# Artificial Intelligence 102

## AI Review

In our Artificial Intelligence 101 article, we spoke about binary classification with supervised learning using the fly example. Then we discussed the limitations of this type of clarification because it has only two data sets to compare with the unknown data.

In the case of the fly example, we are only able to determine if it is a flying or a crawling insect. If we want to get more precise, such as determining what type of fly it is, we need to acquire more categories of labeled data. This is called multiclass classification

As we proceed with the multiclass classifications, we are also going to delve into the types of models that are used for this process, but before we begin, let’s clarify a couple of AI terms so that everything is clear, starting with data points which we scratched the surface within our AI 101 article.

### What is a Data Point?

A data point is a specific attribute that is input into the machine learning algorithm (AKA the model). It is a component that is part of a complete unit. The more data points there are, the more precise the model will be in its conclusion.

### What is a Dataset?

A dataset is a collection of data points. A data set can contain any number of data points, from a few to billions.

### Data Point and Dataset Usages

Our fly example is a representation of AI data points and datasets, but in the real world, these factors work for a large variety of conditions. Below are just a few of them.

• Financial predictions
• Using a self-driving car
• Facial recognition
• Medical diagnosis models
• Agriculture
• Predictions for better sales
• Fraud detection systems
• A customer service chatbot

Together, the algorithm reads the unknown data points that are given to it and compares those data points to the labeled model The more data points that are supplied, the more accurate the model will be.

Now, let’s look at the AI models that are available.

## Honor Thy Neighbor! The K-Nearest Neighbor Model

One of the models is called K-Nearest Neighbor (KNN). This algorithm will look at the unknown piece of data and compare it to the marked data. This is nothing new. We learned about this in our previous lesson on supervised learning, but now the comparisons will be matched against more than two classes.

In our fly example, let’s create classes that will include four types of flies: house fly, horse fly, fruit fly and horn fly. Each one of these flies have specific characteristics or patterns of data points that distinguish them from the other classes.

Example 1: Imagine you have a big puzzle with different pieces. Each piece of the puzzle represents a data point. Just like how each puzzle piece is unique and contributes to the overall picture, a data point is a single piece of information or observation that helps us understand or solve a problem.

Example 2: Let’s say we want to know the favorite color of each student in a class. Each student’s favorite color is a data point. We can collect all these data points to find patterns or make conclusions about the class’s preferences.

In simpler terms, a data point is like a puzzle piece that provides us with a small part of the whole picture or information we are trying to understand. By putting all the data points together, we can learn more about a situation, solve problems, or make decisions based on the available information.

In other words: A data point is a small piece of information or a single example that helps us understand or learn about a larger group or class of things. It’s like having one item or measurement from a collection that represents the whole group.

The k-nearest neighbors (KNN) algorithm uses data points of specific marked classes to compare to the unknown (given) data. The more data points of a specific class, the more likely the unknown data will match that class.

The algorithm will scan the data points of the unknown fly and ask itself which known fly category looks to be the closest neighbor to the unknown fly? Technically speaking, which set of data points of a specific class is the closest match to the set of data points to the unknown data? Looking at it in reverse, which class is the most distant match to the unknown data?

This is the KNN process, which finds the closest pattern of data points of the unknown data. The more accurate the data points that match the unknown data, called votes, the better of a match you have, and those classes will be its closest neighbors.

Another way of explaining KNN is once the K nearest neighbors are identified, the unknown data point is assigned the class label that is most prevalent among its neighbors. This means that the majority class among the k nearest neighbors determines the classification of the unknown data point.

## But How Do We Measure These Distances?

### Do the Math

Math is used (don’t worry. It is simply high school math) to determine which neighbors are the closest in proximity to the unknown data and those neighbors are designated by the letter K.

The math that is used is the distance between two points. If you don’t remember how to calculate the distance between two points, you can go to this refresher course. This procedure is called the Euclidean Distance and the computer instructions are based upon this concept.

So the data points that match the unknown data get more votes and subsequently are given a number that represents the distance to the unknown entity. The lower the number, the closer the data class resembles the unknown.

To relate Euclidean Distance to our fly example, it would mean what fly category has the line with the least distance to the unknown fly.

The KNN algorithm is based on the concept that similar things exist in close proximity, so the best match would be those where the lines in the graph are the shortest distance.

## What is a Predictor?

A predictor is the output that an algorithm releases based on a learned dataset that it uses to make further predictions.

## The Regression Model

This algorithm is a supervised learning model used when future predictions are required. It takes the input data, also known here as independent variables and makes predictions based on the patterns it sees from what it learned from the dataset. In other words, Regression models are trained on a dataset of historical data. The model learns the relationship between the independent and dependent variables from the data. Then it can be used to predict the value of the dependent variable for new data points.

## Conclusion

1. A major advantage of AI lies in its ability to improve efficiency. Similar to the Industrial Revolution, AI is streamlining the manufacturing process, increasing productivity and reducing human error.
2. Artificial Intelligence enhances decision-making through data analysis and predictive capabilities. In healthcare, AI can analyze a vast amount of medical datasets, aiding doctors in diagnosing diseases and suggesting treatment plans. Financial institutions rely on AI for fraud detection, increasing security and efficiency. and governments use machine learning to predict criminal activities and allocate resources for improved public safety.
3. Machine learning algorithms can generate art, compose music, and write literature. In design and engineering, it assists in more efficient and aesthetically pleasing products.
4. AI is expediting scientific research by rapidly analyzing extensive datasets, accelerating discoveries in genomics, drug development, and climate science.
5. This technology also holds promise in addressing global challenges such as in agriculture, where it can enhance crop yields. Disaster prediction and response are also improved through AI analytics.
6. Natural Language Processing (NPL) gives us voice recognition that enables better interaction with digital devices, especially for people with disabilities.

As AI continues to advance,  the potential to reshape industries and improve the quality of life for people around the world is extremely promising, but we must ensure that the utilization of machine learning does not fall into the wrong hands. Ethical considerations and responsible development must remain at the forefront so that artificial intelligence benefits are harnessed responsibly and equitably throughout the world!

