IBM Watson AI Assistant Can Now Work With Autonomous Devices

IBM’s Watson has earned fame besting Jeopardy! champions. But now the artificial intelligence (AI) platform is rolling out Watson Assistant, designed to “help bridge the information and data sharing gap between people and things.”

Watson Assistant is designed to be embedded in a wide variety of things, from cars to conference rooms, retail stores to banks.

The idea, apparently, is that Watson Assistant’s AI capabilities can help Internet of Things (IoT) systems serve proactive and personalized experiences with enhanced data security. Initial applications center around travel and vehicles, with such customers as HARMAN, the Munich Airport, Royal Bank of Scotland, and Autodesk.

Maseratis and Recipes

In travel applications, the IBM spokesperson said Watson Assistant could eventually automatically communicate changes in your itinerary, including flight delays and other issues, to all your vendors and devices.

For example, it could automatically program your destination into your rental car’s navigation system, and it preset smart appliances in your hotel room with your preferred music, temperature, and lighting.

Similarly, in vehicular applications Watson Assistant could ask you questions during your commute home, communicating with your smart home to determine what ingredients you had on hand to make dinner, and suggest appropriate recipes, and where to stop to pick up any missing essentials. It could also identify mechanical problems, such as a short in a fuel-pump relay, and automatically schedule a service appointment.

Other examples provided by IBM include working with Chameleon Technology, a UK-based designer and manufacturer of smart home displays, to leverage your calendar and local weather reports to work with your solar panels, home battery, and electric car to ensure that every component is always topped up and ready to go when you need it.

An encouraging AI/IoT vision, if not yet a reality

It’s a grand and compelling vision, but it’s still at the concept stage. While all of these capabilities might exist in the proof-of-concept stage, they’re still a long way from being ready for prime time.

IBM highlight security and data protection. This kind of AI/IoT synergy creates a lot of personally identifiable data that could lead to unintended consequences if not properly protected.

The next step, for IBM or anyone, is to start pilot programs that actually do the things promised in these new developments, for at least some people in some situations. Only then will we find out how well these approaches work and whether they really make a difference for the people who use them.

Network World

You Might Also Read: 

IBM Watson's Goodbye To Privacy:

Artificial Intelligence Is Too Narrow:

 

« Regulation Might Actually Protect Facebook
Police Arrest Bank Hacker Who Stole $1B »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

One Identity

One Identity

One Identity delivers identity governance, access management, and privileged account management solutions that facilitate and secure your digital transformation.

HexaTrust

HexaTrust

The HEXATRUST club was founded by a group of French SMEs that are complementary players with expertise in information security systems, cybersecurity, cloud confidence and digital trust.

Cask Government Services

Cask Government Services

Cask Government Services focuses on program management, cybersecurity, logistics, business analysis and engineering services for Federal, State and Local Government.

Sphonic

Sphonic

Sphonic provides regulated institutions of any size a powerful compliance & risk platform to quickly and securely onboard new customers and manage ongoing AML and Fraud & Risk trends.

Fugue

Fugue

Fugue ensures cloud infrastructure stays in continuous compliance with enterprise security policies.

InterVision

InterVision

InterVision is a leading Strategic Services Provider, assisting businesses in driving value and gaining a competitive edge by helping IT Leaders solve the most crucial challenges they face.

Rigado

Rigado

Rigado's mission is to enable commercial IoT success by providing high-performance secure and scalable wireless edge connectivity and network infrastructure.

Munich Re

Munich Re

Munich Re is a leading global provider of reinsurance, primary insurance and insurance-related risk solutions including Cyber.

Akito

Akito

Akito was set up to become a point of reference in the ICT market for issues related to Security and in particular Cyber Security.

Acmetek Global Solutions

Acmetek Global Solutions

Acmetek is a Global Distributor and a Trusted Advisor of PKI /IOT & SSL Security Products and a Managed Services Company.

FortKnoxster

FortKnoxster

FortKnoxster is a cybersecurity company within the Crypto & FinTech space. Our encryption technologies are blockchain integrated.

Sourcepass

Sourcepass

Sourcepass is an IT consulting company that focuses on providing expert IT services, cloud computing solutions, cybersecurity services, website, and application development.

Aiden Technologies

Aiden Technologies

Aiden simplifies your IT process, giving you peace of mind and security by ensuring your computers get exactly the software they need and nothing else.

Corona IT Solutions

Corona IT Solutions

At Corona IT Solutions, our team of specialists in networking, wireless and VoIP are dedicated to providing proactive monitoring and management of your IT systems.

IEC Cyber Ltd

IEC Cyber Ltd

IEC Cyber provides Cyber security consulting services for OT systems, with emphasis on process systems aligned to IEC 61508 and IEC 61511. We are a preferred consulting firm for IEC 62443 services.

HIFENCE

HIFENCE

HIFENCE delivers cybersecurity and networking services that make your company safer and more secure. That’s all we do, so you can concentrate on all the things that you do best.