The keynote at Joint IEEE BigData Service 2017, and 11th IEEE International Symposium on Service-Oriented System Engineering (SOSE 2017) with a focus on Cognitive Assistant in the Enterprise, and Cognitive Services.
Last week, I visited University of New South Wales, in Australia, and gave a talk providing an overview on research work over the past couple of years to establish a framework for Cognitive Enterprise services, specifically on how the lifecycle of enterprise services from sales to delivery and operation is transformed in the cognitive era. I provided an overview of the research assets we have produced, some of which is in industry or the company in various ways.
Cognitive Work Assistants - Vision and Open ChallengesHamid Motahari
Cognitive assistants aim to augment human intelligence by performing administrative tasks and providing guidance, advice, and assistance to humans. Key challenges for cognitive assistants include building extensive domain knowledge, adapting to new domains, evaluating system performance, addressing user privacy and trust, and enabling natural language interaction. Developing cognitive assistants that can understand tasks, take proactive actions, and interact contextually remains an important area for future research.
Hamid Reza Motahari Nezhad is a research group lead at IBM Almaden Research Center where his work focuses on database management, information retrieval, process mining, and cognitive business process management. Some of his influential publications include papers on discovering interaction models from web service logs, event correlation across services, and process automation for unstructured processes. He is currently working on cognitive process enablement, which aims to define, enact, and learn from processes through conversational assistants.
This document discusses how integrating design thinking with IT project development can lead to more successful outcomes. It proposes a 3-D model consisting of three phases: Discovery, Development, and Deployment.
In the Discovery phase, both design thinking methods like ethnography and traditional strategic analysis are used to understand user needs. For a project with the Virginia Employment Commission, user archetypes were identified which enriched the request for proposal.
The Development phase involves creating prototypes and visual representations of concepts to get user feedback. Iterative testing and refining occurs. Technical requirements are defined later based on the user vision.
Once a strong prototype and business case are established, the potential service moves into the Deployment phase where a final
Last week, I visited University of New South Wales, in Australia, and gave a talk providing an overview on research work over the past couple of years to establish a framework for Cognitive Enterprise services, specifically on how the lifecycle of enterprise services from sales to delivery and operation is transformed in the cognitive era. I provided an overview of the research assets we have produced, some of which is in industry or the company in various ways.
Cognitive Work Assistants - Vision and Open ChallengesHamid Motahari
Cognitive assistants aim to augment human intelligence by performing administrative tasks and providing guidance, advice, and assistance to humans. Key challenges for cognitive assistants include building extensive domain knowledge, adapting to new domains, evaluating system performance, addressing user privacy and trust, and enabling natural language interaction. Developing cognitive assistants that can understand tasks, take proactive actions, and interact contextually remains an important area for future research.
Hamid Reza Motahari Nezhad is a research group lead at IBM Almaden Research Center where his work focuses on database management, information retrieval, process mining, and cognitive business process management. Some of his influential publications include papers on discovering interaction models from web service logs, event correlation across services, and process automation for unstructured processes. He is currently working on cognitive process enablement, which aims to define, enact, and learn from processes through conversational assistants.
This document discusses how integrating design thinking with IT project development can lead to more successful outcomes. It proposes a 3-D model consisting of three phases: Discovery, Development, and Deployment.
In the Discovery phase, both design thinking methods like ethnography and traditional strategic analysis are used to understand user needs. For a project with the Virginia Employment Commission, user archetypes were identified which enriched the request for proposal.
The Development phase involves creating prototypes and visual representations of concepts to get user feedback. Iterative testing and refining occurs. Technical requirements are defined later based on the user vision.
Once a strong prototype and business case are established, the potential service moves into the Deployment phase where a final
Microsoft Unified Communications - Improving User Productivity and Saving Com...Microsoft Private Cloud
This document summarizes research by IDC on the benefits of using presence and enterprise instant messaging (EIM). Key findings include:
- Customers saved $12,404 per 100 users annually in long distance and teleconference costs and improved user productivity, saving over 1.7 hours per month per user.
- IT support staff were more efficient, allowing companies to shift 2.1 support staff to other projects, saving $2,860 per 100 users annually.
- The overall return on investment for using presence and EIM was 258% with a payback period of 10.7 months.
