Remove tag risk-based-approach
article thumbnail

The most valuable AI use cases for business

IBM Big Data Hub

Voice-based queries use natural language processing (NLP) and sentiment analysis for speech recognition so their conversations can begin immediately. Generative AI can produce high-quality text, images and other content based on the data used for training. Humanize HR AI can attract, develop and retain a skills-first workforce.

article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

Part 3 will discuss how to manage the various DT risks. This discussion will include methods, tools, and techniques such as using personae and identifying use cases that have high business value, while minimizing project risks. Finally, Part 3 will look to the future, will present next steps, and will discuss key takeaways.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Surviving Stalkerware

ForAllSecure

Cherne: The name of this talk at Black Hat this year is a “Survivor-centric, Trauma-informed Approach to Stalkerware.” What role does technology play in facilitating intimate partner abuse? What role might the security industry have in identifying or even stopping it? Vamosi: Ever get the feeling that someone is watching you.

article thumbnail

Autonomy CEO: Web 2.0 'under all the hype, there is something there.' | ZDNet

Collaboration 2.0

By Oliver Marks | June 30, 2008, 5:31pm PDT Summary An intriguing article by ‘meaning based computing’ company Autonomy’s CEO Mike Lynch in today’s Financial Times: Embracing the friend, taming the beast – Web 2.0 He is based in San Francisco. Hot Topics iPhone iPad Enterprise 2.0 Autonomy CEO: Web 2.0

Paper 40