The document discusses an upcoming IBM Watson hackathon in Israel from June 10-11, 2015. It provides an overview of Watson's cognitive computing capabilities like natural language processing, big data analysis, and evidence-based reasoning. It describes several Watson developer cloud services that can be used to build "killer apps", including AlchemyLanguage for text analysis, AlchemyVision for image analysis, Question & Answer for answering questions, and Personality Insights and Tradeoff Analytics for understanding personality and exploring tradeoffs. It also discusses how these services can be combined and integrated to provide holistic cognitive solutions.
The increasing presence of smartphones and the rapid popularity of mobile applications that cater to consumers and businesses has meant that today there is a mobile app for virtually everything.
A look at the growth of the Internet of Things and how devices and applications like Bouncie are creating rich experiences and opportunities for consumers and marketers around the world.
Mobile Labs: Supercharge Mobile App Testing - All About SpeedMobile Labs
Whether you’re manually testing your mobile apps or exploring test automation, you have the need for speed. But sometimes choppy graphics, lag time, and annoying network issues get in the way. What can a modern-day testing superhero do?
Review this presentation to discover how to supercharge your mobile app testing for higher quality and better mobile experiences. Save the day by implementing a super-powerful, super-fast, and completely reimagined mobile device cloud into your testing lab.
You will learn:
- How to harness the power of real-time manual testing
- Ways to dominate test automation with Appium for incredible performance
- Tips to speed up mobile app testing for superior mobile app experiences
The increasing presence of smartphones and the rapid popularity of mobile applications that cater to consumers and businesses has meant that today there is a mobile app for virtually everything.
A look at the growth of the Internet of Things and how devices and applications like Bouncie are creating rich experiences and opportunities for consumers and marketers around the world.
Mobile Labs: Supercharge Mobile App Testing - All About SpeedMobile Labs
Whether you’re manually testing your mobile apps or exploring test automation, you have the need for speed. But sometimes choppy graphics, lag time, and annoying network issues get in the way. What can a modern-day testing superhero do?
Review this presentation to discover how to supercharge your mobile app testing for higher quality and better mobile experiences. Save the day by implementing a super-powerful, super-fast, and completely reimagined mobile device cloud into your testing lab.
You will learn:
- How to harness the power of real-time manual testing
- Ways to dominate test automation with Appium for incredible performance
- Tips to speed up mobile app testing for superior mobile app experiences
Neev Information technologies has a expertise is Web , Mobile, Social applications. It has come up with the Cloud services on collaboration with Amazon. The company is growing with more than 50% YOY. Has a great future ahead.
Mobility and cloud computing are colliding. This presentation highlights the surprising results from a Cisco IBSG study to better understand this dynamic market.
For more information on this presentation:
http://www.cisco.com/web/about/ac79/cloudcollide
Cisco IBSG Service Provider:
http://www.cisco.com/web/about/ac79/sp
2016 Top Trends in Mobile App Development LifeInnoppl Dubai
With the mobile technology getting a massive makeover, we are in for a fast-paced development changes in 2016. Consumers are utilizing their smart phones more and syncing it with wearable devices, their cars, home appliances, etc. The smart devices are slowly becoming the connecting hub on how an individual lives their life. As Google CEO Larry Page announced "We are no longer living in a mobile-first world, we are in a mobile-only world."
Solution Analysts, a leading enterprise software development company specializes in offering high-end solutions in the domains of mobile, web, and IoT. Since its inception in 2011, we strive to achieve our vision of bringing automation and convenience for our clients across more than 19 countries worldwide.
Headquartered in India, we have an office in Delmar, Delaware, USA to serve our corporate clientele more efficiently. At SA, we deliver enterprise-grade solutions to improve conversion rates, generate high ROI, and expand the business of our esteemed clients. Our in-house team consists of over 200 dedicated professionals who can easily handle the development project of any size and scale.
We thrive with transparency, effective communication, and excellent client collaboration while integrating advancements of emerging technologies including AI, AR, VR, and IoT. Our key services include-
Enterprise Software Development
Mobile Application Development
Web Design and Development
E-Commerce Solutions
IoT Application Development
Everything as a Service- XaaS
At SA, our endeavor remains to add value to the client's business through user-friendly and seamlessly-performing solutions. We're passionate about our work and ready to help you build a robust solution that can take your business to the next level.
