AI - Reshaping the Workplace

 

Much like the evolution of systems design, IT-enabled process change ebbs and flows over time. We see this in history as each technology revolution brings with it a refactoring of business operations.

With the rise of client/server computing in the 1980s, and the introduction of database servers and visual development tools like PowerBuilder, “business process re-engineering” became all the craze during the 1990s.

By 1993, 60 percent of the Fortune 500 developed IT systems to automate mundane tasks like insurance claims processing or AP invoice/purchase order reconciliation, channeling the mandate of technology-led business transformation in Michael Hammer’s infamous 1990 HBR article, “Don’t Automate, Obliterate.”

Twenty-odd years later, we’re about to see another “flow” of transformation thanks to resurgent interest in artificial intelligence and the emergence of the AI-powered business application. What’s different this time around is the transformation will be driven bottom up by rank-and-file employees, making it potentially more disruptive than any “flow” of process change that came before. What are AI-powered apps, and what do they have to do with business process re-engineering?

AI-powered apps are software capable of performing higher-order tasks associated with the work of educated office workers. With narrowly focused “brains” optimized to perform a particular task within a narrow domain, AI-powered apps can schedule your business meetings, answer common customer requests and notify you that your connecting flight is delayed by 20 minutes when you thought you had 5 minutes to sprint to the gate.

Outside the purview of IT, employees, teams and entire departments will champion process re-engineering efforts with AI-powered apps, whether they realize it or not. As each individual app eliminates a “task,” the employees who assemble their own “stack” of AI-powered apps will automate many of the mundane parts of their jobs. Teammates eager to be productive and stay competitive will fast follow, as will department managers who want to demonstrate techno-prowess and cost-cutting efforts to higher-ups.

In my own experience, x.ai’s “Amy,” the AI for scheduling business meetings, is totally addictive. You simply cc her on an email thread and she goes to work engaging with the recipient to find a date and optimal place to meet. I use it everyday, and couldn’t imagine my workday without her. It’s still in beta, but the other testers I speak with call it the closest thing to “magic” they’ve seen in years. Sell it for $5/month? $10/month? Either way, if Dropbox had a meteoric rise within organizations, just wait till x.ai releases publicly and busy execs, consultants and sales people purchase and expense access to “Amy.”
Amy may be the “a-ha” breakthrough application of the moment, but the formula will hold for AI-powered apps in other domains. 

We define AI-powered business applications as software in which the user experience is driven by AI. Today, that takes the form of voice (Apple Siri), text-based interfaces (x.ai’s Amy) or intelligent notifications (Google Now). Other examples of AI-driven UX like Google Search’s auto fill differ in that they do not automate a step within a workflow. Excluded are new-school applications for fraud management, data science or security analytics that leverage AI solely for back-end ops and/or require technical/IT admin chops to operate. We include developer services because they will enable the next wave of AI-powered business apps. In the chart, we’ve included current as well as soon-to-be entrants according to our understanding of those companies’ product roadmaps. This landscape is intended to serve as a complement to Shivon Zilis’s birds-eye view of AI startups. We welcome you to critique it in the comments sections of this post.

New Categories Will Emerge Over The Next Couple Of Years. In our initial sweep of the startup landscape, we’ve identified 10 app categories getting the AI treatment. This is just the tipping point. Startup activity will accelerate rapidly over the next two years as entrepreneurs identify new business processes to automate. Kevin Kelly of Wired states it with spirit: “The business plans of the next 10,000 startups are easy to forecast: Take X and add AI.” Expect AI-powered business applications to spring up across enterprise software categories that touch the end user.

In consequence, time-on-screen shrinks and software is capable of just working in the background. “Invisible software” is the highest realization of the AI-powered app, likely to distinguish winners from losers within each category segment. It will also be the most disruptive because it automates a job rather than just a task.

As startups flock into this space, and major software companies start placing bets, the effects will ripple across organizations. One breakthrough application at a time, human capital will start to shift from mundane tasks and transactions to higher-order, creative work. Along the way, we’ll see massive businesses built where software replaces or reshapes specific job functions. We’ll also see duds and false promises. I’m keeping a keen eye on carefully executed “invisible software” as the guiding light.
Techcrunch: http://tcrn.ch/1Vm7VXx

« Russian Scientists Create Cockroach Robo-Spy
DARPA - Tech to Protect the Internet of Things »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

SRI International

SRI International

SRI International is a research institute performing client-sponsored R&D in a broad range of study areas including computing and cybersecurity.

First National Technology Solutions (FNTS)

First National Technology Solutions (FNTS)

First National Technology Solutions is a leading provider of flexible, customized hosted and remote managed services including IT security and compliance.

Salt Communications

Salt Communications

Salt communications is a global leader in secure communications. Our bespoke platform is the secure communications solution that uniquely gives complete control to our customers.

AntemetA

AntemetA

AntemetA specializes in network infrastructure, security and cloud computing, helping companies transform their Information Systems.

Cyphercor

Cyphercor

Cyphercor is a leading smartphone and desktop-based two-factor authentication (2FA) provider.

Lexsynergy

Lexsynergy

Lexsynergy is a global domain name management and online brand protection company.

SterlingRisk Programs

SterlingRisk Programs

SterlingRisk’s Cyber practice brings experience working with a wide array of clients across a broad spectrum of industries.

SecSign Technologies

SecSign Technologies

SecSign Technologies delivers user authentication, messaging, file sharing, and file storage with next generation security for company networks, websites, platforms, and devices.

Diaplous Group

Diaplous Group

Diaplous Group is a leading Maritime Risk Management (MRM) provider, delivering specialized services to an ever-broadening portfolio of shipping, oil & gas, energy and construction industries.

BreachLock

BreachLock

Breachlock delivers the most comprehensive Penetration Testing as a Service (PtaaS) powered by Certified Hackers and AI.

BaXian Group

BaXian Group

BaXian AG is an international consulting company specializing in IT security, data analytics, risk management and compliance.

Alpha Omega Integration

Alpha Omega Integration

Alpha Omega creates new possibilities through intelligent end-to-end mission-focused government IT solutions.

Confidencial

Confidencial

Confidencial is a provider of solutions that help organizations secure their most sensitive information, regardless if that information exists inside or is shared outside the organization.

Sayers

Sayers

Sayers is best known for its ability to solve business challenges with IT solutions. Our areas of expertise include cloud, storage, virtualization, security, mobility and networking.

Lighthouse IT

Lighthouse IT

At Lighthouse IT, we are focused on delivering seamless and reliable services to unlock the value of technology for your business.

2021.AI

2021.AI

2021.AI serves the growing business need for full oversight and management of applied AI.