• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Cognitive Computing Is Knocking On The Door

    January 27, 2014 Dan Burger

    Powerful cognitive computer systems are on the doorstep. You have to decide whether or not to let them in. These are computers modeled on the human brain, so there’s the possibility they will come in whether you invite them or not.

    Sorry for the Fright Night introduction. This isn’t a Stanley Kubrick Space Odyssey. It’s IBM‘s annual innovation thriller titled Five in Five. If you’ve not heard of it before, it’s a made for media prediction of what will come to pass during the next five-year span. But before we get to that, let me introduce the star of the show: Watson, the almost human brain capable of inhuman brainpower. Watson is the face of cognitive computing. And, not coincidentally, cognitive computing is the theme of theme of the Five in Five forecast.

    IBM’s cognitive computing applied to the medical industry has been on display for several years, but here’s the latest. IBM’s five-year prediction is that doctors will be sequencing patients’ DNA in a day. But that’s just the beginning. It’s the doctors’ access to cloud-based systems that puts the cog in cognitive. Those systems will provide recommendations for improved health based on real-time clinical and research information. If you’ve yet to hear about knowledge conduits known as WatsonPaths, you will before long.

    You may have guessed digital education was going to make this list, but you may not have surmised the reason. The cloud-based cognitive systems to collect and analyze student data over an extended period of time lead teachers to the information that will shape personalized learning experiences for their students. The system will also connect the dots between students’ goals and interests with data on their learning styles so teachers can better match content and presentation method with student’ preferred way of learning.

    In the future, individual consideration trumps collective averages based on criteria such as age, gender, culture, and socio-economic scorecards.

    If you are already thinking about kissing your privacy good-bye, just pat down the hairs that are standing up on the back of your neck and relax. The escape from the law of averages through microscopically close individual scrutiny will also be protected. Say hello to your digital guardian. The DG knows you are a person of many habits. Stay habitual and DG stays at ease. When your patterns of activity look fishy, that’s a sign of fraud. DG calls the cops.

    Here’s one you probably did not see coming. The future of shopping is a return to the past. Well, sorta. Local retailers get back on the economic gravy train by knowing all about you as you walk into a store–just like the days when grandma went to the butcher and he knew what meat to wrap up before she said a word. But soon any retailer, anywhere and anytime will know what you want and how you want it. The best thing about this is you don’t have to worry about those Amazon delivery drones (as seen on CBS 60 Minutes) crashing into your windows or delivering your cuff links to the wrong zip code.

    The cities where we live are going to get smart, too. They will also be growing. More than half the world’s population will be living in cities by 2030. The benefits of new technologies such as crowdsourcing will provide city officials with immediate feedback on issues such as zoning changes or sales tax increases. IBM says it will increase response times to citizens, but that seems to me to be a personnel issue.

    You can read a lot more about the smarter future by visiting this IBM website.

    RELATED STORIES

    Watson Apps Ready To Change The World

    Watson’s Prodigy Leads Power Systems Into The Cognitive Era

    IBM, Nuance, and Universities to Commercialize Watson for Medicine

    Humans Fight, But Watson’s Chips Beat Quiz Champs

    Watson Gets Schooled By College Students And Professors



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    UCG Technologies

    CYBER-ATTACKS ON THE RISE. PROTECT WITH THE TRIPLE PLAY.

    COVID-19 has not only caused a global pandemic, but has sparked a “cyber pandemic” as well.

    “Cybersecurity experts predict that in 2021, there will be a cyber-attack incident every 11 seconds. This is nearly twice what it was in 2019 (every 19 seconds), and four times the rate five years ago (every 40 seconds in 2016). It is expected that cybercrime will cost the global economy $6.1 trillion annually, making it the third-largest economy in the world, right behind those of the United States and China.”1

    Protecting an organization’s data is not a single-faceted approach, and companies need to do everything they can to both proactively prevent an attempted attack and reactively respond to a successful attack.

    UCG Technologies’ VAULT400 subscription defends IBM i and Intel systems against cyber-attacks through comprehensive protection with the Triple Play Protection – Cloud Backup, DRaaS, & Enterprise Cybersecurity Training.

    Cyber-attacks become more sophisticated every day. The dramatic rise of the remote workforce has accelerated this trend as cyber criminals aggressively target company employees with online social engineering attacks. It is crucial that employees have proper training on what NOT to click on. Cyber threats and social engineering are constantly evolving and UCG’s Enterprise Cybersecurity Training (powered by KnowBe4) is designed to educate employees on the current cutting-edge cyber-attacks and how to reduce and eliminate them.

    A company is only as strong as its weakest link and prevention is just part of the story. Organizations need to have a quick response and actionable plan to implement should their data become compromised. This is the role of cloud backup and disaster-recovery-as-a-service (DRaaS).

    Data is a company’s most valuable asset. UCG’s VAULT400 Cloud Backup provides 256-bit encrypted backups to two (2) remote locations for safe retrieval should a cyber-attack occur. This is a necessary component of any protection strategy. Whether a single click on a malicious link brings down the Windows environment or an infected SQL server feeds the IBM i, once the data is compromised, there is no going back unless you have your data readily available.

    Recovery is not a trivial task, especially when you factor in the time sensitive nature of restoring from an active attack. This leads to the third play of the Triple Play Protection – DRaaS.  Companies have myriad concerns once an attack is realized and a managed service disaster recovery allows employees to keep focus on running the business in a crisis state.

    The combination of training employees with secure backup and disaster recovery offers companies the best chance at avoiding financial disruption in an age of stronger, more frequent cyber-attacks.

    Reach out to UCG Technologies to discuss your company’s security needs and develop a data protection plan that fits you best.

    ucgtechnologies.com/triple-play

     800.211.8798 | info@ucgtechnologies.com

     

    1. https://theconversation.com/cyberattacks-are-on-the-rise-amid-work-from-home-how-to-protect-your-business-151268

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Attunity Buys Hayes for SAP Data Chops The Case Of The Late Night FSM Explorer

    Leave a Reply Cancel reply

Volume 24, Number 3 -- January 27, 2014
THIS ISSUE SPONSORED BY:

ProData Computer Services
SEQUEL Software
Profound Logic Software
System i Developer
Shield Advanced Solutions

Table of Contents

  • What The System x Selloff Means To IBM i Shops
  • RPG OA: Open Opportunity, Open To Interpretation
  • Ricoh Gets Into MSP Business With mindSHIFT Buy
  • As I See It: MLK And The NSA
  • Power Systems Sales Power Down In The Fourth Quarter
  • Reader Feedback: Finding The i In The Power Ecosystem And Strategy
  • IBM Licenses Power8 Chips To Chinese Startup
  • Cognitive Computing Is Knocking On The Door
  • OCEAN User Group Milestone: 25 Years of Educational Endurance
  • CIOs To Feel The Pinch Again In 2014

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • We Want IBM i On The Future Power E1050
  • Thoroughly Modern: Running CA 2E Applications? It’s Time To Modernize The UI
  • Guru: SELECT INTO And Arrays
  • Clearlake Re-Acquires Precisely In $3.5 Billion Deal
  • Ansible Automation Story Gets Better on IBM i
  • Why Open Source Is Critical for Digital Transformation
  • mrc Refreshes IBM i Low-Code Dev Tool
  • Unit Testing Automation Hits Shift Left Instead of Ctrl-Alt-Delete Cash
  • Four Hundred Monitor, March 3
  • IBM i PTF Guide, Volume 23, Number 9

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2021 IT Jungle

loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.