Stay Ahead, Stay ONMINE

😲 Quantifying Surprise – A Data Scientist’s Intro To Information Theory – Part 1/4: Foundations

Surprise! Generated using Gemini. During the telecommunication boom, Claude Shannon, in his seminal 1948 paper¹, posed a question that would revolutionise technology: How can we quantify communication? Shannon’s findings remain fundamental to expressing information quantification, storage, and communication. These insights made major contributions to the creation of technologies ranging from signal processing, data compression (e.g., Zip files and compact discs) to the Internet and artificial intelligence. More broadly, his work has significantly impacted diverse fields such as neurobiology, statistical physics and computer science (e.g, cybersecurity, cloud computing, and machine learning). [Shannon’s paper is the] Magna Carta of the Information Age Scientific American This is the first article in a series that explores information quantification – an essential tool for data scientists. Its applications range from enhancing statistical analyses to serving as a go-to decision heuristic in cutting-edge machine learning algorithms. Broadly speaking, quantifying information is assessing uncertainty, which may be phrased as: “how surprising is an outcome?”. This article idea quickly grew into a series since I found this topic both fascinating and diverse. Most researchers, at one stage or another, come across commonly used metrics such as entropy, cross-entropy/KL-divergence and mutual-information. Diving into this topic I found that in order to fully appreciate these one needs to learn a bit about the basics which we cover in this first article. By reading this series you will gain an intuition and tools to quantify: Bits/Nats – Unit measures of information. Self-Information – **** The amount of information in a specific event. Pointwise Mutual Information – The amount of information shared between two specific events. Entropy – The average amount of information of a variable’s outcome. Cross-entropy – The misalignment between two probability distributions (also expressed by its derivative KL-Divergence – a distance measure). Mutual Information – The co-dependency of two variables by their conditional probability distributions. It expresses the information gain of one variable given another. No prior knowledge is required – just a basic understanding of probabilities. I demonstrate using common statistics such as coin and dice 🎲 tosses as well as machine learning applications such as in supervised classification, feature selection, model monitoring and clustering assessment. As for real world applications I’ll discuss a case study of quantifying DNA diversity 🧬. Finally, for fun, I also apply to the popular brain twister commonly known as the Monty Hall problem 🚪🚪 🐐 . Throughout I provide python code 🐍 , and try to keep formulas as intuitive as possible. If you have access to an integrated development environment (IDE) 🖥 you might want to plug 🔌 and play 🕹 around with the numbers to gain a better intuition. This series is divided into four articles, each exploring a key aspect of Information Theory: 😲 Quantifying Surprise: 👈 👈 👈 YOU ARE HERE In this opening article, you’ll learn how to quantify the “surprise” of an event using _self-informatio_n and understand its units of measurement, such as _bit_s and _nat_s. Mastering self-information is essential for building intuition about the subsequent concepts, as all later heuristics are derived from it. 🤷 Quantifying Uncertainty: Building on self-information, this article shifts focus to the uncertainty – or “average surprise” – associated with a variable, known as entropy. We’ll dive into entropy’s wide-ranging applications, from Machine Learning and data analysis to solving fun puzzles, showcasing its adaptability. 📏 Quantifying Misalignment: Here, we’ll explore how to measure the distance between two probability distributions using entropy-based metrics like cross-entropy and KL-divergence. These measures are particularly valuable for tasks like comparing predicted versus true distributions, as in classification loss functions and other alignment-critical scenarios. 💸 Quantifying Gain: Expanding from single-variable measures, this article investigates the relationships between two. You’ll discover how to quantify the information gained about one variable (e.g, target Y) by knowing another (e.g., predictor X). Applications include assessing variable associations, feature selection, and evaluating clustering performance. Each article is crafted to stand alone while offering cross-references for deeper exploration. Together, they provide a practical, data-driven introduction to information theory, tailored for data scientists, analysts and machine learning practitioners. Disclaimer: Unless otherwise mentioned the formulas analysed are for categorical variables with c≥2 classes (2 meaning binary). Continuous variables will be addressed in a separate article. 🚧 Articles (3) and (4) are currently under construction. I will share links once available. Follow me to be notified 🚧 Quantifying Surprise with Self-Information Self-information is considered the building block of information quantification. It is a way of quantifying the amount of “surprise” of a specific outcome. Formally self-information, or also referred to as Shannon Information or information content, quantifies the surprise of an event x occurring based on its probability, p(x). Here we denote it as hₓ: Self-information _h_ₓ is the information of event x that occurs with probability p(x). The units of measure are called bits. One bit (binary digit) is the amount of information for an event x that has probability of p(x)=½. Let’s plug in to verify: hₓ=-log₂(½)= log₂(2)=1 bit. This heuristic serves as an alternative to probabilities, odds and log-odds, with certain mathematical properties which are advantageous for information theory. We discuss these below when learning about Shannon’s axioms behind this choice. It’s always informative to explore how an equation behaves with a graph: Bernoulli trial self-information h(p). Key features: Monotonic, h(p=1)=0, h(p →)→∞. To deepen our understanding of self-information, we’ll use this graph to explore the said axioms that justify its logarithmic formulation. Along the way, we’ll also build intuition about key features of this heuristic. To emphasise the logarithmic nature of self-information, I’ve highlighted three points of interest on the graph: At p=1 an event is guaranteed, yielding no surprise and hence zero bits of information (zero bits). A useful analogy is a trick coin (where both sides show HEAD). Reducing the probability by a factor of two (p=½​) increases the information to _hₓ=_1 bit. This, of course, is the case of a fair coin. Further reducing it by a factor of four results in hₓ(p=⅛)=3 bits. If you are interested in coding the graph here is a python script: To summarise this section: Self-Information hₓ=-log₂(p(x)) quantifies the amount of “surprise” of a specific outcome x. Three Axioms Referencing prior work by Ralph Hartley, Shannon chose -log₂(p) as a manner to meet three axioms. We’ll use the equation and graph to examine how these are manifested: An event with probability 100% is not surprising and hence does not yield any information. In the trick coin case this is evident by p(x)=1 yielding hₓ=0. Less probable events are more surprising and provide more information. This is apparent by self-information decreasing monotonically with increasing probability. The property of Additivity – the total self-information of two independent events equals the sum of individual contributions. This will be explored further in the upcoming fourth article on Mutual Information. There are mathematical proofs (which are beyond the scope of this series) that show that only the log function adheres to all three². The application of these axioms reveals several intriguing and practical properties of self-information: Important properties : Minimum bound: The first axiom hₓ(p=1)=0 establishes that self-information is non-negative, with zero as its lower bound. This is highly practical for many applications. Monotonically decreasing: The second axiom ensures that self-information decreases monotonically with increasing probability. No Maximum bound: At the extreme where _p→_0, monotonicity leads to self-information growing without bound hₓ(_p→0) →_ ∞, a feature that requires careful consideration in some contexts. However, when averaging self-information – as we will later see in the calculation of entropy – probabilities act as weights, effectively limiting the contribution of highly improbable events to the overall average. This relationship will become clearer when we explore entropy in detail. It is useful to understand the close relationship to log-odds. To do so we define p(x) as the probability of event x to happen and p(¬x)=1-p(x) of it not to happen. log-odds(x) = log₂(p(x)/p(¬x))= h(¬x) – h(x). The main takeaways from this section are Axiom 1: An event with probability 100% is not surprising Axiom 2: Less probable events are more surprising and, when they occur, provide more information. Self information (1) monotonically decreases (2) with a minimum bound of zero and (3) no upper bound. In the next two sections we further discuss units of measure and choice of normalisation. Information Units of Measure Bits or Shannons? A bit, as mentioned, represents the amount of information associated with an event that has a 50% probability of occurring. The term is also sometimes referred to as a Shannon, a naming convention proposed by mathematician and physicist David MacKay to avoid confusion with the term ‘bit’ in the context of digital processing and storage. After some deliberation, I decided to use ‘bit’ throughout this series for several reasons: This series focuses on quantifying information, not on digital processing or storage, so ambiguity is minimal. Shannon himself, encouraged by mathematician and statistician John Tukey, used the term ‘bit’ in his landmark paper. ‘Bit’ is the standard term in much of the literature on information theory. For convenience – it’s more concise Normalisation: Log Base 2 vs. Natural Throughout this series we use base 2 for logarithms, reflecting the intuitive notion of a 50% chance of an event as a fundamental unit of information. An alternative commonly used in machine learning is the natural logarithm, which introduces a different unit of measure called nats (short for natural units of information). One nat corresponds to the information gained from an event occurring with a probability of 1/e where e is Euler’s number (≈2.71828). In other words, 1 nat = -ln(p=(1/e)). The relationship between bits (base 2) and nats (natural log) is as follows: 1 bit = ln(2) nats ≈ 0.693 nats. Think of it as similar to a monetary current exchange or converting centimeters to inches. In his seminal publication Shanon explained that the optimal choice of base depends on the specific system being analysed (paraphrased slightly from his original work): “A device with two stable positions […] can store one bit of information” (bit as in binary digit). “A digit wheel on a desk computing machine that has ten stable positions […] has a storage capacity of one decimal digit.”