Knowing Cognitive Computing

Cognitive computing is the tech industry’s latest ‘it’ thing. Not just within the Big Data world, but also outside that realm.

The virtues and drawbacks of cognitive computing are being discussed in mainstream television, newspapers, magazines and blogs, with questions like: What will it bring, what will be the effect on our jobs, and how we make decisions.

But what is cognitive computing and how can it be used in the organization? “Cognitive computing offers fundamental differences in how systems are built and interact with humans. Cognitive-based systems, such as IBM Watson, are able to build knowledge and learn, understand natural language, and reason and interact more naturally with human beings than traditional systems.”

What will you do with cognitive computing?

What can you do with cognitive computing? Or better: what will you do with cognitive computing?

Let me give two examples of how companies are using IBM Watson’s cognitive capabilities:

eyeQ specializes in digital content presentation at the point of sale; they use Watson to help customers make onsite product selection decisions. Their recommendations are based on analysis of the shoppers’ age, gender, and personality based on their Twitter feed.

Sellpoints (noticed) that 69% of consumers use search engines to make purchase decisions, but they drop off rapidly with each additional step (click) in the process. By searching on intent rather than simply by keyword matching, they reduce the number of steps and thus increase sales.

In addition to the above, IBM has put Watson to use for oncology, or general health, where it helps doctors diagnose patients and propose treatment plans. It will in the near future help lawyers find applicable texts and jurisdiction for their cases. It can help you improve your customer engagements with automated self-service Question-and-Answer applications.

All these and other applications take unstructured documents, websites, blog posts, books and so on as their source base of knowledge, or corpus.

This implies that knowledge is captured from all sorts of documents in an orderly manner, and that the knowledge base should be complete, or as complete, as can be. That’s one of the reasons that cognitive products find their first use in sectors where completeness of information is necessary to be compliant. And knowledge is mostly recorded in documents. Medicine and law are good examples of these kind of sectors.

Based on this corpus of knowledge, and the processing power to know and interpret all the information at hand, Watson and other cognitive systems can give you more complete and relevant answers than a human being, or through discovery by any advanced search engine, 24/7, and almost anywhere, with an Internet connection.

At this moment, oncologists rate computer expertise between an “assistant” and a “fellow expert”. But as IBM Watson learns on the job, these ratings will improve.

Better decisions

Computers can make increasingly better decisions, often even better than humans. But, will the person allow that? According to research by the Dutch company Motivaction 75 percent want to stay in control, 20 percent will occasionally have computers decide some things and only 5 percent would leave all decisions to computers.

Only when we acknowledge that humans are fallible and cannot, by nature, know everything, we can start to benefit from this new type of computing. Experts and professionals know they don’t know everything and are struggling to get to know what they don’t know:

“The professionals don’t know what they need to know. For instance, even attorneys that specialize don’t know the majority of the laws that define their specialty, let alone all of them. At the core of the IBM Watson effort and its general analytics push is to fix that problem. The time is coming when any professional that doesn’t have access to, and knowhow to use a tool like Watson will have inadequate skills to gain employment in the developed world.”

But first, you have to be aware of the value of this knowledge for your organization. That this knowledge is constantly changing and you and your employees have to learn constantly to keep up; at the same time being aware that you still don’t know enough. When your organization is focused on adding value based on knowledge, cognitive computing will give you a competitive edge.

You don’t have to be a research institute to work with knowledge. When you’re a retailer, cognitive computing will help you understand and communicate with your customers. In oil and gas exploration, it helps companies decide where to drill. It can assist lawyers in building legal arguments and police detectives in solving cold cases. Almost all organizations today use knowledge. Using knowledge from unstructured sources in and outside the organization will open new opportunities.

Cognitive computing can provide you with an unparalleled opportunity to leverage information and learning, to both grow your profits and provide value added services.

The question is not what can cognitive computing do, but rather how will you put cognitive computing to work for you.

Information-Management: http://bit.ly/1UQlLwY

« CIA Mission To Kidnap Edward Snowden
Intelligence Agencies Want To Target Surveillance Programs »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Information-Technology Promotion Agency (IPA) - Japan

Information-Technology Promotion Agency (IPA) - Japan

IPA is an implementing agency in Japan with a role to address Information Security, IT Systems Reliability and IT Resource Development.

Digital Guardian

Digital Guardian

Digital Guardian is a next generation data protection platform designed to stop data theft.

Subex

Subex

Subex leverages its award-winning telecom analytics solutions in areas such as Revenue Assurance, Fraud Management, Asset Assurance and Partner Management, and IoT Security.

Assured Enterprises

Assured Enterprises

Assured Enterprises provides comprehensive cyber risk identification, management and mitigation across all platforms.

Database Cyber Security Guard

Database Cyber Security Guard

Database Cyber Security Guard (aka Don't Be Breached) informs Security Professionals and DBAs of Zero Day, Ransomware and Data Breach attacks within milli-seconds

AnChain.AI

AnChain.AI

AnChain.AI's analytics platform proactively protects crypto assets by providing proprietary artificial intelligence, knowledge graphs, and threat intelligence on blockchain transactions.

Attack Research

Attack Research

We go far beyond standard tools and scripted tests. Find out if your network or technology can stand real-world and dedicated attackers.

Wipe-Global

Wipe-Global

Wipe-Global is specialized in data erasure with an international established service partner network.

CyberMDX

CyberMDX

CyberMDX delivers proactive security built for hospital devices. 360° visibility, insight, and protection for all connected hospital technologies.

Spin Technology

Spin Technology

SpinOne is a SaaS data protection platform designed to monitor, secure, and back up your G Suite and O365 data, improve compliance, and reduce IT costs.

Visory

Visory

Great businesses depend on great technology. We make sure our clients go to market with enterprise-level technology and world-class security for their data and infrastructure.

ActiveFence

ActiveFence

ActiveFence enables Trust & Safety teams to be proactive about online integrity so they can keep their users safe from online harm – across content formats, languages, and abuse areas.

Bestman Solutions

Bestman Solutions

As a specialist cyber security practice, we believe that people are an organisation’s most valuable asset. Success depends on hiring the right people, and this is where we come in.

ReformIT

ReformIT

ReformIT is a Managed IT Service and Security provider with many years experience helping companies find the right IT solutions to meet the needs of their businesses.

Lithuanian Cyber Command (LTCYBERCOM)

Lithuanian Cyber Command (LTCYBERCOM)

The Lithuanian Cyber Command is responsible for planning and execution of operations in cyberspace and installation of strategic and operational communications and information systems.

Black Breach

Black Breach

Black Breach experts protect your organization from cyber threats with military-grade AI-tooled cybersecurity solutions.