Search This Blog

Powered by Blogger.

Blog Archive

Labels

Showing posts with label NVIDIA. Show all posts

Are GPUs Ready for the AI Security Test?

 


As generative AI technology gains momentum, the focus on cybersecurity threats surrounding the chips and processing units driving these innovations intensifies. The crux of the issue lies in the limited number of manufacturers producing chips capable of handling the extensive data sets crucial for generative AI systems, rendering them vulnerable targets for malicious attacks.

According to recent records, Nvidia, a leading player in GPU technology, announced cybersecurity partnerships during its annual GPU technology conference. This move underscores the escalating concerns within the industry regarding the security of chips and hardware powering AI technologies.

Traditionally, cyberattacks garner attention for targeting software vulnerabilities or network flaws. However, the emergence of AI technologies presents a new dimension of threat. Graphics processing units (GPUs), integral to the functioning of AI systems, are susceptible to similar security risks as central processing units (CPUs).


Experts highlight four main categories of security threats facing GPUs:


1. Malware attacks, including "cryptojacking" schemes where hackers exploit processing power for cryptocurrency mining.

2. Side-channel attacks, exploiting data transmission and processing flaws to steal information.

3. Firmware vulnerabilities, granting unauthorised access to hardware controls.

4. Supply chain attacks, targeting GPUs to compromise end-user systems or steal data.


Moreover, the proliferation of generative AI amplifies the risk of data poisoning attacks, where hackers manipulate training data to compromise AI models.

Despite documented vulnerabilities, successful attacks on GPUs remain relatively rare. However, the stakes are high, especially considering the premium users pay for GPU access. Even a minor decrease in functionality could result in significant losses for cloud service providers and customers.

In response to these challenges, startups are innovating AI chip designs to enhance security and efficiency. For instance, d-Matrix's chip partitions data to limit access in the event of a breach, ensuring robust protection against potential intrusions.

As discussions surrounding AI security evolve, there's a growing recognition of the need to address hardware and chip vulnerabilities alongside software concerns. This shift reflects a proactive approach to safeguarding AI technologies against emerging threats.

The intersection of generative AI and GPU technology highlights the critical importance of cybersecurity in the digital age. By understanding and addressing the complexities of GPU security, stakeholders can mitigate risks and foster a safer environment for AI innovation and adoption.


Nvidia Unveils Latest AI Chip, Promising 30x Faster Performance

 

Nvidia, a dominant force in the semiconductor industry, has once again raised the bar with its latest unveiling of the B200 "Blackwell" chip. Promising an astonishing 30 times faster performance than its predecessor, this cutting-edge AI chip represents a significant leap forward in computational capabilities. The announcement was made at Nvidia's annual developer conference, where CEO Jensen Huang showcased not only the groundbreaking new chip but also a suite of innovative software tools designed to enhance system efficiency and streamline AI integration for businesses. 

The excitement surrounding the conference was palpable, with attendees likening the atmosphere to the early days of tech presentations by industry visionaries like Steve Jobs. Bob O'Donnell from Technalysis Research, who was present at the event, remarked, "the buzz was in the air," underscoring the anticipation and enthusiasm for Nvidia's latest innovations. 

One of the key highlights of the conference was Nvidia's collaboration with major tech giants such as Amazon, Google, Microsoft, and OpenAI, all of whom expressed keen interest in leveraging the capabilities of the new B200 chip for their cloud-computing services and AI initiatives. With an 80% market share and a track record of delivering cutting-edge solutions, Nvidia aims to solidify its position as a leader in the AI space. 

In addition to the B200 chip, Nvidia also announced plans for a new line of chips tailored for automotive applications. These chips will enable functionalities like in-vehicle chatbots, further expanding the scope of AI integration in the automotive industry. Chinese electric vehicle manufacturers BYD and Xpeng have already signed up to incorporate Nvidia's new chips into their vehicles, signalling strong industry endorsement. 

Furthermore, Nvidia demonstrated its commitment to advancing robotics technology by introducing a series of chips specifically designed for humanoid robots. This move underscores the company's versatility and its role in shaping the future of AI-powered innovations across various sectors. Founded in 1993, Nvidia initially gained recognition for its graphics processing chips, particularly in the gaming industry. 

