Immersive Analytics – Future Interactions of Hybrid and Augmented Reality

Immersive Analytics (IA) has made a lot of advancement and a great deal of research is thrusted towards it due to the vast opportunities that this technology has to offer in analytical reasoning, exploration of data and in decision making. IA is there for others to simplify the known data of a system in a more visual and elaborated tangible manner, making it more interactive and engaging, establishing a realistic feeling in an alternate reality.
A new multi-disciplinary creative exploration into the future of interaction technologies, Immersive Analytics (IA) converges information visualization, visual analytics, virtual and augmented reality and natural user interfaces. While zeroing on an enterprise software, businesses stress specifically on usability.
An end user looks for accessibility of accurate data, in appropriate format, through most conducive channel within the right context – mainly when it is about Business Intelligence (BI) and analytics application. Designers need to break the glass ceiling of usability and move past the conventional keyboard and mouse, and experiment with innovative modes that are more innate and natural such as the visual, vocal and hand movements.
There is an imbalance in the human analytical capabilities and in demand volumes, variations and pace, this calls us to explore more about the computing machines to delegate the tasks like transformation, representation, condense and convert the information into assimilated and actionable bytes, mainly focusing on the scalability of IA.
Organic Interactions
Of late, it is evidently clear from the boom of Alexa and Echo that voice modulation is the most inherent mode of communication for human operators. Similarly, the big question arises that is it possible to just ask the BI suite to pull up report only through speech? For building the GenY IA interface for analytical tools, the top priority is to have a first layer of input that is compatible in supporting multiple Natural Language (NL) modalities, whether voice, visual or hand gesture or a mix of Virtual reality (VR) and mixed reality (MR).
A user is most likely to use more than one IA modality at any given time which gives them more natural interactions to emulate the human-human communication characteristics, making the interaction more intuitive, easier and user friendly. It is then that the multi-modal interaction layer orchestrates a vivid programmed command after interpreting the end user IA inputs.
Once the user’s inputs are captured, the first layer analyzes the recorded information and preserves it to be readily construed by the next layer where they are decoded into executable commands and deliver tasks for analytical applications.
Intelligent Interface
For user experience (UX) to be more engaging the user interface (UI) is supposed to be agile to strike a gripping conversation. Primarily, the UI must be capable enough of seamlessly switch over from one major natural language modality to the other one. Task execution framework of IA is quite crucial for the overall UX to be seamless. For NL interface, the execution tasks are either based on dialogue, a two-way information exchange where the output is generated based on information received and oriented towards retrieval of canned response and report, and generates insights depending on precise queries.
For gesture-based interactions, IR sensors and cams seize the inputs and decode them into conventional action for AI same as cursor clicks and moves. For a better immersive analytics report, the output can be given in the form of VR/MR, in which case the end user can interact with the visual data for virtual UX.
Keeping in mind the predominant trend of end user expectations, the GenY IA interface for AI in all probabilities will come with in-built platform intelligence. Using the machine learning algorithms that are both through supervised and unsupervised methods, the system can enhance its responses based on queries, search-strings and through sentiment analysis – constantly adding to its capability environment.
Conclusion
Past decade has witnessed a swift advancement and wide adoption of immersive devices like the HoloLens and Oculus Rift that have heavy capabilities to expressively outspread the methodology of revolutionized visual analytics through critical 3D context data and developing a sense of virtual presence. The immersive virtual world has no boundary; while time and scale are pliable. VR is undoubtedly a viable and vital technology when implemented accurately to understand the remote and visual importance of each component of an asset. However, if the product is detached from its entire lifecycle, IA leaves the engineer and staff in a fix.
Data encryption standards must be bound by defined storage, dissemination and retrieval policies. Top it all, these standards must be backed by watertight governance framework that has periodic provision of audits, and strict regulations to strongly maintain the records of usage. The discussion is only a sneak peek into the future of IA interface for composite business tool.
References
http://sites.tcs.com/blogs/agile-business/speaking-analytics-reengineering-man-machine-interactions/
https://www.ibm.com/blogs/internet-of-things/immersive-analytics-digital-twin/
http://www.powermag.com/immersive-visual-environments-advanced-analytics-drive-operational-optimization/

Information Security: How critical is it?