This document discusses business intelligence in the cloud. It begins by introducing constraints to traditional BI adoption like costly and inflexible integrated infrastructures. Cloud computing provides an environment for BI that is elastic, low-cost, and flexible. The document then discusses how cloud BI can accelerate adoption, enable easier evaluation and short-term analysis, and increase flexibility. Overall, cloud BI makes BI implementation cheaper and faster while increasing an organization's analytic capabilities.
IBM @ SXSW: Giving Your Collaboration Tools a BrainJacques Pavlenyi
Despite the many recent advances in workplace collaboration tools, we're still overwhelmed with information and tasks. It's time to think differently about the way we work together. This session explores how IBM is using design thinking, and cognitive computing technologies, to reimagine the way we work with one another.
Social Data Analytics using IBM Big Data TechnologiesNicolas Morales
Distilling Insights from Social Media Using Big Data Technologies
Have you ever wondered what your customers are saying about you in Social media, and the impact it might be having on your business? This session will focus on how BigInsights and Big Data technologies can be used to glean useful and actionable insights from social media data.
You'll see how data can be ingested and prepped and do text analytics on social data in real time. Using Hadoop, we'll show you how you can store and analyze your large volume of historical social media data and reference data. This talk and demo will provide an introduction to text analytics and how it is used within the IBM Big Data platform for a social media solution.
IBM Messaging and Collaboration solutions: an introductionJacques Pavlenyi
Introduction to IBM Messaging and Collaboration solutions. Designed for businesses of all sizes, it provides for the rapid development and deployment of collaborative and workflow-driven business applications, including email, calendar, contacts, teamspaces, and much more, that bring people and ideas together in a security-rich enterprise-ready platform. Includes IBM Lotus Notes, IBM Lotus Domino, IBM Lotus Notes Traveler, IBM Lotus Protector, IBM Lotus Expeditor, and IBM Lotus Symphony. To learn more visit us at http://www.ibm.com/lotus/notesanddomino
The document discusses a study that aimed to evaluate the transparency of cloud providers' security, privacy, auditability, and service level agreements. It developed a Cloud Provider Transparency Scorecard to assess information from cloud providers' websites. It conducted a preassessment of six cloud providers to evaluate available information and then performed a detailed assessment using the scorecard. The assessment focused on policies, procedures, certifications, audits and service level agreements published on providers' websites.
This document provides a crash course on essential technology terminology needed for business meetings and strategy discussions. It introduces the "Technology Trio" of mobile devices, cloud computing, and social networking that are driving changes in business. Employees now demand using these technologies for work. The document then provides a table defining key terms like Android, API, best-in-breed solutions, big data, cloud computing, integrated platforms, middleware, mobile apps, SaaS, social collaboration and more. This terminology guide aims to help readers discuss technology strategies and solutions more knowledgeably.
Initializing and launching your social business initiatives: social from the ...Jacques Pavlenyi
An overview of IBM's transformation into a social business. Case study reviewing how IBM continues to adopt social media and collaboration technologies, and the beneficial impact it is having on the business.
Daniel Tunkelang argues that knowledge representation is overrated for AI systems and computation is underrated. He discusses past attempts at knowledge representation like Cyc and Freebase, and how today's data-driven approaches using large datasets have proven more effective than rule-based systems for tasks like machine translation and question answering. Tunkelang advocates for semi-structured data and data-driven recommendations and queries to empower users and fill gaps in systems' knowledge. He concludes that communication is both the problem and solution, and systems should leverage users as intelligent partners rather than relying solely on perfect schemas or vocabularies.
Anuj Sharma from Impetus discusses text mining and its applications for business. He explains that unstructured data like text accounts for 80% of enterprise data and contains valuable information. Text mining uses techniques like sentiment analysis, topic modeling and feature-based opinion mining to analyze unstructured text. Two use cases are presented: analyzing hotel reviews to determine sentiment ratings and mapping them, and monitoring social media for sentiment about an advertising campaign. The presentation concludes with an overview of Impetus' data science team and practices.
This document discusses the importance of computers in human life and management until 2020. It covers several topics related to human-computer interaction (HCI) including the goals of HCI research, the relationship between humans and computers, differences between the human brain and computers, resources used for interaction, and interface analysis and specification. The key goals of HCI research are to create computer interfaces that are more usable and understandable in order to maximize effectiveness and efficiency. Understanding how humans use technology and creating tools to enable building appropriate interfaces are important to achieving this goal.
