Understanding Cognitive Dissonance in AI: Unravelling Drift, Bias, and Other Issues

This article explores cognitive dissonance in AI, focusing on the inconsistencies in AI system outputs due to conflicting data, rules, or patterns. It examines key issues such as drift, bias, overfitting, underfitting, explainability, transparency, data privacy, security, hallucinations, and data poisoning. The article also provides strategies for addressing these challenges, emphasizing the importance of continuous monitoring, bias mitigation, model complexity balance, enhancing explainability, robust data governance, and protection against data poisoning. The goal is to develop more reliable, fair, and trustworthy AI systems.

Continue reading

Why AI Responses Vary: Understanding the Subjectivity and Variability in AI Language Models

Artificial Intelligence (AI) language models often generate different responses to the same query, leading to perceptions of inconsistency and subjectivity. This article delves into the reasons behind this variability, including the probabilistic nature of AI, contextual dependence, diversity in training data, and other influencing factors. It also offers insights on achieving greater consistency in AI interactions.

Continue reading

Analysis of “The Supply Chain Problem” by Jon Davies, CTO at Pervade

In the digital age, cybersecurity has become a critical concern for organizations worldwide. Jon Davies, CTO at Pervade, addresses this issue comprehensively in his whitepaper, “The Supply Chain Problem.” This article delves into the key points raised in the whitepaper, analyzing the background, emerging trends, challenges, and proposed solutions to supply chain cyber-attacks.

Continue reading

Wayne Horkan at FICTA 2024: “AI: the spearhead of progress, not there yet”

FICTA 24 brought together experts to discuss AI’s transformative potential and the challenges ahead. My keynote, “AI: the spearhead of progress, not quite there”, covered the current state of AI, its applications across various industries, and the ethical considerations crucial for its future. The conference underscored the importance of interdisciplinary collaboration and featured esteemed speakers who provided valuable insights into AI and technology.

Continue reading

Daemon Targaryen is a bargain bucket Elric and Valyrians are knock-off Melnibonéans.

This article explores the intriguing comparisons between Daemon Targaryen from George R.R. Martin’s A Song of Ice and Fire series and Elric of Melniboné from Michael Moorcock’s Elric Saga, cheekily framing Daemon as a “bargain bucket Elric” and Valyrians as “knock-off Melnibonéans.” By examining their superficial similarities and deeper divergences, as well as the cultural parallels and distinctions between Valyrians and Melnibonéans, the discussion reveals both the influences and unique qualities that define these iconic characters and their respective worlds, offering insights into the rich tapestry of fantasy literature.

Continue reading
Jimmy Carl Black - Poster from the film "Where's the beer and when do we get paid"

Free as in Beer vs. Free as in Speech: Understanding Different “Free” Concepts

The term “free” can be ambiguous, particularly in software and digital content. “Free as in beer” means something is available at no cost, akin to receiving a free drink, but without the freedom to modify or share it. “Free as in speech” emphasizes user freedoms, allowing modification, distribution, and understanding of the software’s code. Other examples of “free” include free trials, freeware, and ad-supported services. Understanding these distinctions helps users make informed decisions about the software and content they use.

Continue reading

A Beginner’s Guide to Using MetaTrader 4 for Trading Success

Part of a short series of articles on using MetaTrader 4, written on request. This does not mean I endorse trading, MetaTrader 4, or that I’d do this because I wouldn’t. I design and build IT systems, and that’s what I’ll stick to, ta. This article is the introduction and precis to the other articles below.

Continue reading

Reaction to FT’s Comparative Analysis of AI Video Models: Sora versus Runway

In the rapidly evolving field of artificial intelligence, video generation technologies are shaping up to be the next frontier in digital media creation. As companies strive to leverage AI for more realistic and creative video content, OpenAI’s Sora is emerging as a standout contender. A recent evaluation by the Financial Times, which tested several AI video models including Sora, Runway, and Pika, revealed intriguing results about their capabilities. This article delves into why Sora appears to be leading the pack, potentially redefining how industries like advertising, animation, and real estate utilize video content in the digital age.

Continue reading

The Ideal Strengths and Capabilities of Service Desk Professionals: Shaping the Future of IT Support

What are the essential strengths and capabilities that define the best in IT support leadership? From fostering a positive workplace culture to mastering the latest in technical expertise, learn how service desk managers and third-line engineers are shaping the future of IT support. This insightful article dives deep into the qualities that make these professionals indispensable to their teams and organizations. Join us in exploring the key insights that drive success in the fast-evolving world of IT support.

Continue reading

Cyber Governance at a Crossroads: Responding to DSIT’s Consultation

This framing article summarises a set of responses to DSIT’s Cyber Governance Code of Practice consultation in Jan/Feb 2024. It highlights practitioner and institutional submissions, alongside thematic deep dives on law, assurance, incentives, and professionalism. The message: DSIT asked the right questions, but the hardest answers were still missing.

Continue reading

Professionalism and Accountability: Why Cyber Needs Recognition like Law and Engineering

This article argues that DSIT’s Cyber Governance Code of Practice must embed professional recognition for cyber experts, just as directors rely on lawyers, accountants, and engineers. Without a register of recognised professionals, directors risk being accountable without credible support.

Continue reading