Hello. I started exploring computers at a very early age, and that was that. I was instantly hooked and intrigued with computers, and essentially technology at large. What captivated me was what computers could do, how they could be used to extend our abilities in a nearly infinite way - so long as we could figure out how to actually make computers do that.
I recall that a piece of research once compared the efficiency of movement of humans against that of the animal kingdom. The conclusion was that on a grand scale of things, we humans were pretty inefficient movers. The eagle was ranked first, with its elegant ability to soar and ride the currents of the air to cover huge distances. Humans? If memory serves we came in somewhere around the twentieth. Not doing so well, we were not.
But, humans had invented this thing called the bicycle - a tool, nothing more. But that tipped the scales. With a bicycle, humans blew the eagle away in terms of efficiency of movement. I feel that computers, and our ability to control and imbue abilities into these machines, is to our mental faculties what the bicycle was to our movement ability. It is an extension of our mind.
So, pretty much I was exploring, building and ultimately programming every computer (which truth be told was not that many) I could get my hands on. I started my foray into coding with BASIC, the free and conveniently accessible language found in almost every personal computer at the time.
As time passed and I got more and more comfortable with code, the desire for more led me to go beyond programming, to looking code written by other people. This led me into the world of computer security and reverse engineering. Initially, it was really just to understand how things worked. I remember that at the time I wanted to know exactly how the Windows kernel worked - why Windows sometimes did the things it did. But quickly, it became a challenge of discovering the gems and secrets hiding inside other people’s software. It then naturally led to me to bug hunting for the purpose of finding vulnerabilities and writing exploits to demonstrate those vulnerabilities.
Having spent years in computer security, vulnerability research and exploitation, my next leap was into the huge, uncharted world of artificial intelligence. What initially led me to this was because the art of reverse-engineering, especially for exploitation, is a human dominated skill, often favouring the hugely parallel mind of the researcher over automated techniques. But newer techniques especially those driven by machine intelligence, can be applied in very interesting ways to yield results that a human has trouble finding. So, my study of AI started in order to find more bugs more quickly and more accurately, research that led me to combine the computer security research with artificial intelligence. Beyond that, AI as a field itself began to intrigue me, as until today, we still do not know very much about AI. Subsequent research had me focused on techniques involved in content recognition through what is often referred to today as deep learning, and how to implement them in a largely scalable way.
Right now, I am a co-founder of Qavar, a technology company focused on using artificial intelligence to usher in a new breed of business automation solutions. While it is encouraging that very recently more and more companies are starting to open up and release their research and technology into the open source world, AI and its derivative technologies still largely remain in the hands of large companies.
Therefore, despite the fact that the application of AI can literally make the software that underpins business operations entirely different - bringing about incredibly new and efficient ways of doing things - very little of AI technology has actually reached the business and consumer level. Through Qavar, I hope to create a company that does that, bringing artificial intelligence in a seamless way to help people, businesses, and, where possible, the world at large.