with cognitive business · – restrict the access to the data to specific (groups of) people,...

36
Mission Possible With cognitive Business Where digital business meets digital intelligence (and creates disruption) Geert-Jan de Koning Analytics Technical Lead, IBM Benelux May 11, 2017 © 2017 International Business Machines Corporation 1

Upload: others

Post on 13-Jul-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: With cognitive Business · – Restrict the access to the data to specific (groups of) people, using tools such as IBM Guardium & Qradar. Copy – Take a copy of the (sensitive) data

Mission PossibleWith cognitive Business

Where digital business meets digital intelligence

(and creates disruption)

Geert-Jan de Koning

Analytics Technical Lead, IBM Benelux

May 11, 2017© 2017 International Business Machines Corporation1

Page 2: With cognitive Business · – Restrict the access to the data to specific (groups of) people, using tools such as IBM Guardium & Qradar. Copy – Take a copy of the (sensitive) data

© 2016 International Business Machines Corporation2

Agenda and topics

Intro

AI and the real world

Disruption

Cognitive business

Examples

Data value

How to start

Page 3: With cognitive Business · – Restrict the access to the data to specific (groups of) people, using tools such as IBM Guardium & Qradar. Copy – Take a copy of the (sensitive) data

© 2016 International Business Machines Corporation3

Artificial Intelligence in Hollywood

A small test

Page 4: With cognitive Business · – Restrict the access to the data to specific (groups of) people, using tools such as IBM Guardium & Qradar. Copy – Take a copy of the (sensitive) data

© 2016 International Business Machines Corporation4

Artificial Intelligence in real life

Page 5: With cognitive Business · – Restrict the access to the data to specific (groups of) people, using tools such as IBM Guardium & Qradar. Copy – Take a copy of the (sensitive) data

© 2016 International Business Machines Corporation5

AI concerns and ethics

Page 6: With cognitive Business · – Restrict the access to the data to specific (groups of) people, using tools such as IBM Guardium & Qradar. Copy – Take a copy of the (sensitive) data

Digital businesses are

disrupting virtually every

industry and profession.

expect more

competitors

from outside

their industry

54% of CxOs

© 2016 International Business Machines Corporation6

Page 7: With cognitive Business · – Restrict the access to the data to specific (groups of) people, using tools such as IBM Guardium & Qradar. Copy – Take a copy of the (sensitive) data

Dramatic technology forces are behind

“creative disruption”

Digital commerce Cloud

The sharing economy

MobileIoT

BlockchainCognitive AI

Machine

learning

Data = THE

source of advantageOld intermediaries

no longer needed

Explosion of dataPervasiveInterconnectivity

34B connected devices in 2020 180 Zettabytes in 2025

Page 8: With cognitive Business · – Restrict the access to the data to specific (groups of) people, using tools such as IBM Guardium & Qradar. Copy – Take a copy of the (sensitive) data

Traditional IT market(Non Cloud)

Cloud IT

Cognitive

solutions

0.5

1.0

1.5

2.0

2.5

IBM Addressable Market ($T)

I90 I0 I10 I20

— IDC

— IDC

— IDC

— Gartner

Traditional IT

3-5% CAGR

New Markets

25% CAGR

75%of developers to embed

cognitive into apps by ‘18

Industry-focused cognitive/AI

top Investment by ‘20

55% of new

Apps cloud native by ‘19

Hybrid becomes

the infrastructure

foundation for next

move of apps

... transforming the IT industry

Page 9: With cognitive Business · – Restrict the access to the data to specific (groups of) people, using tools such as IBM Guardium & Qradar. Copy – Take a copy of the (sensitive) data

© 2016 International Business Machines Corporation9

3D “printing” propeller blade manufacturing.

RAM-LAB- On site

- Faster

- Repeatable

- Cheaper

- Embedded quality control

Page 10: With cognitive Business · – Restrict the access to the data to specific (groups of) people, using tools such as IBM Guardium & Qradar. Copy – Take a copy of the (sensitive) data

The next revolution: IBM emerges

Cloud

Cognitive

Industry

IBM’s next era

0%

1960 20001980 2016

100%

50%

Hardware and

systems management

Services

Cloud PlatformCognitive

Solutions Cloud and

cognitive-

led to be

half of

IBM...

