Article | February 27, 2020
Microsoft recently announced that it’s leveraging a new global strategic partnership with Telefonica to jointly develop “go-to-market plans for regions the company does business.Last year during Mobile World Congress 2019, Microsoft took the veil off its newfound relationship with the international telecommunications giant, Telefonica.Highlighted during this year’s announcement was Microsoft’s opening of a new datacenter region in Spain. Microsoft’s new data center comes at a time where the company looks to help expedite Spain’s digital transformation.
Article | February 27, 2020
TinyML, as a concept, concerns the running of ML inference on Ultra Low-Power (ULP 1mW) microcontrollers found on IoT devices. Yet today, various challenges still limit the effective execution of TinyML in the embedded IoT world. As both a concept and community, it is still under development.Here at Ericsson, the focus of our TinyML as-a-Service (TinyMLaaS) activity is to democratize TinyML, enabling manufacturers to start their AI businesses using TinyML, which runs on 8, 16 and 32 bit microcontrollers.Our goal is to make the execution of ML tasks possible and easy in a specific class of devices. These devices are characterized by very constrained hardware and software resources such as sensor and actuator nodes based on these microcontrollers.Below, we present how we can bind the as-a-service model to TinyML. We will provide a high-level technical overview of our concept and introduce the design requirements and building blocks which characterize this emerging paradigm.
BIG DATA MANAGEMENT
Article | February 27, 2020
In this article, we will explore different techniques to detect money laundering activities.
Notwithstanding, regardless of various expected applications inside the financial services sector, explicitly inside the Anti-Money Laundering (AML) appropriation of Artificial Intelligence and Machine Learning (ML) has been generally moderate.
What is Money Laundering, Anti Money Laundering?
Money Laundering is where someone unlawfully obtains money and moves it to cover up their crimes.
Anti-Money Laundering can be characterized as an activity that forestalls or aims to forestall money laundering from occurring.
It is assessed by UNO that, money-laundering exchanges account in one year is 2–5% of worldwide GDP or $800 billion — $3 trillion in USD. In 2019, regulators and governmental offices exacted fines of more than $8.14 billion.
Indeed, even with these stunning numbers, gauges are that just about 1 % of unlawful worldwide money related streams are ever seized by the specialists.
AML activities in banks expend an over the top measure of manpower, assets, and cash flow to deal with the process and comply with the guidelines.
What are the punishments for money laundering?
In 2019, Celent evaluated that spending came to $8.3 billion and $23.4 billion for technology and operations, individually. This speculation is designated toward guaranteeing anti-money laundering.
As we have seen much of the time, reputational costs can likewise convey a hefty price. In 2012, HSBC laundering of an expected £5.57 billion over at least seven years.
What is the current situation of the banks applying ML to stop money laundering?
Given the plenty of new instruments the banks have accessible, the potential feature risk, the measure of capital involved, and the gigantic expenses as a form of fines and punishments, this should not be the situation.
A solid impact by nations to curb illicit cash movement has brought about a huge yet amazingly little part of money laundering being recognized — a triumph rate of about 2% average.
Dutch banks — ABN Amro, Rabobank, ING, Triodos Bank, and Volksbank announced in September 2019 to work toward a joint transaction monitoring to stand-up fight against Money Laundering.
A typical challenge in transaction monitoring, for instance, is the generation of a countless number of alerts, which thusly requires operation teams to triage and process the alarms.
ML models can identify and perceive dubious conduct and besides they can classify alerts into different classes such as critical, high, medium, or low risk. Critical or High alerts may be directed to senior experts on a high need to quickly explore the issue.
Today is the immense number of false positives, gauges show that the normal, of false positives being produced, is the range of 95 and 99%, and this puts extraordinary weight on banks.
The examination of false positives is tedious and costs money. An ongoing report found that banks were spending near 3.01€ billion every year exploring false positives.
Establishments are looking for increasing productive ways to deal with crime and, in this specific situation, Machine Learning can end up being a significant tool.
Financial activities become productive, the gigantic sum and speed of money related exchanges require a viable monitoring framework that can process exchanges rapidly, ideally in real-time.
What are the types of machine learning algorithms which can identify money laundering transactions?
Supervised Machine Learning, it is essential to have historical information with events precisely assigned and input variables appropriately captured. If biases or errors are left in the data without being dealt with, they will get passed on to the model, bringing about erroneous models.
It is smarter to utilize Unsupervised Machine Learning to have historical data with events accurately assigned. It sees an obscure pattern and results. It recognizes suspicious activity without earlier information of exactly what a money-laundering scheme resembles.
What are the different techniques to detect money laundering?
K-means Sequence Miner algorithm: Entering banking transactions, at that point running frequent pattern mining algorithms and mining transactions to distinguish money laundering. Clustering transactions and dubious activities to money laundering lastly show them on a chart.
Time Series Euclidean distance: Presenting a sequence matching algorithm to distinguish money laundering detection, utilizing sequential detection of suspicious transactions. This method exploits the two references to recognize dubious transactions: a history of every individual’s account and exchange data with different accounts.
Bayesian networks: It makes a model of the user’s previous activities, and this model will be a measure of future customer activities. In the event that the exchange or user financial transactions have.
Cluster-based local outlier factor algorithm: The money laundering detection utilizing clustering techniques combination and Outliers.
For banks, now is the ideal opportunity to deploy ML models into their ecosystem. Despite this opportunity, increased knowledge and the number of ML implementations prompted a discussion about the feasibility of these solutions and the degree to which ML should be trusted and potentially replace human analysis and decision-making.
In order to further exploit and achieve ML promise, banks need to continue to expand on its awareness of ML strengths, risks, and limitations and, most critically, to create an ethical system by which the production and use of ML can be controlled and the feasibility and effect of these emerging models proven and eventually trusted.
Article | February 27, 2020
In the age of Big Data, you’ll hear a lot of terms tossed around. Three of the most commonly used are business intelligence,” data warehousing and data analytics.You may wonder, however, what distinguishes these three concepts from each other so let’s take a look. What differentiates business intelligence from the other two on the list is the idea of presentation. Business intelligence is primarily about how you take the insights you’ve developed from the use of analytics to produce action. BI tools include items like To put it simply, business intelligence is the final product. It’s the yummy cooked food that comes out of the frying pan when everything is done.In the flow of things, business intelligence interacts heavily with data warehousing and analytics systems. Information can be fed into analytics packages from warehouses. It then comes out of the analytics software and is routed back into storage and also into BI. Once the BI products have been created, information may yet again be fed back into data storage and warehousing.