As per the current trends, the news of some or the other organization falling victim of foul cyberattack led breach, resulting in exposure of sensitive information and confidential data is no more a rare scenario.
When servers were securely encrypted and hidden away behind the corporate firewalls and perimeter-deployed intrusion prevention controls, enterprises took the security aspect complacently and completely relied on their host information security system. However, unforeseen events and actions have exposed the inadequately architected information security controls.
Network-based protection has made the businesses information quite vulnerable to attacks while the migration to hybrid cloud and private domains is imminently executed. The ever-changing cyber-threat landscape poses a critical challenge of keeping data secure whilst the evolving complexity of cyber threats whether a virus attack, cyber-fraud or espionage is getting intricate and daunting.
Regardless of the growing complexity of operations and magnanimity of enterprise networks, organizations still continue to jeopardize the security and as per 2018 State of Application Delivery (SOAD) report as many as 36% of businesses have only 25% of their applications secured. This needs to change – mainly the approach towards the alarming issue of IT information security (infosec) as we discuss.
Guiding Principles of Infosec: CIA
Information security is designed to protect the enterprise assets – digital and non-digital in every format from spiteful intentions. The core objectives ensure that confidential and sensitive information is made accessible to only authorized party (confidential), ward off unsanctioned data modification (Integrity) and ensure the data availability to all the authorized party as and when required (availability), commonly referred to as the CIA triad, the combined features of infosec program.  Infosec is a blanket term that encompasses compliance, risk and protection from unauthorized access, usage, expose, disruption, changes or ruining of the network and the data. CIA triad is the basis to a robust information security system.
The big question is which one of these CIA attributes is the most important. The answer and approach are completely based on businesses to evaluate and align their mission, goals, services, compliance perimeter and SLAs. In all likelihood all the components of CIA take the priority and organizations in that case should ensure equal allocation of resources for seamless implementation of CIA.
For confidentiality of information the critical aspect is encryption to ensure only authorized personnel can access and decode the information. As an alternative, information can be kept confidential through enforced permission and access control to sensitive information to restrict the accessibility.
Integrity entails protecting the information from unauthorized personnel since information holds value only if it is accurate. Cryptography is the key to keep the information integral through securely hashing the original message. Availability is conducive and valued when the information is made accessible to the right people at the time they need, and backup is the key to it to ward off disruption and destruction.
Security Imminent to be part of Organizational Culture
Information technology has become an integral part of every aspect of the enterprise world. Hence, fostering data security for business assurance is indispensable. Infosec cannot happen in silos, it is a shared endeavor to be incorporated into the organizational culture. Be it, employees, business partners or other stakeholders, personnel with access to sensitive data should not view security as an added cost burden; rather, awareness about cyber-attacks and threats should be the top priority even for casual technology users in an organization
A minor security lapse can result in serious security risks that have the capability to jeopardize business operations and result in serious loss. Business enterprises must accept and proactively initiate security implementations. Though laws remain static for some time, technology is a dynamic agent. It keeps changing evolving and changing technology undoubtedly brings new types of threats. So, while laws on information security might not get updated with technological changes, companies must look beyond their legal requirements and take a robust security stance.
CMS IT Proposition
Enterprises encounter serious security breaches despite investing heavily in Information security infrastructure. Hackers shrewdly devise new ways to breach the Information security of enterprise networks, either from within the company or from outside.
Research suggests that nearly 90% of enterprise breaches could be prevented through proper monitoring. Having said so, setting up a dedicated Security Operations Centre (SOC) to monitor the data and network is an enormous challenge because of high set-up costs, demands significant time and efforts, and increasing shortage of skilled in-house experts. Our SOCs at Bangalore and Mumbai offices are robust with in-house skilled expertise to take care of all types of business information security needs.
CMS IT’s Integrated Information Security framework security program revolves around process-driven human intelligence managing best-in-class technologies with better business service SLAs and security SLAs. We automate the processes through our end-to-end Artificial Intelligence as well. We offer solutions to complex business enterprise network securities through consistent and efficient tailored infosec services to cater to the organizational security goals and requirements.
As one of India’s top IT services firms, CMS IT provides complete solutions to large corporations across all sectors, including banking, insurance, retail, telecom and manufacturing. We provide new, cost effective and cutting-edge IT infrastructure solutions that are reliable, resilient and responsive. With decades of experience CMS IT’s security operations center (SOC) model is progressive and designed to meet all the advanced cyber security.
Conclusion
Excessive connectivity, governance pressure and sky-rocketing customer expectations are all together having a major impact on the modus operandi of companies to proactively address the alarming risks to their network security from all quarters. Whether financial services or retail sector, digital transformation landscape is the key driver to all the applications. Cloud adoption has undeniably heightened the need to step up from the conventional security measures, to stay abreast of the rapid rise in users, applications, data and infrastructure.
In today’s sprawling global networking and digital world, App security contributes a major share in the reputation management. Businesses need to deliver services with higher speed, adaptive functionality with utmost security.
Reference
Cobb, S. (2018). The 5 IT security actions to take now based on 2018 Trends. Retrieved from https://www.welivesecurity.com/2018/04/04/5-security-actions-cyber-risks-trends/
Cotextis. (2018). What’s a Security Operations Centre (SOC) and why should I care? Retrieved from  https://www.contextis.com/blog/whats-security-operations-centre-soc-and-why-should-i-care
Durbin, S. (2018). The Top Five Global Cyber Security Threats for 2018. Retrieved from https://www.cso.com.au/article/632468/top-five-global-cyber-security-threats-2018

