Will artificial intelligence become ubiquitous?
The use of connected smart devices is growing rapidly, but they are not yet ubiquitous. There are three challenges to widespread adoption of AI. Many friends may have realized that artificial intelligence has affected our lives. Achieving ubiquitous artificial intelligence could be life-changing in the future. For example, our food never goes bad and everything we eat is healthy. Even out shopping, the store will immediately know that we have walked in and start recommending customized products, which is why it is crucial to understand and break down barriers to AI adoption.
3 obstacles to the adoption of artificial intelligence applications:
- Hardware and hardware compatibility are key, and the technology is currently not mature yet.
- People have reason to worry about privacy issues.
- The necessary technology is very expensive.
The first challenge: hardware
such as smart refrigerator. Samsung launched such a device in 2018, but it was more of a novelty. According to data from an organization, smart refrigerators were the most popular in North America in 2019, accounting for 31% of the global market. However, these are not Star Trek-style devices with touch screens, instead they are smart thanks to internal circuitry that allows for greater efficiency and self-monitoring, and users may not even realize how smart the device is.
Major appliances take longer to replace than mobile phones, and consumers will replace larger items as needed, so they are less likely to buy a new phone simply because it is more efficient than because the battery life is slightly longer Possibility of new phone.
Updating hardware is not a simple task either. We can't just add a Wi-Fi card to any refrigerator and hope it broadcasts service records to the local repair center. Most of the electronics in our lives are not modular or designed to scale well beyond their current design. This is a serious limitation for integrating IoT devices, because as anyone with just a few smart light bulbs will tell you, hardware and hardware compatibility is key, and we're not there yet.
That is to say, smart refrigerators, as well as other examples of smart hardware, are absolutely necessary to build a future life driven by artificial intelligence. It will take a while for us to agree on a future of AI-driven hardware that some of us will buy into sooner than others. This group of early adopters is critical to leading the way to mass adoption, helping to address vulnerabilities and proving that these products not only work, but bring value to people’s lives.
Second Challenge: Privacy
We are entering an era where personal data is more valuable than ever, and consumers are beginning to realize this fact. A 2019 report showed that more than 60% of respondents believed connected devices were creepy, which could reduce adoption of such devices.
While all of this may sound intimidating, there are some interesting innovations that address these pain points. We may be enjoying the benefits of this kind of thinking without even realizing it. To understand this, we have to enter a room full of network devices.
Most of us are familiar with server rooms, thanks to some of the mundane yet high-tech data centers we see in TV shows and movies. What most consumers don't realize is that companies don't upgrade all their data center hardware at once. Just like when you buy a new laptop, you probably don't buy a new router, over time data center components get replaced here and there, and it can end up becoming a patchwork of vendors and services.
Some time ago, network administrators unified management while allowing the underlying system to micromanage individual components. This requires special software to integrate all the different requirements of all the different devices, controlling them as needed while obfuscating the details for managers.
As data centers continue to be upgraded, more and more privacy is embedded in them. While we can't yet fully trust every step we take toward artificial intelligence, we can expect that in the next few years, most data centers will be privacy-centric.
Final Challenge: Cost
The cost of current artificial intelligence solutions is often prohibitive. However, this is not always the case.
We’re already pushing AI to the edge in a more cost-effective way, layering software on top of existing hardware rather than waiting for specialized AI-specific chips. We can add functionality to machines by leveraging their networks and power grids.
Going back to our not-so-smart refrigerator, what would happen if the electric box was replaced with a smart electric box that would detect the refrigerator in your home based on its power usage? The smart electric box will know the manufacturer and model of the refrigerator and make decisions about the contents of the refrigerator based on this information. Add a smart kitchen camera, or an anti-embedded scale, and we can add sensors without adding much cost.
Ultimately, the best AI solutions will cross all these barriers. They will push AI to end consumers without relying on specialized chips, which will require consumers to replace their devices with new ones. After all, ubiquitous AI relies on it wherever it is needed.
The above is the detailed content of Will artificial intelligence become ubiquitous?. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics



Configuring a Debian mail server's firewall is an important step in ensuring server security. The following are several commonly used firewall configuration methods, including the use of iptables and firewalld. Use iptables to configure firewall to install iptables (if not already installed): sudoapt-getupdatesudoapt-getinstalliptablesView current iptables rules: sudoiptables-L configuration

This article describes how to adjust the logging level of the ApacheWeb server in the Debian system. By modifying the configuration file, you can control the verbose level of log information recorded by Apache. Method 1: Modify the main configuration file to locate the configuration file: The configuration file of Apache2.x is usually located in the /etc/apache2/ directory. The file name may be apache2.conf or httpd.conf, depending on your installation method. Edit configuration file: Open configuration file with root permissions using a text editor (such as nano): sudonano/etc/apache2/apache2.conf

The readdir function in the Debian system is a system call used to read directory contents and is often used in C programming. This article will explain how to integrate readdir with other tools to enhance its functionality. Method 1: Combining C language program and pipeline First, write a C program to call the readdir function and output the result: #include#include#include#includeintmain(intargc,char*argv[]){DIR*dir;structdirent*entry;if(argc!=2){

In Debian systems, readdir system calls are used to read directory contents. If its performance is not good, try the following optimization strategy: Simplify the number of directory files: Split large directories into multiple small directories as much as possible, reducing the number of items processed per readdir call. Enable directory content caching: build a cache mechanism, update the cache regularly or when directory content changes, and reduce frequent calls to readdir. Memory caches (such as Memcached or Redis) or local caches (such as files or databases) can be considered. Adopt efficient data structure: If you implement directory traversal by yourself, select more efficient data structures (such as hash tables instead of linear search) to store and access directory information

The steps to install an SSL certificate on the Debian mail server are as follows: 1. Install the OpenSSL toolkit First, make sure that the OpenSSL toolkit is already installed on your system. If not installed, you can use the following command to install: sudoapt-getupdatesudoapt-getinstallopenssl2. Generate private key and certificate request Next, use OpenSSL to generate a 2048-bit RSA private key and a certificate request (CSR): openss

In Debian systems, the readdir function is used to read directory contents, but the order in which it returns is not predefined. To sort files in a directory, you need to read all files first, and then sort them using the qsort function. The following code demonstrates how to sort directory files using readdir and qsort in Debian system: #include#include#include#include#include//Custom comparison function, used for qsortintcompare(constvoid*a,constvoid*b){returnstrcmp(*(

Using OpenSSL for digital signature verification on Debian systems, you can follow these steps: Preparation to install OpenSSL: Make sure your Debian system has OpenSSL installed. If not installed, you can use the following command to install it: sudoaptupdatesudoaptininstallopenssl to obtain the public key: digital signature verification requires the signer's public key. Typically, the public key will be provided in the form of a file, such as public_key.pe

In Debian systems, OpenSSL is an important library for encryption, decryption and certificate management. To prevent a man-in-the-middle attack (MITM), the following measures can be taken: Use HTTPS: Ensure that all network requests use the HTTPS protocol instead of HTTP. HTTPS uses TLS (Transport Layer Security Protocol) to encrypt communication data to ensure that the data is not stolen or tampered during transmission. Verify server certificate: Manually verify the server certificate on the client to ensure it is trustworthy. The server can be manually verified through the delegate method of URLSession
