Businesses

An Automation Tipping Point? The Rise of 'Robotics as a Service' (venturebeat.com) 104

"Robotics-as-a-service (RaaS) is about to eat the world of work" argues Hooman Radfar, a partner at the startup studio Expa who's been "actively investing in and looking for new companies" catalyzing the change." Companies buy massive robots and software solutions that are customized -- at great cost -- to their specific needs. The massive conglomerates that sell these robots have dominated the field for decades, but that is about to change. One major factor driving this change is how dramatically globalization has reduced hardware production costs and capabilities. At the same time, cheap and powerful computing and cloud infrastructure are now also readily available and easy to spin up. As a result, vertical-specific, robotic-powered, solutions can today be offered as variable cost services versus being sold at a fixed cost. Just as cable companies include the costs of set-top boxes in their monthly bill, robots and their associated software will be bundled together and sold in a subscription package. This change to the robotics business model will have profound implications, radically transforming markets and at the same time changing the future of work.

With a new variable cost model in place as a result of subscription packages, it's simple to calculate when a market is about to tip to favor RaaS. A market has hit its automation tipping point when an RaaS solution is introduced with a unit cost that is less than or equal to the unit cost for humans-in-the-loop to conduct the same task... One market that has already reached its automation tipping point is the enterprise building security market... Crop dusting ($70 billion), industrial cleaning ($78 billion), warehouse management ($21 billion), and many more service markets are tipping. When these sectors hit their automation tipping point, we will see the same level of industry disruption currently taking place in the building security market.

The changes taking place in the enterprise will also deeply impact consumer markets, and ultimately society, in profound and potentially challenging ways. We are at the start of a massive shift in how work gets done.

One study predicted the worldwide RaaSS market would be $34.7 within three years, according to the article, which also explores how the building security market is already being disrupted. "Instead of manning a building with three to four people, you can have one human managing a few remote robots" -- at a cost that's 30% cheaper.

"Moreover, all the data and insights collected via these robots is organized and made available for building and security optimization. It isn't just cheaper, it's better. There's no turning back -- this market has hit its automation tipping point."
Google

Google's New ReCAPTCHA Has a Dark Side (fastcompany.com) 94

An anonymous reader quotes a report from Fast Company: We've all tried to log into a website or submit a form only to be stuck clicking boxes of traffic lights or storefronts or bridges in a desperate attempt to finally convince the computer that we're not actually a bot. For many years, this has been one of the predominant ways that reCaptcha -- the Google-run internet bot detector -- has determined whether a user is a bot or not. But last fall, Google launched a new version of the tool, with the goal of eliminating that annoying user experience entirely. Now, when you enter a form on a website that's using reCaptcha V3, you won't see the "I'm not a robot" checkbox, nor will you have to prove you know what a cat looks like. Instead, you won't see anything at all.

Google is also now testing an enterprise version of reCaptcha v3, where Google creates a customized reCaptcha for enterprises that are looking for more granular data about users' risk levels to protect their site algorithms from malicious users and bots. But this new, risk-score based system comes with a serious trade-off: users' privacy. According to two security researchers who've studied reCaptcha, one of the ways that Google determines whether you're a malicious user or not is whether you already have a Google cookie installed on your browser. It's the same cookie that allows you to open new tabs in your browser and not have to re-log in to your Google account every time. But according to Mohamed Akrout, a computer science PhD student at the University of Toronto who has studied reCaptcha, it appears that Google is also using its cookies to determine whether someone is a human in reCaptcha v3 tests. Akrout wrote in an April paper about how reCaptcha v3 simulations that ran on a browser with a connected Google account received lower risk scores than browsers without a connected Google account.
"Because reCaptcha v3 is likely to be on every page of a website, if you're signed into your Google account there's a chance Google is getting data about every single webpage you go to that is embedded with reCaptcha v3 -- and there many be no visual indication on the site that it's happening, beyond a small reCaptcha logo hidden in the corner," the report adds.
China

Eight of the World's Biggest Technology Service Providers Were Hacked by Chinese Cyber Spies in an Elaborate and Years-Long Invasion (reuters.com) 99

The invasion exploited weaknesses in those companies, their customers, and the Western system of technological defense, Reuters reported on Wednesday. From the report: Hacked by suspected Chinese cyber spies five times from 2014 to 2017, security staff at Swedish telecoms equipment giant Ericsson had taken to naming their response efforts after different types of wine. Pinot Noir began in September 2016. After successfully repelling a wave of attacks a year earlier, Ericsson discovered the intruders were back. And this time, the company's cybersecurity team could see exactly how they got in: through a connection to information-technology services supplier Hewlett Packard Enterprise. Teams of hackers connected to the Chinese Ministry of State Security had penetrated HPE's cloud computing service and used it as a launchpad to attack customers, plundering reams of corporate and government secrets for years in what U.S. prosecutors say was an effort to boost Chinese economic interests.

