AI - Reshaping the Workplace

 

Much like the evolution of systems design, IT-enabled process change ebbs and flows over time. We see this in history as each technology revolution brings with it a refactoring of business operations.

With the rise of client/server computing in the 1980s, and the introduction of database servers and visual development tools like PowerBuilder, “business process re-engineering” became all the craze during the 1990s.

By 1993, 60 percent of the Fortune 500 developed IT systems to automate mundane tasks like insurance claims processing or AP invoice/purchase order reconciliation, channeling the mandate of technology-led business transformation in Michael Hammer’s infamous 1990 HBR article, “Don’t Automate, Obliterate.”

Twenty-odd years later, we’re about to see another “flow” of transformation thanks to resurgent interest in artificial intelligence and the emergence of the AI-powered business application. What’s different this time around is the transformation will be driven bottom up by rank-and-file employees, making it potentially more disruptive than any “flow” of process change that came before. What are AI-powered apps, and what do they have to do with business process re-engineering?

AI-powered apps are software capable of performing higher-order tasks associated with the work of educated office workers. With narrowly focused “brains” optimized to perform a particular task within a narrow domain, AI-powered apps can schedule your business meetings, answer common customer requests and notify you that your connecting flight is delayed by 20 minutes when you thought you had 5 minutes to sprint to the gate.

Outside the purview of IT, employees, teams and entire departments will champion process re-engineering efforts with AI-powered apps, whether they realize it or not. As each individual app eliminates a “task,” the employees who assemble their own “stack” of AI-powered apps will automate many of the mundane parts of their jobs. Teammates eager to be productive and stay competitive will fast follow, as will department managers who want to demonstrate techno-prowess and cost-cutting efforts to higher-ups.

In my own experience, x.ai’s “Amy,” the AI for scheduling business meetings, is totally addictive. You simply cc her on an email thread and she goes to work engaging with the recipient to find a date and optimal place to meet. I use it everyday, and couldn’t imagine my workday without her. It’s still in beta, but the other testers I speak with call it the closest thing to “magic” they’ve seen in years. Sell it for $5/month? $10/month? Either way, if Dropbox had a meteoric rise within organizations, just wait till x.ai releases publicly and busy execs, consultants and sales people purchase and expense access to “Amy.”
Amy may be the “a-ha” breakthrough application of the moment, but the formula will hold for AI-powered apps in other domains. 

We define AI-powered business applications as software in which the user experience is driven by AI. Today, that takes the form of voice (Apple Siri), text-based interfaces (x.ai’s Amy) or intelligent notifications (Google Now). Other examples of AI-driven UX like Google Search’s auto fill differ in that they do not automate a step within a workflow. Excluded are new-school applications for fraud management, data science or security analytics that leverage AI solely for back-end ops and/or require technical/IT admin chops to operate. We include developer services because they will enable the next wave of AI-powered business apps. In the chart, we’ve included current as well as soon-to-be entrants according to our understanding of those companies’ product roadmaps. This landscape is intended to serve as a complement to Shivon Zilis’s birds-eye view of AI startups. We welcome you to critique it in the comments sections of this post.

New Categories Will Emerge Over The Next Couple Of Years. In our initial sweep of the startup landscape, we’ve identified 10 app categories getting the AI treatment. This is just the tipping point. Startup activity will accelerate rapidly over the next two years as entrepreneurs identify new business processes to automate. Kevin Kelly of Wired states it with spirit: “The business plans of the next 10,000 startups are easy to forecast: Take X and add AI.” Expect AI-powered business applications to spring up across enterprise software categories that touch the end user.

In consequence, time-on-screen shrinks and software is capable of just working in the background. “Invisible software” is the highest realization of the AI-powered app, likely to distinguish winners from losers within each category segment. It will also be the most disruptive because it automates a job rather than just a task.

As startups flock into this space, and major software companies start placing bets, the effects will ripple across organizations. One breakthrough application at a time, human capital will start to shift from mundane tasks and transactions to higher-order, creative work. Along the way, we’ll see massive businesses built where software replaces or reshapes specific job functions. We’ll also see duds and false promises. I’m keeping a keen eye on carefully executed “invisible software” as the guiding light.
Techcrunch: http://tcrn.ch/1Vm7VXx

« Russian Scientists Create Cockroach Robo-Spy
DARPA - Tech to Protect the Internet of Things »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ON-DEMAND WEBINAR: 2024 and beyond: Top six cloud security trends

ON-DEMAND WEBINAR: 2024 and beyond: Top six cloud security trends

Learn about the top cloud security trends in 2024 and beyond, along with solutions and controls you can implement as part of your security strategy.

Center for a New American Security (CNAS)

Center for a New American Security (CNAS)

CNAS is the nation's leading research institution focused on defense and national security policy. Cyber security issues are an intrinsic element of the national security debate.

Egress Software Technologies

Egress Software Technologies

Egress Software Technologies is a leading provider of data security services designed to protect shared information throughout its lifecycle.

Payload Security

Payload Security

Payload Security's VxStream Sandbox is a fully automated malware analysis system.

Sparta Consulting

Sparta Consulting

Sparta Consulting is an information management and business development full service provider.

Eseye

Eseye

Eseye is a global specialist supplier of cellular internet connectivity for intelligent IoT (Internet of Things) devices.

Styra

Styra

Styra allows companies to secure cloud environments and applications, including those built on the popular Kubernetes open-source cloud platform.

Keynetic Technologies

Keynetic Technologies

Keynetic focuses on developing cybersecurity solutions for Industry 4.0.

ConvergeOne

ConvergeOne

ConvergeOne is a leading global IT services provider of collaboration and technology solutions including cybersecurity.

IoT M2M Council (IMC)

IoT M2M Council (IMC)

The IMC is the largest and fastest-growing trade organisation in the IoT/M2M sector.

SOFTwarfare

SOFTwarfare

SOFTwarfare deliver high-quality, reliable and secure enterprise application integrations through RESTful APIs for Cyber, Ops & Dev.

Tesserent

Tesserent

Tesserent (formerly Pure Security) is a full-service cybersecurity solutions provider. We partner with clients across Australia and New Zealand in the protection of their digital assets.

Etonwood

Etonwood

Etonwood specialises in infrastructure and vendor technology recruitment in areas including cloud platforms, cyber security and service management.

OSIbeyond

OSIbeyond

OSIbeyond provides comprehensive Managed IT Services to organizations in the Washington D.C., MD, and VA area including IT Help Desk Support, Cloud Solutions, Cybersecurity, and Technology Strategy.

Seccuri

Seccuri

Seccuri is a unique global cybersecurity talent tech platform. Use our specialized AI algorithm to grow and improve the cybersecurity workforce.

Data Pie Cybersecurity

Data Pie Cybersecurity

The Data Pie Cybersecurity Consulting offers a 360° around protection for your IT security. Security awareness solutions and consulting.

Firesand

Firesand

Based in Milton Keynes, Firesand Ltd provides penetration testing services to improve your cyber security and protect your company against hackers.