The document discusses improving employee productivity and the digital work environment. It suggests that when the number of employees triples, productivity halves, due to increased complexity, bureaucracy, and decreased communication and sharing of ideas. The document proposes that the intranet should be viewed as a tool for collaboration and innovation, rather than just a document directory. It presents models for restructuring the intranet into targeted services and situations to better meet employee needs. Metrics for measuring success include resolving employee issues on the first contact and using the preferred communication channel. The goal is to improve the usability of internal information and make the intranet a central part of integrated multichannel employee services.
Webinar - Building a ChatBot using IBM Watson Conversation ServiceThirdEye Data
This webinar showcases step-by-step instructions to build a Chatbot from scratch using IBM Watson Conversation.
And there is no need to write long lines of code nor have any machine learning background!
1) The document discusses using Detroit as a hypothetical example for implementing a sovereign control/enable grid system for municipal users in the "Internet of Space".
2) It proposes using spatial vectors and arrays to map out economic development programs, retail revitalization initiatives, and improvements to commercial real estate, education, healthcare and other city services.
3) The system aims to establish clear boundaries between lawful and unlawful zones and activities, while also accounting for individuals' imperfections and creating spaces where all citizens can safely grow.
A Survey of Building Robust Business Models in Pervasive ComputingOsama M. Khaled
Pervasive computing is one of the most challenging and difficult computing domains nowadays. It includes many architectural challenges like context awareness, adaptability, mobility, availability, and scalability. There are currently few approaches which provide methodologies to build suitable architectural models that are more suited to the nature of the pervasive domain. This area still needs a lot of enhancements in order to let the software business analyst (BA) cognitively handle pervasive applications by using suitable tasks and tools. Accordingly, any proposed research topic that would attempt to define a development methodology can greatly help BAs in modeling pervasive applications with high efficiency. In this survey paper we address some of the most significant and current software engineering practices that are proving to be most effective in building pervasive systems.
For citation:
Osama M. Khaled and Hoda M. Hosny. A Survey of Building Robust Business Models in Pervasive Computing. An accepted paper in the 2014 World Congress in Computer Science Computer Engineering and Applied Computing
Peregrine Guard - An Enterprise Mobile Security Product by i7 NetworksProductNation/iSPIRT
Peregrine Guard is a mobile security solution that provides agentless discovery and access control for BYOD environments. It uses proprietary fingerprinting techniques to extract detailed device information without requiring an agent. This information is used to implement granular, policy-based access controls based on factors like user, device, location, and security posture. It allows organizations to safely enable BYOD while mitigating risks to the corporate network and sensitive data.
This presentation describes some of the Open Source Ai projects we are working at the Center for Open Source, Data and AI Technologies (CODAIT), including Model Asset Exchange (MAX), Fabric for Deep Learning (FfDL) and Jupyter Enterprise Gateway.
The document discusses the rise of social business and how organizations are transforming into social businesses to reap benefits. Key points:
1. Social businesses embrace social tools and networks to create business value by connecting people, being transparent, and acting nimble.
2. Becoming a social business can help organizations deepen customer relationships, drive operational efficiencies, and optimize the workforce.
3. Social businesses focus on engaging networks of customers, partners and employees to generate innovation, share knowledge, and make quicker decisions.
IBM hosted a cloud forum on April 7, 2011 to discuss social business in the cloud. Sean Poulley, Vice President of IBM's Social Business Cloud, presented on how social business embraces networks of people to create business value by being engaged, transparent, and nimble while ensuring trust, security, and compliance. IBM defined social business, created the first social software platform in 2007, and brought it to the cloud in 2009. IBM sees social business as a $100 billion opportunity and delivers social business solutions globally across industries from large to small customers. Brendan Crotty then demonstrated LotusLive, IBM's social collaboration platform in the cloud, which provides security, reliability, integration capabilities, and is an ext
Learn about Linux in a Private Cloud with Social Business on System z.Learn how Social Media transforms the way we live and do Business. For more information, visit http://ibm.co/PNo9Cb.
