Is the world ready for cows armed with artificial intelligence?
No time to ruminate on that because the moment has arrived, thanks to a Dutch company that has married two technologies - motion sensors and AI - with the aim of bringing the barnyard into the 21st century.
The company, Connecterra, has brought its IDA system , or "The Intelligent Dairy Farmer's Assistant", to the United States after having piloted it in Europe for several years.
IDA uses a motion-sensing device attached to a cow's neck to transmit its movements to a program driven by AI. The sensor data, when aligned repeatedly with real-world behaviour, eventually allows IDA to tell from data alone when a cow is chewing cud, lying down, walking, drinking or eating.
Those indicators can predict whether a particular cow is ill, has become less productive, or is ready to breed - alerting the farmer to changes in behavior that might otherwise be easily missed.
"It would just be impossible for us to keep up with every animal on an individual basis," says Richard Watson, one of the first four US farmers to use IDA since it launched commercially in December.
Mr Watson, who owns the Seven Oaks Dairy in Waynesboro, Georgia, says having a computer identify which cows in his 2,000-head herd need attention could help improve farm productivity as much as 10 per cent, which would mean hundreds of thousands of dollars to his family.
"If we can prove out that these advantages exist from using this technology ... I think adoption of IDA across a broad range of farming systems, particularly large farming systems, would be a no-brainer," he says.
_______________
Read more:
Generation Start-up: A restaurant’s excess food is now a UAE resident’s bargain dinner with BonApp
Development of 'chocolate forests' could put Brazil at top of cocoa tree
_______________
Dairy farming is just one industry benefiting from AI, which is being applied in fields as diverse as journalism, manufacturing and self-driving cars. In agriculture, AI is being developed to estimate crop health using drone footage and parse out weed killer between rows of cotton.
Yasir Khokhar, the former Microsoft employee who is the founder and CEO of Connecterra, says the inspiration for the idea came after living on a dairy farm south of Amsterdam.
"It turns out the technology farmers use is really outdated in many respects," he says. "What does exist is very cumbersome to use, yet agriculture is one of those areas that desperately needs technology."
Underlying IDA is Google's open-source TensorFlow programming framework, which has helped spread AI to many disciplines. It's a language built on top of the commonly used Python code that helps connect data from text, images, audio or sensors to neural networks - the algorithms that help computers learn. The language has been downloaded millions of times and has about 1,400 people contributing code, only 400 of whom work at Google, according to product manager Sandeep Gupta.
He says TensorFlow can be used by people with only high-school level math and some programming skills.
"We're continuing this journey making it easier and easier to use," Mr Gupta says.
TensorFlow has been used to do everything from helping Nasa scientists find planets using the Kepler telescope to assisting a tribe in the Amazon detect the sounds of illegal deforestation, according to Google spokesman Justin Burr.
Google hopes users adapt the open-source code to discover new applications that the company could someday use in its own business.
Even without AI, sensors are helping farmers keep tabs on their herds.
Mary Mackinson Faber, a fifth-generation farmer at the Mackinson Dairy Farm near Pontiac, Illinois, says a device attached to a cow's tail developed by Irish company Moocall sends her a text when a cow is ready to give birth, so she can be there to make sure nothing goes wrong. Moocall doesn't use AI - it simply sends a text when a certain threshold of spinal contractions in the tail are exceeded.
While she calls it a "great tool", she says it takes human intuition to do what's right for their animals.
"There are certain tasks that it can help with, and it can assist us, but I don't think it will ever replace the human."
Student Of The Year 2
Director: Punit Malhotra
Stars: Tiger Shroff, Tara Sutaria, Ananya Pandey, Aditya Seal
1.5 stars
Tori Amos
Native Invader
Decca
KILLING OF QASSEM SULEIMANI
First Person
Richard Flanagan
Chatto & Windus
The Birkin bag is made by Hermès.
It is named after actress and singer Jane Birkin
Noone from Hermès will go on record to say how much a new Birkin costs, how long one would have to wait to get one, and how many bags are actually made each year.
THE SPECS
Engine: 1.5-litre
Transmission: 6-speed automatic
Power: 110 horsepower
Torque: 147Nm
Price: From Dh59,700
On sale: now
Who has lived at The Bishops Avenue?
- George Sainsbury of the supermarket dynasty, sugar magnate William Park Lyle and actress Dame Gracie Fields were residents in the 1930s when the street was only known as ‘Millionaires’ Row’.
- Then came the international super rich, including the last king of Greece, Constantine II, the Sultan of Brunei and Indian steel magnate Lakshmi Mittal who was at one point ranked the third richest person in the world.
- Turkish tycoon Halis Torprak sold his mansion for £50m in 2008 after spending just two days there. The House of Saud sold 10 properties on the road in 2013 for almost £80m.
- Other residents have included Iraqi businessman Nemir Kirdar, singer Ariana Grande, holiday camp impresario Sir Billy Butlin, businessman Asil Nadir, Paul McCartney’s former wife Heather Mills.
Hunting park to luxury living
- Land was originally the Bishop of London's hunting park, hence the name
- The road was laid out in the mid 19th Century, meandering through woodland and farmland
- Its earliest houses at the turn of the 20th Century were substantial detached properties with extensive grounds
Key findings of Jenkins report
- Founder of the Muslim Brotherhood, Hassan al Banna, "accepted the political utility of violence"
- Views of key Muslim Brotherhood ideologue, Sayyid Qutb, have “consistently been understood” as permitting “the use of extreme violence in the pursuit of the perfect Islamic society” and “never been institutionally disowned” by the movement.