# Computer Data Storage – How Times Have Changed!

## A Bit of Data Storage History

As computers gained momentum in the 1980s, the need to store information on a mobile platform was intensifying. Floppy disks were the first portable devices that were invented. They were invented by a team of IBM engineers led by Alan Shugart in 1971 but they didn’t gain popularity until the early 1980s. The disks were very light in weight and would “flop” if you waved them; hence, ‘floppy disks.’

They were large  8″ in diameter disks and could store a maximum of 100 KB of data. That’s about 10 full pages of words plus maybe a few small pictures. So if you had a thesis to write or hundreds of pictures to save, you would have been out of luck.

In 1981, the 3.5-inch floppy disk was introduced, which stored up to 1.44 MB of data. They were hard disks, meaning that they didn’t “flop” but their storage capacity was over 100 times more than the 8″ floppy disks that were initially created.

## Floppy Disk Issues

Floppy disks were not without their flaws. They were susceptible to damage from magnets and dust, and could easily be corrupted by physical damage or exposure to heat. They were also slow, with read and write speeds that could be frustratingly slow for users.Despite these limitations, these disks played an important role in the history of computing. They enabled the widespread distribution of software and documents and helped establish the personal computer as a powerful tool for individuals and small businesses.

Today, floppy disks are essentially a relic of the past, but their impact on computing history cannot be overlooked.

## The Introduction of the Compact Disk

By the early 2000s, floppy disks were being phased out as other storage options, such as CDs were becoming more popular and they were a revolution in data storage capacity. From 1.44 MB of the 3.5,” floppies came 50 megabytes (MB) to 700 MB of data storage on a CD.

This capacity not only allowed users to store text and image data but also music and videos.

## Enter the Flash Drive, AKA USB

Not to be confused with USB cables, these are plastic devices, about an inch long that plug into the USB port, the same port that those cables connect to.

A typical flash drive is a hard plastic device about the size of your thumb, which is why they are sometimes called thumb drives. Their storage capacity blows away any of their predecessor’s CDs or floppies with storage starting with 4 GB up to 256 GB. That is over 1,000 times more storage space than the first hard drives that came onto the market.

# What are All Those Types of USB Connectors For?

## What are These Things?

OK so you got a bunch of those wires with different looking ends and you don’t know which one of these connects to the device you want to connect to. Here we will unfold that mystery for you!

## USB Overview

They are called USB (Universal Serial Bus) cables. There are several types of USB connectors that have been developed over the years,  but it is worth noting that USB connectors can have different versions, indicating the supported USB specification and data transfer speeds.

For example, USB 2.0, USB 3.0 (also known as USB 3.1 Gen 1), USB 3.1 (also known as USB 3.1 Gen 2), and USB 3.2 are different versions with varying capabilities.

USB (Universal Serial Bus) cables come in various types, each designed for specific purposes and compatibility with different devices.

Here’s an overview of the most common types of USB cables:

• USB Type-A: USB Type-A is the standard and most recognizable USB connector. It features a rectangular shape with a flat, rectangular end. Type-A connectors are commonly found on computers, laptops, game consoles and USB hubs. They are used to connect a wide range of peripherals such as keyboards, mice, printers, external hard drives and flash drives.
• USB Type-B: These connectors are typically larger and less common than Type-A. They feature a square shape with beveled corners. They are used on devices that require a more substantial connection. You probably would recognize them when connecting your laptop to a printer, scanner or an external hard drive. There are various subtypes of Type-B connectors. Let’s take a look.
• Standard-B: Standard-B connectors are the ones you would be most familiar with. They connect printers, scanners, and other peripheral devices that require a larger connection. They have a squarish shape with two rounded corners and are less common in modern devices.
• Mini-B: Mini-B connectors are smaller than Standard-B and were commonly used with older cameras, MP3 players, and other small electronic devices. They are gradually being phased out in favor of Micro-B connectors.
• Micro-B: These connectors are smaller than both Standard-B and Mini-B connectors. They are commonly used with smartphones, tablets, portable hard drives, and other compact devices. Micro-B connectors are reversible, making them more user-friendly. There are two subtypes of Micro-B connectors: Micro-B USB 2.0 and Micro-B USB 3.0.
• USB Type-C: Type-C is a newer, versatile, and increasingly popular connector. It features a small, reversible design that allows for easy plug orientation. Type-C cables can be plugged in either way, eliminating the frustration of trying to find the correct orientation.

They are used in a wide range of devices, including smartphones, tablets, laptops, desktop computers, gaming consoles, and peripherals. Type-C cables have numerous advantages over their predecessors. They support faster data transfer speeds and higher power delivery and can transmit audio and video signals through alternate modes like DisplayPort or HDMI. Type-C connectors are backward compatible with USB 2.0 and USB 3.0 standards using appropriate adapters or cables.

• USB Mini-A and Mini-AB: Mini-A connectors are smaller and less common than Type-A connectors. They were primarily used in older digital cameras, MP3 players, and other portable devices. USB Mini-AB connectors combine the features of both Mini-A and Mini-B connectors, allowing devices to function as either a USB On-The-Go (OTG) host or a peripheral device.
• USB 3.0 Type-A and Type-B: USB 3.0, also known as USB 3.1 Gen 1, introduced faster data transfer speeds compared to USB 2.0. USB 3.0 Type-A connectors are backward compatible with USB 2.0 Type-A ports, while USB 3.0 Type-B connectors provide improved speeds for compatible devices such as external hard drives.
• USB 3.1 Type-C: USB 3.1, also known as USB 3.1 Gen 2, further improved data transfer speeds over USB 3.0. USB 3.1 Type-C connectors offer faster speeds, higher power delivery, and support for alternate modes for audio, video, and other protocols. USB 3.1 Type-C cables are backward compatible with USB 3.0 Type-A and Type-B connectors using appropriate adapters or cables.
• ## Summary

It may be confusing in the beginning, but keep in mind that the most used one is the Type-A and then you can take it from there.