The document discusses new technologies using artificial intelligence and data insights to provide information at the point of action. It describes how AI is being used through cognitive services and tools like machine learning, natural language processing, and robotic process automation to automate tasks, improve processes, enhance customer experience and make organizations more creative. Examples are given of how companies have increased sales leads, improved efficiency and reduced response times through implementing AI technologies. The role of "smart bots" using technologies like cloud cognitive platforms, messaging and voice is also described for recognizing human intents in conversations.
The document discusses IBM's Business Process Manager and how it enables digital business automation. Some key points:
- Three main expectations are driving the need for automation: employees expect new assistance tools, customers expect seamless personalized experiences, and everyone expects self-service.
- Achieving the right automation outcomes can be challenging as projects often take too long, successes are not scalable or repeatable, and companies focus on isolated touchpoints rather than customer journeys.
- Digital process automation with IBM's Business Process Manager framework addresses these challenges by enabling speed, scale, and customer focus through an extensible platform for rapid delivery, experimentation, and end-to-end customer journeys.
Microsoft Unified Communications - Improving User Productivity and Saving Com...Microsoft Private Cloud
This document summarizes research by IDC on the benefits of using presence and enterprise instant messaging (EIM). Key findings include:
- Customers saved $12,404 per 100 users annually in long distance and teleconference costs and improved user productivity, saving over 1.7 hours per month per user.
- IT support staff were more efficient, allowing companies to shift 2.1 support staff to other projects, saving $2,860 per 100 users annually.
- The overall return on investment for using presence and EIM was 258% with a payback period of 10.7 months.
This document discusses business intelligence in the cloud. It begins by introducing constraints to traditional BI adoption like costly and inflexible integrated infrastructures. Cloud computing provides an environment for BI that is elastic, low-cost, and flexible. The document then discusses how cloud BI can accelerate adoption, enable easier evaluation and short-term analysis, and increase flexibility. Overall, cloud BI makes BI implementation cheaper and faster while increasing an organization's analytic capabilities.
IBM @ SXSW: Giving Your Collaboration Tools a BrainJacques Pavlenyi
Despite the many recent advances in workplace collaboration tools, we're still overwhelmed with information and tasks. It's time to think differently about the way we work together. This session explores how IBM is using design thinking, and cognitive computing technologies, to reimagine the way we work with one another.
Social Data Analytics using IBM Big Data TechnologiesNicolas Morales
Distilling Insights from Social Media Using Big Data Technologies
Have you ever wondered what your customers are saying about you in Social media, and the impact it might be having on your business? This session will focus on how BigInsights and Big Data technologies can be used to glean useful and actionable insights from social media data.
You'll see how data can be ingested and prepped and do text analytics on social data in real time. Using Hadoop, we'll show you how you can store and analyze your large volume of historical social media data and reference data. This talk and demo will provide an introduction to text analytics and how it is used within the IBM Big Data platform for a social media solution.
IBM Messaging and Collaboration solutions: an introductionJacques Pavlenyi
Introduction to IBM Messaging and Collaboration solutions. Designed for businesses of all sizes, it provides for the rapid development and deployment of collaborative and workflow-driven business applications, including email, calendar, contacts, teamspaces, and much more, that bring people and ideas together in a security-rich enterprise-ready platform. Includes IBM Lotus Notes, IBM Lotus Domino, IBM Lotus Notes Traveler, IBM Lotus Protector, IBM Lotus Expeditor, and IBM Lotus Symphony. To learn more visit us at http://www.ibm.com/lotus/notesanddomino
The document discusses a study that aimed to evaluate the transparency of cloud providers' security, privacy, auditability, and service level agreements. It developed a Cloud Provider Transparency Scorecard to assess information from cloud providers' websites. It conducted a preassessment of six cloud providers to evaluate available information and then performed a detailed assessment using the scorecard. The assessment focused on policies, procedures, certifications, audits and service level agreements published on providers' websites.
This document provides a crash course on essential technology terminology needed for business meetings and strategy discussions. It introduces the "Technology Trio" of mobile devices, cloud computing, and social networking that are driving changes in business. Employees now demand using these technologies for work. The document then provides a table defining key terms like Android, API, best-in-breed solutions, big data, cloud computing, integrated platforms, middleware, mobile apps, SaaS, social collaboration and more. This terminology guide aims to help readers discuss technology strategies and solutions more knowledgeably.