However, its strategic investments in machine learning capabilities have propelled it to the forefront of the AI revolution. Despite facing increasing competition from rivals like AMD and Intel, Nvidia remains a dominant force in the market, capitalizing on the rapid expansion of AI-driven technologies. As the demand for AI solutions continues to soar, Nvidia's latest advancements position it as a key player in driving innovation and shaping the trajectory of AI adoption in the business world. With its track record of delivering high-performance chips and cutting-edge software tools, Nvidia is poised to capitalize on the myriad opportunities presented by the burgeoning AI market.

NVIDIA's Dominance in Shaping the Digital World

 


NVIDIA, a global technology powerhouse, is making waves in the tech industry, holding about 80% of the accelerator market in AI data centres operated by major players like AWS, Google Cloud, and Microsoft Azure. Recently hitting a monumental $2 trillion market value, NVIDIA's stock market soared by $277 billion in a single day – a historic moment on Wall Street.

In a remarkable financial stride, NVIDIA reported a staggering $22.1 billion in revenue, showcasing a 22% sequential growth and an astounding 265% year-on-year increase. Colette Kress, NVIDIA's CFO, emphasised that we are at the brink of a new computing era.

Jensen Huang, NVIDIA's CEO, highlighted the integral role their GPUs play in our daily interactions with AI. From ChatGPT to video editing platforms like Runway, NVIDIA is the driving force behind these advancements, positioning itself as a leader in the ongoing industrial revolution.

The company's influence extends to generative AI startups like Anthropic and Inflection, relying on NVIDIA GPUs, specifically RTX 5000 and H100s, to power their services. Notably, Meta's Mark Zuckerberg disclosed plans to acquire 350K NVIDIA H100s, emphasising NVIDIA's pivotal role in training advanced AI models.

NVIDIA is not only a tech giant but also a patron of innovation, investing in over 30 AI startups, including Adept, AI21, and Character.ai. The company is actively engaged in healthcare and drug discovery, with investments in Recursion Pharmaceuticals and its BioNeMo AI model for drug discovery.

India has become a focal point for NVIDIA, with promises of tens of thousands of GPUs and strategic partnerships with Reliance and Tata. The company is not just providing hardware; it's actively involved in upskilling India's talent pool, collaborating with Infosys and TCS to train thousands in generative AI.

Despite facing GPU demand challenges last year, NVIDIA has significantly improved its supply chain. Huang revealed plans for a new GPU range, Blackwell, promising enhanced AI compute performance, potentially reducing the need for multiple GPUs. Additionally, the company aims to build the next generation of AI factories, refining raw data into valuable intelligence.

Looking ahead, Huang envisions sovereign AI infrastructure worldwide, making AI-generation factories commonplace across industries and regions. The upcoming GTC conference in March 2024 is set to unveil NVIDIA's latest innovations, attracting over 300,000 attendees eager to learn about the next generation of AI.

To look at the bigger picture, NVIDIA's impact extends far beyond its impressive financial achievements. From powering AI startups to influencing global tech strategies, the company is at the forefront of shaping the future of technology. As it continues to innovate, NVIDIA remains a key player in advancing AI capabilities and fostering a new era of computing.


Nvidia CEO Believes AI Would Kill Coding

 

When ChatGPT was first made public by OpenAI in November 2022, many were taken aback by its abilities. People discovered an array of opportunities for the AI chatbot, ranging from asking it to write poetry and music to debug and coding. Companies like Google and Microsoft also quickly released their own chatbots, Bard (now Gemini) and Bing. With ChatGPT, the popularity of generative AI reached new heights. 

AI has been heralded by many as the future. Notable figures in the IT industry, including Sam Altman, Satya Nadella, Bill Gates, and Sundar Pichai, have already spoken on the possible effects of AI on labour markets, highlighting its significance. While some IT professionals think AI will result in job losses in the IT industry, others think it will open up more opportunities. 

CEO of Nvidia Jensen Huang agrees that AI will have an impact on the labour market and argues that anyone can become a programmer with this new technology, so children don't need to learn how to code. 

The Nvidia CEO can be seen speaking at an event in a video that has gone viral. He claims that a decade or so ago, the consensus was that everyone should learn how to code. Now, however, things are entirely different because of artificial intelligence; everyone is a coder. He also said that children don't need to learn how to code and that it is our responsibility to create technology that would enable human language to be used in programming. Put another way, computers should be able to understand human language, minimising the necessity for coding languages like C++ or Java.