The hacking campaign, known as "Cloud Hopper," was the subject of a U.S. indictment in December that accused two Chinese nationals of identity theft and fraud. Prosecutors described an elaborate operation that victimized multiple Western companies but stopped short of naming them. A Reuters report at the time identified two: Hewlett Packard Enterprise and IBM. Yet the campaign ensnared at least six more major technology firms, touching five of the world's 10 biggest tech service providers. Also compromised by Cloud Hopper, Reuters has found: Fujitsu, Tata Consultancy Services, NTT Data, Dimension Data, Computer Sciences Corporation and DXC Technology. HPE spun-off its services arm in a merger with Computer Sciences Corporation in 2017 to create DXC.

Security

Huawei Telecom Gear Much More Vulnerable To Hackers Than Rivals' Equipment, Report Says (wsj.com) 84

Telecommunications gear made by China's Huawei is far more likely to contain flaws that could be leveraged by hackers for malicious use than equipment from rival companies, according to new research by cybersecurity experts that top U.S. officials said appeared credible. From a report: Over half of the nearly 10,000 firmware images encoded into more than 500 variations of enterprise network-equipment devices tested by the researchers contained at least one such exploitable vulnerability, the researchers found. Firmware is the software that powers the hardware components of a computer. The tests were compiled in a new report that has been submitted in recent weeks to senior officials in multiple government agencies in the U.S. and the U.K., as well as to lawmakers. The report is notable both for its findings and because it is circulating widely among Trump administration officials who said it further validated their policy decisions toward Huawei.

"This report supports our assessment that since 2009, Huawei has maintained covert access to some of the systems it has installed for international customers," said a White House official who reviewed the findings. "Huawei does not disclose this covert access to customers nor local governments. This covert access enables Huawei to record information and modify databases on those local systems." The report, reviewed by The Wall Street Journal, was prepared by Finite State, a Columbus, Ohio-based cybersecurity firm.

IBM

China's Biggest Startups Ditch Oracle and IBM for Home-Made Tech (bloomberg.com) 132

For years, companies like Oracle and IBM invested heavily to build new markets in China for their industry-leading databases. Now, boosted in part by escalating U.S. tensions, one Chinese upstart is stepping in, winning over tech giants, startups and financial institutions to its enterprise software. From a report: Beijing-based PingCAP already counts more than 300 Chinese customers. Many, including food delivery giant Meituan, its bike-sharing service Mobike, video streaming site iQIYI and smartphone maker Xiaomi are migrating away from Oracle and IBM's services toward PingCAP's, encapsulating a nation's resurgent desire to Buy China. PingCAP's ascendancy comes as the U.S. cuts Huawei off from key technology, sending chills through the country's largest entities while raising questions about the security of foreign-made products. That's a key concern as Chinese companies modernize systems in every industry from finance and manufacturing to healthcare by connecting them to the internet.
Chromium

Microsoft's Chromium Edge Browser Now Available On Windows 7 and Windows 8 (theverge.com) 58

The Chromium-powered Edge browser is now available on both Windows 7 and Windows 8 for testing today. The Verge reports: The release comes two months after Chromium Edge first debuted on Windows 10, and a month after it appeared on macOS. Microsoft is releasing the daily Canary builds initially, and plans to support the weekly Dev channel "soon." You can download the installer over at Microsoft's Edge Insider site. "You will find the experience and feature set on previous versions of Windows to be largely the same as on Windows 10, including forthcoming support for Internet Explorer mode for our enterprise customers," explains a Microsoft Edge team blog post. While most features will be the same, dark mode is missing and Microsoft says there is no support for AAD sign-in.
IBM

Why New York's Subway Still Uses OS/2 (tedium.co) 197

Every day 5.7 million people ride the subway in New York City -- and are subjected to both "the whims of the Metropolitan Transit Authority and the unheard-of reliability of a marginally successful operating system from the early 1990s."

martiniturbide shared this report from Tedium: OS/2 and MTA consultant Neil Waldhauer said in an email, "For a few years, you could bet your career on OS/2." To understand why, you need to understand the timing. Waldhauer continues, "The design is from a time before either Linux or Windows was around. OS/2 would have seemed like a secure choice for the future." So for a lack of options, the MTA went with its best one. And it's worked out for decades, as one of the key software components of a quite complex system...