# AI 101 – How Does Artificial Intelligence Work?

## Overview: Artificial Intelligence in 100 Words

### AI is Learning

The basic premise behind AI is to create algorithms (computer programs) that can scan unknown data and compare it to data that it is familiar with. So let’s start by looking at a simple example.

### The AI Mindset Overview

Is this a fork or a spoon? Is it a knife? Well, they both have handles, but this one has spikes. Let me look up what pieces of information I have in my database that look like this item. Oh, I have a piece that resembles this spike pattern, so it must be a fork!

AI algorithms scan the unknown data’s characteristics, called patterns. It then matches those patterns to data it already has recognized, called data it recognizes is called labeled data or training data and the complete set of this labeled data is called the dataset. The result is that it makes a determination as to what that unknown item is.

The patterns within the dataset are called data points, also called input points (we will be going into more detail about datasets and data points in our Artificial Intelligence 102 article).

This whole process of scanning, comparing and determining is called machine learning. (There are actually seven steps involved in machine learning and we will touch upon those steps in our Artificial Intelligence 102 article).

For example, if you are going to write a computer program that will allow you to draw a kitchen on the screen, you would need a dataset that contains data points that make up the different items (training data) in the kitchen; such as a stove, fridge, sink, as well as utensils to name a few; hence our image and analysis of the fork in the image above.

Note: The more information (data points) that is input into the dataset,  the more precise its algorithm’s determination will be.

Now, let’s go a bit deeper into how a computer program is written.

## Writing the Computer Program

We spoke about how computers are programmed using instructions in our bits and bytes article, but as a refresher, let’s recap!

Computer programs, called algorithms, tell the computer to do things by reading instructions that a human programmer has entered.  One of our examples was a program that distributes funds to an ATM recipient. It was programmed to distribute the funds if there was enough money in the person’s account and not if there wasn’t.

But THIS IS NOT AI since the instructions are specific and there are no variations to decide anything other than “if this, then that”.

In other words, the same situation will occur over and over with only two results. There is no determination that there may be more issues, such as the potential for fraudulent activity.

Bottom line – There is no learning involved.

## Writing a Learning Program

The ATM example is limited to two options, but AI is much more intensive than that. It is used to scan thousands of items of data in order to determine a conclusion.

### How Netflix Does It

Did you ever wonder how Netflix shows you movies or TV shows that are tuned to your interests? It does this by determining what your preferences are based on your previous viewings.

The algorithm analyzes large amounts of data, including user preferences, viewing history, ratings, and other relevant information to make personalized recommendations for each user.

It employs machine learning to predict which movies or TV shows the user is likely to enjoy.

It identifies patterns and similarities between users with similar tastes and suggests content that has been positively received by those users but hasn’t been watched by the current user.

For example, if a user has watched science fiction movies, the recommendation might be to suggest other sci-fi films or TV shows that are popular among those users with similar preferences.

The program will learn and adapt as the user continues to interact with the platform, incorporating feedback from their ratings and viewings in order to refine future recommendations.

By leveraging machine learning, streaming platforms like Netflix can significantly enhance the user experience by providing tailored recommendations, increasing user engagement and improving customer satisfaction.

This can’t be done using the non-learning ‘if-else’ program we previously spoke about in the ATM example.

### A Gmail AI Example

As you type your email, Google reads it and then offers words to accompany the sentence that would coincide with what you are about to type before you have even typed it.

This is called language modeling which uses the Natural Language Process (NPL) model.

In NLP, the algorithm uses a factor of probability that is designed to predict the most likely next word in a sentence based on the previous entry.

AI algorithms feed on data to learn new things.
The more data (data points) that exist, the easier it will be for the model to identify the patterns of an unknown entity.

## AI: How it All Works

There are three main types of machine learning: supervised learning, unsupervised learning and reinforcement learning.

## Click CC above for closed caption

### Supervised Learning

This is the most common type of machine learning. It involves feeding a computer a large amount of data with the aim of enabling it to recognize patterns from the labeled dataset and make predictions when confronted with new data.

In other words, supervised learning consists of training a computer program to read from a data sample (dataset) in order to identify what the unknown data is.

#### How the Machine Thinks with Supervised Learning

Show and Tell: A human labels a dataset with data points that identify the sample set to be a building.

Then the human does the same thing to identify a bridge. This is another classification different from the building classification and is identified with specific patterns that make up a bridge.

The program takes note of the patterns of each classification. If computer instructions were written in plain English, this is what it would say:

This is a bridge. Look at the patterns that make up the bridge. And this is a building. Look at the patterns that make up the building. I can see distinguishable differences in the characteristics between the two. Let me match them up to the unknown data and make a decision on whether this new data is a bridge or a building.

Supervised learning is used in many applications such as image recognition, speech recognition and natural language processing.

Supervised learning uses a data sample to compare unknown data. The data sample is called a data model.

#### It’s Raining Cats and Dogs

A supervised learning algorithm could be trained using a set of images called “cats” and “dogs”, and each cat and dog are labeled with data points that distinguish each.

The program would be designed to learn the difference between the animals by using pattern recognition as it scans each image.

A computer instruction (in simplified terms) might be “If you see a pattern of thin lines from the face (whiskers), then this is a cat”.

The end result would be that the program would be able to make a distinction of whether the new image it is presented with is that of a cat or dog!

This type of learning involves two categories – cats and dogs. When only two classifications are involved, it is called Binary Classification.

### An Example

Suppose you are studying insects and you want to separate flying insects from crawling ones. Well, that’s easy. You take a bug that you found in your backyard and compare it to the ant and fly you already stored on your insect board. In AI terms, this is supervised binary classification.

You immediately know, based on the pattern configuration of the insect which classification it belongs to – the crawlers or the flies. Now you grab more flies and put them in the fly category and do the same with the creepy crawlers for their category.

Let’s say you want to go deeper in the fly classification and find out what type of fly it is, (e.g. house fly, horse fly, fruit fly, horn fly, etc.); but you only have two classifications to compare them two – flies and crawlers, so what do we do? You create more classifications for the fly class.

