Crete from pirates and invaders.
While thousands of years have passed since Hephaestus’ mythical robots came to life, today’s intelligent machines–strong of skillful AI–are making headway in our own workplaces. Take the factories and warehouses adversely affected by the pandemic as an example. With fewer and fewer workers willing and able to assist our manufacturers and fulfilment centers, many are embracing AI and machine learning to automate tasks such as quality control which are traditionally reliant on scores of human workers.
Despite the vast amount written about AI, this technology is still, in a sense, in its “mythological” era, mostly due to the mismatch between what science fiction portrays AI to be capable of, and what today’s technology does (hint: it does a lot!).
Mots-clés : cybersécurité, sécurité informatique, protection des données, menaces cybernétiques, veille cyber, analyse de vulnérabilités, sécurité des réseaux, cyberattaques, conformité RGPD, NIS2, DORA, PCIDSS, DEVSECOPS, eSANTE, intelligence artificielle, IA en cybersécurité, apprentissage automatique, deep learning, algorithmes de sécurité, détection des anomalies, systèmes intelligents, automatisation de la sécurité, IA pour la prévention des cyberattaques.
Bots et IA biaisées : une menace silencieuse pour la cybersécurité des entreprises Introduction Les…
Cloudflare en Panne : Causes Officielles, Impacts et Risques pour les Entreprises Le 5 décembre…
Introduction La cybersécurité est aujourd’hui une priorité mondiale. Récemment, la CISA (Cybersecurity and Infrastructure Security…
La transformation numérique face aux nouvelles menaces Le cloud computing s’impose aujourd’hui comme un…
Les attaques par déni de service distribué (DDoS) continuent d'évoluer en sophistication et en ampleur,…
Face à l'adoption croissante des technologies d'IA dans les PME, une nouvelle menace cybersécuritaire émerge…
This website uses cookies.