IBM Watson AI Assistant Can Now Work With Autonomous Devices

IBM’s Watson has earned fame besting Jeopardy! champions. But now the artificial intelligence (AI) platform is rolling out Watson Assistant, designed to “help bridge the information and data sharing gap between people and things.”

Watson Assistant is designed to be embedded in a wide variety of things, from cars to conference rooms, retail stores to banks.

The idea, apparently, is that Watson Assistant’s AI capabilities can help Internet of Things (IoT) systems serve proactive and personalized experiences with enhanced data security. Initial applications center around travel and vehicles, with such customers as HARMAN, the Munich Airport, Royal Bank of Scotland, and Autodesk.

Maseratis and Recipes

In travel applications, the IBM spokesperson said Watson Assistant could eventually automatically communicate changes in your itinerary, including flight delays and other issues, to all your vendors and devices.

For example, it could automatically program your destination into your rental car’s navigation system, and it preset smart appliances in your hotel room with your preferred music, temperature, and lighting.

Similarly, in vehicular applications Watson Assistant could ask you questions during your commute home, communicating with your smart home to determine what ingredients you had on hand to make dinner, and suggest appropriate recipes, and where to stop to pick up any missing essentials. It could also identify mechanical problems, such as a short in a fuel-pump relay, and automatically schedule a service appointment.

Other examples provided by IBM include working with Chameleon Technology, a UK-based designer and manufacturer of smart home displays, to leverage your calendar and local weather reports to work with your solar panels, home battery, and electric car to ensure that every component is always topped up and ready to go when you need it.

An encouraging AI/IoT vision, if not yet a reality

It’s a grand and compelling vision, but it’s still at the concept stage. While all of these capabilities might exist in the proof-of-concept stage, they’re still a long way from being ready for prime time.

IBM highlight security and data protection. This kind of AI/IoT synergy creates a lot of personally identifiable data that could lead to unintended consequences if not properly protected.

The next step, for IBM or anyone, is to start pilot programs that actually do the things promised in these new developments, for at least some people in some situations. Only then will we find out how well these approaches work and whether they really make a difference for the people who use them.

Network World

You Might Also Read: 

IBM Watson's Goodbye To Privacy:

Artificial Intelligence Is Too Narrow:

 

« Regulation Might Actually Protect Facebook
Police Arrest Bank Hacker Who Stole $1B »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Waterfall Security Solutions

Waterfall Security Solutions

Waterfall Security is focused on protecting critical infrastructure and industrial control systems from remote online cyber attacks,

Oodrive

Oodrive

Oodrive is the first trusted European collaborative suite allowing users to collaborate, communicate and streamline business with transparent tools that ensure security.

BetterCloud

BetterCloud

BetterCloud puts IT in control of the modern workplace through user lifecycle management, data discovery, and IT and security automation purpose-built for SaaS.

Gilbert + Tobin

Gilbert + Tobin

Gilbert + Tobin is an Australian corporate law firm serving clients throughout Australia, and around the world, on a broad range of legal issues including cyber security.

Clym

Clym

Clym is the data privacy platform that helps organisations meet their data protection obligations. Cookies, Consent, Requests, Policies and more are all managed in a secure and adaptive application.

Mosaic 451

Mosaic 451

Mosaic451 is a bespoke IT managed services provider and consultancy specializing in information security, operations and design.

Center for Infrastructure Assurance and Security (CIAS)

Center for Infrastructure Assurance and Security (CIAS)

CIAS is developing the world's foremost center for multidisciplinary education and development of operational capabilities in the areas of infrastructure assurance and security.

Agile Underwriting

Agile Underwriting

Agile, an underwriting agency, insurtech and Coverholder at Lloyd's, provides niche insurance products across Aviation, Marine & Cargo, Cyber and Financial Lines.

Sec-Ops

Sec-Ops

Sec-Ops is a forward thinking cyber security company, formed by a group of security enthusiasts with years of experience and backgrounds in the technology and the government industries.

LogicBoost Labs

LogicBoost Labs

LogicBoost Labs has the expertise, experience, funding and connections to make your startup succeed. We are always interested in new ways to change the world for the better.

NACVIEW

NACVIEW

NACVIEW is a Network Access Control solution. It allows to control endpoints and identities that try to access the network - wired and wireless, including VPN connections.

CaseMatrix

CaseMatrix

Discover a new era of legal intelligence with CaseMatrix. We identify potential class action cases arising from cyber incidents and data breaches.

Red Helix

Red Helix

Red Helix (formerly Phoenix Datacom) is a market leader in network performance and cyber security.

CyberSecAsia

CyberSecAsia

CyberSecAsia series conference is the one and only decision-makers gathering for CISO and info security experts in Asia.

Blackmere Consulting

Blackmere Consulting

Blackmere Consulting is a Nationwide Technical and Executive Recruiting firm dedicated to Cyber Security and Information Technology.

CYNC Secure

CYNC Secure

CYNC boosts cybersecurity remediation by consolidating fragmented data and optimizing operational processes.