- Muslim Brotherhood at all levels has repeatedly defended Hamas attacks against Israel, including the use of suicide bombers and the killing of civilians.
- Laying out the report in the House of Commons, David Cameron told MPs: "The main findings of the review support the conclusion that membership of, association with, or influence by the Muslim Brotherhood should be considered as a possible indicator of extremism."
Sholto Byrnes on Myanmar politics
The bio
Who inspires you?
I am in awe of the remarkable women in the Arab region, both big and small, pushing boundaries and becoming role models for generations. Emily Nasrallah was a writer, journalist, teacher and women’s rights activist
How do you relax?
Yoga relaxes me and helps me relieve tension, especially now when we’re practically chained to laptops and desks. I enjoy learning more about music and the history of famous music bands and genres.
What is favourite book?
The Perks of Being a Wallflower - I think I've read it more than 7 times
What is your favourite Arabic film?
Hala2 Lawen (Translation: Where Do We Go Now?) by Nadine Labaki
What is favourite English film?
Mamma Mia
Best piece of advice to someone looking for a career at Google?
If you’re interested in a career at Google, deep dive into the different career paths and pinpoint the space you want to join. When you know your space, you’re likely to identify the skills you need to develop.
Eyasses squad
Charlie Preston (captain) – goal shooter/ goalkeeper (Dubai College)
Arushi Holt (vice-captain) – wing defence / centre (Jumeriah English Speaking School)
Olivia Petricola (vice-captain) – centre / wing attack (Dubai English Speaking College)
Isabel Affley – goalkeeper / goal defence (Dubai English Speaking College)
Jemma Eley – goal attack / wing attack (Dubai College)
Alana Farrell-Morton – centre / wing / defence / wing attack (Nord Anglia International School)
Molly Fuller – goal attack / wing attack (Dubai College)
Caitlin Gowdy – goal defence / wing defence (Dubai English Speaking College)
Noorulain Hussain – goal defence / wing defence (Dubai College)
Zahra Hussain-Gillani – goal defence / goalkeeper (British School Al Khubairat)
Claire Janssen – goal shooter / goal attack (Jumeriah English Speaking School)
Eliza Petricola – wing attack / centre (Dubai English Speaking College)
KILLING OF QASSEM SULEIMANI
Turkish Ladies
Various artists, Sony Music Turkey
Islamic%20Architecture%3A%20A%20World%20History
%3Cp%3E%3Cstrong%3EAuthor%3A%3C%2Fstrong%3E%20Eric%20Broug%3Cbr%3E%3Cstrong%3EPublisher%3A%3C%2Fstrong%3E%20Thames%20%26amp%3B%20Hudson%3Cbr%3E%3Cstrong%3EPages%3A%3C%2Fstrong%3E%20336%3Cbr%3E%3Cstrong%3EAvailable%3A%3C%2Fstrong%3E%20September%3C%2Fp%3E%0A
SOUTH%20KOREA%20SQUAD
%3Cp%3E%0D%3Cstrong%3EGoalkeepers%3A%20%3C%2Fstrong%3EKim%20Seung-gyu%2C%20Jo%20Hyeon-woo%2C%20Song%20Bum-keun%0D%3Cbr%3E%3Cstrong%3EDefenders%3A%20%3C%2Fstrong%3EKim%20Young-gwon%2C%20Kim%20Min-jae%2C%20Jung%20Seung-hyun%2C%20Kim%20Ju-sung%2C%20Kim%20Ji-soo%2C%20Seol%20Young-woo%2C%20Kim%20Tae-hwan%2C%20Lee%20Ki-je%2C%20Kim%20Jin-su%0D%3Cbr%3E%3Cstrong%3EMidfielders%3A%20%3C%2Fstrong%3EPark%20Yong-woo%2C%20Hwang%20In-beom%2C%20Hong%20Hyun-seok%2C%20Lee%20Soon-min%2C%20Lee%20Jae-sung%2C%20Lee%20Kang-in%2C%20Son%20Heung-min%20(captain)%2C%20Jeong%20Woo-yeong%2C%20Moon%20Seon-min%2C%20Park%20Jin-seob%2C%20Yang%20Hyun-jun%0D%3Cbr%3E%3Cstrong%3EStrikers%3A%20%3C%2Fstrong%3EHwang%20Hee-chan%2C%20Cho%20Gue-sung%2C%20Oh%20Hyeon-gyu%3C%2Fp%3E%0A
The years Ramadan fell in May
Know your cyber adversaries
Cryptojacking: Compromises a device or network to mine cryptocurrencies without an organisation's knowledge.
Distributed denial-of-service: Floods systems, servers or networks with information, effectively blocking them.
Man-in-the-middle attack: Intercepts two-way communication to obtain information, spy on participants or alter the outcome.
Malware: Installs itself in a network when a user clicks on a compromised link or email attachment.
Phishing: Aims to secure personal information, such as passwords and credit card numbers.
Ransomware: Encrypts user data, denying access and demands a payment to decrypt it.
Spyware: Collects information without the user's knowledge, which is then passed on to bad actors.
Trojans: Create a backdoor into systems, which becomes a point of entry for an attack.
Viruses: Infect applications in a system and replicate themselves as they go, just like their biological counterparts.
Worms: Send copies of themselves to other users or contacts. They don't attack the system, but they overload it.
Zero-day exploit: Exploits a vulnerability in software before a fix is found.