³ “In analytical work where integration and differentiation are involved the base e is sometimes useful. The resulting units of information will be called natural units.” Key aspects of machine learning, such as popular loss functions, often rely on integrals and derivatives. The natural logarithm is a practical choice in these contexts because it can be derived and integrated without introducing additional constants. This likely explains why the machine learning community frequently uses nats as the unit of information – it simplifies the mathematics by avoiding the need to account for factors like ln(2). As shown earlier, I personally find base 2 more intuitive for interpretation. In cases where normalisation to another base is more convenient, I will make an effort to explain the reasoning behind the choice. To summarise this section of units of measure: bit = amount of information to distinguish between two equally likely outcomes. Now that we are familiar with self-information and its unit of measure let’s examine a few use cases. Quantifying Event Information with Coins and Dice In this section, we’ll explore examples to help internalise the self-information axioms and key features demonstrated in the graph. Gaining a solid understanding of self-information is essential for grasping its derivatives, such as entropy, cross-entropy (or KL divergence), and mutual information – all of which are averages over self-information. The examples are designed to be simple, approachable, and lighthearted, accompanied by practical Python code to help you experiment and build intuition. Note: If you feel comfortable with self-information, feel free to skip these examples and go straight to the Quantifying Uncertainty article. Generated using Gemini. To further explore the self-information and bits, I find analogies like coin flips and dice rolls particularly effective, as they are often useful analogies for real-world phenomena. Formally, these can be described as multinomial trials with n=1 trial. Specifically: A coin flip is a Bernoulli trial, where there are c=2 possible outcomes (e.g., heads or tails). Rolling a die represents a categorical trial, where c≥3 outcomes are possible (e.g., rolling a six-sided or eight-sided die). As a use case we’ll use simplistic weather reports limited to featuring sun 🌞 , rain 🌧 , and snow ⛄️. Now, let’s flip some virtual coins 👍 and roll some funky-looking dice 🎲 … Fair Coins and Dice Generated using Gemini. We’ll start with the simplest case of a fair coin (i.e, 50% chance for success/Heads or failure/Tails). Imagine an area for which at any given day there is a 50:50 chance for sun or rain. We can write the probability of each event be: p(🌞 )=p(🌧 )=½. As seen above, according the the self-information formulation, when 🌞 or 🌧 is reported we are provided with h(🌞 __ )=h(🌧 )=-log₂(½)=1 bit of information. We will continue to build on this analogy later on, but for now let’s turn to a variable that has more than two outcomes (c≥3). Before we address the standard six sided die, to simplify the maths and intuition, let’s assume an 8 sided one (_c=_8) as in Dungeons Dragons and other tabletop games. In this case each event (i.e, landing on each side) has a probability of p(🔲 ) = ⅛. When a die lands on one side facing up, e.g, value 7️⃣, we are provided with h(🔲 =7️⃣)=-log₂(⅛)=3 bits of information. For a standard six sided fair die: p(🔲 ) = ⅙ → an event yields __ h(🔲 )=-log₂(⅙)=2.58 bits. Comparing the amount of information from the fair coin (1 bit), 6 sided die (2.58 bits) and 8 sided (3 bits) we identify the second axiom: The less probable an event is, the more surprising it is and the more information it yields. Self information becomes even more interesting when probabilities are skewed to prefer certain events. Loaded Coins and Dice Generated using Gemini. Let’s assume a region where p(🌞 ) = ¾ and p(🌧 )= ¼. When rain is reported the amount of information conveyed is not 1 bit but rather h(🌧 )=-log₂(¼)=2 bits. When sun is reported less information is conveyed: h(🌞 )=-log₂(¾)=0.41 bits. As per the second axiom— a rarer event, like p(🌧 )=¼, reveals more information than a more likely one, like p(🌞 )=¾ – and vice versa. To further drive this point let’s now assume a desert region where p(🌞 ) =99% and p(🌧 )= 1%. If sunshine is reported – that is kind of expected – so nothing much is learnt (“nothing new under the sun” 🥁) and this is quantified as h(🌞 )=0.01 bits. If rain is reported, however, you can imagine being quite surprised. This is quantified as h(🌧 )=6.64 bits. In the following python scripts you can examine all the above examples, and I encourage you to play with your own to get a feeling. First let’s define the calculation and printout function: import numpy as np def print_events_self_information(probs): for ps in probs: print(f”Given distribution {ps}”) for event in ps: if ps[event] != 0: self_information = -np.log2(ps[event]) #same as: -np.log(ps[event])/np.log(2) text_ = f’When `{event}` occurs {self_information:0.2f} bits of information is communicated’ print(text_) else: print(f’a `{event}` event cannot happen p=0 ‘) print(“=” * 20) Next we’ll set a few example distributions of weather frequencies # Setting multiple probability distributions (each sums to 100%) # Fun fact – 🐍 💚 Emojis! probs = [{‘🌞 ‘: 0.5, ‘🌧 ‘: 0.5}, # half-half {‘🌞 ‘: 0.75, ‘🌧 ‘: 0.25}, # more sun than rain {‘🌞 ‘: 0.99, ‘🌧 ‘: 0.01} , # mostly sunshine ] print_events_self_information(probs) This yields printout Given distribution {‘🌞 ‘: 0.5, ‘🌧 ‘: 0.5} When `🌞 ` occurs 1.00 bits of information is communicated When `🌧 ` occurs 1.00 bits of information is communicated ==================== Given distribution {‘🌞 ‘: 0.75, ‘🌧 ‘: 0.25} When `🌞 ` occurs 0.42 bits of information is communicated When `🌧 ` occurs 2.00 bits of information is communicated ==================== Given distribution {‘🌞 ‘: 0.99, ‘🌧 ‘: 0.01} When `🌞 ` occurs 0.01 bits of information is communicated When `🌧 ` occurs 6.64 bits of information is communicated Let’s examine a case of a loaded three sided die. E.g, information of a weather in an area that reports sun, rain and snow at uneven probabilities: p(🌞 ) = 0.2, p(🌧 )=0.7, p(⛄️)=0.1. Running the following print_events_self_information([{‘🌞 ‘: 0.2, ‘🌧 ‘: 0.7, ‘⛄️’: 0.1}]) yields Given distribution {‘🌞 ‘: 0.2, ‘🌧 ‘: 0.7, ‘⛄️’: 0.1} When `🌞 ` occurs 2.32 bits of information is communicated When `🌧 ` occurs 0.51 bits of information is communicated When `⛄️` occurs 3.32 bits of information is communicated What we saw for the binary case applies to higher dimensions. To summarise – we clearly see the implications of the second axiom: When a highly expected event occurs – we do not learn much, the bit count is low. When an unexpected event occurs – we learn a lot, the bit count is high. Event Information Summary In this article we embarked on a journey into the foundational concepts of information theory, defining how to measure the surprise of an event. Notions introduced serve as the bedrock of many tools in information theory, from assessing data distributions to unraveling the inner workings of machine learning algorithms. Through simple yet insightful examples like coin flips and dice rolls, we explored how self-information quantifies the unpredictability of specific outcomes. Expressed in bits, this measure encapsulates Shannon’s second axiom: rarer events convey more information. While we’ve focused on the information content of specific events, this naturally leads to a broader question: what is the average amount of information associated with all possible outcomes of a variable? In the next article, Quantifying Uncertainty, we build on the foundation of self-information and bits to explore entropy – the measure of average uncertainty. Far from being just a beautiful theoretical construct, it has practical applications in data analysis and machine learning, powering tasks like decision tree optimisation, estimating diversity and more. Claude Shannon. Credit: Wikipedia Loved this post? ❤️🍕 💌 Follow me here, join me on LinkedIn or 🍕 buy me a pizza slice! About This Series Even though I have twenty years of experience in data analysis and predictive modelling I always felt quite uneasy about using concepts in information theory without truly understanding them. The purpose of this series was to put me more at ease with concepts of information theory and hopefully provide for others the explanations I needed. 🤷 Quantifying Uncertainty – A Data Scientist’s Intro To Information Theory – Part 2/4: EntropyGa_in intuition into Entropy and master its applications in Machine Learning and Data Analysis. Python code included. 🐍 me_dium.com Check out my other articles which I wrote to better understand Causality and Bayesian Statistics: Footnotes ¹ A Mathematical Theory of Communication, Claude E. Shannon, Bell System Technical Journal 1948. It was later renamed to a book The Mathematical Theory of Communication in 1949. [Shannon’s “A Mathematical Theory of Communication”] the blueprint for the digital era – Historian James Gleick ² See Wikipedia page on Information Content (i.e, self-information) for a detailed derivation that only the log function meets all three axioms. ³ The decimal-digit was later renamed to a hartley (symbol Hart), a ban or a dit. See Hartley (unit) Wikipedia page. Credits Unless otherwise noted, all images were created by the author. Many thanks to Will Reynolds and Pascal Bugnion for their useful comments.
Surprise! Generated using Gemini.
Surprise! Generated using Gemini.