Initializing and launching your social business initiatives: social from the ...Jacques Pavlenyi
An overview of IBM's transformation into a social business. Case study reviewing how IBM continues to adopt social media and collaboration technologies, and the beneficial impact it is having on the business.
Daniel Tunkelang argues that knowledge representation is overrated for AI systems and computation is underrated. He discusses past attempts at knowledge representation like Cyc and Freebase, and how today's data-driven approaches using large datasets have proven more effective than rule-based systems for tasks like machine translation and question answering. Tunkelang advocates for semi-structured data and data-driven recommendations and queries to empower users and fill gaps in systems' knowledge. He concludes that communication is both the problem and solution, and systems should leverage users as intelligent partners rather than relying solely on perfect schemas or vocabularies.
Anuj Sharma from Impetus discusses text mining and its applications for business. He explains that unstructured data like text accounts for 80% of enterprise data and contains valuable information. Text mining uses techniques like sentiment analysis, topic modeling and feature-based opinion mining to analyze unstructured text. Two use cases are presented: analyzing hotel reviews to determine sentiment ratings and mapping them, and monitoring social media for sentiment about an advertising campaign. The presentation concludes with an overview of Impetus' data science team and practices.
This document discusses the importance of computers in human life and management until 2020. It covers several topics related to human-computer interaction (HCI) including the goals of HCI research, the relationship between humans and computers, differences between the human brain and computers, resources used for interaction, and interface analysis and specification. The key goals of HCI research are to create computer interfaces that are more usable and understandable in order to maximize effectiveness and efficiency. Understanding how humans use technology and creating tools to enable building appropriate interfaces are important to achieving this goal.
The document discusses improving employee productivity and the digital work environment. It suggests that when the number of employees triples, productivity halves, due to increased complexity, bureaucracy, and decreased communication and sharing of ideas. The document proposes that the intranet should be viewed as a tool for collaboration and innovation, rather than just a document directory. It presents models for restructuring the intranet into targeted services and situations to better meet employee needs. Metrics for measuring success include resolving employee issues on the first contact and using the preferred communication channel. The goal is to improve the usability of internal information and make the intranet a central part of integrated multichannel employee services.
Webinar - Building a ChatBot using IBM Watson Conversation ServiceThirdEye Data
This webinar showcases step-by-step instructions to build a Chatbot from scratch using IBM Watson Conversation.
And there is no need to write long lines of code nor have any machine learning background!
1) The document discusses using Detroit as a hypothetical example for implementing a sovereign control/enable grid system for municipal users in the "Internet of Space".
2) It proposes using spatial vectors and arrays to map out economic development programs, retail revitalization initiatives, and improvements to commercial real estate, education, healthcare and other city services.
3) The system aims to establish clear boundaries between lawful and unlawful zones and activities, while also accounting for individuals' imperfections and creating spaces where all citizens can safely grow.
A Survey of Building Robust Business Models in Pervasive ComputingOsama M. Khaled
Pervasive computing is one of the most challenging and difficult computing domains nowadays. It includes many architectural challenges like context awareness, adaptability, mobility, availability, and scalability. There are currently few approaches which provide methodologies to build suitable architectural models that are more suited to the nature of the pervasive domain. This area still needs a lot of enhancements in order to let the software business analyst (BA) cognitively handle pervasive applications by using suitable tasks and tools. Accordingly, any proposed research topic that would attempt to define a development methodology can greatly help BAs in modeling pervasive applications with high efficiency. In this survey paper we address some of the most significant and current software engineering practices that are proving to be most effective in building pervasive systems.
For citation:
Osama M. Khaled and Hoda M. Hosny. A Survey of Building Robust Business Models in Pervasive Computing. An accepted paper in the 2014 World Congress in Computer Science Computer Engineering and Applied Computing
Peregrine Guard - An Enterprise Mobile Security Product by i7 NetworksProductNation/iSPIRT
Peregrine Guard is a mobile security solution that provides agentless discovery and access control for BYOD environments. It uses proprietary fingerprinting techniques to extract detailed device information without requiring an agent. This information is used to implement granular, policy-based access controls based on factors like user, device, location, and security posture. It allows organizations to safely enable BYOD while mitigating risks to the corporate network and sensitive data.
This presentation describes some of the Open Source Ai projects we are working at the Center for Open Source, Data and AI Technologies (CODAIT), including Model Asset Exchange (MAX), Fabric for Deep Learning (FfDL) and Jupyter Enterprise Gateway.
