AI - Reshaping the Workplace

 

Much like the evolution of systems design, IT-enabled process change ebbs and flows over time. We see this in history as each technology revolution brings with it a refactoring of business operations.

With the rise of client/server computing in the 1980s, and the introduction of database servers and visual development tools like PowerBuilder, “business process re-engineering” became all the craze during the 1990s.

By 1993, 60 percent of the Fortune 500 developed IT systems to automate mundane tasks like insurance claims processing or AP invoice/purchase order reconciliation, channeling the mandate of technology-led business transformation in Michael Hammer’s infamous 1990 HBR article, “Don’t Automate, Obliterate.”

Twenty-odd years later, we’re about to see another “flow” of transformation thanks to resurgent interest in artificial intelligence and the emergence of the AI-powered business application. What’s different this time around is the transformation will be driven bottom up by rank-and-file employees, making it potentially more disruptive than any “flow” of process change that came before. What are AI-powered apps, and what do they have to do with business process re-engineering?

AI-powered apps are software capable of performing higher-order tasks associated with the work of educated office workers. With narrowly focused “brains” optimized to perform a particular task within a narrow domain, AI-powered apps can schedule your business meetings, answer common customer requests and notify you that your connecting flight is delayed by 20 minutes when you thought you had 5 minutes to sprint to the gate.

Outside the purview of IT, employees, teams and entire departments will champion process re-engineering efforts with AI-powered apps, whether they realize it or not. As each individual app eliminates a “task,” the employees who assemble their own “stack” of AI-powered apps will automate many of the mundane parts of their jobs. Teammates eager to be productive and stay competitive will fast follow, as will department managers who want to demonstrate techno-prowess and cost-cutting efforts to higher-ups.

In my own experience, x.ai’s “Amy,” the AI for scheduling business meetings, is totally addictive. You simply cc her on an email thread and she goes to work engaging with the recipient to find a date and optimal place to meet. I use it everyday, and couldn’t imagine my workday without her. It’s still in beta, but the other testers I speak with call it the closest thing to “magic” they’ve seen in years. Sell it for $5/month? $10/month? Either way, if Dropbox had a meteoric rise within organizations, just wait till x.ai releases publicly and busy execs, consultants and sales people purchase and expense access to “Amy.”
Amy may be the “a-ha” breakthrough application of the moment, but the formula will hold for AI-powered apps in other domains. 

We define AI-powered business applications as software in which the user experience is driven by AI. Today, that takes the form of voice (Apple Siri), text-based interfaces (x.ai’s Amy) or intelligent notifications (Google Now). Other examples of AI-driven UX like Google Search’s auto fill differ in that they do not automate a step within a workflow. Excluded are new-school applications for fraud management, data science or security analytics that leverage AI solely for back-end ops and/or require technical/IT admin chops to operate. We include developer services because they will enable the next wave of AI-powered business apps. In the chart, we’ve included current as well as soon-to-be entrants according to our understanding of those companies’ product roadmaps. This landscape is intended to serve as a complement to Shivon Zilis’s birds-eye view of AI startups. We welcome you to critique it in the comments sections of this post.

New Categories Will Emerge Over The Next Couple Of Years. In our initial sweep of the startup landscape, we’ve identified 10 app categories getting the AI treatment. This is just the tipping point. Startup activity will accelerate rapidly over the next two years as entrepreneurs identify new business processes to automate. Kevin Kelly of Wired states it with spirit: “The business plans of the next 10,000 startups are easy to forecast: Take X and add AI.” Expect AI-powered business applications to spring up across enterprise software categories that touch the end user.

In consequence, time-on-screen shrinks and software is capable of just working in the background. “Invisible software” is the highest realization of the AI-powered app, likely to distinguish winners from losers within each category segment. It will also be the most disruptive because it automates a job rather than just a task.

As startups flock into this space, and major software companies start placing bets, the effects will ripple across organizations. One breakthrough application at a time, human capital will start to shift from mundane tasks and transactions to higher-order, creative work. Along the way, we’ll see massive businesses built where software replaces or reshapes specific job functions. We’ll also see duds and false promises. I’m keeping a keen eye on carefully executed “invisible software” as the guiding light.
Techcrunch: http://tcrn.ch/1Vm7VXx

« Russian Scientists Create Cockroach Robo-Spy
DARPA - Tech to Protect the Internet of Things »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

USNA Center for Cyber Security Studies

USNA Center for Cyber Security Studies

The mission of the Center for Cyber Security Studies is to enhance the education of midshipmen in all areas of cyber warfare.

Security Weekly

Security Weekly

Security Weekly provides free content within the subject areas of IT security news, vulnerabilities, hacking, and research.

Trust Guard

Trust Guard

Trust Guard services provide complete security for your website.

Boxcryptor

Boxcryptor

Boxcryptor encrypts your sensitive files before uploading them to cloud storage services.

Ericsson

Ericsson

Ericsson is a leading provider of telecommunications services and network infrastructure solutions including all aspects of network security.

Claroty

Claroty

Claroty was conceived to secure and optimize OT networks that run the world’s most critical infrastructures.

Haystax Technology

Haystax Technology

Haystax’s security analytics platform applies artificial intelligence techniques to identify and prioritize threats in real time.

High Sec Labs (HSL)

High Sec Labs (HSL)

High Sec Labs develops high-quality, cyber-defense solutions in the field of network and peripheral isolation.

adaware

adaware

adaware is an award-winning security and privacy software provider, empowering users to connect with confidence.

Guernsey

Guernsey

Guernsey provides a wide range of engineering, architecture and consulting services to multiple markets, including cybersecurity consulting and CMMC certification.

Silent Quadrant

Silent Quadrant

Silent Quadrant delivers incomparable cybersecurity consulting, digital transformation, and risk management within our purpose-driven clients - empowering them to be the most resilient entities.

Zitec

Zitec

One of Europe's largest and most prominent full-cycle software development services companies, Zitec is the digital transformation partner to companies in the EU, UK, USA, Canada and ME.

CyberFOX

CyberFOX

CyberFOX is a global cybersecurity solutions provider focused on identity access management (IAM) for managed service providers (MSPs) and IT professionals.

Netsurit

Netsurit

Managed IT, Cloud, and Security Services. Netsurit is Your IT Innovation and Digital Transformation Accelerator.

Infinavate

Infinavate

Infinavate Fort CyberVault offers end-to-end services that comprehensively responds to the organization’s information security and privacy needs.

Ivolv Cybersecurity

Ivolv Cybersecurity

Ivolv is here to assist your organization in building effective protection and resilience against cyber attacks.