During the telecommunication boom, Claude Shannon, in his seminal 1948 paper¹, posed a question that would revolutionise technology:

How can we quantify communication?

Shannon’s findings remain fundamental to expressing information quantification, storage, and communication. These insights made major contributions to the creation of technologies ranging from signal processing, data compression (e.g., Zip files and compact discs) to the Internet and artificial intelligence. More broadly, his work has significantly impacted diverse fields such as neurobiology, statistical physics and computer science (e.g, cybersecurity, cloud computing, and machine learning).

[Shannon’s paper is the]

Magna Carta of the Information Age

  • Scientific American

This is the first article in a series that explores information quantification – an essential tool for data scientists. Its applications range from enhancing statistical analyses to serving as a go-to decision heuristic in cutting-edge machine learning algorithms.

Broadly speaking, quantifying information is assessing uncertainty, which may be phrased as: “how surprising is an outcome?”.

This article idea quickly grew into a series since I found this topic both fascinating and diverse. Most researchers, at one stage or another, come across commonly used metrics such as entropy, cross-entropy/KL-divergence and mutual-information. Diving into this topic I found that in order to fully appreciate these one needs to learn a bit about the basics which we cover in this first article.

By reading this series you will gain an intuition and tools to quantify:

  • Bits/Nats – Unit measures of information.
  • Self-Information – **** The amount of information in a specific event.
  • Pointwise Mutual Information – The amount of information shared between two specific events.
  • Entropy – The average amount of information of a variable’s outcome.
  • Cross-entropy – The misalignment between two probability distributions (also expressed by its derivative KL-Divergence – a distance measure).
  • Mutual Information – The co-dependency of two variables by their conditional probability distributions. It expresses the information gain of one variable given another.

No prior knowledge is required – just a basic understanding of probabilities.

I demonstrate using common statistics such as coin and dice 🎲 tosses as well as machine learning applications such as in supervised classification, feature selection, model monitoring and clustering assessment. As for real world applications I’ll discuss a case study of quantifying DNA diversity 🧬. Finally, for fun, I also apply to the popular brain twister commonly known as the Monty Hall problem 🚪🚪 🐐 .

Throughout I provide python code 🐍 , and try to keep formulas as intuitive as possible. If you have access to an integrated development environment (IDE) 🖥 you might want to plug 🔌 and play 🕹 around with the numbers to gain a better intuition.

This series is divided into four articles, each exploring a key aspect of Information Theory:

  1. 😲 Quantifying Surprise: 👈 👈 👈 YOU ARE HERE
    In this opening article, you’ll learn how to quantify the “surprise” of an event using _self-informatio_n and understand its units of measurement, such as _bit_s and _nat_s. Mastering self-information is essential for building intuition about the subsequent concepts, as all later heuristics are derived from it.

  2. 🤷 Quantifying Uncertainty: Building on self-information, this article shifts focus to the uncertainty – or “average surprise” – associated with a variable, known as entropy. We’ll dive into entropy’s wide-ranging applications, from Machine Learning and data analysis to solving fun puzzles, showcasing its adaptability.
  3. 📏 Quantifying Misalignment: Here, we’ll explore how to measure the distance between two probability distributions using entropy-based metrics like cross-entropy and KL-divergence. These measures are particularly valuable for tasks like comparing predicted versus true distributions, as in classification loss functions and other alignment-critical scenarios.
  4. 💸 Quantifying Gain: Expanding from single-variable measures, this article investigates the relationships between two. You’ll discover how to quantify the information gained about one variable (e.g, target Y) by knowing another (e.g., predictor X). Applications include assessing variable associations, feature selection, and evaluating clustering performance.

Each article is crafted to stand alone while offering cross-references for deeper exploration. Together, they provide a practical, data-driven introduction to information theory, tailored for data scientists, analysts and machine learning practitioners.

Disclaimer: Unless otherwise mentioned the formulas analysed are for categorical variables with c≥2 classes (2 meaning binary). Continuous variables will be addressed in a separate article.

🚧 Articles (3) and (4) are currently under construction. I will share links once available. Follow me to be notified 🚧


Quantifying Surprise with Self-Information

Self-information is considered the building block of information quantification.

It is a way of quantifying the amount of “surprise” of a specific outcome.

Formally self-information, or also referred to as Shannon Information or information content, quantifies the surprise of an event x occurring based on its probability, p(x). Here we denote it as hₓ:

Self-information _h_ₓ is the information of event x that occurs with probability p(x).
Self-information _h_ₓ is the information of event x that occurs with probability p(x).

The units of measure are called bits. One bit (binary digit) is the amount of information for an event x that has probability of p(x)=½. Let’s plug in to verify: hₓ=-log₂(½)= log₂(2)=1 bit.

This heuristic serves as an alternative to probabilities, odds and log-odds, with certain mathematical properties which are advantageous for information theory. We discuss these below when learning about Shannon’s axioms behind this choice.

It’s always informative to explore how an equation behaves with a graph:

Bernoulli trial self-information h(p). Key features: Monotonic, h(p=1)=0, h(p →)→∞.
Bernoulli trial self-information h(p). Key features: Monotonic, h(p=1)=0, h(p →)→∞.

To deepen our understanding of self-information, we’ll use this graph to explore the said axioms that justify its logarithmic formulation. Along the way, we’ll also build intuition about key features of this heuristic.