The document discusses the rise of social business and how organizations are transforming into social businesses to reap benefits. Key points:
1. Social businesses embrace social tools and networks to create business value by connecting people, being transparent, and acting nimble.
2. Becoming a social business can help organizations deepen customer relationships, drive operational efficiencies, and optimize the workforce.
3. Social businesses focus on engaging networks of customers, partners and employees to generate innovation, share knowledge, and make quicker decisions.
IBM hosted a cloud forum on April 7, 2011 to discuss social business in the cloud. Sean Poulley, Vice President of IBM's Social Business Cloud, presented on how social business embraces networks of people to create business value by being engaged, transparent, and nimble while ensuring trust, security, and compliance. IBM defined social business, created the first social software platform in 2007, and brought it to the cloud in 2009. IBM sees social business as a $100 billion opportunity and delivers social business solutions globally across industries from large to small customers. Brendan Crotty then demonstrated LotusLive, IBM's social collaboration platform in the cloud, which provides security, reliability, integration capabilities, and is an ext
Learn about Linux in a Private Cloud with Social Business on System z.Learn how Social Media transforms the way we live and do Business. For more information, visit http://ibm.co/PNo9Cb.
The document discusses new technologies using artificial intelligence and data insights to provide information at the point of action. It describes how AI is being used through cognitive services and tools like machine learning, natural language processing, and robotic process automation to automate tasks, improve processes, enhance customer experience and make organizations more creative. Examples are given of how companies have increased sales leads, improved efficiency and reduced response times through implementing AI technologies. The role of "smart bots" using technologies like cloud cognitive platforms, messaging and voice is also described for recognizing human intents in conversations.
The document discusses IBM's Business Process Manager and how it enables digital business automation. Some key points:
- Three main expectations are driving the need for automation: employees expect new assistance tools, customers expect seamless personalized experiences, and everyone expects self-service.
- Achieving the right automation outcomes can be challenging as projects often take too long, successes are not scalable or repeatable, and companies focus on isolated touchpoints rather than customer journeys.
- Digital process automation with IBM's Business Process Manager framework addresses these challenges by enabling speed, scale, and customer focus through an extensible platform for rapid delivery, experimentation, and end-to-end customer journeys.
The mainframe IMS assets can be integrated in the API economy, in the hybrid Cloud, in virtual data lake repositories. Just imagine any business use case and ask for guidance
1. The document discusses DevOps and hybrid cloud, with DevOps being an approach combining culture, processes, and technologies to continuously deliver applications and innovation.
2. APIs are key to hybrid cloud and DevOps, allowing components and services to be developed and reused across teams and cloud environments.
3. IBM recommends organizations build a common toolchain including tools for development, testing, deployment, and monitoring to facilitate DevOps practices and hybrid cloud deployments.
A dive into Microsoft Strategy on Machine Learning, Chat Bot, and Artificial ...SeokJin Han
Wondering what Microsoft offers in terms of Artificial Intelligence? Take a look at this slide when I talk about what strategy and solutions Microsoft offers.
A developer can now build out Cloud Native applications using our patterns-first approach. You simply select the type of building block you’d like to create followed by which services you’d like to incorporate into your application (i.e., Cloudant database, WatsonConversation, Push Notifications).
Using Xamarin for your Mobile+ Apps – Xamarin Experience London 2017Xpand IT
The document discusses Microsoft's Xamarin platform for building native and cross-platform mobile apps using C#. It highlights how Xamarin allows developers to build apps using one codebase that can target iOS, Android and Windows devices while still delivering native experiences. It provides examples of companies like British Airways that have adopted Xamarin to build apps across multiple platforms more efficiently. The document also discusses Microsoft's broader vision and investments in artificial intelligence, cognitive services and bots to help organizations leverage AI technologies.
This document provides a summary of a presentation on patterns for mobile and IoT backends using serverless paradigms.
The presentation covers serverless computing on IBM Cloud Functions, introduces mobile services on IBM Bluemix, discusses IoT, and outlines several patterns discussed including: [1] mobile apps controlling processes, [2] processes triggering on mobile uploads/downloads, and [3] mobile notifications on events of interest.