Despite the failure of OS/2 in the consumer market, it was hilariously robust, leading to a long life in industrial and enterprise systems -- with one other famous example being ATMs. Waldhauer said, "Thinking about all the operating systems in use [in the MTA], I'd have to say that OS/2 is probably the most robust part of the system, except for the mainframe." It's still in use in the NYC subway system in 2019. IBM had long given up on it, even allowing another company to maintain the software in 2001. (These days, a firm named Arca Noae sells an officially supported version of OS/2, ArcaOS, though most of its users are in similar situations to the MTA.)

HP

IT Pro Screwed Out of Unused Vacation Pay, Bonus By HPE Thanks To Outdated Law (theregister.co.uk) 229

Slashdot reader Meg Whitman shares a report from The Register: A "highly skilled IT professional" has lost his fight to be paid his unused vacation days as well as a non-trivial bonus, after a judge stuck to a law he admitted was outdated. Matthew White joined Hewlett-Packard in 2013 and left in July 2015, just months before the company split into HP and Hewlett Packard Enterprise (HPE). After quitting, he was stunned when the U.S. mega-corp, citing HPE's new policies, refused to hand over extra pay he felt was contractually due. Hewlett-Packard had enticed White with a sweet contract that offered a signing bonus, base salary, regular bonuses, and a benefits program. But after he quit, he was left without his unused vacation pay and a $10,000 bonus he felt he was entitled to. [...]

HPE decided that, under the law, White could only get hold of the relevant policies if he turned up, in person, to the company's official human resources headquarters -- which is on the other side of America in California, roughly 2,500 miles away. White felt this was ridiculous given that HP, sorry, HPE is not only a massive organization with HR people all over the United States, but that it was a technology company with countless employees working across the world, often at home, and that the policies are likely readily available in an internal cloud. The judge had some sympathy for that view. "This part of the statute may indeed need reworking for today's world where cloud-based digital records are replacing physical file folders located in a physical location, where employees work at home -- sometimes remotely from any head office or regional office -- and where worldwide companies like HP assign HP personnel for an entire country or region, or even outsource various HP responsibilities." Yet the judge still decided against the techie.

Security

Should Companies Abandon Their Password Expiration Policies? (techcrunch.com) 132

In his TechCrunch column, software engineer/journalist Jon Evans writes that last month "marked a victory for sanity and pragmatism over irrational paranoia." I'm talking about Microsoft finally -- finally! but credit to them for doing this nonetheless! -- removing the password expiration policies from their Windows 10 security baseline... Many enterprise-scale organizations (including TechCrunch's owner Verizon) require their users to change their passwords regularly. This is a spectacularly counterproductive policy.

To quote Microsoft: "Recent scientific research calls into question the value of many long-standing password-security practices such as password expiration policies, and points instead to better alternatives... If a password is never stolen, there's no need to expire it. And if you have evidence that a password has been stolen, you would presumably act immediately rather than wait for expiration to fix the problem... If an organization has successfully implemented banned-password lists, multi-factor authentication, detection of password-guessing attacks, and detection of anomalous logon attempts, do they need any periodic password expiration? And if they haven't implemented modern mitigations, how much protection will they really gain from password expiration...?"

Perfect security doesn't exist. World-class security is hard. But decent security is generally quite accessible, if you faithfully follow some basic rules. In order to do so, it's best to keep those rules to a minimum, and get rid of the ones that don't make sense. Password expiration is one of those. Goodbye to it, and good riddance.

Instead the column recommends password managing software to avoid password re-use across sites, as well as two-factor authentication. "And please, if you work with code or data repositories, stop checking your passwords and API keys into your repos."

But if your company still has a password expiration policy, he suggests mailing Microsoft's blog post to your sys-admin. "They will ignore you at first, of course, because that's what enterprise administrators do, and because information security (like transportation security) is too often an irrational one-way ratchet because our culture of fear incentivizes security theater rather than actual security -- but they may grudgingly begin to accept that the world has moved on."
Advertising

Google Struggles To Justify Why It's Restricting Ad Blockers In Chrome (vice.com) 178

An anonymous reader quotes a report from Vice News: Google has found itself under fire for plans to limit the effectiveness of popular ad blocking extensions in Chrome. While Google says the changes are necessary to protect the "user experience" and improve extension security, developers and consumer advocates say the company's real motive is money and control. In the wake of ongoing backlash to the proposal, Chrome software security engineer Chris Palmer took to Twitter this week to claim the move was intended to help improve the end-user browsing experience, and paid enterprise users would be exempt from the changes.