BoxTone iPad in the Enterprise Industry Polling AnalysisBoxTone
During October 2010, BoxTone conducted a series of three large scale webinars on “Securing & Managing iPad at the Point of Use.”
The more than 1200 attendees represented wide cross-section of industries including 50 of Fortune 100 and wide cross-section of business & IT roles including 10% executives.
Watch this slideshare to see the amazing polling results about the rapid update of iPad in the enterprise ... faster than any technology wave in memory!
I hope now it’s clear to you how to develop a machine learning app efficiently. Machine Learning is becoming the future of the advancement of mobile app development. But still, if there are any doubts, you can contact us.
Did you know that mobile security breaches have affected more than two-thirds of global organizations in the last 12 months? This presentation helps you assess where you stand, explains the different security threats that are out there, and argues for why you should be using Security by Design for all your mobile apps.
India as a Product Nation - The Next Google can come from India Avinash Raghava
This presentation talks about the Important Characteristics of the Software Product Industry, Why India needs The Software Products Industry. Indian Software Product Industry touches 3m small enterprises today. It will touch 30m enterprises – small businesses, rural schools, primary healthcare centers, small farms, etc. - in 10 years
Neev Information technologies has a expertise is Web , Mobile, Social applications. It has come up with the Cloud services on collaboration with Amazon. The company is growing with more than 50% YOY. Has a great future ahead.
Mobility and cloud computing are colliding. This presentation highlights the surprising results from a Cisco IBSG study to better understand this dynamic market.
For more information on this presentation:
http://www.cisco.com/web/about/ac79/cloudcollide
Cisco IBSG Service Provider:
http://www.cisco.com/web/about/ac79/sp
2016 Top Trends in Mobile App Development LifeInnoppl Dubai
With the mobile technology getting a massive makeover, we are in for a fast-paced development changes in 2016. Consumers are utilizing their smart phones more and syncing it with wearable devices, their cars, home appliances, etc. The smart devices are slowly becoming the connecting hub on how an individual lives their life. As Google CEO Larry Page announced "We are no longer living in a mobile-first world, we are in a mobile-only world."
Solution Analysts, a leading enterprise software development company specializes in offering high-end solutions in the domains of mobile, web, and IoT. Since its inception in 2011, we strive to achieve our vision of bringing automation and convenience for our clients across more than 19 countries worldwide.
Headquartered in India, we have an office in Delmar, Delaware, USA to serve our corporate clientele more efficiently. At SA, we deliver enterprise-grade solutions to improve conversion rates, generate high ROI, and expand the business of our esteemed clients. Our in-house team consists of over 200 dedicated professionals who can easily handle the development project of any size and scale.
We thrive with transparency, effective communication, and excellent client collaboration while integrating advancements of emerging technologies including AI, AR, VR, and IoT. Our key services include-
Enterprise Software Development
Mobile Application Development
Web Design and Development
E-Commerce Solutions
IoT Application Development
Everything as a Service- XaaS
At SA, our endeavor remains to add value to the client's business through user-friendly and seamlessly-performing solutions. We're passionate about our work and ready to help you build a robust solution that can take your business to the next level.
BoxTone iPad in the Enterprise Industry Polling AnalysisBoxTone
During October 2010, BoxTone conducted a series of three large scale webinars on “Securing & Managing iPad at the Point of Use.”
The more than 1200 attendees represented wide cross-section of industries including 50 of Fortune 100 and wide cross-section of business & IT roles including 10% executives.
Watch this slideshare to see the amazing polling results about the rapid update of iPad in the enterprise ... faster than any technology wave in memory!
I hope now it’s clear to you how to develop a machine learning app efficiently. Machine Learning is becoming the future of the advancement of mobile app development. But still, if there are any doubts, you can contact us.
Did you know that mobile security breaches have affected more than two-thirds of global organizations in the last 12 months? This presentation helps you assess where you stand, explains the different security threats that are out there, and argues for why you should be using Security by Design for all your mobile apps.