This is multi-classifications, or more technically called multi-class classifications, which provide additional labeled classes for the algorithm to compare the new data to.

We will delve more into multi-class classifications and how this works in our next article, but for now, just know what binary classifications and multi-class clarifications are.

### Unsupervised Learning

Unsupervised learning involves training a computer program without providing any labels or markings to the data. The aim is to enable the program to find (learn) patterns and relationships on its own.

It does this by reading millions of pieces of information and grouping them into categories based on their characteristics or patterns, then making decisions on what the new entity is by matching it up to one of those categories.

In other words, it matches patterns of the unknown data to the groups it created and then labels them without human intervention. This is called clustering.

Anomaly detection is the task of identifying data points that are unusual or different from the rest of the data. This can be useful for tasks such as fraud detection and quality control.

## Reinforcement Learning

Reinforcement learning (RL) learns by trial and error, receiving feedback in the form of rewards or penalties for their actions. Any negative number that gets assigned means it is punished.

The higher the negative number, the more the algorithm will learn not to pursue that particular circumstance and will subsequently try again until positive numbers are assigned, called a reward. It will continue this process until it is properly rewarded. The goal of RL is to maximize its rewards over time by finding a sequence of actions that leads to the highest possible reward.

One of the defining features of RL is the use of a feedback loop in which the agent’s actions (an agent is the decision-making unit that is responsible for choosing actions in the environment that was provided to it). The loop permits the agent to learn from experience and adjust its behavior accordingly.

The feedback loop works as follows:

1. The agent takes an action in its environment.
2. The environment provides the agent with feedback about the action, such as a reward or punishment.
3. The agent then updates its policy based on the feedback.
4. The agent will repeat steps 1-3 until it learns to take actions that lead to desired outcomes (rewards).

RL has been applied to a wide range of problems, such as games, robotics and autonomous driving. It is particularly useful in scenarios where the action may not be immediately clear and where exploration is necessary to find the best solution.

## Conclusion

Overall, these AI methods are widely used in various industries and applications. We will continue to see growth and development as artificial intelligence technology advances.

What are the advances or dangers that AI can bring to the future? Read our article on the Pros and Cons of AI to find out.

## Machine Language Terms to Know

• Computer Instruction
• Computer Program
• Algorithm
• Data Points
• Patterns
• Labeled Data
• Dataset
• Data Model
• Pattern Recognition
• Machine Learning
• Binary Classification
• Multiclass Classification
• Supervised Learning
• Unsupervised Learning
• Reinforced Learning

# How to Optimize for Voice Search in 2023

## Voice Search Overview

Voice search is here to stay and will only be gaining momentum as we proceed into the future and for those that are in marketing or SEOs, it is important to stay up to date with these features and optimize accordingly.

The processes behind voice and text search are quite different. Voice search queries may be longer and more complex, as people tend to ask questions in a conversational style, while text queries are typically shorter and more direct.

Another difference is in the way search results are presented. In text search, results are typically displayed on a search engine results page (SERP), with a list of links and brief descriptions. In contrast, voice search typically provides only the most relevant result, read aloud by a virtual assistant or smart speaker; such as Apple Siri, Amazon Alexa, Google Assistant and Microsoft Corona. This means that optimizing for voice search requires a different approach to traditional SEO, with an emphasis on providing clear, concise answers to common voice questions.

Searching by sound is an SEO component that cannot be overlooked and with the accelerating advancements in artificial intelligence, it is imperative that web developers and SEOs keep a watchful eye on this evolving technology.

## The Statistics

As of the writing of this article, 32% of people between the age of 18 and 64 use a voice search medium (Alexa, Siri, Corona, etc.) and that number will only grow as we move to the future.

Entering standard text search queries on mobile devices is commonplace, with over 60% of cell phone users text searching and 57% of mobile users taking advantage of voice search.

It should be no surprise that Google is the most successful interpreter of audio searches with a 95% accuracy.

In a study in 2021, 66.3 million households in the US were forecasted to own a smart speaker and that forecast has become a reality as of 2023.

Voice technology stretches beyond search queries as 44% of homeowners use voice assistants to turn on TVs and lights, as well as an array of other smart home devices currently on the market.

With statistics as these, speaking to robotic assistants is here to stay and will only be growing with new technologies as we proceed through the 2020s and beyond.

## How Does Voice Search Work?

### The Physics Behind It

If you just need to know that there is an analog-to-digital conversion and are not interested in the specifics of how it’s done, you can skip this part and go to the next section, which is Where Does the Data Come From?

We will summarize the process of how the sound of human speech is converted into machine language, which is filtering and digitizing.

Filtering: Smart speakers and voice assistants are designed to recognize the human voice over background noise and other sounds; hence, they filter out negative sounds so that they can only hear our voices.

Digitizing: All sound is naturally created in analog frequencies (use of sinewaves). Computers cannot decode analog frequencies. They must be converted to the computer language of binary code.

Below are the details of how an analog signal is converted to digital.

### The Analog Conversion Process

|n order to make this conversion, an Analog-to-Digital Converter (ADC) is required. The ADC works by sampling the analog signal at regular intervals and converting each sample into a digital value.

The steps are as follows:

1. Sampling: The first step is to sample the analog signal at a fixed interval. The sampling rate must be high enough to capture all the frequencies of interest in the analog signal. The Nyquist-Shannon sampling theorem states that the sampling rate must be at least twice the highest frequency in the signal. Sampling means taking regular measurements of the amplitude (or voltage) of the signal at specific points in time and converting those measurements into a digital signal. Sampling is necessary in order to convert analog sound waves into digital signals, which are easier to store, transmit, and process using digital systems such as computers or microcontrollers. The rate at which the analog signal is sampled, known as the sampling rate or sampling frequency, is important because it determines the level of detail that can be captured in the digital signal. Sampling an analog signal is an important step in converting it to a digital signal that can be analyzed, manipulated, or transmitted using digital systems.
2. Quantization: Once the analog signal is sampled, the next step involves assigning a digital value to each sample based on its amplitude. The resolution of the quantization process is determined by the number of bits used to represent each sample. The higher the number of bits, the greater the resolution of the digital signal.
3. Encoding: The final step is to encode the quantized samples into a digital format. This can be done using various encoding techniques such as pulse code modulation (PCM) or delta modulation.

