AI Can Simplify The Purchasing Process For Business

For all the mystery still surrounding the future of artificial intelligence, some early governmental uses could help federal workers and contractors navigate acquisition regulations to make federal purchasing less complex.

A new joint report from the Partnership for Public Service and the IBM Center for the Business of Government pointed to a pilot program currently deployed by the US Air Force as a test case for making contracting quicker and more efficient.

Strategic, widespread use of AI "could save government up to 1.2 billion work hours and $41.1 billion annually," the report estimated.

Because of the density and complexity of the current federal acquisition process, "people tend to go for what they know will work rather than where is there opportunity for innovation, saving time and saving money," said Mallory Bulman, the vice president of research and evaluation at the Partnership.

The US Air Force, which spent $53 billion on products in services in fiscal year 2017 alone, will be working with two contractors and "hopes to unveil the AI system both online and as a phone application later in 2018," according to the report.

"The goal is to enable a contract officer to query how a specific contract should be structured or if a particular contract type can be used for buying a particular product or service," it stated.

The payoffs of using AI, in terms of saving both time and human headaches, could make purchasing easier and more innovative.

Specifically, using AI could allow businesses of any size to query the software for bidding details, as well as a list of contracts they would be eligible to bid. Making contracting easier could lead to a greater deployment of technology and even make bidding easier for small businesses.

The report noted that to prepare the system, contracting officers must first upload massive amounts of data to inform AI's decision-making -- a "major effort before the system can be helpful."

If the Air Force pilot program is successful, it would offer agencies a chance to repurpose the hours that would have been spent on the lengthy acquisition process, as well as "an AI approach to emulate to simplify and speed up what is now a mystifying government necessity."

The report also pointed to three other possible use cases: helping law enforcement, relieving human workers from tedious and rote tasks, as well as helping the country's most vulnerable populations.

However, Federal Cognitive Solutions Leader at IBM's Global Business Services Claude Yusti pointed out that AI in government is still in its nascent stages.

Right now, "AI is Kitty Hawk," he said, advising agencies not to underestimate the amount of upfront investment needed. "AI is really best suited to pick a small initiative around the problem... Pick something that can prove it can pay its way."

Bulman added that any effective AI solution "is always about the data" and agency personnel expertise.

"It really matters what type of information goes into the AI system because that is going to be the basis of the learning," she said.

FCW

You Might Also Read: 

Artificial Intelligence Needs Regulation:

Computers Say ‘No’ But AI’s Decisions Must Be Fair & Transparent:

Using AI In Business Intelligence:

 

 

« Russian Troops Use Missiles & Cyber To Counter 'swarm of drones'
Cyber Attacks Will Continue to Succeed »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Panda Security

Panda Security

Panda Security specializes in the development of endpoint security products and is part of the WatchGuard portfolio of IT security solutions.

Adlink Technology

Adlink Technology

ADLINK is a leading provider of embedded computing products and services for applications including IoT and industrial automation.

ThreatMark

ThreatMark

ThreatMark provides fraud detection solutions for digital banking and payments.

TokenOne

TokenOne

TokenOne is a Cyber Security software company that makes it easy to replace passwords, tokens and other forms of authentication with a more secure solution.

Swiss Cyber Think Tank (SCTT)

Swiss Cyber Think Tank (SCTT)

The Swiss Cyber Think Tank is a business network for Cyber Risk & Insurability, providing an industry-wide networking platform for insurers, technology and security firms.

Connectitude

Connectitude

Connectitude IIoT Platform ™ is a complete solution for industrial IIoT.

Taoglas

Taoglas

Taoglas Next Gen IoT Edge software provides a pay as you go platform for customers to connect, manage and maintain their edge devices in an efficient and secure way.

DreamIt Ventures

DreamIt Ventures

DreamIt Ventures is an early stage venture fund that accelerates startups building transformative tech products in the fields of Healthtech, Securetech, and Urbantech.

Atakama

Atakama

With Atakama, data remains encrypted until the very moment it is used, and the ability to decrypt is based on zero trust architecture.

National Institute for Research & Development in Informatics (ICI Bucharest)

National Institute for Research & Development in Informatics (ICI Bucharest)

ICI Bucharest is the most important institute in the field of research, development and innovation in information and communication technology (ICT) in Romania.

Canonic Security

Canonic Security

Canonic streamlines app review, continuously monitors apps, and reduces the risks involved in third-party access to your data.

GajShield

GajShield

GajShield Infotech provides Data Security Firewall solutions to Corporate’s and Government agencies.

Occentus Network

Occentus Network

Occentus Network is a telecommunications service provider specialized in High Availability Servers & managed Cloud services.

Certera

Certera

Certera is a modern and affordable SSL Certificate, Code Signing Certificate, and Cyber Security Services provider.

AccessIT Group

AccessIT Group

AccessIT Group is a specialized cybersecurity solutions provider offering a full range of advanced security services.

Avatar Managed Services

Avatar Managed Services

Avatar offers proven, process driven IT support to companies who want to utilize their technology to their best advantage.