India as a Product Nation - The Next Google can come from India Avinash Raghava
This presentation talks about the Important Characteristics of the Software Product Industry, Why India needs The Software Products Industry. Indian Software Product Industry touches 3m small enterprises today. It will touch 30m enterprises – small businesses, rural schools, primary healthcare centers, small farms, etc. - in 10 years
In this session, you'll get all the answers about how ChatGPT and other GPT-X models can be applied to your current or future project. First, we'll put in order all the terms – OpenAI, GPT-3, ChatGPT, Codex, Dall-E, etc., and explain why Microsoft and Azure are often mentioned in this context. Then, we'll go through the main capabilities of the Azure OpenAI and respective usecases that might inspire you to either optimize your product or build a completely new one.
IBM i & digital transformation - Presentation & basic demo
IBM Watson Studio, IBM DSX Local w/ Open Source (Spark) & IBM Technology (OpenPower, CAPI, NVLINK)
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Cognitive appications can be more tailored towards certain indivduals
Pareto optimality represents a state in which it is not possible to improve any one option without diminishing another option
Pareto optimality represents a state in which it is not possible to improve any one option without diminishing another option
השקף הבא מתאר את תהליך בניית האפליקציה שהיא "Powered by Watson”
השלב הראשון הוא להתנסות בשירותים של ווטסון אשר זמינים על פלטפורת Bluemix או ב Watson Developer Cloud
ולאחר מכן לבחון כיצד הפתרון שלכם יכול להיות מועשר ע"י יכולות אלו
אתם מוזמנים לפנות אלינו לפגישת סיעור מוחות לאפיון use case עם ווטסון שבה נבחן יחדיו:
כיצד נכון להעשיר את הפתרון שלכם במצעות ווטסון
מהם מקורות הנתונים שעליהם נדרש לממש את היכולות הנ"ל
לאחר אפיון ה use case הוא יוצג בפני Watson Ecosystem ותדרשו לחתום על חוזה פיתוח שאינו מחייב
ואז תנתן לכם האפשרות לממש אותו במשך 45 יום תוך ליווי צמוד של אנשי ווטסון
בתום התקופה תבוצע הערכה מצד אחד ע"י צוות ווטסון לבחינת מה שפותח ומצד שני על ידיכם על מנת לבחון אם מה שפותח תואם לציפיות
במידה וקיימת התאמה מלאה מתקדמים לחתימת החוזה המסחרי
Try Watson APIs on Bluemix (www.bluemix.net)
Think how to empower your solution by Watson
We will help you to:
Identify the most relevant and attractive use cases
Identify the Input Data Sources to Examine
Design a Model that fits your data
ההתקדמות בעולם ה Cognitive Computing מאפשרת כיום לממש יכולות שבעבר נראו כחלום רחוק.
כיום ההתקדמות שנעשתה בווטסון מאפשרת לבנות פתרונות אשר עונים על צרכים עסקיים ואנו צופים גידול משמעותי ביכולת זו עם הזמן.
לדוגמא פתרונות שמאפשרים לקלוט מיד מחיישנים, לנתח אותו, להפיק ממנו תובנות ולהצליב אותו עם תובנות שניתן להפיק ממידע טקסטואלי באמצעות יכולות של עיבוד שפה טבעית
ולהציע הצעות רלוונטיות ללקוח.
אנחנו צופים שפע של פתרונות שבוניות על Domain Expertise בתחומים שונים כדוגמא: רפואה, תיירות, שירות לקוחות (CRM), Security ועוד
לדוגמא חברת GenieMD פתחה פתרון אשר מאפשר לסכנרן את המידע הרפואי על פני כל מכשירי הקצה (טלפונים, מחשבים וטבלטים), לנתח את הנתונים ולהפיק תובנות שבאות לידי ביטוי בהמלצה לבדיקות נוספות שצריך לבצע, מעקב אחר פרמטרים ביומטרים, קבלת התראות ועוד. יכולת זו מאפשרת לנהל מעקב רפואי אישי הדוק בין רופא לחולה, בין בני משפחה –
מעקב רפואי עבור ילדים קטנים, הורים מבוגרים או חולים כרוניים.