Overall, the main process of converting analog to digital frequencies involves sampling, quantization, and encoding. The resulting digital signal can then be processed using digital signal processing techniques.

In summary: Smart speakers and voice assistants take in the audio from a person’s speech and convert it to machine language.

## Where Does the Data Come From?

Information gathered from smart speakers and voice assistants pulls data from an aggregate of sources.

If you want your business to grow, you must be attentive to where content for voice search is collected so that you can make intelligent decisions regarding how to optimize for these devices.

### Amazon Alexa

When Alexa responds to a query, it relies on Microsoft’s Bing search engine for the answer. Why? Because Amazon, as well as Microsoft, are in direct competition with Google, even though Google has the most popular search engine in the world.

Amazon’s refusal to use Google for audio responses is not something to be concerned about. After all, Bing’s search algorithms are very similar to Google’s.

With that said, if a person speaks to Alexa with a specific request, (e.g. “What’s the weather today?”), Alexa can pull that information from a database associated with that request. In this case, Alexa will connect to Accuweather. The device can access Wikipedia and Yelp if it needs to as well.

### Apple Siri

Initially, Apple used Bing as its default search engine, but in 2017, Apple partnered with Google. Now, when you say “Hey Siri”, you can expect Siri to access the immense data repository from Google and supply the answer. This applies to the Safari browser for text searches as well.

There is a caveat though. When it comes to local business searches, Siri will call on Apple Maps data and will use Yelp for review information.

### Microsoft Cortona

This one is probably the most straightforward out of all of the search engines, as Cortona relies on what else but Microsoft Bing for its information.

OK, this one’s a no-brainer. Google can currently index trillions of pages to retrieve information and since this also applies to Apple’s Siri, this section is of most importance if you want to optimize voice search for these voice assistants.

#### So What is a Featured Snippet?

Featured snippets are what you see after you run a Google search query. It is a paragraph that appears at the top of the page that summarizes the answer to a question.

The information that Google applies to the snippet is gathered from, what Google determines to be the most reliable source (website) for that information.

#### How Does Google Determine a Featured Snippet?

For a snippet to be posted by Google, it needs to know that the source is trustworthy via its domain authority, link juice and high-quality content, to name three important organic factors, as any SEOs would already know, but in addition to these factors, Google will defer to “HowTo” and FAQ pages most often to pull in the snippet.

#### Is Structured Data Needed?

Structured data is extra code that helps Google better understand what the page or parts of the page are about.

One might wonder if structured data has to be used in order to provide the featured snippet? The answer is no. As per Google, as long as the web page is optimized properly and contains the questions that equate to the user’s query or voice search in this case, structured data is not necessary; however, if it wouldn’t hurt to put it in, as we all are aware that nothing is static in the SEO world and this rule can easily change in the future.

The reason why Google focuses on “HowTo” and FAQ pages is that their content reflects that of human speech. For example, an FAQ page on EV cars may have the question “How long do EV batteries last?” – That is exactly how a person would ask a voice assistant that same question!

An ‘Action’ for Google Assistant is created, equivalent to an Alexa Skill and Google will read the snippet back to the user to answer the question he/she asked.

## Summarizing Optimization for Voice Search

### Alexa

Bing: If you have not already done so, bring Bing into your scope of work for SEO and start optimizing for this search engine.

Yelp: We all know that reviews are of the utmost importance, so check out Yelp for your or your client’s business and build on those reviews! Legitimately of course.

### Siri

Apple Factors: Where you might not be fully optimized is with Apple Maps, so get going. Start by registering with Apple Business Connect.

Yelp: And now Yelp is back in the picture!

### Cortona

Bing: As mentioned, become an SEO Bing expert and you are ready to ask Cortona anything.

Besides the standard organic optimization, focus on schema markup for HowTo and FAQ articles for voice search, which, if you’re lucky, will be shown on the SERP as a featured snippet.

There you have it. How to optimize for voice search. Let’s get these robots configured so that our businesses will be the first thing you hear from your voice assistant!

# The Pros and Cons of AI

## Overview

Are you afraid of what AI can do or are you looking forward to the benefits it can provide? Part of your decision would be based on whether you feel that the glass is half full or half empty, but the reality is that there are always consequences to technological advancements. Hopefully, we can honestly say a lot of it will be for the good of humankind, but let’s not be naive and think three won’t be those nefarious individuals looking to selfishly benefit at the expense of the rest of us.

One example would be the development of the atom bomb, which was the result of Einstein’s theory of relativity, even though the scientist had no idea of the frightening consequences his theory would bring.

## Enter AI

Artificial intelligence (AI) is a rapidly growing field that has the potential to transform our world in countless ways. From healthcare to finance, education and transportation, AI can benefit us in a myriad of ways, but not everyone is on board with this as we will see in this article.

Regardless, artificial intelligence is advancing at an exceptional rate whether we like it or not, as our AI avatars explain below.

So let’s take a look at both the positives and negatives of artificial intelligence and what it can potentially have for us and then you can decide.

## The Benefits

One of the most significant benefits of AI is its potential to revolutionize healthcare. AI can analyze vast amounts of medical data, including patient records, lab results and imaging studies.

With this information, its algorithms can detect patterns and make predictions that could help doctors diagnose and treat diseases more accurately and quickly than ever before. It can also help identify high-risk patients, allowing doctors to intervene early and prevent diseases from progressing.

### Transportation

Artificial intelligence can be used to optimize traffic flow and reduce congestion and subsequently, travel time for busy commuters.

Moving not too far into the future are autonomous vehicles – cars that drive themselves. There are some being tested now, such as Teslar and Google and Teslar already has autonomous vehicles on the market, but a driver must remain inside.

When it does become mainstream, self-driving cars, buses and trains have the potential to significantly reduce accidents, traffic congestion, and pollution. By removing the human element from driving, these vehicles can make our roads safer and more efficient.