...the other

half with it

embedded

Page 11: With cognitive Business · – Restrict the access to the data to specific (groups of) people, using tools such as IBM Guardium & Qradar. Copy – Take a copy of the (sensitive) data

Three disruptive forces are forcing leaders in government to

focus on three key areas …

Engage DecideDiscover

Increased demand for services

and citizen expectations

Placing greater pressures and

demands on and expectations for

public resources and services

requiring organizations to operate

smarter and more efficiently

Increased complexity

Challenging decision making

capabilities in navigating complex

operating and information

environments and increasing the

need for enhanced innovation

capacity to drive operational

improvements

Stagnant economic growth and

resource constraints

Challenging organizations to do more

with less and requiring them to better

leverage existing resources and

expertise while reducing instances of

fraud and error

Page 12: With cognitive Business · – Restrict the access to the data to specific (groups of) people, using tools such as IBM Guardium & Qradar. Copy – Take a copy of the (sensitive) data

Government organizations need to engage with citizens, discover

insights and make effective decisions to succeed

Engage DecideDiscover

Government CXOs actively

pursuing industry model

innovation2

Government CXOs that believe

citizens demand more

personalized experiences1

54% 59% 54%

Annual spend of U.S. Federal

Government3 …

… amount allocated based on basic

evidence3

$3 trillion

<1%Today In 3 years

Page 13: With cognitive Business · – Restrict the access to the data to specific (groups of) people, using tools such as IBM Guardium & Qradar. Copy – Take a copy of the (sensitive) data

Governments are faced with challenges pertaining to personalized

experience, insufficient skills and lack of effective decision making

EngageDecide

Government organizations

are weak in making cost

reduction decisions3

Government CXOs that believe

they’re not competent in providing

personalized citizen experience1

Key challenges of Government

CXO in pursuing disruptive

innovation2

Discover

58%53%

54%

55%

58% Insufficient skills

Lack of quality/ reliable data

Lack of analytical tools

Organizational complacency

67%

Page 14: With cognitive Business · – Restrict the access to the data to specific (groups of) people, using tools such as IBM Guardium & Qradar. Copy – Take a copy of the (sensitive) data

Data is growing fast- in volume, variety, and complexity –

traditional analytics solutions are not able to fully exploit its

value…

Sources: See speaker notes

Data is growing with time, but usability is

limited..

2.63 PBProjected volume of data stored on average by

in US Federal agencies in 20152,3

.5%

of data is produced a day by each cancer patient1

... because of the limits of traditional

analytics capabilities

Addresses predefined problems but cannot

adopt to new problem domain

Provides accurate and definitive answers but

cannot handle ambiguity or gray areas

Handles structured and unstructured

information with known semantics – thus

cannot make use of data from new and varied

sources

Interacts in formal digital means (e.g.,

commands, screens) with human – thus limits

the engagement of end user

Page 15: With cognitive Business · – Restrict the access to the data to specific (groups of) people, using tools such as IBM Guardium & Qradar. Copy – Take a copy of the (sensitive) data

Only 20% of data is visible to computers

80%

is invisible

Data Iceberg

© 2016 International Business Machines Corporation15

Page 16: With cognitive Business · – Restrict the access to the data to specific (groups of) people, using tools such as IBM Guardium & Qradar. Copy – Take a copy of the (sensitive) data

Structured and active Unstructured and dark

Data that’s coming

• Customer records

• Transactional systems

• Predictive models

• Institutional expertise

• Operational systems

• News

• Events

• Social media

• Weather

• Geospatial information

• Internet of Things (IoT)

• Sensory data

• Images

• Video

Data outside your firewallData you possess ++

Cognitive businesses can access and use all types of data.

