Get Even More Visitors To Your Blog, Upgrade To A Business Listing >>

Daily Tech Digest - October 12, 2023

Bridging the AI-Human Divide: AI as Your Operations Teammate

When viewed through the lens of collaboration rather than competition, AI should free people to do what they are uniquely good at — creative problem-solving, collaborating and using judgment to solve complex challenges. This “human-in-the-loop” approach to AI can alleviate people from daily-grind tasks that are time-consuming, repetitive, and often lead to burnout. Envision a scenario where your AI teammate seamlessly integrates into your operational workflows, becoming a trusted assistant who handles time-consuming tasks. This teammate has a comprehensive understanding of your operations, understands the contextual importance of data and can deliver that data exactly when needed in the forms of metrics, graphs and recommended actions. Imagine an AI teammate that collects and sorts a massive amount of data, producing concise summaries for human analysis. Or AI that provides you with information that detects and contextualizes incidents. As potent as AI is in dissecting vast data sets, spotting patterns, and rendering contextual analysis, it’s still in its infancy. 


Chatbots in the future of customer service

Customers often feel like they must jump over hurdles, trying different phrase combinations to explain what they need to get a rules-based chatbot — which is typically defined with existing mapped-out responses — to understand their request. Generative AI addresses this pain point, by continuously training and optimising chatbots to deliver a far more sophisticated, personalised level of customer support. Through conversational interactions, the technology can provide intelligent support for faster issue resolution while increasing self-solve rates to better streamline processes for the human agents. Generative AI’s ability to formulate responses based on historical insights, such as past behaviour and user profile problems, is a key differentiator for business leaders looking to win customer loyalty. Considering the majority of customers say it’s important organisations understand them, with 65 per cent wanting agents to resolve problems easily, it’s an impossible demand to meet without integrating intelligent solutions. 


Treat generative AI like a burning platform and secure it now



Technical debt has hindered UK innovation

With Technical Debt reaching an extreme tipping point, it is important to learn from how we got here. As businesses are driven to provide better and more customized solutions for their customers, they are competing for a limited pool of developers who can help them navigate complex IT infrastructure and operations. The research found that the two leading factors behind technical debt were the high number of development languages, which makes it difficult to maintain and upgrade systems, as well as steep turnover in development teams. This results in new hires becoming responsible for platforms they did not create and may not fully understand. Other significant factors include companies accepting known defects in order to meet deadlines, and the presence of outdated development languages and frameworks. As a result, businesses struggle to maintain and rework critical systems. Over time, technical debt builds up and compounds through thousands of seemingly small decisions, before becoming a major problem preventing companies from investing in new innovations or services.


How ChatGPT and other AI tools could disrupt scientific publishing

Many editors are concerned that generative AI could be used to more easily produce fake but convincing articles. Companies that create and sell manuscripts or authorship positions to researchers who want to boost their publishing output, known as paper mills, could stand to profit. A spokesperson for Science told Nature that LLMs such as ChatGPT could exacerbate the paper-mill problem. One response to these concerns might be for some journals to bolster their approaches to verify that authors are genuine and have done the research they are submitting. “It’s going to be important for journals to understand whether or not somebody actually did the thing they are claiming,” says Wachter. At the publisher EMBO Press in Heidelberg, Germany, authors must use only verifiable institutional e-mail addresses for submissions, and editorial staff meet with authors and referees in video calls, says Bernd Pulverer, head of scientific publications there. But he adds that research institutions and funders also need to monitor the output of their staff and grant recipients more closely.


Israel-Hamas conflict extends to cyberspace

There have also been cyberattacks targeting Palestine by an India-based hacktivist group called Indian Cyber Force. The group has shown solidarity with Israel in the current conflict and has taken responsibility for bringing down the websites of Hamas, Palestine National Bank, Palestine Web Mail Government Services, and Palestine Telecommunication Company. "Indian Cyber Force has previously initiated several cyber campaigns in support of India. Their previous targets include Bangladesh and Canada. It appears that Bangladesh was targeted regarding their relationship with Pakistan," Flashpoint said in a report. ... India's open support for Israel in the ongoing conflict has also dragged the country into this cyber warfare. Several hacktivist groups objected to India's support for Israel in the current conflict and its departure from a traditional neutral stance in the Israel-Palestine conflict. Hacktivist group Ghosts of Palestine posted a message on the Telegram channel claiming to target India. The message clearly highlighted that the cause of the attacks was India's support for Israel.