### Education

Artificial intelligence can also be used to improve education. AI-powered tutoring systems can provide personalized, adaptive learning experiences for students of all ages and abilities.

By analyzing a student’s learning style, strengths and weaknesses, these systems can create customized lesson plans that help them learn more effectively. This can lead to improved academic outcomes and greater educational equity, as students who may struggle with traditional teaching methods can receive tailored instruction that meets their needs.

One caveat is the temptation for students to cheat by using apps such as Chat GPT, but alert teachers should be able to tell the difference by determining if the student’s writing style has changed.  With that said, this will still be a challenge for educators.

### Finance

Ai can be used to detect fraud, manage risk and optimize investments. By analyzing financial data,  machine learning algorithms can detect patterns that may indicate fraudulent activity, alerting financial institutions to potential threats before they cause significant damage.

Additionally, it can help financial institutions manage risk more effectively by predicting market fluctuations and identifying potential investments that offer high returns with low risk.

### Law Enforcement

AI-powered surveillance systems can detect potential threats in public spaces, alerting law enforcement and allowing them to respond more quickly.

It can also be used to analyze crime data, helping law enforcement identify patterns and allocate resources more effectively. Indeed, New York City Mayor Eric Adams introduced crime-fighting robots to the Times Square area and if they prove productive, they will be placed all over the city.

### The Environment

By analyzing environmental data, AI can help us understand the impacts of human activity on the planet and develop strategies to mitigate them. For example, it can help us optimize energy consumption, reduce waste and improve recycling efforts. Additionally, AI can help us predict and respond to natural disasters, reducing their impact on human lives and property.

## The Negatives

Of course, as with any powerful technology, AI also poses some risks and challenges. One concern is the potential for it to be used in ways that violate privacy or human rights.

Additionally, the use of AI in decision-making processes could result in biases or discrimination if the algorithms are not carefully designed and monitored. Finally, there is the risk that AI could become too powerful, leading to unintended consequences or even threatening human existence.

To mitigate these risks, we must approach AI development with caution and foresight. We must ensure that AI is developed and used in ways that prioritize human welfare and respect human rights. This requires ongoing dialogue and collaboration between technologists, policymakers and the public, as well as strict laws that prohibit collusion and/or intentionally skewing the algorithms.

## Potential Dangers

Artificial Intelligence can pose significant dangers that need to be addressed. Similar to the potential dangers of the use of quantum computers, the same threats are associated with AI.

### The Labor Question

No doubt, unemployment due to artificial intelligence is a major concern. As this technology advances, it becomes increasingly capable of performing tasks that were once done by humans, leading to job loss and economic disruption.

For example, self-driving cars have the potential to replace human drivers, which would lead to unemployment in the transportation sector. This could result in a significant reduction in the workforce and an increase in social inequality.

### Discrimination

Another danger is its ability to perpetuate biases and discrimination. Algorithms are designed to learn from data, and if the data used is biased, the AI will also be biased. This can result in unfair decisions being made, such as in hiring, lending, or criminal justice. It can have significant negative impacts on individuals and communities.

### The Military

AI could pose a significant threat to global security. With technological advancements increasing in this arena technology, it is becoming increasingly possible for computers to be used in cyber-attacks or even to control weapons systems. This could lead to significant risks and damages, such as loss of life or damage to critical infrastructure.

### Malicious Financial Behavior

The financial markets would most likely be the most affected by artificial intelligence, both for good and bad. We have already discussed the good, but the bad is already a concern. There can be serious consequences that could affect the banks and stock market as nefarious individuals try to override the algorithms with corrupt data and computer instructions. The expression “What’s in your wallet” will have a  much greater significance should malicious AI alter your bank accounts.

### A Question of Morals

Finally, the development of AI could also pose ethical and moral dilemmas. As these algorithms become more intelligent, questions arise about their autonomy and decision-making capabilities. If an AI system makes a decision that is morally or ethically questionable, who is held accountable? What happens if an AI system is programmed to harm humans or perform unethical tasks?

## AI in a Nutshell

Artificial intelligence can help us solve some of the biggest challenges facing our society. However, we must approach AI with caution and foresight, taking steps to mitigate risks and ensure that this technology is used in ways that prioritize humanity and respect human rights. With careful planning and collaboration, we can harness the power of Artificial Intelligence to create a better future for all!

# What’s the Difference Between a Building Spire and Antenna?

## Introduction:

Many skyscrapers may feature protruding elements on their roofs that serve different purposes. Two common rooftop structures are spires and antennas. While both structures may appear similar from a distance, they have other functions and designs. This essay will explore the differences between building spires and antennas.

## The Feud Between Spires and Antennas

When the new One World Trade Center (AKA Freedom Tower) in New York City was completed, the owners laid claim that this was the tallest building in the western hemisphere, rising to a symbolic height of 1,776 feet. The number represents the year the Declaration of Independence was created.

But all is not rosy when the owners of the Chicago Willis Tower had something to say about it. They claimed that the 408-foot steel attachment that was placed on the top of the Freedom Tower should not count and subsequently, the 1,451-foot Willis Tower should still be considered the tallest building in the western hemisphere.

Interesting note: The Empire State Building has a spire and an antenna!

### Enter The Council of Tall Buildings

Someone needed to step in and resolve this and the international non-profit Council of Tall Buildings did just that and their conclusion was that the Freedom Tower is the tallest

Reason is that there is a difference between a spire and antenna and spires count. Antennas don’t, of which they concluded that One World Trade Center has a spire.

Now let’s take a look and see why this is the case.

## Function

The primary function of a building spire is to enhance the aesthetics of the structure. Spires can add architectural interest to a building and make it stand out in a cityscape. They come in different shapes and sizes and can be made from various materials, such as metal or stone. Spires can also have religious or symbolic significance, as they are often found in churches or other historical buildings.

Antennas, on the other hand, have a functional purpose. They are designed to transmit or receive electromagnetic waves, such as television or radio signals. Antennas can also be used for communication purposes, such as transmitting mobile phone signals or internet data. They are typically made of metal and are shaped to optimize the reception or transmission of waves.

