IBM’s Watson Takes On The IoT

IBM Watson Assistant is a new artificial intelligence assistant designed to work with autonomous and IoT devices.

IBM’s Watson has earned fame besting quiz show Jeopardy! champions. But now the artificial intelligence (AI) platform is rolling out Watson Assistant, designed to “help bridge the information and data sharing gap between people and things.”

Announced this morning at the IBM THINK 2018 conference in Las Vegas, an IBM spokesperson described Watson Assistant in an email as “an AI assistant for enterprises that can be accessed via voice or text interaction.

Watson Assistant is helping businesses transform their customer experiences by bringing together data on all the places and things consumers interact with daily.” Watson Assistant is designed to be embedded in a wide variety of things, from cars to conference rooms, retail stores to banks.

The idea, apparently, is that Watson Assistant’s AI capabilities can help Internet of Things (IoT) systems serve proactive and personalized experiences with enhanced data security. Initial applications center around travel and vehicles, with such customers as HARMAN, the Munich Airport, Royal Bank of Scotland, and Autodesk.

Maseratis and Recipes

In travel applications, the IBM spokesperson said Watson Assistant could eventually automatically communicate changes in your itinerary, including flight delays and other issues, to all your vendors and devices. For example, it could automatically program your destination into your rental car’s navigation system, and it preset smart appliances in your hotel room with your preferred music, temperature, and lighting.

Similarly, in vehicular applications Watson Assistant could ask you questions during your commute home, communicating with your smart home to determine what ingredients you had on hand to make dinner, and suggest appropriate recipes, and where to stop to pick up any missing essentials. It could also identify mechanical problems, such as a short in a fuel-pump relay, and automatically schedule a service appointment.

Other examples provided by IBM include working with Chameleon Technology, a UK-based designer and manufacturer of smart home displays, to leverage your calendar and local weather reports to work with your solar panels, home battery, and electric car to ensure that every component is always topped up and ready to go when you need it.

An encouraging AI/IoT vision, if not yet a reality

It’s a grand and compelling vision, but it’s still at the concept stage. While all of these capabilities might exist in the proof-of-concept stage, they’re still a long way from being ready for prime time.

It seems IBM is right to focus on the smarts needed to create compelling real-world use cases, combining multiple types of IoT devices from a variety of vendors.

Just as important is IBM highlight security and data protection. This kind of AI/IoT synergy creates a lot of personally identifiable data that could lead to unintended consequences if not properly protected.

The next step for IBM is to start pilot programs that actually do the things promised in these new developments, for at least some people in some situations. Only then will we find out how well these approaches work and whether they really make a difference for the people who use them.

NetworkWorld

You Might Also Read: 

One Insurer Plans To Replace Humans With AI:

Using Big Data To Improve Customer Experience & Results:

 

 

« Using GDPR Compliance To Excel At CRM
Fake News Will Lead To A Cyber War »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Acumin Recruitment

Acumin Recruitment

Acumin is an internationally established Cyber Security recruitment specialist.

Cybsecurity Foundation (CSF)

Cybsecurity Foundation (CSF)

Cybsecurity is a non-profit NGO, which aims to work on improvement of security levels in the Polish cyberspace.

ITrust

ITrust

French cybersecurity pure player since 2007. ITrust offers its Cyber expertise services and develops disruptive products in Cyber/Artificial Intelligence.

6cure

6cure

The 6cure Threat Protection solution eliminates malicious traffic to critical services in real time and protects against DDoS attacks.

Ethoca

Ethoca

Ethoca is a secure network for card issuers and merchants to connect and work cooperatively outside the payment network in a unique and powerful way.

RevenueStream

RevenueStream

RevenueStream uses an innovative algorithmic approach to intercept and prevent payment fraud before it even happens.

National Cyber and Information Security Agency (NUKIB) - Czech Republic

National Cyber and Information Security Agency (NUKIB) - Czech Republic

NUKIB is the central Czech government body for cyber security, the protection of classified information in the area of information and communication systems and cryptographic protection.

STM

STM

STM provides system engineering, technical support, project management, technology transfer and logistics support services for the Turkish Armed Forces.

Belden

Belden

Belden is a global leader in signal transmission and security solutions for mission-critical applications in enterprise and industrial markets. Belden brands include Hirschmann and Tofino Security.

TM One

TM One

TM One is the enterprise and public sector business solutions arm of Telekom Malaysia Berhad (TM) Group.

10dot Cloud Security

10dot Cloud Security

10dot Cloud Security is a security service management company. Our solutions give you contextualised visibility into your network security.

Global Cybersecurity Institute - Rochester Institute of Technology (RIT)

Global Cybersecurity Institute - Rochester Institute of Technology (RIT)

At RIT’s Global Cybersecurity Institute, we educate and train cybersecurity professionals; develop new cybersecurity and AI-based knowledge for industry, academia, and government.

iManage

iManage

iManage's intelligent, cloud-enabled, secure knowledge work platform enables organizations to uncover and activate the knowledge that exists inside their business.

HashDit

HashDit

HashDit products and services focus on helping build a safe ecosystem for both protocol users and smart contract developers on BNB Chain.

CIP Cyber

CIP Cyber

CIP Cyber is an online learning community with a mission of connecting, training, and certifying cybersecurity professionals to protect critical infrastructure.

MIND

MIND

MIND is the first-ever data security platform that puts data loss prevention and insider risk management programs on autopilot, so you can automatically identify, detect and prevent data leaks.