fbpx Skip to content

Cognitive on Cloud

Transformation Infrastructure

By pwsadmin | September 26, 2020

Hybrid IT enables a composable infrastructure which describes a framework whose physical compute, storage, and network fabric resources are treated as services. Resources are logically pooled so that administrators need to physically configure hardware to support a specific software application, which describes the function of a composable architecture. This type of transformative infrastructure is foundational…

Essential Characteristics of Cloud Computing as Digital Transformation

By pwsadmin | September 25, 2020

A survey of 2,000 executives conducted by Cognizant in 2016 identified the top five ways digital transformations generate value:      Accelerating speed to market      Strengthening competitive positioning      Boosting revenue growth      Raising employee productivity      Expanding the ability to acquire, engage, and retain customers   Digital transformation is also a cultural change. Cloud Computing as Digital Transformation Since cloud…

Embrace Transformation

By pwsadmin | September 22, 2020

From a business perspective, differentiating business processes and quality customer service are central to overall success. Business leaders must therefore clearly identify and measure how information technology contributes to the value of every key business process. They must also know how to most cost effectively use IT when the task is merely the management of…

Computer Vision Advances Zero-Defect Manufacturing

By pwsadmin | July 25, 2020

by Kevin L. Jackson Electronics manufacturers operate in a challenging environment. It’s hard enough to keep up with the ever-accelerating rate of change in the industry. Now customers want increasingly specialized product variations in less time and of higher quality. Meeting this demand for increased product variation can seriously impact the bottom line. Such variability increases…

Real-Time Analytics Power the Roadway of the Future

By pwsadmin | July 25, 2020

By Kevin L. Jackson The complexities of citywide traffic are pushing the limits of existing transportation management systems. Outdated infrastructure is based on proprietary, single-purpose subsystems, making it costly to acquire, operate, and maintain. And current roadways are simply not prepared for the future of autonomous vehicles. Enter the SPaT Challenge, an initiative encouraging cities and…

Thriving on the Edge: Developing CSP Edge Computing Strategy

By pwsadmin | March 6, 2020

Communications Service Providers (CSPs) are facing significant business model challenges. Referred to generally as edge computing, the possibilities introduced by the blending of 5G networks and distributed cloud computing technologies are redefining how CSPs operate, partner, and drive revenue. A new Ericsson Digital whitepaper entitled, “Edge computing and deployment strategies for communication service providers,” addresses these challenges…

SourceConnecte! Marketplace With A Mission

By pwsadmin | March 6, 2020

Earlier this year, GC GlobalNet launched a new breed of B2B e-commerce sites. Curated by Kevin L. Jackson, SourceConnecte (with an “e”) went live with three strategic goals in mind: Efficiently leverage modern social media technologies to facilitate value-based interactions between enterprise buyers and vetted suppliers; Establish a protected interactive environment capable of supporting high-value B2B e-commerce negotiations…

Potential vs. Reality: Is Edge Computing Real?

By pwsadmin | January 19, 2020

Edge computing provides compute, storage, and networking resources close to devices generating traffic. Its benefits are based on an ability to provide new services capable of meeting stringent operational requirements by minimizing both data latency and the need for bandwidth. Based on Google trend data, searches for the term has also grown substantially over the…

Enabling Digital Transformation

By pwsadmin | December 22, 2019

Digital transformation integrates technology into all areas of an organization’s business or mission. Its fundamental purpose is to create and deliver innovative and industry-changing products and services to a global customer base. This outcome requires the seamless two-way flow of data and information between internal business processes and external processes that interact with customers, business…

The ThinkShield Story Part 1: The Challenge

By G C Network | October 24, 2019

The cybersecurity challenge seems to be growing daily. Threats are becoming more sophisticated, and attacks are becoming more destructive while the corporate world’s response seems to resemble a deer in headlights. Recent examples of this dangerous state of affairs include[1]: A data breach of a US Customs and Border Protection surveillance contractor that led to…

Photo credit: Shutterstock

According to the IBM Institute for Business Value the market will see a rapid adoption of initial cognitive systems. The most likely candidates have moved beyond descriptive and diagnostic, predictive and routine industry-specific capabilities. 70 percent of survey respondents are currently using advanced programmatic analytics in three or more departments. In fact, the widespread adoption of cognitive systems and artificial intelligence (AI) across various industries is expected to drive worldwide revenues from nearly US$8.0 billion in 2016 to more than US$47 billion in 2020.