Chrome security leader Justin Schuh also said the changes were driven by privacy and security concerns. Adblock developers, however, aren't buying it. uBlock Origin developer Raymond Hill, for example, argued this week that if user experience was the goal, there were other solutions that wouldn't hamstring existing extensions. "Web pages load slow because of bloat, not because of the blocking ability of the webRequest API -- at least for well crafted extensions," Hill said. Hill said that Google's motivation here had little to do with the end user experience, and far more to do with protecting advertising revenues from the rising popularity of adblock extensions.
The team behind the EFF's Privacy Badger ad-blocking extension also spoke out against the changes. "Google's claim that these new limitations are needed to improve performance is at odds with the state of the internet," the organization said. "Sites today are bloated with trackers that consume data and slow down the user experience. Tracker blockers have improved the performance and user experience of many sites and the user experience. Why not let independent developers innovate where the Chrome team isn't?"
Robotics

'Robots' Are Not 'Coming For Your Job' -- Management Is (gizmodo.com) 191

merbs writes: If the robots are simply "coming," if they just show up and relieve a helpless lot of humans of their livelihoods, then no one is to blame for this techno-elemental phenomenon, and little is to be done about it beyond bracing for impact. Not the executives swayed by consulting firms who insist the future is in AI customer service bots, or the managers who see an opportunity to improve profit margins by adopting automated kiosks that edge out cashiers, or the shipping conglomerate bosses who decide to replace dockworkers with a fleet of automated trucks. These individuals may feel as if they have no choice, with shareholders and boards and bosses of their own to answer to, and an economic system that incentivizes the making of these decisions -- and sometimes the technology will perform obviously superior work to the human -- but they are exactly that: decisions, made by people, to call in or build the job-threatening robots.

Pretending otherwise, that robots in every use case are inevitable, is the very worst form of technological determinism, and leads to a dearth in critical thinking about when and how automation *is* best implemented. Because even the most ardent robot lovers will agree, there are plenty of cases of badly deployed automation; systems that make our lives worse and more inefficient, and that kill jobs en route to worse outcomes. And such automated regression is often implemented under the logic of 'robots are coming,' so better hop aboard. We will be able to make better decisions about embracing effective automation if we understand that, in practice, 'the robots are coming for our jobs' usually means something more like 'a CEO wants to cut his operating budget by 15 percent and was just pitched on enterprise software that promises to do the work currently done by thirty employees in accounts payable.'

Blackberry

BlackBerry Messenger Shuts Down For Good Today (engadget.com) 66

Today, Emtek pulls the plug on BlackBerry Messenger. From a report: The company announced last month that it would shut down the consumer service, which has been steadily losing users and failing to attract new ones. As a consolation for diehard fans, BlackBerry opened BBM Enterprise, its enterprise-grade encrypted Messenger (BBMe), for personal use. That's available on Android, iOS, Windows and Mac. Three years ago, the company set out to reinvigorate BBM consumer service, but those efforts fell flat. "We poured our hearts into making this a reality, and we are proud of what we have built to date," BlackBerry wrote on its blog. "The technology industry however, is very fluid, and in spite of our substantial efforts, users have moved on to other platforms, while new users proved difficult to sign on."
Advertising

Google To Restrict Modern Ad Blocking Chrome Extensions To Enterprise Users (9to5google.com) 312

Earlier this year, Google proposed changes to the open-source Chromium browser that would break content-blocking extensions, including various ad blockers. Despite the overwhelming negative feedback to the move, Google appears to be standing firm on the changes, sharing that current ad blocking capabilities will be restricted to enterprise users. 9to5Google reports: Manifest V3 comprises a major change to Chrome's extensions system, including a revamp to the permissions system and a fundamental change to the way ad blockers operate. In particular, modern ad blockers, like uBlock Origin and Ghostery, use Chrome's webRequest API to block ads before they're even downloaded. With the Manifest V3 proposal, Google deprecates the webRequest API's ability to block a particular request before it's loaded. As you would expect, power users and extension developers alike criticized Google's proposal for limiting the user's ability to browse the web as they see fit.