To emphasise the logarithmic nature of self-information, I’ve highlighted three points of interest on the graph:

  • At p=1 an event is guaranteed, yielding no surprise and hence zero bits of information (zero bits). A useful analogy is a trick coin (where both sides show HEAD).
  • Reducing the probability by a factor of two (p=½​) increases the information to _hₓ=_1 bit. This, of course, is the case of a fair coin.
  • Further reducing it by a factor of four results in hₓ(p=⅛)=3 bits.

If you are interested in coding the graph here is a python script:

To summarise this section:

Self-Information hₓ=-log₂(p(x)) quantifies the amount of “surprise” of a specific outcome x.

Three Axioms

Referencing prior work by Ralph Hartley, Shannon chose -log₂(p) as a manner to meet three axioms. We’ll use the equation and graph to examine how these are manifested:

  1. An event with probability 100% is not surprising and hence does not yield any information.
    In the trick coin case this is evident by p(x)=1 yielding hₓ=0.

  2. Less probable events are more surprising and provide more information.
    This is apparent by self-information decreasing monotonically with increasing probability.

  3. The property of Additivity – the total self-information of two independent events equals the sum of individual contributions. This will be explored further in the upcoming fourth article on Mutual Information.

There are mathematical proofs (which are beyond the scope of this series) that show that only the log function adheres to all three².

The application of these axioms reveals several intriguing and practical properties of self-information:

Important properties :

  • Minimum bound: The first axiom hₓ(p=1)=0 establishes that self-information is non-negative, with zero as its lower bound. This is highly practical for many applications.
  • Monotonically decreasing: The second axiom ensures that self-information decreases monotonically with increasing probability.
  • No Maximum bound: At the extreme where _p→_0, monotonicity leads to self-information growing without bound hₓ(_p→0) →_ ∞, a feature that requires careful consideration in some contexts. However, when averaging self-information – as we will later see in the calculation of entropy – probabilities act as weights, effectively limiting the contribution of highly improbable events to the overall average. This relationship will become clearer when we explore entropy in detail.

It is useful to understand the close relationship to log-odds. To do so we define p(x) as the probability of event x to happen and px)=1-p(x) of it not to happen. log-odds(x) = log₂(p(x)/px))= hx) – h(x).

The main takeaways from this section are

Axiom 1: An event with probability 100% is not surprising

Axiom 2: Less probable events are more surprising and, when they occur, provide more information.

Self information (1) monotonically decreases (2) with a minimum bound of zero and (3) no upper bound.

In the next two sections we further discuss units of measure and choice of normalisation.

Information Units of Measure

Bits or Shannons?

A bit, as mentioned, represents the amount of information associated with an event that has a 50% probability of occurring.

The term is also sometimes referred to as a Shannon, a naming convention proposed by mathematician and physicist David MacKay to avoid confusion with the term ‘bit’ in the context of digital processing and storage.

After some deliberation, I decided to use ‘bit’ throughout this series for several reasons:

  • This series focuses on quantifying information, not on digital processing or storage, so ambiguity is minimal.
  • Shannon himself, encouraged by mathematician and statistician John Tukey, used the term ‘bit’ in his landmark paper.
  • ‘Bit’ is the standard term in much of the literature on information theory.
  • For convenience – it’s more concise

Normalisation: Log Base 2 vs. Natural

Throughout this series we use base 2 for logarithms, reflecting the intuitive notion of a 50% chance of an event as a fundamental unit of information.

An alternative commonly used in machine learning is the natural logarithm, which introduces a different unit of measure called nats (short for natural units of information). One nat corresponds to the information gained from an event occurring with a probability of 1/e where e is Euler’s number (≈2.71828). In other words, 1 nat = -ln(p=(1/e)).

The relationship between bits (base 2) and nats (natural log) is as follows:

1 bit = ln(2) nats ≈ 0.693 nats.

Think of it as similar to a monetary current exchange or converting centimeters to inches.

In his seminal publication Shanon explained that the optimal choice of base depends on the specific system being analysed (paraphrased slightly from his original work):

  • “A device with two stable positions […] can store one bit of information” (bit as in binary digit).
  • “A digit wheel on a desk computing machine that has ten stable positions […] has a storage capacity of one decimal digit.”³
  • “In analytical work where integration and differentiation are involved the base e is sometimes useful. The resulting units of information will be called natural units.

Key aspects of machine learning, such as popular loss functions, often rely on integrals and derivatives. The natural logarithm is a practical choice in these contexts because it can be derived and integrated without introducing additional constants. This likely explains why the machine learning community frequently uses nats as the unit of information – it simplifies the mathematics by avoiding the need to account for factors like ln(2).

As shown earlier, I personally find base 2 more intuitive for interpretation. In cases where normalisation to another base is more convenient, I will make an effort to explain the reasoning behind the choice.

To summarise this section of units of measure:

bit = amount of information to distinguish between two equally likely outcomes.

Now that we are familiar with self-information and its unit of measure let’s examine a few use cases.

Quantifying Event Information with Coins and Dice

In this section, we’ll explore examples to help internalise the self-information axioms and key features demonstrated in the graph. Gaining a solid understanding of self-information is essential for grasping its derivatives, such as entropy, cross-entropy (or KL divergence), and mutual information – all of which are averages over self-information.

The examples are designed to be simple, approachable, and lighthearted, accompanied by practical Python code to help you experiment and build intuition.

Note: If you feel comfortable with self-information, feel free to skip these examples and go straight to the Quantifying Uncertainty article.

Generated using Gemini.
Generated using Gemini.

To further explore the self-information and bits, I find analogies like coin flips and dice rolls particularly effective, as they are often useful analogies for real-world phenomena. Formally, these can be described as multinomial trials with n=1 trial. Specifically:

  • A coin flip is a Bernoulli trial, where there are c=2 possible outcomes (e.g., heads or tails).
  • Rolling a die represents a categorical trial, where c≥3 outcomes are possible (e.g., rolling a six-sided or eight-sided die).

As a use case we’ll use simplistic weather reports limited to featuring sun 🌞 , rain 🌧 , and snow ⛄️.

Now, let’s flip some virtual coins 👍 and roll some funky-looking dice 🎲 …

Fair Coins and Dice

Generated using Gemini.
Generated using Gemini.

We’ll start with the simplest case of a fair coin (i.e, 50% chance for success/Heads or failure/Tails).

Imagine an area for which at any given day there is a 50:50 chance for sun or rain. We can write the probability of each event be: p(🌞 )=p(🌧 )=½.

As seen above, according the the self-information formulation, when 🌞 or 🌧 is reported we are provided with h(🌞 __ )=h(🌧 )=-log₂(½)=1 bit of information.

We will continue to build on this analogy later on, but for now let’s turn to a variable that has more than two outcomes (c≥3).

Before we address the standard six sided die, to simplify the maths and intuition, let’s assume an 8 sided one (_c=_8) as in Dungeons Dragons and other tabletop games. In this case each event (i.e, landing on each side) has a probability of p(🔲 ) = ⅛.

When a die lands on one side facing up, e.g, value 7️⃣, we are provided with h(🔲 =7️⃣)=-log₂(⅛)=3 bits of information.

For a standard six sided fair die: p(🔲 ) = ⅙ → an event yields __ h(🔲 )=-log₂(⅙)=2.58 bits.

Comparing the amount of information from the fair coin (1 bit), 6 sided die (2.58 bits) and 8 sided (3 bits) we identify the second axiom: The less probable an event is, the more surprising it is and the more information it yields.

Self information becomes even more interesting when probabilities are skewed to prefer certain events.

Loaded Coins and Dice

Generated using Gemini.
Generated using Gemini.

Let’s assume a region where p(🌞 ) = ¾ and p(🌧 )= ¼.

When rain is reported the amount of information conveyed is not 1 bit but rather h(🌧 )=-log₂(¼)=2 bits.

When sun is reported less information is conveyed: h(🌞 )=-log₂(¾)=0.41 bits.

