IBM Watson's Goodbye To Privacy

IBM held an event in San Francisco recently to show off new capabilities in Watson, it’s artificial intelligence system that’s being made available to developers to let them build smarter, "cognitive" applications.

To set the futuristic tone, IBM invited Peter Diamandis, founder of the nonprofit X Prize Foundation, which humbly describes itself as "a catalyst for the benefit of humanity." To give you an idea of Diamandis' interests, he said he is currently "prospecting" asteroids that he plans to mine for resources. He put the value of one asteroid at $5.4 trillion.

But he was there to talk about Watson, and how humankind is producing so much data these days that we can no longer make sense of it all without artificial intelligence (AI). Watson and its ilk are needed to uncover patterns in mountains of information and make decisions we can no longer arrive at through traditional programming.

This isn’t big data it’s gargantuan data. Take, for example, images from new fleets of satellites that can see things as small as 50 centimeters across.

“You want to know what your competitors in China are doing? You can watch them,” said Diamandis. Want to predict what Best Buy’s earnings will be at the end of the quarter? Count the number of cars in its parking lots and the size of packages people are carrying out. "Well, you couldn't count them," he said, "but Watson could.”

It’s a fantasy, and yet not really. That data is starting to be collected, and IBM, along with rivals like Google and Microsoft, are building AI systems that will make that type of analysis possible. But the data gets closer to home than satellite images, and when it does there's little room for privacy.

“We’re heading towards a world of near perfect data,” Diamandis said, where “perfect” means everything that happens is recorded and available for someone to mine.

Self-driving cars, he notes, are constantly monitoring their surroundings, capturing image data at 250MB per second. “You’ll never have an accident and not know what happened,” he says.

Add to that an army of miniature image-snapping drones cruising the streets, and "you’ll never get pick-pocketed and not know who did it."

 “If you thought your privacy wasn't dead yet,” he concluded, “think again.”
If that doesn't sound thrilling, there's a trade-off for giving up all this data, a whole new world of convenience. And it’s already starting to emerge in the form of 100 applications that developers have built using Watson’s cognitive APIs.

One of them on show at the Watson event was a hotel concierge app like you've never seen.

The Ivy app from Go Moment uses Watson's natural language APIs to interpret the messages you type, and it's been loaded with everything there is to know about the hotel you're staying in and the surrounding area, including restaurants, theaters and other services. There are no more calls to the front desk and waiting an eternity for someone to show up at your room. Need tickets for a show and a beer and some towels by the pool and recommendations for dinner? Ask Ivy and it shall deliver. Watson's APIs basically allow any app developer to create their own version of Siri, with knowledge about any environment they load in.

Ivy will be available to 20 million hotel guests by the end of the year, according to Go Moment CEO Raj Singh. Hotels love it, he said, because it keeps guests happy and cuts labor costs. That's because it can field most questions itself, and those it can't it routes directly to the right department without tying up the front desk. "We automate two months of labor every day." he claimed.

Another Watson-powered service is WayBlazer, which is basically Expedia on steroids. The service lets you input searches using natural language -- "What's the best hotel for a relaxing extended weekend?" -- and spits out results based on a profile it builds over time. The data is culled from thousands of sources including social media, blogs, magazines and newspapers.
CEO Felix Laboy arranged a "girls weekend" for one of IBM's executives, which included spas, massages and plenty of shopping. It seemed out of touch with Silicon Valley's current obsession with diversity and equality, and the executive pointed out that she might have enjoyed some outdoor activities as well.

Marketers are another big target for Watson, and former Sun CEO Scott McNealy was there to show his service, WayIn. It uses Watson's image recognition capabilities to trawl photos on social media and make them searchable, even when they don't have tags describing their content.

"We'll ingest and tag 200 million pictures a day," he said, which can be filtered by demographic and other attributes. "You can't do this without Watson."

Computerworld

 

 

 

« Bitcoin Groups and Law Enforcement Unite
NATO’s role in the cyber domain is unclear. »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

National Crime Agency (NCA)

National Crime Agency (NCA)

The NCA's Cyber Crime Unit focuses on critical cyber incidents in the UK as well as longer-term activity against the criminals and the services on which they depend.

Centre for International Governance Innovation (CIGI)

Centre for International Governance Innovation (CIGI)

CIGI research areas include Conflict Management & Security which encompass cyber security and cyber warfare.

QA Systems

QA Systems

QA Systems provides software testing solutions for safety and business critical sectors and software safety and security standards.

Resilient Information Systems Security (RISS)

Resilient Information Systems Security (RISS)

RISS is a research group is in the Department of Computing at Imperial College London.

Athena Forensics

Athena Forensics

Athena Forensics is one of the UK's leading providers of Computer Forensics, Mobile Phone Forensics, Cell Site Analysis and Expert Witness Services.

Azeti Networks

Azeti Networks

Azeti Networks is a global provider of IoT technology to a variety of verticals including telecomms, oil/gas, manufacturing, finance and healthcare.

RiskCentric

RiskCentric

RiskCentric is a consultancy specializing in risk management and compliance.

The ai Corporation

The ai Corporation

The ai Enterprise Fraud Solution is an on-prem or cloud-based self-service, machine learning fraud detection and prevention tool set.

Iron Bow Technologies

Iron Bow Technologies

Iron Bow Technologies is a leading IT solution provider dedicated to successfully transforming technology investments into business capabilities for government, commercial and healthcare clients.

Securd

Securd

Securd takes opportunities away from your cyber adversaries. Cloud-delivered zero-trust DNS firewall and web filtering protection keep your business network and remote employees safe.

SecureDrives

SecureDrives

Passwordless Authentication & Encrypted Data Storage Solutions from SecureDrives. We are enabling organisations to work safely and securely, using technology driven solutions.

ABCsolutions

ABCsolutions

ABCsolutions is dedicated to assisting businesses and professionals achieve compliance with federal anti-money laundering regulations in an intelligent and pragmatic way.

Scybers

Scybers

Scybers are a global cybersecurity advisory and managed services company. With our deep expertise, we help our clients reduce their cyber risks with confidence.

Cranium

Cranium

Cranium are an international consultancy organisation specialised in privacy, security and data management.

US Department of State - Bureau of Cyberspace & Digital Policy

US Department of State - Bureau of Cyberspace & Digital Policy

The Bureau of Cyberspace and Digital Policy leads and coordinates the Department’s work on cyberspace and digital diplomacy to encourage responsible state behavior in cyberspace.

CyberSecureRIA

CyberSecureRIA

We founded CyberSecureRIA specifically to secure and support RIAs. We exist to secure SEC-registered RIAs, and keep them compliant with cybersecurity regulations.