Now, months later, Google has responded to some of the various issues raised by the community, sharing more details on the changes to permissions and more. The most notable aspect of their response, however, is a single sentence buried in the text, clarifying their changes to ad blocking and privacy blocking extensions: "Chrome is deprecating the blocking capabilities of the webRequest API in Manifest V3, not the entire webRequest API (though blocking will still be available to enterprise deployments)." Google is essentially saying that Chrome will still have the capability to block unwanted content, but this will be restricted to only paid, enterprise users of Chrome. This is likely to allow enterprise customers to develop in-house Chrome extensions, not for ad blocking usage.

Android

Huawei's Android Replacement OS Will Launch in June, Company Exec Says (techradar.com) 72

Huawei's home-grown operating system -- codenamed HongMeng -- that's set to replace Android once the Huawei ban from Google comes into full effect, will be commercially rolled out next month, a Middle East head for the firm revealed exclusively to TechRadar Middle East. From a report: On May 20, Google announced that it would partially cut off Huawei devices from its Android operating system but was given an extension till August 19 by the US White House. "Huawei knew this was coming and was preparing. The OS was ready in January 2018 and this was our 'Plan B'," said Alaa Elshimy, Managing Director and Vice President of Huawei Enterprise Business Group Middle East. "We did not want to bring the OS to the market as we had a strong relationship with Google and others and did not want to ruin the relationship. Now, we are rolling it out next month."
Security

Google Says Some G Suite User Passwords Were Stored In Plaintext Since 2005 (techcrunch.com) 35

Google says a small number of its enterprise customers mistakenly had their passwords stored on its systems in plaintext. The exact number was not disclosed. "We recently notified a subset of our enterprise G Suite customers that some passwords were stored in our encrypted internal systems unhashed," said Google vice president of engineering Suzanne Frey.

Slashdot reader pegdhcp appears to be one of the users impacted by this security lapse: I am sharing a message that I received from G Suite, redacted. They are having some serious problem... If you missed the message or somehow tend to ignore sometimes extremely frequent and unnecessary G Suite messages like I do, this one can be important depending on your settings. [You can read the full email message (with redactions) below:]
Hardware

Google Glass Gets a Surprise Upgrade and New Frames (cnet.com) 59

Google just unveiled its newest version of Glass. It's not made to be a widespread consumer product, but there are business users who will care. And the latest Glass Enterprise Edition 2, with key upgraded specs, shows where most smartglasses are at. From a report: You might remember Glass as a strange 2013 footnote, but Glass has stuck around: it became an enterprise-targeted device in 2017, and has been used in a variety of other assistive ways. Plenty of other AR headsets have been moving into the enterprise space over the last couple of years too, from Microsoft HoloLens 2 to Vuzix' glasses. While the single-display design of Glass isn't going to allow 3D augmented reality like what you'd experience on HoloLens 2, there could be applications for other types of useful augmented reality via the improved built-in camera and upgraded onboard processor. Google's announcement touts the new onboard Qualcomm XR1 chip as enabling "support for computer vision and advanced machine learning capabilities."

Google representatives refused to comment on whether that means the new Glass could possibly adopt some Google Lens-like features, and Google's VP of VR and AR, Clay Bavor, said in a statement that "Using technologies like computer vision and AR, our team's focus has been on building helpful experiences that provide useful information in context. Glass Enterprise Edition 2 does just that, and we're excited to give businesses and their employees tools to help them work better, smarter and faster."

Government

Critics Call White House Social Media Bias Survey A 'Data Collection Ploy' (sfgate.com) 199

An anonymous reader quotes the Washington Post: Venky Ganesan, a partner at technology investor Menlo Ventures, told The Washington Post that the White House's new survey about bias on social media is "pure kabuki theatre" and an attempt to curry political points with conservatives. He said the Trump administration's repeated accusations that tech companies censor conservative voices are unfounded because even though most Silicon Valley executives are liberal or libertarian, they wouldn't let politics get in the way of their primary goal: making money...

The Internet Association, a trade association representing Facebook, Google and other tech companies, also pushed back on President Trump's repeated accusations that their products are biased against conservatives. The association says the platforms are open and enable the speech of all Americans -- including the president himself. "That's why the president uses Twitter so much," said Michael Beckerman, the Internet Association's chief executive. "He actually used Twitter for this particular announcement, which is perhaps ironic."