As per the second axiom— a rarer event, like p(🌧 )=¼, reveals more information than a more likely one, like p(🌞 )=¾ – and vice versa.

To further drive this point let’s now assume a desert region where p(🌞 ) =99% and p(🌧 )= 1%.

If sunshine is reported – that is kind of expected – so nothing much is learnt (“nothing new under the sun” 🥁) and this is quantified as h(🌞 )=0.01 bits. If rain is reported, however, you can imagine being quite surprised. This is quantified as h(🌧 )=6.64 bits.

In the following python scripts you can examine all the above examples, and I encourage you to play with your own to get a feeling.

First let’s define the calculation and printout function:

import numpy as np

def print_events_self_information(probs):
    for ps in probs:
        print(f"Given distribution {ps}")
        for event in ps:
            if ps[event] != 0:
                self_information = -np.log2(ps[event]) #same as: -np.log(ps[event])/np.log(2) 
                text_ = f'When `{event}` occurs {self_information:0.2f} bits of information is communicated'
                print(text_)
            else:
                print(f'a `{event}` event cannot happen p=0 ')
        print("=" * 20)

Next we’ll set a few example distributions of weather frequencies

# Setting multiple probability distributions (each sums to 100%)
# Fun fact - 🐍  💚  Emojis!
probs = [{'🌞   ': 0.5, '🌧   ': 0.5},   # half-half
        {'🌞   ': 0.75, '🌧   ': 0.25},  # more sun than rain
        {'🌞   ': 0.99, '🌧   ': 0.01} , # mostly sunshine
]

print_events_self_information(probs)

This yields printout

Given distribution {'🌞      ': 0.5, '🌧      ': 0.5}
When `🌞      ` occurs 1.00 bits of information is communicated 
When `🌧      ` occurs 1.00 bits of information is communicated 
====================
Given distribution {'🌞      ': 0.75, '🌧      ': 0.25}
When `🌞      ` occurs 0.42 bits of information is communicated 
When `🌧      ` occurs 2.00 bits of information is communicated 
====================
Given distribution {'🌞      ': 0.99, '🌧      ': 0.01}
When `🌞      ` occurs 0.01 bits of information is communicated 
When `🌧      ` occurs 6.64 bits of information is communicated  

Let’s examine a case of a loaded three sided die. E.g, information of a weather in an area that reports sun, rain and snow at uneven probabilities: p(🌞 ) = 0.2, p(🌧 )=0.7, p(⛄️)=0.1.

Running the following

print_events_self_information([{'🌞 ': 0.2, '🌧 ': 0.7, '⛄️': 0.1}])

yields

Given distribution {'🌞  ': 0.2, '🌧  ': 0.7, '⛄️': 0.1}
When `🌞  ` occurs 2.32 bits of information is communicated 
When `🌧  ` occurs 0.51 bits of information is communicated 
When `⛄️` occurs 3.32 bits of information is communicated 

What we saw for the binary case applies to higher dimensions.

To summarise – we clearly see the implications of the second axiom:

  • When a highly expected event occurs – we do not learn much, the bit count is low.
  • When an unexpected event occurs – we learn a lot, the bit count is high.

Event Information Summary

In this article we embarked on a journey into the foundational concepts of information theory, defining how to measure the surprise of an event. Notions introduced serve as the bedrock of many tools in information theory, from assessing data distributions to unraveling the inner workings of machine learning algorithms.

Through simple yet insightful examples like coin flips and dice rolls, we explored how self-information quantifies the unpredictability of specific outcomes. Expressed in bits, this measure encapsulates Shannon’s second axiom: rarer events convey more information.

While we’ve focused on the information content of specific events, this naturally leads to a broader question: what is the average amount of information associated with all possible outcomes of a variable?

In the next article, Quantifying Uncertainty, we build on the foundation of self-information and bits to explore entropy – the measure of average uncertainty. Far from being just a beautiful theoretical construct, it has practical applications in data analysis and machine learning, powering tasks like decision tree optimisation, estimating diversity and more.

Claude Shannon. Credit: Wikipedia
Claude Shannon. Credit: Wikipedia

Loved this post? ❤️🍕

💌 Follow me here, join me on LinkedIn or 🍕 buy me a pizza slice!

About This Series

Even though I have twenty years of experience in data analysis and predictive modelling I always felt quite uneasy about using concepts in information theory without truly understanding them.

The purpose of this series was to put me more at ease with concepts of information theory and hopefully provide for others the explanations I needed.

🤷 Quantifying Uncertainty – A Data Scientist’s Intro To Information Theory – Part 2/4: EntropyGa_in intuition into Entropy and master its applications in Machine Learning and Data Analysis. Python code included. 🐍 me_dium.com

Check out my other articles which I wrote to better understand Causality and Bayesian Statistics:

Footnotes

¹ A Mathematical Theory of Communication, Claude E. Shannon, Bell System Technical Journal 1948.

It was later renamed to a book The Mathematical Theory of Communication in 1949.

[Shannon’s “A Mathematical Theory of Communication”] the blueprint for the digital era – Historian James Gleick

² See Wikipedia page on Information Content (i.e, self-information) for a detailed derivation that only the log function meets all three axioms.

³ The decimal-digit was later renamed to a hartley (symbol Hart), a ban or a dit. See Hartley (unit) Wikipedia page.

Credits

Unless otherwise noted, all images were created by the author.

Many thanks to Will Reynolds and Pascal Bugnion for their useful comments.

Shape
Shape
Stay Ahead

Explore More Insights

Stay ahead with more perspectives on cutting-edge power, infrastructure, energy,  bitcoin and AI solutions. Explore these articles to uncover strategies and insights shaping the future of industries.

Shape

Google owns the most AI compute, and it built it its way

Google, for its part, will continue to be “one of the largest, if not the largest,” consumer of compute resources, said Bill Wong, research fellow at Info-Tech Research Group. “Its business model drives that global demand, specifically through the widespread use of Google search and Gemini, which it provides for

Read More »

Cisco to acquire Galileo for AI observability

“We have this opportunity to be a trust layer, not just for … network activity, but actually what’s happening at the application layer, at the workload layer, between agents, between workloads, between data,” Peter Bailey, senior vice president and general manager of Cisco’s security business, told Network World last month.

Read More »

Nvidia Rubin GPUs may be delayed, slowing the next phase of AI infrastructure

The Rubin platform was expected to see early adoption among hyperscalers and AI-native companies, which have the infrastructure to support high-density systems, advanced cooling, and tightly integrated architectures. Hyperscalers to absorb shock Typically, hyperscalers lead early adoption of advanced GPUs, deploying them internally and through cloud platforms, with enterprises gaining

Read More »

Energy Department Continues Initiating Strategic Petroleum Reserve Emergency Exchanges

WASHINGTON — The U.S. Department of Energy (DOE) today issued a Request for Proposal (RFP) for an emergency exchange of up to 30 million barrels of sweet crude oil from the Strategic Petroleum Reserve (SPR). This action continues DOE’s execution of the 172-million-barrel release President Trump authorized as part of a coordinated release of 400 million barrels from IEA member nations’ strategic reserves. The Department will continue issuing RFPs to deliver on President Trump’s commitment to the coordinated release, addressing global supply disruptions and strengthening energy security for the United States and its allies. The crude oil will originate from the SPR’s West Hackberry site. This action builds on the Department’s two previous Emergency Exchange RFPs, which together quickly moved to award approximately 55 million barrels from the Bayou Choctaw, Bryan Mound, and West Hackberry SPR sites. These earlier exchanges demonstrated the SPR’s ability to rapidly deliver crude oil to the market under emergency authorities. Today’s announcement of the 30-million-barrel exchange leverages the full capabilities of the SPR, alongside the President’s limited Jones Act waiver, to accelerate critical near-term oil flows into the market and strengthen supply resilience. “Today’s action strengthens efforts to move oil quickly to market and address short-term supply pressures,” said Kyle Haustveit, Assistant Secretary of the Hydrocarbons and Geothermal Energy Office. “With two earlier exchanges, we are building on proven momentum. Thanks to President Trump, we are managing the SPR responsibly, returning premium barrels later to bolster long-term readiness at no cost to taxpayers.” Under DOE’s exchange authority, participating companies will return the borrowed 30-million-barrels with additional premium barrels by next year. This exchange delivers immediate crude to refiners and the market while generating additional barrels for the American people at no cost to taxpayers. Bids for this solicitation are due no later than 11:00 A.M. Central Time on Monday, April 13, 2026. For more information on the SPR, please visit DOE’s website. 

