IT Pro 20/20: The quest to humanise AI
Issue 28 looks at recent developments in artificial intelligence that are pushing businesses to be more creative
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
You are now subscribed
Your newsletter sign-up was successful
Welcome to issue 28 of IT Pro 20/20, distilling the most important themes of the previous month into a simple, easy-to-read package.
The striking image that appears on the front cover of issue 28 was created entirely by artificial intelligence. This year represented a major breakthrough for OpenAI, which unveiled DALL-E 2, the second generation of its imaging tool that’s capable of creating some truly spectacular works of art.
We show how this work, alongside similar projects across the industry, is attempting to mould an approach to artificial intelligence that puts human creativity at its core.
The next IT Pro 20/20 will be available on 31 May – previous issues can be found here. If you would like to receive each issue in your inbox as they release, you can subscribe to our mailing list here.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Dale Walker is a contributor specializing in cybersecurity, data protection, and IT regulations. He was the former managing editor at ITPro, as well as its sibling sites CloudPro and ChannelPro. He spent a number of years reporting for ITPro from numerous domestic and international events, including IBM, Red Hat, Google, and has been a regular reporter for Microsoft's various yearly showcases, including Ignite.
-
ITPro Excellence Awards winners unveiledIt's time to celebrate excellence in IT. Read on for the full list of winners...
-
This new mobile compromise toolkit enables spyware, surveillance, and data theftNews The professional package allows even unsophisticated attackers to take full control of devices