## Design

Spires and antennas have distinct designs that reflect their functions. Building spires are often ornamental and decorative and conform to the building’s architecture or aesthetic design.

They can be designed in various shapes and sizes, such as a pointed Gothic spire or a round domed spire. Spires are typically made of materials that can withstand weather and environmental factors.

Antennas, on the other hand, have a practical design that is optimized for their function. The shape of an antenna is critical to its performance in capturing or emitting electromagnetic waves.

Antennas can be designed in different shapes, such as a Yagi antenna or a dipole antenna, depending on the specific frequency range they are intended to operate within. The size and placement of an antenna are also crucial factors that can affect its performance.

## Location

Spires and antennas are located on different parts of a building. Spires are typically located at the top of a building, either on the roof or on a tower. They are often used to create a distinctive silhouette or to draw attention to the building. Spires are usually visible from a distance, which makes them an essential part of a building’s architecture.

Antennas, on the other hand, can be located anywhere on a building’s roof or facade. The location of an antenna depends on various factors, such as the type of signals it is designed to capture or transmit and the obstacles in the surrounding area. Antennas can also be located on poles or towers outside of a building.

## Regulation

The regulation of spires and antennas differs. Building codes typically regulate the design and construction of spires. There may be height restrictions or other regulations that limit the size or shape of a spire. Spires may also be subject to aesthetic guidelines to ensure they fit in with the surrounding architecture.

Antennas, on the other hand, are subject to a different set of regulations. In many countries, the construction of antennas is regulated by government agencies, such as the Federal Communications Commission (FCC) in the United States. These agencies are responsible for ensuring that antennas are safe and do not interfere with other electronic devices or signals. Antennas may also be subject to zoning regulations that limit their size or placement.

## Conclusion

In summary, while building spires and antennas may appear similar from a distance, they have different functions, designs, locations, and regulations. Spires are decorative elements that enhance the aesthetics of a building, while antennas are functional structures that capture or emit electromagnetic waves.

The design of a spire is ornamental, while the design of an antenna is optimized for its function. The location of a spire is typically on the roof or tower of a building, while the location.

And there lies the reason why the Freedom Tower stands to be the official tallest building in the western hemisphere.

# Suspension Bridges: How are They Constructed

Suspension bridges are among the most impressive engineering feats, with their long spans and elegant designs. These bridges rely on the strength of cables and towers to support the cables which provide safe passage over rivers, gorges, and other obstacles.

## Bridge Suspension Cables

Once the towers are in place, the cables can be installed. The cables are assembled on the ground and then lifted into place using cranes or other heavy machinery. The cables are anchored to the towers using large steel plates, which are bolted to the tower and embedded in the concrete foundation. The cables are also anchored to the ground using massive concrete blocks, which are buried deep below the surface of the earth to provide a secure anchor point.

Suspension cables are an essential part of the suspension bridge design, which hold up the load (bridge deck or road) and are braced by towers on each side of the bridge. Anchoring the cables to the towers, or sometimes to the ground on both sides, enables the load to stretch across the entire span of the bridge without any further bracing required (e.g. truss or arches holding it up).

The cables are typically made of high-strength steel wires woven together that act as one unit. These cables can weigh thousands of tons and must be anchored securely to the towers and the ground.

The tension in the main cables is transferred to the suspension cables, which then transfer the weight of the bridge deck to the towers and anchorages at the ends of the bridge.

The towers provide additional support to the bridge and help to distribute the weight of the bridge evenly.

In the photo above of the Royal Gorge Bridge in the Rocky Mountains, Colorado, each of the cables consists of 2100 galvanized steel wires.

## Bridge Deck

With the cables in place, the next step is to construct the bridge deck. The deck is typically made of steel or reinforced concrete and is suspended from the cables using hangers. The hangers are attached to the cables using large steel pins and are spaced at regular intervals to provide support for the deck. The deck is often assembled on the ground and then lifted into place using cranes or other heavy machinery.

Once the deck is in place, the final touches can be added. This includes the installation of guardrails, lighting, and other safety features, as well as the application of the final coat of paint. The bridge is then inspected to ensure that it meets all safety standards and is ready for use.

## Summary

In conclusion, suspension bridges are an incredible feat of engineering, requiring meticulous planning, precision construction, and rigorous safety testing. The construction process involves the careful placement of towers, the installation of massive cables, and the suspension of the bridge deck. Despite the challenges involved, suspension bridges have become an iconic symbol of human ingenuity and technological advancement, connecting people and places all over the world.

# The Impact of Climate Change and What We Can Do About It

## Climate Change Overview

Climate change is one of the most pressing issues facing our planet today, and its significance cannot be overstated. It is a global problem that affects every aspect of our lives, from the environment to the economy, and if left unchecked, it has the potential to cause devastating consequences

In this essay, we will explore why climate change is so important and why urgent action is necessary to mitigate its effects.

## The Environment

First and foremost, climate change also referred to as ‘global warming’, poses a major threat to our ecosystem. The Earth’s climate is a complex entity, and any changes to it can have far-reaching consequences.

The continuous rise in greenhouse emissions such as pollutants from cars, planes and industrial complexes is what is causing temperatures to rise.

For example, these rising temperatures and changing rainfall patterns can lead to more frequent natural disasters such as hurricanes, floods, and droughts. These weather events can destroy homes and infrastructure.

The temperature has risen about 1.8 degrees F (1 C) over the last century, but most of this rise has occurred within the last four decades.

If this small rise in temperature doesn’t sound significant, it is and has already caused numerous issues across the globe.

The natural disasters that are occurring because of this can also lead to a significant economic burden, as governments and individuals would be forced to spend billions of dollars to rebuild damaged infrastructure and homes, as discussed later in this article.

## Upsetting the Balance of Nature

Wildlife will not be immune to this changing environment. As temperatures rise, it is becoming increasingly difficult for some animals to adapt.

Some species could become endangered or even go extinct, and even now, polar bears are struggling to find food as the Arctic ice melts, and coral reefs are dying due to rising ocean temperatures.