Read More »

DOE’s Office of Energy Dominance Financing Announces Conditional Commitment for a Domestic Medical Isotope Manufacturing Facility

WASHINGTON—The U.S. Department of Energy’s (DOE) Office of Energy Dominance Financing (EDF) issued a conditional commitment for a loan of up to $263 million to SHINE Chrysalis, LLC (SHINE) to support the construction of Chrysalis, a high-volume medical isotope production facility in Janesville, Wisconsin. The production facility will create a supply of reliable and secure medical isotopes made with fusion and fission technology. Millions of patients rely on medical isotopes for life-saving diagnostic imaging and cancer treatments, but most of that supply comes from overseas with limited capacity to meet demand.  Utilizing fusion and fission technology, the facility will establish the only domestic commercial supply of molybdenum-99 (Mo-99). Mo-99 is a life-saving medical isotope essential for diagnostic imaging; its decay product of technetium-99m (Tc-99m) is used in over 40,000 medical procedures in the United States each day. “The SHINE Chrysalis project is vital to improving the nuclear supply chain and contributing to a strong next-generation nuclear workforce while onshoring this critical production and improving national security,” EDF Director Gregory A. Beard said. “Using EDF’s loan authority to further commercialize a project long supported by DOE is Trump’s policy at work: ensuring a reliable and secure domestic supply chain while lowering costs.” Thanks to President Trump and the Working Families Tax Cut, today’s announcement highlights the Energy Department’s role in advancing President Trump’s Executive Order, Reinvigorating the Nuclear Industrial Base, by maximizing the use of uranium through an innovative recycling process. This project will support hundreds of construction and operation jobs, contributing to a strong next-generation American nuclear workforce. SHINE has developed and demonstrated its technology through significant support from the National Nuclear Security Administration (NNSA) over the last 16 years. With NNSA funding, the National Laboratories also played a key role in developing SHINE’s technology. “SHINE is the key to

Read More »

United States and Australia meet for Mining, Minerals and Metals Investment Ministerial

We, the Australian Minister for Resources and Northern Australia, the Hon Madeleine King MP, and Secretaries and senior representatives from the United States, including Secretary of Interior Doug Burgum, Administrator of the U.S. Environmental Protection Agency Lee Zeldin, Chairman of the U.S. Export Import Bank John Jovanovic, and Assistant Secretary of Energy Audrey Robertson,  held our inaugural Mining, Minerals, and Metals Investment Ministerial in Tokyo on 14 March 2026, to advance cooperation under the landmark bilateral agreement, the United States–Australia Framework for Securing Supply in the Mining and Processing of Critical Minerals and Rare Earths (the Framework). Under the Framework, Australia and the United States are delivering concrete outcomes to strengthen, secure, and diversify critical minerals and rare earth supply chains. Within six months of agreement of the Framework, we have each taken measures to provide at least USD $1 billion in financing to key critical minerals projects. By mobilising government and private sector capital, these investments support the development of our shared industrial base and strengthen longer term supply for defence, manufacturing, and energy supply chains. To build resilience, enhance stability, and bolster economic security in support of our shared critical minerals interests, Australia and the United States today announce the establishment of the Critical Minerals Supply Security Response Group and commit to deeper cooperation between our key agencies. In line with the Framework, the Critical Minerals Supply Security Response Group, led by senior representatives from the United States Department of Energy and the Australian Department of Industry, Science and Resources, will cooperate on priority minerals and supply chain vulnerabilities and coordinate efforts to accelerate the delivery of processed minerals under the Framework. Australia and the United States also commit to leveraging shared policy and interagency regulatory tools and, where appropriate, investments to secure critical minerals supply, including through cooperation between Australia’s

Read More »

Energy Security for Indo-Pacific Endurance, a Global Growth Center of the 21st Century

We, the ministers and representatives of Australia, Bangladesh, Brunei, Japan, Malaysia, New Zealand, Philippines, Republic of Korea, Singapore, Timor-Leste, United States, and Vietnam met in Tokyo, Japan, on March 14–15, 2026, to hold the historic Indo-Pacific Energy Security Ministerial and Business Forum. The forum was co-hosted by the Chair and Vice Chair of the U.S. National Energy Dominance Council, Secretary of the Interior Doug Burgum, Secretary of Energy Chris Wright, and Japanese Minister of Economy, Trade and Industry Akazawa Ryosei. We affirm our shared determination to work collectively to ensure stable and secure energy supply in the Indo-Pacific region. To this end, we focused on three key themes: reliable energy for Indo-Pacific growth and security; securing energy supply chains, infrastructure and maritime routes; and enabling trade and investment. To support these goals, Ministers affirm the value of: The necessity of reliable, affordable, secure and dispatchable energy from all sources depending on each country’s situation, in meeting the region’s surging energy demand.  Promoting quality as a key procurement mechanism to mitigate risk of operational liabilities. Protecting against rising cyber threats to the security of the energy grid, critical infrastructure, vehicles, and devices. Investment in comprehensive energy infrastructure that encompasses the entire energy supply chain from upstream development facilities to downstream equipment to support an affordable, reliable, and secure energy supply including baseload electricity.  Continuing to supply affordable and reliable energy sources in the Indo-Pacific region, including through emergency response measures, to benefit both producers and consumer countries. While maintaining strong relations with current partners, expanding and diversifying energy suppliers and fuel types in order to strengthen energy security. Promoting transparent, long-term energy contracts that reduce market volatility. As the global economy expands, so too does demand for energy driven by AI and electrification, we, as countries committed to a free and

Read More »

Energy Department Issues Funding Opportunity to Strengthen American Critical Minerals and Materials Supply Chain

WASHINGTON—The U.S. Department of Energy’s (DOE) Office of Critical Minerals and Energy Innovation (CMEI) and Hydrocarbons and Geothermal Energy Office (HGEO) today announced a funding opportunity of up to $69 million for technologies or processes that advance the domestic production and refining of critical materials. Projects selected through this Notice of Funding Opportunity (NOFO) will address the greatest technical obstacles to a stronger critical materials supply chain. “This funding will help establish a more secure and affordable supply of the critical minerals and materials that are foundational to American energy dominance, national security, and industrial competitiveness,” said Assistant Secretary of Energy (EERE) Audrey Robertson. DOE is seeking projects that bridge the gap between bench-scale innovations and commercially viable technologies. Selected project teams will form industry-led partnerships and conduct research and development with support from the U.S. national laboratories. The NOFO, which is part of DOE’s Critical Minerals and Materials Accelerator Program and jointly funded by CMEI’s Advanced Materials and Manufacturing Technologies Office and HGEO’s Office of Geothermal, has three primary topic areas: Production and material efficiency for critical materials including rare earth elements Processes to refine and alloy gallium, gallium nitride, germanium, and silicon carbide Cost-competitive direct lithium extraction, separation, and processing CMEI will host an informational webinar on April 16, 2026, to discuss the NOFO and application requirements. Letters of intent are due on April 21, 2026, by 5 p.m. ET. Deadlines for full applications will be staggered based on topic area, starting in May 2026. For more details on sub-topics and deadlines, visit the NOFO landing page. The Critical Minerals and Materials Accelerator is one of several programs developed through DOE’s Critical Materials Collaborative. This NOFO is part of $1 billion in critical materials funding announced by DOE in August 2025, and follows the Manufacturing Deployment Office’s announcement