He explains, "Over the last 10-15 years, almost everybody who sits on a stage like this would tell you that it is vital that your children learn computer science, everybody should learn how to program. In fact, it is almost exactly the opposite. It is our job to create computing technology such that nobody has to program, and that the programming language is human. Everybody in the world is now a programmer. This is the miracle of AI."

"You now have a computer that will do what you tell it to do. It is vital that we upskill everyone and the upskilling process will be delightful and surprising,” Huang added. 

This is not the first time the Nvidia CEO has spoken about AI's ubiquitous effect across sectors. As one of the world's leading chipmakers, Nvidia was instrumental in the development of ChatGPT, which made use of hundreds of Nvidia GPUs. 

Huang announced the closure of the "digital divide" at a gathering held at the Computex convention in Taiwan last year. He emphasised how AI is bringing about a new era of computing, when previously unthinkable tasks are made possible. Huang highlighted how programming is now accessible to almost anyone, saying that all it takes to become a programmer is some computer involvement.

AI Boom: Cybercriminals Winning Early

Artificial intelligence (AI) is ushering in a transformative era across various industries, including the cybersecurity sector. AI is driving innovation in the realm of cyber threats, enabling the creation of increasingly sophisticated attack methods and bolstering the efficiency of existing defense mechanisms.

In this age of AI advancement, the potential for a safer world coexists with the emergence of fresh prospects for cybercriminals. As the adoption of AI technologies becomes more pervasive, cyber adversaries are harnessing its power to craft novel attack vectors, automate their malicious activities, and maneuver under the radar to evade detection.

According to a recent article in The Messenger, the initial beneficiaries of the AI boom are unfortunately cybercriminals. They have quickly adapted to leverage generative AI in crafting sophisticated phishing emails and deepfake videos, making it harder than ever to discern real from fake. This highlights the urgency for organizations to fortify their cybersecurity infrastructure.

On a more positive note, the demand for custom chips has skyrocketed, as reported by TechCrunch. As generative AI algorithms become increasingly complex, off-the-shelf hardware struggles to keep up. This has paved the way for a new era of specialized chips designed to power these advanced systems. Industry leaders like NVIDIA and AMD are at the forefront of this technological arms race, racing to develop the most efficient and powerful AI chips.

McKinsey's comprehensive report on the state of AI in 2023 reinforces the notion that generative AI is experiencing its breakout year. The report notes, "Generative AIs have surpassed many traditional machine learning models, enabling tasks that were once thought impossible." This includes generating realistic human-like text, images, and even videos. The applications span from content creation to simulating real-world scenarios for training purposes.

However, amidst this wave of optimism, ethical concerns loom large. The potential for misuse, particularly in deepfakes and disinformation campaigns, is a pressing issue that society must grapple with. Dr. Sarah Rodriguez, a leading AI ethicist, warns, "We must establish robust frameworks and regulations to ensure responsible use of generative AI. The stakes are high, and we cannot afford to be complacent."

Unprecedented opportunities are being made possible by the generative AI surge, which is changing industries. The potential is limitless and can improve anything from creative processes to data synthesis. But we must be cautious with this technology and deal with the moral issues it raises. Gaining the full benefits of generative AI will require a careful and balanced approach as we navigate this disruptive period.


Nvidia's AI Software Raises Concerns Over Exposing Sensitive Data

 

Nvidia, a leading technology company known for its advancements in artificial intelligence (AI) and graphics processing units (GPUs), has recently come under scrutiny for potential security vulnerabilities in its AI software. The concerns revolve around the potential exposure of sensitive data and the need to ensure robust data protection measures.

A report revealed that Nvidia's AI software had the potential to expose sensitive data due to the way it handles information during the training and inference processes. The software, widely used for various AI applications, including natural language processing and image recognition, could inadvertently leak confidential data, posing a significant security risk.

One of the primary concerns is related to the use of generative AI models, such as ChatGPT, which generate human-like text responses. These models rely on vast amounts of training data, including publicly available text from the internet. While efforts are made to filter out personal information, the potential for sensitive data exposure remains a challenge.

Nvidia acknowledges the issue and is actively working on enhancing data protection measures. The company has been investing in confidential computing, a technology that aims to protect sensitive data during processing. By utilizing secure enclaves, trusted execution environments, and encryption techniques, confidential computing ensures that sensitive data remains secure and isolated, even during the training and inference stages of AI models.

To address these concerns, Nvidia has introduced tools and libraries that developers can use to enhance data privacy and security in their AI applications. These tools include privacy-preserving techniques like differential privacy and federated learning, which allow organizations to protect user data and train models without exposing personal information.