© 2016 International Business Machines Corporation16

Page 17: With cognitive Business · – Restrict the access to the data to specific (groups of) people, using tools such as IBM Guardium & Qradar. Copy – Take a copy of the (sensitive) data

Data Assessment

The value of data goes down over time, while the risk of sensitive data being exposed goes up.

Almost 70% of your company data is ROT data

Use data assessment tools that can analyze what you have without moving the data from its original location

Page 18: With cognitive Business · – Restrict the access to the data to specific (groups of) people, using tools such as IBM Guardium & Qradar. Copy – Take a copy of the (sensitive) data

Shows the hits (in Blue to Red) of where sensitive data has been found in each source for further investigations.

In-Place Data Assessment

Gives an overview of what is there in the sources to enable further analysis to the data

Page 19: With cognitive Business · – Restrict the access to the data to specific (groups of) people, using tools such as IBM Guardium & Qradar. Copy – Take a copy of the (sensitive) data

19

Possible Actions following the Assessment ActivitiesDelete

– Delete or purge redundant, obsolete or trivial (ROT) data.

Quarantine

– Place sensitive data in a controlled place with limited access.

Move

– Move the data to a access controlled environment such as IBM Content Foundation.

Declare as a records

– Declare the data as a record so it cannot be changed and has only view access by specific (groups of) people and gets a retention period, using tools such as IBM Enterprise Records

Restrict access

– Restrict the access to the data to specific (groups of) people, using tools such as IBM Guardium & Qradar.

Copy

– Take a copy of the (sensitive) data and place it in a controlled environment.

Archive

– Move the data to a separate Read Only storage environment with specific access grants.

Monitor

– As long as the source is stays active, monitoring the source for new sensitive data is an continuous activity.

Page 20: With cognitive Business · – Restrict the access to the data to specific (groups of) people, using tools such as IBM Guardium & Qradar. Copy – Take a copy of the (sensitive) data

Cognitive systems are creating a new partnership

between humans and technology

Humans excel at

DILEMMAS

COMPASSION

DREAMING

ABSTRACTION

IMAGINATION

MORALS

GENERALIZATION

Cognitive Systemsexcel atCOMMON SENSE (but with many biases)

ELIMINATING BIASES

LOCATING KNOWLEDGE

PATTERN IDENTIFICATION

MACHINE LEARNING

NATURAL LANGUAGE PROCESSING AT SCALE

PROVIDING ENDLESS CAPACITY

© 2016 International Business Machines Corporation20

Page 21: With cognitive Business · – Restrict the access to the data to specific (groups of) people, using tools such as IBM Guardium & Qradar. Copy – Take a copy of the (sensitive) data

Cognitive computing complements traditional analytics by

creating a value continuum

Analytics Cognitive computing

Addresses predefined

problems

Addresses ambiguous

problems

Provides accurate and

definitive answers

Provides answers with a

margin of error

Handles information with

known semantics

Handles information without

explicitly knowing semantics

Interacts in formal digital

means (e.g. commands,

screens) with humans

Interacts in natural

language with humans

Page 22: With cognitive Business · – Restrict the access to the data to specific (groups of) people, using tools such as IBM Guardium & Qradar. Copy – Take a copy of the (sensitive) data

What would this look like in the real world?

© 2016 International Business Machines Corporation22

Page 23: With cognitive Business · – Restrict the access to the data to specific (groups of) people, using tools such as IBM Guardium & Qradar. Copy – Take a copy of the (sensitive) data

What is real now?

© 2016 International Business Machines Corporation23

Page 24: With cognitive Business · – Restrict the access to the data to specific (groups of) people, using tools such as IBM Guardium & Qradar. Copy – Take a copy of the (sensitive) data

A quick detour to the early years: 2011

Watson only knew “Q&A”

Watson Jeopardy

Q&A

© 2016 International Business Machines Corporation24

Page 25: With cognitive Business · – Restrict the access to the data to specific (groups of) people, using tools such as IBM Guardium & Qradar. Copy – Take a copy of the (sensitive) data

What happened to Watson after Jeopardy?