Read More »

Latin America returns to the energy security conversation at CERAWeek

With geopolitical risk central to conversations about energy, and with long-cycle supply once again in focus, Latin America’s mix of hydrocarbons and export potential drew renewed attention at CERAWeek by S&P Global in Houston. Argentina, resource story to export platform Among the regional stories, Argentina stood out as Vaca Muerta was no longer discussed simply as a large unconventional resource, but whether the country could turn resource quality into sustained export capacity.  Country officials talked about scale: more operators, more services, more infrastructure, and a larger industrial base around the unconventional play. Daniel González, Vice Minister of Energy and Mining for Argentina, put it plainly: “The time has come to expand the Vaca Muerta ecosystem.” What is at stake now is not whether the basin works, but whether the country can build enough above-ground capacity and regulatory consistency to keep development moving. Horacio Marín, chairman and chief executive officer of YPF, offered an expansive version of that argument. He said Argentina’s energy exports could reach $50 billion/year by 2031, backed by roughly $130 billion in cumulative investment in oil, LNG, and transportation infrastructure. He said Argentine crude output could reach 1 million b/d by end-2026. He said Argentina wants to be seen less as a recurrent frontier story and more as a future supplier with scale. “The time to invest in Vaca Muerta is now,” Marín said. The LNG piece is starting to take shape. Eni, YPF, and XRG signed a joint development agreement in February to move Argentina LNG forward, with a first phase planned at 12 million tonnes/year. Southern Energy—backed by PAE, YPF, Pampa Energía, Harbour Energy, and Golar LNG—holds a long-term agreement with SEFE for 2 million tonnes/year over 8 years. The movement by global standards is early-stage and relatively modest, but it adds to Argentina’s export

Read More »

Neoclouds gain momentum in a supply-constrained world

And since they used the same hardware, both neoclouds and traditional cloud providers are subject to the same shortage problem. Component suppliers are reporting significant shortages due to demand for AI data centers and Synergy sees neoclouds also experiencing delays just like traditional cloud providers. “Demand is currently outstripping supply,” said Dinsmore. “It will take a while before that starts to come into more balance.” Among neoclouds, CoreWeave stands out as the most direct challenger to traditional hyperscale cloud providers. Meanwhile, OpenAI and Anthropic represent a distinct but increasingly important category, and that is platform-centric providers offering cloud-like access to foundational models and AI development environments. Synergy says that as demand for AI infrastructure accelerates, neoclouds are positioning themselves as focused alternatives to traditional hyperscale providers such as Amazon, Microsoft and Google.

Read More »

What is AI networking? How it adds intelligence to your infrastructure

The end goal is to make networks more reliable, efficient and performant. Enterprises are already seeing notable results when AI is applied to IT operations, including shorter deployment times, a decrease in trouble tickets, and faster time to resolution. With the help of AI, networks  will become more autonomous and self-healing (that is, able to address issues without the need for human intervention). In fact, Tier 1 and Tier 2 infrastructure is moving toward ‘no human in the loop,’ Nick Lippis, co-founder and co-chair of enterprise user community ONUG, recently told Network World. In time, humans will only need to step in for policy exceptions and high-risk decisions. “Layering in AI capabilities makes LAN management applications easier to use and more accessible across an organization,” Dell’Oro Group analyst Sian Morgan said. Gartner predicts that, by 2030, AI agents will drive most network activities, up from “minimal adoption” in 2025. The firm emphasizes that leaders who overlook the AI networking shift “risk higher MTTR [meantime to repair], rising costs, and growing security exposure.” The core components of AI networking It’s important to note that the use of AI and machine learning (ML) in network management is not new. AI for IT operations (AIOps), for instance, is a common practice that uses automation to improve broader IT operations. AI networking is specific to the network itself, covering domains including multi-cloud software, wired and wireless LAN, data center switching, SD-WAN and managed network services (MNS). The incorporation of generative AI, in particular, has brought AI networking to the fore, as enterprise leaders are rethinking every single aspect of their business, networking included.

Read More »

Aria Networks raises $125M and debuts its approach for AI-optimized networks

That embedded telemetry feeds adaptive tuning of Dynamic Load Balancing parameters, Data Center Quantized Congestion Notification (DCQCN) and failover logic without waiting for a threshold breach or a manual intervention. The platform architecture is layered. At the lowest levels, agents react in microseconds to link-level events such as transceiver flaps, rerouting leaf-spine traffic in milliseconds. At higher layers, agents make more strategic decisions about flow placement across the cluster. At the cloud layer, a large language model-based agent surfaces correlated insights to operators in natural language, allowing them to ask questions about specific jobs or alert conditions and receive context-aware responses. Karam argued that simply bolting an LLM onto an existing architecture does not deliver the same result. “If you ask it to do anything, it could hallucinate and bring down the network,” he said. “It doesn’t have any of the context or the data that’s required for this approach to be made safe.” Aria also exposes an MCP server, allowing external systems such as job schedulers and LLM routers to query network state directly and integrate it into their own decision-making. MFU and token efficiency as the target metrics Traditional networking is often evaluated in terms of bandwidth and latency. Aria is centering its platform around two metrics: Model FLOPS Utilization (MFU) and token efficiency. MFU is defined as the ratio of achieved FLOPS per accelerator to the theoretical peak. In practice, Karam said, MFU for training workloads typically runs between 33% and 45%, and inference often comes in below 30%. “The network has a major impact on the MFU, and therefore the token efficiency, because the network touches every aspect, every other component in your cluster,” Karam said.

Read More »

New v2 UALink specification aims to catch up to NVLink

But given there are no products currently available using UALink 1.0, UALink 2.0 might be viewed as a premature launch Need to play catch up David Harold, senior analyst with Jon Peddie Research, was guarded in his reaction. “While 2.0 is a significant step forward from 1.0, we need to bear in mind that even 1.0 solutions aren’t shipping yet – they aren’t due until later this year. So, Nvidia is way ahead of the open alternatives on connectivity, indeed ahead of the proprietary or Ethernet based solutions too,” he said. What this means, he added, is that non-Nvidia alternatives are currently lagging in the market. “They need to play catch up on several fronts, not just networking. … I can’t think of a single shipping product that meaningfully has advantages over a Nvidia solution,” he said. “Ultimately UALink remains desirable since it will enable heterogeneous, multi-vendor environments but it’s quite a way behind NVLink today. ” There are plenty of signs that organizations will find it hard to break free of the Nvidia dominance, however. A couple of months ago, RISC-V pioneer SiFive signed a deal with Nvidia to incorporate Nvidia NVLink Fusion into its data center products, a departure for RISC companies. According to Harold, other companies could be joining it. “Custom ASIC company MediaTek is an NVLink partner, and they told me last week that they are planning to integrate it directly into next-generation custom silicon for AI applications,” he said. “This will enable a wider range of companies to use NVLink as their high-speed interconnect.” Other options And, Harold noted, Nvidia is already looking at other options. “Nvidia is now shifting to look at the copper limit for networking speed, with an interest in using optical connectivity instead,” said Harold.