The analyst firm IDC predictsthat the banking, retail, healthcare and discrete manufacturing industries will generate more than 50% of all worldwide cognitive/ AI revenues in 2016. Banking and retail will each deliver nearly US$1.5 billion, while healthcare and discrete manufacturing will deliver the greatest revenue growth over the 2016-2020 forecast period, with CAGRs of 69.3% and 61.4%, respectively. Education and process manufacturing will also experience significant growth over the forecast period.



Figure 1– Credit Cognitive Scale Inc.

So what can cognitive computing really do? Three amazing examples of this burgeoning computing model include:

·         DeepMind from Google that can mirror some of the brain’s short-term memory properties. This computer is built with a neural network capable of interacting with external memory. DeepMind can “remember” using this external memory and use it to understand new information and perform tasks beyond what it was programmed to do. The brain-like abilities of DeepMind mean that analysts can rely on commands and information, which the program can compare with past data queries and respond to without constant oversight.
·         IBM Watson which has a built-in natural language processor and hypothesis generator that it uses to perform evaluations and accomplish dynamic learning. This system is a lot more advanced than the digital assistants on our smartphones and allows users to ask questions in plain language, which Watson then translates into data language for querying.
·         The Qualcomm Zeroth Cognitive Computing Platform that relies on visual and auditory cognitive computing in to reflect human-like thinking and actions. A device running the platform can recognize objects, read handwriting, identify people and understand the overall context of a setting. Zero
th’s ability to replicate intuitive experiences provides a number of opportunities within sentiment analysis. With its ability to understand scenes and context, it can decipher how people are feeling based off facial expressions or voice stress levels.
This shift to cognitive computing will occur within the next 12 to 14 months for many organizations and cognitive era success requires data centric management culture, a common requisite for secure cloud computing. This similarity should not be surprising because both computing models:
  • Need robust and simplified data classification processes in order to more easily deliver industry and business model specific value;
  • Require the implementation of information technology security controls that are driven by data value and role based access control paradigms; and
  • Leverage software applications that should be developed using ISO 27034 which is a multi-part standard on specifying, designing/selecting and implementing information security controls through a set of processes integrated throughout an organization’s Systems Development Life Cycle/s (SDLC).
Companies that are leveraging cloud today must also prepare for the cognitive computing era. This blend of cloud and cognitive has, in fact, created a brand new application development model.

Referred to as Cognitive on cloud”, this model delivers cognitive services running in the cloud that are consumable via representational state transfer (REST) APIs. These services are available as part of platform-as-a-service (PaaS) offerings such as Bluemix and can be easily bound to an application while coding.

Using this approach, cognitive analytics such as voice (tone analyzer, speech-to-text) and video (face detection, visual recognition) capabilities enables quick analysis of petabytes of unstructured data. Developing cognitive applications to run on mobile devices has provided new insights which help organizations create totally new revenue streams. When selecting a cloud service provider however cognitive on cloud ROI requires more than just a total cost of ownership comparison. In addition to this basic analysis, an organization must consider which cloud is cognitive enabled at the Platform-as-a-Service (PaaS) layer. The convergence of cognitive computing and cloud is driving this cognitive-oriented digital economy and the potential return is seemingly unlimited.

This post was brought to you by IBM Global Technology Services. For more content like this, visit IT Biz Advisor.

Cloud Musings

( Thank you. If you enjoyed this article, get free updates by email or RSS – © Copyright Kevin L. Jackson 2016)

Follow me at https://Twitter.com/Kevin_Jackson
Posted in

G C Network

Leave a Comment





Crate

Purchase Crate

Shipping and discount codes are added at checkout.

Checkout
Scroll To Top