It is crucial for organizations utilizing Nvidia's AI software to implement these privacy-enhancing measures to mitigate the risks associated with potential data exposure. By adopting the best practices and tools provided by Nvidia, businesses can ensure that their AI models and applications are built with data privacy and security in mind.

The issue surrounding Nvidia's AI software serves as a reminder of the ever-evolving landscape of cybersecurity and the need for continuous vigilance. As AI technologies continue to advance, both technology providers and organizations must prioritize data protection, invest in secure computing environments, and stay updated with the latest privacy-preserving techniques.

While Nvidia's AI software has proven to be instrumental in various domains, the potential for sensitive data exposure raises concerns about data privacy and security. By actively addressing these concerns and providing tools for enhanced data protection, Nvidia is taking steps to mitigate the risks associated with potential data exposure. It is now up to organizations and developers to implement these measures to ensure that sensitive data remains safeguarded throughout the AI lifecycle.

T-Mobile Reveals its Security Systems were Hacked via Lapsus$ Hackers

 

T-Mobile acknowledged on Friday it had been the subject of a security compromise in March when the LAPSUS$ mercenary group gained access to its networks. The admission occurred after investigative journalist Brian Krebs published internal chats from LAPSUS$'s key members, revealing the group had infiltrated the company many times in March previous to the arrest of its seven members. 

After analyzing hacked Telegram chat conversations between Lapsus$ gang members, independent investigative journalist Brian Krebs first exposed the incident. T-Mobile said in a statement the breach happened "a few weeks ago" so the "bad actor" accessed internal networks using stolen credentials. "There was no customer or government information or any similarly sensitive information on the systems accessed, and the company has no evidence of the intruder being able to get anything of value," he added.

The initial VPN credentials were allegedly obtained from illegal websites such as Russian Market in order to get control of T-Mobile staff accounts, enabling the threat actor to conduct SIM switching assaults at anytime. 

The conversations suggest how LAPSUS$ had hacked T-Slack Mobile's and Bitbucket accounts, enabling the latter to obtain over 30,000 source code repositories, in addition to getting key to an internal customer account management application called Atlas. In the short time since it first appeared on the threat scene, LAPSUS$ has been known for hacking Impresa, NVIDIA, Samsung, Vodafone, Ubisoft, Microsoft, Okta, and Globant. 

T-Mobile has acknowledged six previous data breaches since 2018, including one in which hackers gained access to data linked to 3% of its members. T-Mobile acknowledged it had disclosed prepaid customers' data a year later, in 2019, and unknown threat actors had acquired access to T-Mobile workers' email accounts in March 2020. Hackers also acquired access to consumer private network information in December 2020, and attackers accessed an internal T-Mobile application without authorization in February 2021. 

According to a VICE investigation, T-Mobile, unsuccessfully, tried to prevent the stolen data from being posted online after paying the hackers $270,000 through a third-party firm in the aftermath of the August 2021 breach. After its stolen sensitive information turned up for sale on the dark web, the New York State Office of the Attorney General (NY OAG) alerted victims of T-August Mobile's data breach would face elevated identity theft risks. 

The City of London Police announced earlier this month as two of the seven adolescents arrested last month for alleged potential connections to the LAPSUS$ data extortion group, a 16-year-old, and a 17-year-old had been charged.

LAPSUS$ Group Targets SuperCare Health

 


SuperCare Health, a California-based respiratory care provider, has revealed a data breach that exposed the personal details of over 300,000 patients. Someone had access to specific systems between July 23 and July 27, 2021. By February 4, the company had assessed the scope of the data breach, learning the attackers had also acquired patient files including sensitive personal information such as:
  • Names, addresses, and birth dates.
  • A medical group or a hospital.
  • Along with health insurance details, a patient's account number and a medical record number are required. 
  • Data about one's health, such as diagnostic and treatment information. 
  • A small number of people's Social Security numbers and driver's license information were also revealed. 

"We have no reason to suspect any information was published, shared, or misused," according to SuperCare Health, but all possibly impacted patients should take extra security precautions to avoid identity theft and fraud. 

On March 25, the company notified all affected customers and implemented extra security steps to prevent the following breaches. The breach has affected 318,379 people, according to the US Department of Health and Human Services. Based on the number of people affected, this is presently among the top 50 healthcare breaches disclosed in the last two years. SuperCare Health further told, "We have reported the event to a Federal Bureau of Investigation and it will cooperate to help us identify and prosecute those involved." 

