AI - Reshaping the Workplace

 

Much like the evolution of systems design, IT-enabled process change ebbs and flows over time. We see this in history as each technology revolution brings with it a refactoring of business operations.

With the rise of client/server computing in the 1980s, and the introduction of database servers and visual development tools like PowerBuilder, “business process re-engineering” became all the craze during the 1990s.

By 1993, 60 percent of the Fortune 500 developed IT systems to automate mundane tasks like insurance claims processing or AP invoice/purchase order reconciliation, channeling the mandate of technology-led business transformation in Michael Hammer’s infamous 1990 HBR article, “Don’t Automate, Obliterate.”

Twenty-odd years later, we’re about to see another “flow” of transformation thanks to resurgent interest in artificial intelligence and the emergence of the AI-powered business application. What’s different this time around is the transformation will be driven bottom up by rank-and-file employees, making it potentially more disruptive than any “flow” of process change that came before. What are AI-powered apps, and what do they have to do with business process re-engineering?

AI-powered apps are software capable of performing higher-order tasks associated with the work of educated office workers. With narrowly focused “brains” optimized to perform a particular task within a narrow domain, AI-powered apps can schedule your business meetings, answer common customer requests and notify you that your connecting flight is delayed by 20 minutes when you thought you had 5 minutes to sprint to the gate.

Outside the purview of IT, employees, teams and entire departments will champion process re-engineering efforts with AI-powered apps, whether they realize it or not. As each individual app eliminates a “task,” the employees who assemble their own “stack” of AI-powered apps will automate many of the mundane parts of their jobs. Teammates eager to be productive and stay competitive will fast follow, as will department managers who want to demonstrate techno-prowess and cost-cutting efforts to higher-ups.

In my own experience, x.ai’s “Amy,” the AI for scheduling business meetings, is totally addictive. You simply cc her on an email thread and she goes to work engaging with the recipient to find a date and optimal place to meet. I use it everyday, and couldn’t imagine my workday without her. It’s still in beta, but the other testers I speak with call it the closest thing to “magic” they’ve seen in years. Sell it for $5/month? $10/month? Either way, if Dropbox had a meteoric rise within organizations, just wait till x.ai releases publicly and busy execs, consultants and sales people purchase and expense access to “Amy.”
Amy may be the “a-ha” breakthrough application of the moment, but the formula will hold for AI-powered apps in other domains. 

We define AI-powered business applications as software in which the user experience is driven by AI. Today, that takes the form of voice (Apple Siri), text-based interfaces (x.ai’s Amy) or intelligent notifications (Google Now). Other examples of AI-driven UX like Google Search’s auto fill differ in that they do not automate a step within a workflow. Excluded are new-school applications for fraud management, data science or security analytics that leverage AI solely for back-end ops and/or require technical/IT admin chops to operate. We include developer services because they will enable the next wave of AI-powered business apps. In the chart, we’ve included current as well as soon-to-be entrants according to our understanding of those companies’ product roadmaps. This landscape is intended to serve as a complement to Shivon Zilis’s birds-eye view of AI startups. We welcome you to critique it in the comments sections of this post.

New Categories Will Emerge Over The Next Couple Of Years. In our initial sweep of the startup landscape, we’ve identified 10 app categories getting the AI treatment. This is just the tipping point. Startup activity will accelerate rapidly over the next two years as entrepreneurs identify new business processes to automate. Kevin Kelly of Wired states it with spirit: “The business plans of the next 10,000 startups are easy to forecast: Take X and add AI.” Expect AI-powered business applications to spring up across enterprise software categories that touch the end user.

In consequence, time-on-screen shrinks and software is capable of just working in the background. “Invisible software” is the highest realization of the AI-powered app, likely to distinguish winners from losers within each category segment. It will also be the most disruptive because it automates a job rather than just a task.

As startups flock into this space, and major software companies start placing bets, the effects will ripple across organizations. One breakthrough application at a time, human capital will start to shift from mundane tasks and transactions to higher-order, creative work. Along the way, we’ll see massive businesses built where software replaces or reshapes specific job functions. We’ll also see duds and false promises. I’m keeping a keen eye on carefully executed “invisible software” as the guiding light.
Techcrunch: http://tcrn.ch/1Vm7VXx

« Russian Scientists Create Cockroach Robo-Spy
DARPA - Tech to Protect the Internet of Things »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Packet Storm

Packet Storm

Packet Storm is an online resource for security tools, whitepapers, exploits, and advisories on computer security issues.

NUS-Singtel Cyber Security R&D Lab

NUS-Singtel Cyber Security R&D Lab

NUS-Singtel Cyber Security R&D Lab conducts research into predictive security analytics.

NextLabs

NextLabs

NextLabs provides data-centric security software to protect business-critical data and applications.

Finnish Information Security Cluster (FISC)

Finnish Information Security Cluster (FISC)

FISC is an organization established by major Finnish information security companies to promote their activities nationally and internationally.

PlainID

PlainID

PlainID provides IAM teams with a simple and intuitive means to control their organization’s entire authorization process.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Greenwave Systems

Greenwave Systems

Greenwave's AXON Platform enables IoT and M2M network service providers to address security, interoperability, flexibility and scalability from a single IoT platform.

Red4Sec

Red4Sec

Red4Sec are experts in ethical hacking, audits of web and mobile applications, code audits, cryptocurrency audits, perimeter security and incident response.

SecureWorx

SecureWorx

SecureWorx are a secure multi-cloud MSP, a provider of advanced IT security services and an independent cyber security advisory.

Computer Services Inc (CSI)

Computer Services Inc (CSI)

CSI is a leading fintech, regtech and cybersecurity solutions partner operating at the intersection of innovation and service.

BrainStorm

BrainStorm

BrainStorm Threat Defense takes a new human-focused approach to security awareness that traditional training lacks. It’s a cutting-edge platform to make your users more security savvy.

AirDroid Business

AirDroid Business

AirDroid Business is an efficient mobile device management solution for Android devices, helping businesses to remotely control and access devices in large quantities using a centralized approach.

Chainguard

Chainguard

Founded by the industry's leading experts on open source software, security and cloud native development, Chainguard are on a mission to make the software supply chain secure by default.

Lodestone

Lodestone

Lodestone partners with clients to help them mitigate business and reputational risk, through our human-based, approach to cyber security, digital forensics and incident response.

Theta

Theta

Theta is a New Zealand owned technology consultancy. Our team of over 330 experienced professionals help organisations transform with technology.

Aim Security

Aim Security

Aim empowers enterprises to unlock the full potential of GenAI technology without compromising security. GenAI makes business better - Aim makes GenAI secure.