AI Speeds Up Government Policy Decisions

The Japanese government believes Artificial Intelligence (AI) is an important key to Japan’s economic progress and is a blueprint for the future. The Japanese government plans to introduce AI data analysis system to speed their policy decision making.  The new Prime Minister, Yoshihide Suga has called for greater use of AI and robotics including IoT as part of the government’s economic growth strategy, urging businesses to invest more into researching new technologies. 

Although Japan has a significant global technological position and is a largely independent IT creator that ranks highly among the developed nations, the technology they plan to use comes from Palantir Technologies, an American company.

A recent increase in equipment that can be diverted to military use, such as drones, is making it a challenge for Japan to track the distribution of related parts and components. The government also faces a need to collect and analyze a huge volume of data over the novel coronavirus.

The system developed by Palantir integrates and analyses data scattered throughout a huge organisation in a short period of time. Its clients include major US and European financial institutions, and such US government organisations as the Central Intelligence Agency, the Defense Department and the Department of Health and Human Services.

Palantir is working with the United States and European countries, including the United Kingdom, to analyse Coronavirus infection routes and stocks of medical goods.

Palantir's technology "can help resolve national issues," Koichi Narasaki, chief executive officer of the US company's Japanese unit, said. Collecting and analysing data on serious global challenges through conventional methods would take years, and a national crisis could occur before the completion of the work, signaling Palantir's readiness to call on Japanese government agencies to adopt its AI-based big data analysis system early.

Narasaki also indicated that Palantir is keen to make contributions to the government on macroeconomic and fiscal policies, claiming that the company never looks at sensitive data of its customers.

Both AI and Human Processors 

Removing humans from workflows that only involve the processing of structure data does not mean that humans are obsolete. There are many business decisions that depend on more than just structured data. Vision statements, company strategies, corporate values, market dynamics all are examples of information that is only available in our minds and transmitted through culture and other forms of non-digital communication.

This kind of information is inaccessible to AI and extremely relevant to business decisions.

Japan Times:       EU Japan Centre:     EU Japan Centre:    Bharat Express:       NewzPad:      Harvard Business Review

You Might Also Read: 

Japan's New AI-Based Cyber Defence System:

 

« The Rise and Fall Of America’s Unregulated Internet
The Data Center Containment Solution Market is Growing »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Opengear

Opengear

Opengear ensures network resilience to enterprises by enabling business continuity with the Network Resilience Platform.

Information Security Research Association (ISRA)

Information Security Research Association (ISRA)

ISRA is a non-profit organization focused on various aspects of Information Security including security research and cyber security awareness activities.

Genie Networks

Genie Networks

Genie Networks is a leading technology company providing networking and security solutions for optimizing the performance of large networks.

CERT-UA

CERT-UA

CERT-UA is the national Computer Emergency Response Team for Ukraine.

National Cyber-Forensics & Training Alliance (NCFTA)

National Cyber-Forensics & Training Alliance (NCFTA)

NCFTA is a trusted alliance of private industry and law enforcement partners dedicated to information sharing and disrupting cyber-related threats.

Sasa Software

Sasa Software

Sasa Software is a cybersecurity software developer specializing in the prevention of file-based network attacks.

Axonius

Axonius

Axonius is the only solution that offers a unified view of all assets and their coverage, empowering customers to take action to enforce their organization’s security policies.

International Data Sanitization Consortium (IDSC)

International Data Sanitization Consortium (IDSC)

IDSC is a group composed of individuals and companies dedicated to standardizing terminology and practices across the data sanitization industry.

S4x Events

S4x Events

S4x are the most advanced and largest ICS cyber security events in the world.

Cybersecure Policy Exchange (CPX)

Cybersecure Policy Exchange (CPX)

Cybersecure Policy Exchange is a new initiative dedicated to advancing effective and innovative public policy in cybersecurity and digital privacy.

Jamf

Jamf

Jamf is the only Apple Enterprise Management solution of scale that remotely connects, manages and protects Apple users, devices and services.

Graylog

Graylog

Graylog provides answers to your team’s security, application, and IT infrastructure questions by enabling you to combine, enrich, correlate, query, and visualize all your log data in one place.

Custard Technical Services

Custard Technical Services

Custard provide Network Security for all types of businesses across many industries, helping to keep them safe and secure.

Proximus Ada

Proximus Ada

Proximus Ada is the first Belgian center of excellence combining artificial intelligence and cybersecurity.

ThreatFabric

ThreatFabric

ThreatFabric integrates industry-leading threat intel, behavioral analytics, advanced device fingerprinting and over 10.000 adaptive fraud indicators.

Sword Group

Sword Group

Sword is a leader in data insights, digital transformation and technology services with a substantial reputation in complex IT, business projects and mission critical operations.