Remove tag risk-based-approach
article thumbnail

Getting ready for artificial general intelligence with examples

IBM Big Data Hub

It might answer questions about local culture and geography, even personalizing them based on the passenger’s interests. It might suggest a restaurant based on preferences and current popularity. Regardless, these are examples of narrow AI. Current AI advancements demonstrate impressive capabilities in specific areas.

article thumbnail

The most valuable AI use cases for business

IBM Big Data Hub

Voice-based queries use natural language processing (NLP) and sentiment analysis for speech recognition so their conversations can begin immediately. For example, Amazon reminds customers to reorder their most often-purchased products, and shows them related products or suggestions.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Thoughts on the Legal Technology Implications of Dynamic Communication Practices

eDiscovery Daily

E-discovery is a prime example of an area where legal technology/operations is seeing the challenges presented by legal professionals’ level of familiarity with computing options, particularly those technologies that form the dynamic changes in how professionals communicate. E-discovery is one example of this.

article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

Part 3 will discuss how to manage the various DT risks. This discussion will include methods, tools, and techniques such as using personae and identifying use cases that have high business value, while minimizing project risks. Finally, Part 3 will look to the future, will present next steps, and will discuss key takeaways.

article thumbnail

The Hacker Mind Podcast: Surviving Stalkerware

ForAllSecure

Some of those who bought the spyware were allegedly able to see live locations of the devices, view the targets emails, photos, web browsing history, text messages, video calls, etc. There are literally dozens of other examples. Yeah but aren't there examples of stalkerware that didn't require physical contact with the device.

article thumbnail

Autonomy CEO: Web 2.0 'under all the hype, there is something there.' | ZDNet

Collaboration 2.0

By Oliver Marks | June 30, 2008, 5:31pm PDT Summary An intriguing article by ‘meaning based computing’ company Autonomy’s CEO Mike Lynch in today’s Financial Times: Embracing the friend, taming the beast – Web 2.0 He is based in San Francisco. Hot Topics iPhone iPad Enterprise 2.0 Autonomy CEO: Web 2.0

Paper 40