The article adds that the Trump administration "declined to tell The Washington Post what it planned to do with the data it's amassing." But on Twitter the New York Times technology columnist Kevin Roose argued that the survey "is just going to be used to assemble a voter file, which Trump will then pay Facebook millions of dollars to target with ads about how biased Facebook is."

Vice also believes it's a "craven data collection ploy" and "an elaborate way of getting people to subscribe to the White House's email list," adding "If this whole enterprise feels shady, that's because it is... The site isn't even hosted on a government server, but was created with Typeform, a Spain-based web tool that lets anyone set up simple surveys." Mashable also notes that the site "also just so happens to have an absolutely bonkers privacy policy" which includes allowing the White House to edit everything that's submitted.

Click here to read even more reactions.
Businesses

Hewlett Packard Enterprise To Acquire Supercomputer Maker Cray for $1.3 Billion (anandtech.com) 101

Hewlett Packard Enterprise will be buying the supercomputer maker Cray for roughly $1.3 billion, the companies said this morning. Intending to use Cray's knowledge and technology to bolster their own supercomputing and high-performance computing technologies, when the deal closes, HPE will become the world leader for supercomputing technology. From a report: Cray of course needs no introduction. The current leader in the supercomputing field and founder of supercomputing as we know it, Cray has been a part of the supercomputing landscape since the 1970s. Starting at the time with fully custom systems, in more recent years Cray has morphed into an integrator and scale-out specialist, combining processors from the likes of Intel, AMD, and NVIDIA into supercomputers, and applying their own software, I/O, and interconnect technologies. The timing of the acquisition announcement closely follows other major news from Cray: the company just landed a $600 million US Department of Energy contract to supply the Frontier supercomputer to Oak Ridge National Laboratory in 2021. Frontier is one of two exascale supercomputers Cray is involved in -- the other being a subcontractor for the 2021 Aurora system -- and in fact Cray is involved in the only two exascale systems ordered by the US Government thus far. So in both a historical and modern context, Cray was and is one of the biggest players in the supercomputing market.
Microsoft

Microsoft Launches Decentralized Identity Tool on Bitcoin Blockchain (coindesk.com) 38

Microsoft is launching the first decentralized infrastructure implementation by a major tech company that is built directly on the bitcoin blockchain. From a report: The open source project, called Ion, deals with the underlying mechanics of how networks talk to each other. For example, if you log onto Airbnb using Facebook, a protocol deals with the software that sends the personal information from your social profile to that external service provider. In this case, Ion handles the decentralized identifiers, which control the ability to prove you own the keys to this data.

Christopher Allen, a crypto veteran and the co-founder of the World Wide Web Consortium (W3C) working group for decentralized identity (DID) solutions, told CoinDesk that Microsoft's move could impact the entire tech industry. "A lot of enterprise infrastructures use Microsoft products," Allen said. "So if they integrate this into any of their infrastructure products, they'll have access to DID." Indeed, Yorke Rhodes, a program manager on Microsoft's blockchain engineering team, told CoinDesk that Microsoft's team has been working for a year on a key signing and validation software that relies on public networks, like bitcoin or ethereum, yet can handle far greater throughput than the underlying blockchain itself.

Open Source

Microsoft Open-Sources a Crucial Algorithm Behind Its Bing Search Services (techcrunch.com) 55

An anonymous reader quotes a report from TechCrunch: Microsoft today announced that it has open-sourced a key piece of what makes its Bing search services able to quickly return search results to its users. By making this technology open, the company hopes that developers will be able to build similar experiences for their users in other domains where users search through vast data troves, including in retail, though in this age of abundant data, chances are developers will find plenty of other enterprise and consumer use cases, too. The piece of software the company open-sourced today is a library Microsoft developed to make better use of all the data it collected and AI models it built for Bing .

With the Space Partition Tree and Graph (SPTAG) algorithm that is at the core of the open-sourced Python library, Microsoft is able to search through billions of pieces of information in milliseconds. Vector search itself isn't a new idea, of course. What Microsoft has done, though, is apply this concept to working with deep learning models. First, the team takes a pre-trained model and encodes that data into vectors, where every vector represents a word or pixel. Using the new SPTAG library, it then generates a vector index. As queries come in, the deep learning model translates that text or image into a vector and the library finds the most related vectors in that index. The library is now available under the MIT license and provides all of the tools to build and search these distributed vector indexes. You can find more details about how to get started with using this library -- as well as application samples -- here.

Slashdot Top Deals