In the last several months, several healthcare institutions have revealed massive data breaches. Monongalia Health System (400,000 people affected), South Denver Cardiology Associates (287,000 people affected), Norwood Clinic (228,000 people affected), and Broward Health (228,000 people affected) are among the organizations on the list (1.3 million). 

Last week, the Health Department issued an advisory to healthcare groups, warning companies about the impact of a major cybercrime attack by the Lapsus$ cybercrime group. In recent months, the hackers have targeted Samsung, NVIDIA, Vodafone, Ubisoft, Globant, Microsoft, and Okta, among others. The organization takes information, often source code, and threatens to release it unless they are paid.

LAPSUS$ steals confidential information from organizations which have been hacked, then threatens to disclose or publish the information if the requested amount is not paid. The LAPSUS$ extortion ring, on the other hand, has abandoned the typical ransomware strategies of file encryption and computer lockout. 

According to the notice, the Health Department is aware of healthcare institutions which have been hacked as a result of the Okta attack; Okta has verified that more than 300 of its clients have been affected by the breach. In the light of the incident, Police in the United Kingdom have identified and charged several accused members of the Lapsus$ gang.

Lapsus$ Attackers Gained Access to a Support Engineer's Laptop, as per Okta

 

According to Okta, a quick inquiry into the posting of screenshots that appeared to depict a data breach discovered they are linked to a "contained" security incident that occurred in January 2022. 

After the LAPSUS$ hacking group shared screenshots on Telegram which it claimed were taken after gaining access to "Okta.com Superuser/Admin and several other systems," Okta, an enterprise identity, and access management business, initiated an investigation. 

Lapsus$ is a hacking gang that has risen through the ranks by supposedly breaking into the networks of high-profile companies one by one to collect information and threaten to disclose it online until blackmail payments are made.

Sitel, Okta's third-party provider of customer support services, was hacked by the Lapsus$ data extortion gang. "The Okta Security team was notified on January 20, 2022, a new factor had been added to a Sitel customer service engineer's Okta account. It was a password which served as this factor" Okta explains. "Though this individual approach was unsuccessful, it reset the account and contacted Sitel," says the company, which then hired a top forensic agency to conduct an investigation. 

Okta is a publicly-traded corporation based in San Francisco with thousands of users, including several technology companies. FedEx, Moody's, T-Mobile, JetBlue, and ITV are among the company's top clients. 

"Lapsus$ is infamous for extortion, threatening victims with the publication of sensitive information if demands are not met," said Ekram Ahmed, a Check Point spokesperson. "The gang boasts of infiltrating Nvidia, Samsung, and Ubisoft, among others." The public has never fully understood how the gang was able to penetrate these targets. 

Okta claims it was unaware of the scope of the event in January, believing it to be restricted to a failed account takeover attempt aimed at a Sitel support engineer. Sitel's hiring of a forensics firm to investigate the incident and prepare a report also assured Okta at the moment the situation didn't need to be escalated any further.

The stock price of Okta dropped about 20% in less than a week after the company's clumsy announcement of the January hacking event. At first, Okta CEO Todd McKinnon described the event as an "attempt" by malicious attackers to hack a support engineer's account. However, it was eventually discovered the problem had affected 2.5 percent of Okta's clients (366 in total). Sitel's support engineers have restricted access to Jira requests and support systems, but they are not allowed to download, create, or delete client records. 

According to Okta, the screenshots posted by the Lapsus$ group were taken from a compromised Sitel engineer's account with limited access. Regardless, the corporation voiced dissatisfaction with the amount of time it took for the investigation's findings to be released.

Nvidia Confirms Company Data Was Stolen in a Breach

 

Last week Chipmaker company Nvidia witnessed a cyberattack that breached its network. The company has confirmed that the intruders got access to proprietary information data and employee login data. 
As the breach came to light last week, the organization attributed the security breach to a threat group called "Lapsus$".

“We are aware that the threat actor took employee credentials and some Nvidia proprietary information from our systems and has begun leaking it online,” the company said in a statement. 

However, as of now, Nvidia didn’t produce any specific details of the stolen data. Meanwhile, LAPSUS$, the alleged culprit, has claimed that it has looted 1TB of data, including files related to the hardware and software belonging to the organization. Following the incident, Lapsus$ started demanding ransom in cryptocurrency in order to prevent the data from being published online. However, Nvidia has not confirmed its stance or response to the demands made by the hackers. 