Commercialization

Cross-industry Applications

R&D

IBMResearch Project

(2006 – )

Watson for

Healthcare(Aug 2011 –)

Watson for Financial

Services(Mar 2012 – )

Expansion

Demonstration

Jeopardy!Grand Challenge

(Feb 2011)

Watson Industry Solutions(2012 – )

© 2016 International Business Machines Corporation25

Page 26: With cognitive Business · – Restrict the access to the data to specific (groups of) people, using tools such as IBM Guardium & Qradar. Copy – Take a copy of the (sensitive) data

26

Real-world applications for Watson

Healthcare / Life Sciences: Diagnostic

Assistance, Evidence-based, Collaborative

Medicine

Tech Support: Help-desk, Contact Centers,

Web Self-Service

Government: Improved Information

Sharing and Security

Enterprise Knowledge Management and

Business Intelligence, Regulatory

Compliance

Financial markets, insurance & banking

© 2016 International Business Machines Corporation26

Page 27: With cognitive Business · – Restrict the access to the data to specific (groups of) people, using tools such as IBM Guardium & Qradar. Copy – Take a copy of the (sensitive) data

© 2016 International Business Machines Corporation27

Page 28: With cognitive Business · – Restrict the access to the data to specific (groups of) people, using tools such as IBM Guardium & Qradar. Copy – Take a copy of the (sensitive) data

Health Deal: incl. IBM Watson

© 2016 International Business Machines Corporation28

Page 29: With cognitive Business · – Restrict the access to the data to specific (groups of) people, using tools such as IBM Guardium & Qradar. Copy – Take a copy of the (sensitive) data

Watson News explorer

© 2016 International Business Machines Corporation29

Page 30: With cognitive Business · – Restrict the access to the data to specific (groups of) people, using tools such as IBM Guardium & Qradar. Copy – Take a copy of the (sensitive) data

http://watson.ted.com/

© 2016 International Business Machines Corporation30

Page 31: With cognitive Business · – Restrict the access to the data to specific (groups of) people, using tools such as IBM Guardium & Qradar. Copy – Take a copy of the (sensitive) data

Watson applied to BI

© 2016 International Business Machines Corporation

http://www.watsonanalytics.com/

31

Page 32: With cognitive Business · – Restrict the access to the data to specific (groups of) people, using tools such as IBM Guardium & Qradar. Copy – Take a copy of the (sensitive) data

Watson services in Bluemix

© 2016 International Business Machines Corporation32

Page 33: With cognitive Business · – Restrict the access to the data to specific (groups of) people, using tools such as IBM Guardium & Qradar. Copy – Take a copy of the (sensitive) data

33 © 2016 International Business Machines Corporation

Where to start?The answer is in the data!

- Data Quality

- Data Governance

- Sensitive Data (GDPR!)

Watson has many faces

Think Big – Start Small – Fail Fast

Page 34: With cognitive Business · – Restrict the access to the data to specific (groups of) people, using tools such as IBM Guardium & Qradar. Copy – Take a copy of the (sensitive) data

Cognitive = IBM

© 2016 International Business Machines Corporation34

Page 35: With cognitive Business · – Restrict the access to the data to specific (groups of) people, using tools such as IBM Guardium & Qradar. Copy – Take a copy of the (sensitive) data

© 2016 International Business Machines Corporation

Resources:

Celia: https://www.youtube.com/watch?v=bMXPyKYY0u8

TED: http://watson.ted.com (TED ID/Password required)

News Explorer: http://news-explorer.mybluemix.net

BlueMix: www.ibm.com/WatsonDeveloperCloud

Watson Analytics: https://www.watsonanalytics.com

35

Page 36: With cognitive Business · – Restrict the access to the data to specific (groups of) people, using tools such as IBM Guardium & Qradar. Copy – Take a copy of the (sensitive) data

Geert-Jan de Koning

www.ibm.com/nl-nl

[email protected]© 2016 International Business Machines Corporation36