AI - Reshaping the Workplace

 

Much like the evolution of systems design, IT-enabled process change ebbs and flows over time. We see this in history as each technology revolution brings with it a refactoring of business operations.

With the rise of client/server computing in the 1980s, and the introduction of database servers and visual development tools like PowerBuilder, “business process re-engineering” became all the craze during the 1990s.

By 1993, 60 percent of the Fortune 500 developed IT systems to automate mundane tasks like insurance claims processing or AP invoice/purchase order reconciliation, channeling the mandate of technology-led business transformation in Michael Hammer’s infamous 1990 HBR article, “Don’t Automate, Obliterate.”

Twenty-odd years later, we’re about to see another “flow” of transformation thanks to resurgent interest in artificial intelligence and the emergence of the AI-powered business application. What’s different this time around is the transformation will be driven bottom up by rank-and-file employees, making it potentially more disruptive than any “flow” of process change that came before. What are AI-powered apps, and what do they have to do with business process re-engineering?

AI-powered apps are software capable of performing higher-order tasks associated with the work of educated office workers. With narrowly focused “brains” optimized to perform a particular task within a narrow domain, AI-powered apps can schedule your business meetings, answer common customer requests and notify you that your connecting flight is delayed by 20 minutes when you thought you had 5 minutes to sprint to the gate.

Outside the purview of IT, employees, teams and entire departments will champion process re-engineering efforts with AI-powered apps, whether they realize it or not. As each individual app eliminates a “task,” the employees who assemble their own “stack” of AI-powered apps will automate many of the mundane parts of their jobs. Teammates eager to be productive and stay competitive will fast follow, as will department managers who want to demonstrate techno-prowess and cost-cutting efforts to higher-ups.

In my own experience, x.ai’s “Amy,” the AI for scheduling business meetings, is totally addictive. You simply cc her on an email thread and she goes to work engaging with the recipient to find a date and optimal place to meet. I use it everyday, and couldn’t imagine my workday without her. It’s still in beta, but the other testers I speak with call it the closest thing to “magic” they’ve seen in years. Sell it for $5/month? $10/month? Either way, if Dropbox had a meteoric rise within organizations, just wait till x.ai releases publicly and busy execs, consultants and sales people purchase and expense access to “Amy.”
Amy may be the “a-ha” breakthrough application of the moment, but the formula will hold for AI-powered apps in other domains. 

We define AI-powered business applications as software in which the user experience is driven by AI. Today, that takes the form of voice (Apple Siri), text-based interfaces (x.ai’s Amy) or intelligent notifications (Google Now). Other examples of AI-driven UX like Google Search’s auto fill differ in that they do not automate a step within a workflow. Excluded are new-school applications for fraud management, data science or security analytics that leverage AI solely for back-end ops and/or require technical/IT admin chops to operate. We include developer services because they will enable the next wave of AI-powered business apps. In the chart, we’ve included current as well as soon-to-be entrants according to our understanding of those companies’ product roadmaps. This landscape is intended to serve as a complement to Shivon Zilis’s birds-eye view of AI startups. We welcome you to critique it in the comments sections of this post.

New Categories Will Emerge Over The Next Couple Of Years. In our initial sweep of the startup landscape, we’ve identified 10 app categories getting the AI treatment. This is just the tipping point. Startup activity will accelerate rapidly over the next two years as entrepreneurs identify new business processes to automate. Kevin Kelly of Wired states it with spirit: “The business plans of the next 10,000 startups are easy to forecast: Take X and add AI.” Expect AI-powered business applications to spring up across enterprise software categories that touch the end user.

In consequence, time-on-screen shrinks and software is capable of just working in the background. “Invisible software” is the highest realization of the AI-powered app, likely to distinguish winners from losers within each category segment. It will also be the most disruptive because it automates a job rather than just a task.

As startups flock into this space, and major software companies start placing bets, the effects will ripple across organizations. One breakthrough application at a time, human capital will start to shift from mundane tasks and transactions to higher-order, creative work. Along the way, we’ll see massive businesses built where software replaces or reshapes specific job functions. We’ll also see duds and false promises. I’m keeping a keen eye on carefully executed “invisible software” as the guiding light.
Techcrunch: http://tcrn.ch/1Vm7VXx

« Russian Scientists Create Cockroach Robo-Spy
DARPA - Tech to Protect the Internet of Things »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

City Security Magazine

City Security Magazine

City Security magazine helps promote best security practices and keep businesses informed on a wide variety of security-related issues.

Boxcryptor

Boxcryptor

Boxcryptor encrypts your sensitive files before uploading them to cloud storage services.

Logsign

Logsign

Logsign is a Security Orchestration, Automation and Response (SOAR) platform with next-gen Security Information and Event Management (SIEM) solution.

Securitybulls

Securitybulls

Securitybulls is an information security firm offering an encyclopedic penetration testing & IT security assessment service for your organization.

Orca Security

Orca Security

Orca Security delivers full stack visibility including prioritized alerts to vulnerabilities, compromises, misconfigurations, and more across your entire inventory on all your cloud accounts.

Early Birds

Early Birds

Early Birds is a Business to Business (B2B) marketplace for Innovators (Startups/Scaleups) and Early Adopters to exchange value early on.

Traced

Traced

At Traced, our aim is to redefine mobile cyber security to provide the best possible protection to everyone against breaches of privacy and security.

Cyphra

Cyphra

Cyphra’s team provide cyber security consulting, technical and managed services expertise and experience to support your organisation.

Safe Systems

Safe Systems

Safe Systems provide compliance centric IT services for community banks and credit unions, ensuring that they are kept up to date on current technologies, security risks, and regulatory changes.

Trace3

Trace3

Trace3 is a pioneer in business transformation solutions, empowering organizations to keep pace with the rapid changes in IT innovations and maximize organizational health.

International Cyber Threat Task Force (ICTTF)

International Cyber Threat Task Force (ICTTF)

The International Cyber Threat Task Force is a not-for-profit initiative promoting the ecosystem of an International independent non-partisan cyber security community.

Heron Technology

Heron Technology

Heron Technology are a technology solutions consultancy with core competencies in the areas of Cyber Security and Digital Aviation.

KCS Group Europe

KCS Group Europe

KCS Group helps its clients to identify and deal with any risks, weaknesses and threats which could impact on the business financially or reputationally.

Aegis Cyber Defense Systems

Aegis Cyber Defense Systems

AEGIS is a powerful cybersecurity tool that can help protect your devices and networks from cyber threats, and increase performance.

Leaf IT

Leaf IT

Leaf IT are a pioneering cloud-first MSP, dedicated to helping businesses in the UK and Ireland. We focus on delivering tangible results for our clients through IT transformation.

Attestiv

Attestiv

Attestiv puts authenticity into photos, videos and documents by utilizing advanced technologies in AI and tamper-proofing.