The primary purpose of a ransomware attack is to encrypt the victim's credentials and threaten to permanently delete it unless a ransom is paid, often in Bitcoin due to the relative anonymity that cryptocurrency provides. Additionally, the threat groups use Ransomware attacks to steal the victim’s data and then threaten to release sensitive details in public unless certain demands are met. Either way, it amounts to extortion. 

According to the sources, the organization did not confirm technical details yet, therefore, it is difficult to confirm anything as of present. However, as a matter of concern, the information related to the attack continues to trickle out. For instance, some of the leaked data contain references to future GPU architectures, including Blackwell. Also, an anonymous source has apparently sent what they claim is proof of stolen DLSS source code to the folks at TechPowerUp. 

"We are investigating an incident. Our business and commercial activities continue uninterrupted. We are still working to evaluate the nature and scope of the event and don’t have any additional information to share at this time," NVIDIA initially said.

The Streamer for Gamer Nvidia Shield Tv Detected with Security Bugs

 

Computer gaming giant that goes by the motto of “level up experience more”, Nvidia detected bugs in its Shield TV. This gaming company is an American multinational technology company headquartered in California, USA. Nvidia is an artificial intelligence computing giant. The foremost work of Nvidia is to design graphics processing unit (GPU) for the gaming world and the professional market. They also develop the system on a chip unit for the mobile computing and automotive market.

In recent times, Nvidia acknowledged three security bugs in the Nvidia Shield TV which could have proved to be harmful and may permit services denial with rights escalation and data loss of the user. Nvidia Shield TV has been developed for gamers to play smart house, PC games from the PC console to television, and stream on and off the local and online internet servers. Better said, it’s a “set-top gadget” used for gaming. Subsequently, for the video-friendly graphics processing unit (GPU) monitor device, Nvidia solely published a security alert for a security bug cluster detected. 

Nvidia Shield TV interface, the NVDEC part of the hardware-dependent decoder encompasses a high– severity by CVE- 2021- 1068. Such bugs arise in the hardware when the actors can write or read from a memory location that is outside the scope of the intended boundary of the buffer. This issue later may lead to a service denial or the escalation of privileges. It has a fair rating of 7.8 CVSS.

The remaining two bugs do not hold high- severity. The flaw CVE- 2021- 1069 was detected in the NV host feature and could easily cause the data to be lost due to the null point reference. Whereas another bug CVE- 2021- 1067 endures in the application of the RPMB command status. In the RPMB command, the actors can write to the Write Protect Configuration Block, which also may lead to a service denial or the escalation of privileges. By using the upgrade note that appears on the notification screen, or via the Settings>About>System update, users can download and install the software update to secure a system. It will prevent them from any further loss of data by the detected bugs.

New AI Program can Effectively Remove the Noise from a Photograph




On July 9, researchers from NVIDIA, Aalto University, and MIT unveiled a yet another AI program that can adequately expel the noise and artifacts from pictures , this AI algorithm is the first of its kind as it doesn't even require a "clean " reference picture to get it going.

To make their noise filtering AI, the researchers began by adding noise to 50,000 sets of clean pictures and then fed these sets of grainy pictures to their AI, preparing it to expel the noise to reveal a much cleaned up version of the photograph, one that looked relatively indistinguishable to the picture before the noise was included.

Subsequent to training their AI, the scientists/researchers tried it by utilizing three sets of pictures to which they'd included the noise and they found that the framework could de-commotion the photographs in milliseconds, creating a version just marginally milder looking than the first before the noise was included.

Researchers say their algorithm can be utilized to denoise old grainy photographs, remove content based watermarks, clear up medicinal X-ray examines taken with undersampled inputs, upgrading astronomical photography, and denoise artificially produced pictures.

This in any case, isn't the principal case of an AI that can enhance inferior photos and absolutely not the first time when NVIDIA's research team has been behind such an amazing exploration.

As in April, NVIDIA and different researchers made another AI-based algorithm that can recreate pictures from which substantial lumps of content has been expelled.
Also in May, NVIDIA and other kindred researchers made an AI algorithm that can encourage robots to do different tasks just by watching a couple of redundancies by human workers.

Despite the fact that it's not yet clear when or if, this product may end up accessible to the overall population. Be that as it may, when that day comes, the researchers trust that it could definitely be helpful for various applications whether it be from astrology to medical imaging.