Bots, Applied AI: Are they the future?

Satya Nadella, CEO, Microsoft says “Bots are the new apps”.

A computer program designed to work on its own to collect information through internet and carry out the monotonous tasks are called bots, pretty much that can be summarized about bots for the common man. A chatbot is a computer program, a humanized service, fueled by complex math and algorithmcontrolled by rules that can be interacted with, via a chatting interface.

Dynamic interaction on internet at various websites is another potential place where bots are being used and positively influence the milieu.

Artificial Intelligence – Humans and Machines working together

AI is all about machines simulating the human intelligence. Cognitive Automation leverages the AI techniques that simulate human brain functioning, helping in complex processes towards decision making, task completion and achieving the goals. Automation has played a pivotal role in propelling this era of remarkable advancement to the next level.

Recently, a fortune 100 bank, $68 billion annual revenue and nearly 50,000 employees, improved their operational efficiencies through intelligent bots. Currently, they have deployed more than 2,000 bots, minimizing the cost by 30%, reduced time spent in handling complex processes by almost 50%, and achieved 100% error-free. Industry 4.0 in manufacturing is also primarily fueled by cognitive intelligence. Predictive analytics is being used to identify elements that can reduce production quality, causing subsequent failures.

The New Age of ITSM – What to Expect and How to Prepare

 

The contribution of ITSM towards business value is significant, and is slowly witnessing a resurgence with the adoption of exciting new technologies. This is good news, considering that ITSM was slowly finding itself being nudged to the sidelines. Adoption of Agile, DevOps, Cloud, Automation, Machine Learning (ML) and Artifical Intelligence (AI) has given ITSM greater relevance in addition to the contribution it has already been making towards operations. The multi-faceted demands of customers, goals of business expansion and the mandate to improve productivity have spurred this adoption of technologies to transform ITSM. Here is a peek at key technological developments on the ITSM front and what organizations need to do to be ready for it.