IBM’s Watson Takes On The IoT

IBM Watson Assistant is a new artificial intelligence assistant designed to work with autonomous and IoT devices.

IBM’s Watson has earned fame besting quiz show Jeopardy! champions. But now the artificial intelligence (AI) platform is rolling out Watson Assistant, designed to “help bridge the information and data sharing gap between people and things.”

Announced this morning at the IBM THINK 2018 conference in Las Vegas, an IBM spokesperson described Watson Assistant in an email as “an AI assistant for enterprises that can be accessed via voice or text interaction.

Watson Assistant is helping businesses transform their customer experiences by bringing together data on all the places and things consumers interact with daily.” Watson Assistant is designed to be embedded in a wide variety of things, from cars to conference rooms, retail stores to banks.

The idea, apparently, is that Watson Assistant’s AI capabilities can help Internet of Things (IoT) systems serve proactive and personalized experiences with enhanced data security. Initial applications center around travel and vehicles, with such customers as HARMAN, the Munich Airport, Royal Bank of Scotland, and Autodesk.

Maseratis and Recipes

In travel applications, the IBM spokesperson said Watson Assistant could eventually automatically communicate changes in your itinerary, including flight delays and other issues, to all your vendors and devices. For example, it could automatically program your destination into your rental car’s navigation system, and it preset smart appliances in your hotel room with your preferred music, temperature, and lighting.

Similarly, in vehicular applications Watson Assistant could ask you questions during your commute home, communicating with your smart home to determine what ingredients you had on hand to make dinner, and suggest appropriate recipes, and where to stop to pick up any missing essentials. It could also identify mechanical problems, such as a short in a fuel-pump relay, and automatically schedule a service appointment.

Other examples provided by IBM include working with Chameleon Technology, a UK-based designer and manufacturer of smart home displays, to leverage your calendar and local weather reports to work with your solar panels, home battery, and electric car to ensure that every component is always topped up and ready to go when you need it.

An encouraging AI/IoT vision, if not yet a reality

It’s a grand and compelling vision, but it’s still at the concept stage. While all of these capabilities might exist in the proof-of-concept stage, they’re still a long way from being ready for prime time.

It seems IBM is right to focus on the smarts needed to create compelling real-world use cases, combining multiple types of IoT devices from a variety of vendors.

Just as important is IBM highlight security and data protection. This kind of AI/IoT synergy creates a lot of personally identifiable data that could lead to unintended consequences if not properly protected.

The next step for IBM is to start pilot programs that actually do the things promised in these new developments, for at least some people in some situations. Only then will we find out how well these approaches work and whether they really make a difference for the people who use them.

NetworkWorld

You Might Also Read: 

One Insurer Plans To Replace Humans With AI:

Using Big Data To Improve Customer Experience & Results:

 

 

« Using GDPR Compliance To Excel At CRM
Fake News Will Lead To A Cyber War »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

KoolSpan

KoolSpan

KoolSpan’s security and privacy solutions address the growing threat of loss or theft of intellectual property, information, and proprietary assets.

IMS Networks

IMS Networks

IMS Networks specializes in the design and management of high criticality networks and telecoms services including network security and Managed Security Services.

I-Tracing

I-Tracing

I-TRACING are experts in IT security, specialized in legal compliance of information systems, security of information systems, and the collection of digital evidence and traces.

JPCERT/CC

JPCERT/CC

JPCERT/CC is the first Computer Security Incident Response Team (CSIRT) established in Japan.

CISPA Helmholtz Center for Information Security

CISPA Helmholtz Center for Information Security

The CISPA Helmholtz Center for Information Security is a German national Big Science Institution within the Helmholtz Association. Our research encompasses all aspects of Information Security.

Crosscheck Networks

Crosscheck Networks

Crosscheck products allow you to test your APIs across different protocols and message formats with functional automation, performance, and security testing capabilities.

Euro-Recycling

Euro-Recycling

Euro-Recycling is a leading UK provider of Secure On-Site Data Media Destruction Services.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

DisruptOps

DisruptOps

Built for today’s cloud-scale enterprises, DisruptOps’ Cloud Detection and Response platform automates assessment and remediation procedures of critical cloud security issues.

US Fleet Cyber Command (FLTCYBER)

US Fleet Cyber Command (FLTCYBER)

US Fleet Cyber Command is responsible for Navy information network operations, offensive and defensive cyberspace operations, space operations and signals intelligence.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Virtual Infosec Africa (VIA)

Virtual Infosec Africa (VIA)

Virtual InfoSec Africa (VIA) is a wholly-owned Ghanaian company specializing in information security and cybersecurity solutions and services.

Willyama Services

Willyama Services

Willyama Services is a certified Information Technology and Cybersecurity professional services business providing services to government and private sector clients.

Firesand

Firesand

Based in Milton Keynes, Firesand Ltd provides penetration testing services to improve your cyber security and protect your company against hackers.

SecurWeave

SecurWeave

SecurWeave's Configurable Hardware Enforced Safety and Security (CHESS) platform has been designed to meet the security and safety criticality needs of the evolving digital industry.

HLB System Solutions

HLB System Solutions

HLB System Solutions: Empowering businesses with proactive IT management, consulting, security, and cloud solutions. Seamless tech for growth!