דוגמא נוספת מהפכנית היא בתחום התיירות – חברת WayBlazer משנה את החוויה בה תיירים מחשפים אינפורמציה או עיצה. כל מה שנדרש הוא להקליד את הבקשה בשפה טבעית והמערכת מציעה הצעות רלוונטיות. לדוגמא בחיפוש של מופעי מוזיקה באוסטין נקבל רשימה של מופעים עם תובנות שמגיעות מתוך ניתוח בלוגים ומידע מהרשת החברתית – למשל לא להגיע עם נעלי עקב. לעיצה בנושא מסעדה יוקרתית לארוחה רומנטית נקבל המלצות עם טיפים לגבי קוד לבוש
אנחנו צופים פיתוח של יותר ויותר מערכות שבהן מחשבים ואנשים עובדים ביחד.
דוגמא מצויינת היא השף ווטסון – מערכת מבוססת ווטסון שממליצה על מתכונים להכנה.
למערכת הוזנו חומרי גלם, מתכונים, סגנונת בישול, ומטבחים שונים מבישול שמרני למולקולרי. כמו כן הוזנו העדפות לשילובי טעמים, וקרבה בטעם בין חומרי גלם.
לדוגמא: אתם מגיעים הבייתה ובודקים מה יש במקרר ומוצאים פטריות שיטקי, גזרים וכרוב אז אתם מזינים למערכת שאתם מעוניינים לההשתמש ברכיבים הללו.
לשאלת סוג התבשיל אתם מזינים לדוגמא:לזניה, סגנון הבישול: אסייתי ולבסוף המערכת שואלת האם אתם מעוניינים במתכון שמרני או יצירתי.
Artificial intelligence meets business intelligence
Big Data growth is accelerating as more of the world's activity is expressed digitally. Not only is it increasing in volume, but also in speed, variety and uncertainty. Most data now comes in unstructured forms such as video, images, symbols and natural language - a new computing model is needed in order for businesses to process and make sense of it, and enhance and extend the expertise of humans. Rather than being programmed to anticipate every possible answer or action needed to perform a function or set of tasks, cognitive computing systems are trained using artificial intelligence (AI) and machine learning algorithms to sense, predict, infer and, in some ways, think.
Systems with domain expertise
Cognitive computing systems get better over time as they build knowledge and learn a domain - its language and terminology, its processes and its preferred methods of interacting. Unlike expert systems of the past which required rules to be hard coded into a system by a human expert, cognitive computers can process natural language and unstructured data and learn by experience, much in the same way humans do. While they'll have deep domain expertise, instead of replacing human experts, cognitive computers will act as a decision support system and help them make better decisions based on the best available data, whether in healthcare, finance or customer service.
Humans and machines working together
In traditional AI, humans are not part of the equation, yet in cognitive computing, humans and machines work together. To enable a natural interaction between them, cognitive computing systems use image and speech recognition as their eyes and ears to understand the world and interact more seamlessly with humans. It provides a feedback loop for machines and humans to learn from and teach one another. By using visual analytics and data visualization techniques, cognitive computers can display data in a visually compelling way that enlightens humans and helps them make decisions based on data.
http://venturebeat.com/2014/10/08/6-of-the-best-ways-ibms-watson-is-powering-startups-and-projects/
GenieMD
The winner of IBM’s Watson mobile developer challenge, GenieMD gives patients and their caregivers a way to keep track of their health profiles across multiple devices, as well as easily diagnose potential issues. The company also builds a personalized profile of every patient, which allows Watson to deliver health suggestions customized just for them.
Chef Watson (Cooking) - Watson recommends recipes that were never tried before
Watson Healthcare Cloud Platform – Analyzing unstructured data coming from wearable devices.
Way Blazer (Travel & Leisure) - Transforming the way travelers seek advice
GenieMD – (Healthcare) - Keeping track of their health profiles across multiple devices, personalized healthcare
דוגמא נוספת מהפכנית היא בתחום התיירות – חברת WayBlazer משנה את החוויה בה תיירים מחשפים אינפורמציה או עיצה. כל מה שנדרש הוא להקליד את הבקשה בשפה טבעית והמערכת מציעה הצעות רלוונטיות. לדוגמא בחיפוש של מופעי מוזיקה באוסטין נקבל רשימה של מופעים עם תובנות שמגיעות מתוך ניתוח בלוגים ומידע מהרשת החברתית – למשל לא להגיע עם נעלי עקב. לעיצה בנושא מסעדה יוקרתית לארוחה רומנטית נקבל המלצות עם טיפים לגבי קוד לבוש
Way Blazer (Travel & Leisure) - Transforming the way travelers seek advice