Specific examples covered include perishable food transport monitoring using sensors and mobile approvals, employee expense reimbursement using mobile uploads and approvals, and remote patient monitoring using sensors and notifications.
This document discusses cognitive business process management (BPM) as a platform for supporting smart processes over unstructured big data. It provides background on BPM and business process analytics. Cognitive systems are described as having the ability to understand natural language, adapt and learn from interactions, and generate and evaluate hypotheses based on evidence. The vision for cognitive BPM is presented as supporting processes over both structured and unstructured information sources by continuously discovering, learning, and acting through analytics. Two example use cases are discussed: one involving knowledge-intensive enterprise processes in an IT services provider, and the other involving cognitive assistant/agents. Initial research supporting aspects of cognitive BPM is also mentioned.
IBM aimed to transition its 500,000 employees to a new cloud-based collaboration platform called IBM Verse quickly and non-disruptively. The migration was completed within just nine months through an automated process that moved up to 25,000 mailboxes per week. This saved IBM millions per year in costs while providing employees with new collaboration tools to drive innovation.
There are many situations where the Process Portal cannot be proposed to end users, e.g. : some process participants should see only a subset of the BPM capabilities, other users need an unified UI that bring together existing web application and the BPM human services. In this session you will learn a technique to embed process portal capabilities in an existing web application, without sacrificing the power of coach view. Using a web 2.0 approach, you will learn how to start a new process instance, show the task list, work on a task (embedding the coach navigation).
- The document discusses IBM Z and the digital enterprise, focusing on how mainframes can support digital transformation.
- It outlines how in-place modernization of mainframe assets makes sense for enterprises, and how mainframes can support business transformation, application modernization and optimization, agility, and cloud services.
- The agenda covers topics like the role of mainframes in digital transformation, application modernization techniques, infrastructure services like IBM Cloud Private, and mainframe modernization examples from IBM clients.
The document discusses the current state of conversational interfaces such as chatbots and voice assistants, noting that while early versions were limited, recent advances in artificial intelligence, data availability, and user expectations have created new opportunities for conversational interfaces to become more useful. However, conversational interfaces still have limitations and work best when focused on simple, well-defined tasks rather than attempting to replace more complex interactions or functions better suited to humans. Designing effective conversational interfaces requires keeping interactions simple, clearly setting user expectations, and in some cases, involving human assistance.
IBM's zAnalytics strategy provides a complete picture of analytics on the mainframe using DB2, the DB2 Analytics Accelerator, and Watson Machine Learning for System z. The presentation discusses updates to DB2 for z/OS including agile partition technology, in-memory processing, and RESTful APIs. It also reviews how the DB2 Analytics Accelerator can integrate with Machine Learning for z/OS to enable scoring of machine learning models directly on the mainframe for both small and large datasets.
Convergence of mobility, analytics, social and cloud to drive innovationKerrie Holley
Short presentation to CIOs at 2013 San Francisco CIO Event, see http://www.hmgstrategy.com/events/agenda.asp?eventID=52
Discussion is brief on innovation, next era of IT computing and CIO role
Introduction to Predictive Analytics with IBM SPSS. Predictive analytics helps organizations use their data to make better decisions by allowing them to draw reliable, data-driven conclusions about current conditions and future events.
Predictive analytics encompasses a variety of techniques such as Statistics, Game theory and Data mining to do this analysis,
and make these predictions.
So by deploying predictive analytics, organizations are addressing their business issues proactively to get the best outcomes.
Using Watson to build Cognitive IoT Apps on BluemixIBM
Learn how IBM Watson is allowing developers to build cognitive applications in the IBM Cloud. Using the IoT foundation and Watson, the future of connected devices is staying connected in a cognitive way with smarter apps and smarter devices.
Analysis insight about a Flyball dog competition team's performanceroli9797
Insight of my analysis about a Flyball dog competition team's last year performance. Find more: https://github.com/rolandnagy-ds/flyball_race_analysis/tree/main
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Data and AI
Round table discussion of vector databases, unstructured data, ai, big data, real-time, robots and Milvus.
A lively discussion with NJ Gen AI Meetup Lead, Prasad and Procure.FYI's Co-Found
The Building Blocks of QuestDB, a Time Series Databasejavier ramirez
Talk Delivered at Valencia Codes Meetup 2024-06.