Read More »

Nvidia’s SchedMD acquisition puts open-source AI scheduling under scrutiny

Is the concern valid? Dr. Danish Faruqui, CEO of Fab Economics, a US-based AI hardware and datacenter advisory, said the risk was real. “The skepticism that Nvidia may prioritize its own hardware in future software updates, potentially delaying or under-optimizing support for rivals, is a feasible outcome,” he said. As the primary developer, Nvidia now controls Slurm’s official development roadmap and code review process, Faruqui said, “which could influence how quickly competing chips are integrated on new development or continuous improvement elements.” Owning the control plane alongside GPUs and networking infrastructure such as InfiniBand, he added, allows Nvidia to create a tightly vertically integrated stack that can lead to what he described as “shallow moats, where advanced features are only available or performant on Nvidia hardware.” One concrete test of that, industry observers say, will be how quickly Nvidia integrates support for AMD’s next-generation chips into Slurm’s codebase compared with how quickly it integrates its own forthcoming hardware and networking technologies, such as InfiniBand. Does the Bright Computing precedent hold? Analysts point to Nvidia’s 2022 acquisition of Bright Computing as a reference point, saying the software became optimized for Nvidia chips in ways that disadvantaged users of competing hardware. Nvidia disputed that characterization, saying Bright Computing supports “nearly any CPU or GPU-accelerated cluster.” Rawat said the comparison was instructive but imperfect. “Nvidia’s acquisition of Bright Computing highlights its preference for vertical integration, embedding Bright tightly into DGX and AI Factory stacks rather than maintaining a neutral, multi-vendor orchestration role,” he said. “This reflects a broader strategic pattern — Nvidia seeks to control the full-stack AI infrastructure experience.”

Read More »

Two New England states say no to new data centers

It’s getting harder and harder for governments to ignore the impact that data centers are having on their communities, consuming vast amounts of water and driving up electricity prices, experts say. According to a Pew Research Center analysis, data centers consumed 183 terawatt-hours of electricity in 2024, more than 4% of total U.S. electricity use. That demand is projected to more than double to 426 terawatt-hours by 2030. The impact is significant. In 2023, data centers consumed about 26% of Virginia’s electricity supply, although Virginia is notable for having an extremely dense collection of data centers. Alan Howard, senior analyst for infrastructure at Omdia, says he is not surprised at all. “The amount of national press coverage regarding what is arguably a limited number of data center ‘horror’ stories has many jurisdictions and states spooked over the potential impacts data center projects might have,” he said. It’s an evolution that’s been coming for some time whereby local legislators have embraced the idea that they don’t want to learn the hard way as others already have, he argues. “All that said, it seems unlikely that there will be broad bans on data center development that would cripple the industry. There’s lots of places to go in the U.S. and developers have warmed up to siting projects in places amenable to their needs, although not ideally convenient,” said Howard.

Read More »

Microsoft will invest $80B in AI data centers in fiscal 2025

And Microsoft isn’t the only one that is ramping up its investments into AI-enabled data centers. Rival cloud service providers are all investing in either upgrading or opening new data centers to capture a larger chunk of business from developers and users of large language models (LLMs).  In a report published in October 2024, Bloomberg Intelligence estimated that demand for generative AI would push Microsoft, AWS, Google, Oracle, Meta, and Apple would between them devote $200 billion to capex in 2025, up from $110 billion in 2023. Microsoft is one of the biggest spenders, followed closely by Google and AWS, Bloomberg Intelligence said. Its estimate of Microsoft’s capital spending on AI, at $62.4 billion for calendar 2025, is lower than Smith’s claim that the company will invest $80 billion in the fiscal year to June 30, 2025. Both figures, though, are way higher than Microsoft’s 2020 capital expenditure of “just” $17.6 billion. The majority of the increased spending is tied to cloud services and the expansion of AI infrastructure needed to provide compute capacity for OpenAI workloads. Separately, last October Amazon CEO Andy Jassy said his company planned total capex spend of $75 billion in 2024 and even more in 2025, with much of it going to AWS, its cloud computing division.

Read More »

John Deere unveils more autonomous farm machines to address skill labor shortage

Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More Self-driving tractors might be the path to self-driving cars. John Deere has revealed a new line of autonomous machines and tech across agriculture, construction and commercial landscaping. The Moline, Illinois-based John Deere has been in business for 187 years, yet it’s been a regular as a non-tech company showing off technology at the big tech trade show in Las Vegas and is back at CES 2025 with more autonomous tractors and other vehicles. This is not something we usually cover, but John Deere has a lot of data that is interesting in the big picture of tech. The message from the company is that there aren’t enough skilled farm laborers to do the work that its customers need. It’s been a challenge for most of the last two decades, said Jahmy Hindman, CTO at John Deere, in a briefing. Much of the tech will come this fall and after that. He noted that the average farmer in the U.S. is over 58 and works 12 to 18 hours a day to grow food for us. And he said the American Farm Bureau Federation estimates there are roughly 2.4 million farm jobs that need to be filled annually; and the agricultural work force continues to shrink. (This is my hint to the anti-immigration crowd). John Deere’s autonomous 9RX Tractor. Farmers can oversee it using an app. While each of these industries experiences their own set of challenges, a commonality across all is skilled labor availability. In construction, about 80% percent of contractors struggle to find skilled labor. And in commercial landscaping, 86% of landscaping business owners can’t find labor to fill open positions, he said. “They have to figure out how to do

Read More »

2025 playbook for enterprise AI success, from agents to evals

Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More 2025 is poised to be a pivotal year for enterprise AI. The past year has seen rapid innovation, and this year will see the same. This has made it more critical than ever to revisit your AI strategy to stay competitive and create value for your customers. From scaling AI agents to optimizing costs, here are the five critical areas enterprises should prioritize for their AI strategy this year. 1. Agents: the next generation of automation AI agents are no longer theoretical. In 2025, they’re indispensable tools for enterprises looking to streamline operations and enhance customer interactions. Unlike traditional software, agents powered by large language models (LLMs) can make nuanced decisions, navigate complex multi-step tasks, and integrate seamlessly with tools and APIs. At the start of 2024, agents were not ready for prime time, making frustrating mistakes like hallucinating URLs. They started getting better as frontier large language models themselves improved. “Let me put it this way,” said Sam Witteveen, cofounder of Red Dragon, a company that develops agents for companies, and that recently reviewed the 48 agents it built last year. “Interestingly, the ones that we built at the start of the year, a lot of those worked way better at the end of the year just because the models got better.” Witteveen shared this in the video podcast we filmed to discuss these five big trends in detail. Models are getting better and hallucinating less, and they’re also being trained to do agentic tasks. Another feature that the model providers are researching is a way to use the LLM as a judge, and as models get cheaper (something we’ll cover below), companies can use three or more models to

Read More »

OpenAI’s red teaming innovations define new essentials for security leaders in the AI era

Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More OpenAI has taken a more aggressive approach to red teaming than its AI competitors, demonstrating its security teams’ advanced capabilities in two areas: multi-step reinforcement and external red teaming. OpenAI recently released two papers that set a new competitive standard for improving the quality, reliability and safety of AI models in these two techniques and more. The first paper, “OpenAI’s Approach to External Red Teaming for AI Models and Systems,” reports that specialized teams outside the company have proven effective in uncovering vulnerabilities that might otherwise have made it into a released model because in-house testing techniques may have missed them. In the second paper, “Diverse and Effective Red Teaming with Auto-Generated Rewards and Multi-Step Reinforcement Learning,” OpenAI introduces an automated framework that relies on iterative reinforcement learning to generate a broad spectrum of novel, wide-ranging attacks. Going all-in on red teaming pays practical, competitive dividends It’s encouraging to see competitive intensity in red teaming growing among AI companies. When Anthropic released its AI red team guidelines in June of last year, it joined AI providers including Google, Microsoft, Nvidia, OpenAI, and even the U.S.’s National Institute of Standards and Technology (NIST), which all had released red teaming frameworks. Investing heavily in red teaming yields tangible benefits for security leaders in any organization. OpenAI’s paper on external red teaming provides a detailed analysis of how the company strives to create specialized external teams that include cybersecurity and subject matter experts. The goal is to see if knowledgeable external teams can defeat models’ security perimeters and find gaps in their security, biases and controls that prompt-based testing couldn’t find. What makes OpenAI’s recent papers noteworthy is how well they define using human-in-the-middle

Read More »