How To Improve Your Data Pipeline Security Credit Score

What do we mean when discussing security tech debt in your data pipeline? This refers to building a data pipeline that doesn't have the scalability to govern data access or secure data confidently across all of your target databases. This can take a couple of forms: - Data teams or line of business leaders are so incentivized to get the data into the cloud for data insights that they build a pipeline to move all of the data without regard to which data is sensitive and should be governed according to privacy regulations. This lets companies use the data, but it's the riskiest. - Security teams get wind of this and slam the brakes on the data teams' plans to move data. Maybe data teams can move the easy or safe data so they go forward without sensitive data to keep the project moving. However, suppose they haven't identified all of the places where sensitive data exists across their data sources. In that case, the security team might decide it's safer to migrate nothing at all, locking everything down under their existing security controls.


IT Leaders in Banking & Finance Prepare for Business in the Metaverse

Several banks are setting up lounges or virtual branches as an entry point to the metaverse and using the space to establish a presence and nurture customer relationships. Offering education, support, and advice on financial products in the metaverse can enable financial services brands to engage Gen Z even as VR banking matures. HSBC, for example, purchased virtual real estate in The Sandbox to engage and connect with sports, e-sports, and gaming enthusiasts. Is this the right idea? IT leaders attending The Future of Banking event had mixed feelings regarding virtual banking services. They expressed skepticism about the likelihood of adoption without a specific incarnation of virtual offerings that fires the customer’s imagination. Banks will need to give customers compelling reasons to go to the metaverse to complete actions they can already do with mobile banking applications or develop actions they cannot experience with mobile or web interfaces. The next biggest hurdle will be understanding what that will look like across the industry.


TCS builds the first digital heart for a professional runner

A digital Heart is a high-fidelity multiscale computational model of the cardiac system. It enables insight into myocardium mechanisms, subcellular mechanisms, electromechanical activation (generation and conduction of cardiac electrical potential leading to cardiac muscle contraction), and hemodynamics (valvular functions, chamber pressures, myocardial wall tension, and coronary blood flow) on both the micro and macro scales. TCS creates a digital heart of a number of data sets, including an MRI. With the data from an MRI alongside various historical and speculative data sets, a functioning heart is modeled in a virtual environment. By applying AI/ML and other analysis, users can see the impact of different conditions and situations such as beginning a long-term exercise program or effect of medication. After a digital twin of a heart is created, researchers can go a step further and use 3D printing to create a physical version of a heart. A 3D printed digital twin heart allows a doctor to practice surgical techniques and test solutions such as new heart valves or drugs without ever touching an actual body.


Keeping up with the demands of the cyber insurance market

While insurers are bringing new products to the market, they are increasingly tightening the requirements for prospective and existing policy holders for the cyber risks they underwrite, asking organizations to demonstrate a high level of security preparedness to gain coverage. In this scenario, thorough planning ahead of the application process ensures that organizations are in the best position to get coverage and reap the benefits of their policy. So, what are the priorities and the key security factors at play to ensure organizations can improve their chances of qualifying? ... Additionally, insurers pay close attention to incident response plans, anticipating a robust strategy that aligns IT, security, and developers for a swift, effective reaction to cyber threats. Devising thorough plans, with role checklists and response measures, and organizing regular simulation exercises will enhance organizations’ incident readiness and show insurers that they are genuinely prepared. Finally, post-attack recovery plans also play a significant role in coverage viability. 



Quote for the day:

“Nobody talks of entrepreneurship as survival, but that’s exactly what it is.” -- Anita Roddick



This post first appeared on Tech Bytes - Daily Digest, please read the originial post: here

Share the post

Daily Tech Digest - October 12, 2023

×

Subscribe to Tech Bytes - Daily Digest

Get updates delivered right to your inbox!

Thank you for your subscription

×