The potential results can have problematic effects on our crops and argriculture. Crop failures will lead to increased food prices and potential famine in certain parts of the world. Disruption in supply chains can lead to food and water shortages.

A negative change in the climate will also cause sea levels to rise, which can lead to flooding and erosion of coastlines, further exacerbating the damage caused by natural disasters.

## The Human Effect

Climate change can have a significant impact on our health. As temperatures rise, so does the risk of heat-related illnesses such as heat stroke and dehydration.

Increased air pollution due to industrialization and deforestation can result in respiratory problems, heart disease, and even cancer. It can also lead to the spread of diseases such as malaria and dengue fever, as warmer temperatures create more favorable conditions for disease-carrying insects to proprogate and spread to new regions.

Poor air quality resulting from increased pollution can exacerbate the situation as well. Respiratory problems such as asthma may be more commonplace and can also increase the risk of heart disease and stroke.

These health issues will disproportionately affect vulnerable populations, such as children, the elderly, and people with a pre-existing medical conditions. In populated communities, such as large cities, they can increase exponentially.

## The Economy

As extreme weather events become more frequent, there is an increasing risk of damage to infrastructure, such as buildings, roads, and bridges. In addition, its impact on prices for food will be detrimental across the world.  Building sea walls and other protective infrastructure, is likely to be more common and subsequently very costly.

## Is There Light At the End of the Climate Tunnel?

The transition to a low-carbon economy can create economic opportunities, such as the development of renewable energy sources and the creation of green jobs. ant economic issue. The effects of climate change can disrupt agriculture, leading to lower crop yields and higher food prices. This can have a disproportionate impact on low-income countries, where agriculture is a significant part of the economy.

Given the significant impacts of climate change on the environment, human health, and the economy, we must take action to address this problem. The good news is that there are many things that individuals, governments, and businesses can do to mitigate the effects of climate change.

# The Nike Missile System

## Introduction

A fairly unknown army base lies in a little peninsula on the north shore of New Jersey. It is not in use now but once was a thriving anti-missile installation where soldiers would be on alert for enemy missiles and planes heading towards New York City.

## The Cold Days

It was the Cold War and enemy nations, namely the Soviet Union were working tirelessly towards advancements in jet planes and ballistic missile production. Given this, the United States established anti-aircraft systems across the country. They were strategically deployed around the major cities to combat this potential threat.

Due to the accelerated research and development that was occurring, missile technology took a giant leap forward. Additionally, the fear of Russian Bear Bombers entering American airspace was becoming more imminent than the threat of German or Japanese aircraft entering the United States after Pearl Harbor.

## The Nike Missile System

Beginning in 1954, Nike Missiles replaced the gun batteries located across the United States. These were supersonic (Marc 2.25) command guidance systems and solid rocket booster missiles. They were designed to intercept long-range Soviet bombers and destroy them while still over the ocean.

Soldiers stationed at these sites were on 24-hour turnaround shifts and lived in ready-made barracks. Examples of Nike Missile battery sites were Fort Tilden and Fort Hancock, New York, which had a Missile Launch Area (the radar area), AKA, the Integrated Fire Control Area (IFC).

The sites had two missile batteries, known as double battery sites, and subsequently, each battery had two underground storage rooms for a total of four magazines at each site.

A missile magazine is the hardened storage barrier where the missile lies when inactive. Rooms accompanied the magazines; each had an elevator unit that raised and lowered the missiles.

## Enter Ajax and Hercules

The Ajax was the first Nike Missile deployed. It was designed to destroy aircraft from 30 miles away. By 1958, a new, more advanced rocket replaced the Ajax, called the Hercules, which had a range of over 96 miles and was designed to carry a nuclear warhead.

Unbeknownst to the general public, there were close to 250 Nike missile bases across the United States and more located in Europe. The New York City area contained one of the largest networks of anti-aircraft Nike batteries, with over 20 sites circling the city in New York State and New Jersey.

## From Missile Defense to Missile Offense

### Cold War

Building anti-missile bases was just one aspect of the country’s overall defense. In 1958 the North American Air Defense Command –  NORAD, (now called the North American Aerospace Defense Command) was commissioned.

Its origins trace back after World War II when the US and Canada began cooperating in air defense against the Soviet bomber threat.

In 1956, the two countries proposed to form an air defense system, and two years later, the joint Canada-US Military Study Group recommended more radar networks.

General Earle E. Partridge, the commander in chief of the newly formed joint US Command, Continental AirDefense Command (CONAD), directed another study of North America defense, which eventually led to the establishment of a combined air defense organization (NORAD) under a single commander,

## The Ending of the Cold War

### Defense

The takedown of the Berlin Wall marked the beginning of the end of the Cold War and resulted in the United States becoming the only superpower left.

Nike missiles were part of the U.S. Army Air Defense Command (ARADCOM), and in agreement with the SALT treaty, all missiles were decommissioned and removed in 1974; however, a few remain. The Sandy Hook, New Jersey, (NY-56) site is one of those Nike missile batteries that are currently open to the public.

NORAD’s mission remains however, and it now provides aerospace warnings for North America, which includes the monitoring of man-made objects in space, and the detection, validation, and warning of attack against North America whether by aircraft, missiles, or space vehicles.

## Offense

The removal of the Nike missiles was not the end of missile deployment. It was only the beginning. After they were removed, a new, much more powerful rocket – the Intercontinental Ballistic Missile or ICBM, was deployed on both sides of the Atlantic, and still exists today.

These missiles are not anti-aircraft designed for defense, but take on an offensive posture following the Cold War strategy – A good defense is a good offense, or as some call it, “Peace Through Strength”.

### 2023

Given the recent events following the surveillance balloon from China and its intrusion into US airspace, NORAD has modified its sensory equipment to detect smaller objects such as balloons.

## What the Future Holds

No one can say for sure where this world is heading, but given the war in Ukraine, China’s threat to take over Taiwan, and Iran’s passion to build a nuclear weapon, it is essential that NORAD remains in existence and possibly a reevaluation of this nations air defense might be prudent.