Traditionally, databases have treated timestamps just as another data type. However, when performing real-time analytics, timestamps should be first class citizens and we need rich time semantics to get the most out of our data. We also need to deal with ever growing datasets while keeping performant, which is as fun as it sounds.
It is no wonder time-series databases are now more popular than ever before. Join me in this session to learn about the internal architecture and building blocks of QuestDB, an open source time-series database designed for speed. We will also review a history of some of the changes we have gone over the past two years to deal with late and unordered data, non-blocking writes, read-replicas, or faster batch ingestion.
End-to-end pipeline agility - Berlin Buzzwords 2024Lars Albertsson
We describe how we achieve high change agility in data engineering by eliminating the fear of breaking downstream data pipelines through end-to-end pipeline testing, and by using schema metaprogramming to safely eliminate boilerplate involved in changes that affect whole pipelines.
A quick poll on agility in changing pipelines from end to end indicated a huge span in capabilities. For the question "How long time does it take for all downstream pipelines to be adapted to an upstream change," the median response was 6 months, but some respondents could do it in less than a day. When quantitative data engineering differences between the best and worst are measured, the span is often 100x-1000x, sometimes even more.
A long time ago, we suffered at Spotify from fear of changing pipelines due to not knowing what the impact might be downstream. We made plans for a technical solution to test pipelines end-to-end to mitigate that fear, but the effort failed for cultural reasons. We eventually solved this challenge, but in a different context. In this presentation we will describe how we test full pipelines effectively by manipulating workflow orchestration, which enables us to make changes in pipelines without fear of breaking downstream.
Making schema changes that affect many jobs also involves a lot of toil and boilerplate. Using schema-on-read mitigates some of it, but has drawbacks since it makes it more difficult to detect errors early. We will describe how we have rejected this tradeoff by applying schema metaprogramming, eliminating boilerplate but keeping the protection of static typing, thereby further improving agility to quickly modify data pipelines without fear.
Codeless Generative AI Pipelines
(GenAI with Milvus)
https://ml.dssconf.pl/user.html#!/lecture/DSSML24-041a/rate
Discover the potential of real-time streaming in the context of GenAI as we delve into the intricacies of Apache NiFi and its capabilities. Learn how this tool can significantly simplify the data engineering workflow for GenAI applications, allowing you to focus on the creative aspects rather than the technical complexities. I will guide you through practical examples and use cases, showing the impact of automation on prompt building. From data ingestion to transformation and delivery, witness how Apache NiFi streamlines the entire pipeline, ensuring a smooth and hassle-free experience.
Timothy Spann
https://www.youtube.com/@FLaNK-Stack
https://medium.com/@tspann
https://www.datainmotion.dev/
milvus, unstructured data, vector database, zilliz, cloud, vectors, python, deep learning, generative ai, genai, nifi, kafka, flink, streaming, iot, edge
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data LakeWalaa Eldin Moustafa
Dynamic policy enforcement is becoming an increasingly important topic in today’s world where data privacy and compliance is a top priority for companies, individuals, and regulators alike. In these slides, we discuss how LinkedIn implements a powerful dynamic policy enforcement engine, called ViewShift, and integrates it within its data lake. We show the query engine architecture and how catalog implementations can automatically route table resolutions to compliance-enforcing SQL views. Such views have a set of very interesting properties: (1) They are auto-generated from declarative data annotations. (2) They respect user-level consent and preferences (3) They are context-aware, encoding a different set of transformations for different use cases (4) They are portable; while the SQL logic is only implemented in one SQL dialect, it is accessible in all engines.
#SQL #Views #Privacy #Compliance #DataLake
The Ipsos - AI - Monitor 2024 Report.pdfSocial Samosa
According to Ipsos AI Monitor's 2024 report, 65% Indians said that products and services using AI have profoundly changed their daily life in the past 3-5 years.
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Data and AI
Discussion on Vector Databases, Unstructured Data and AI
https://www.meetup.com/unstructured-data-meetup-new-york/
This meetup is for people working in unstructured data. Speakers will come present about related topics such as vector databases, LLMs, and managing data at scale. The intended audience of this group includes roles like machine learning engineers, data scientists, data engineers, software engineers, and PMs.This meetup was formerly Milvus Meetup, and is sponsored by Zilliz maintainers of Milvus.