Enterprise IT Watch Blog

June 28, 2016  3:35 PM

Accentuating the positive vision of cognitive computing’s potential

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh
Artificial intelligence, Cognitive computing

Cognitive image via FreeImages

By James Kobielus (@jameskobielus)

Popular anxieties have lives of their own. For whatever reason, many people are unsettled by artificial intelligence. Perhaps this is due to the fact that AI—and more broadly, cognitive computing–has recently been evolving with breathtaking speed from a niche technology to a pervasive force in every aspect of our lives.

To buoy hopes and allay the fears that surround this technology, you need a balanced vision of its future impacts on society. Whatever vision you proclaim should accentuate the positive potential of cognitive computing while highlighting its risks and addressing how those might be mitigated. If you’re one of my regular readers, you know that I’m enthusiastic about the myriad valuable applications of cognitive computing systems such as IBM Watson. Rather that recapitulate my entire bibliography on this topic, I’ll just point you to this InfoWorld column from late last year.

No, I’m not nervous about the risk of cognitive computing running amok. However, I like to think that I’m no Pollyanna. I’m not under the illusion that humanity will always use cognitive computing or any other technology for good. In that regard, check some of my recent thinking on what you might call the “dark sides” of this technology. Among other discussions, I’ve dissected the potential of cognitive systems to be weaponized, addict emotionally vulnerable people, and inadvertently interpret non-existent visual patterns in blurry images.

I’m particularly leery of unhinged sci-fi-stoked fantasies that have no grounding in the reality of how cognitive computing is being used or is likely to be incorporated into our lives. That’s why I came down hard late last year on the “bogus bogeyman of the brainiac robot overlord,” which referred to the absurd notion that humanity is danger of being enslaved by superintelligent robots.

What exactly is freaking out the general public regarding the potential downsides of this technology? I’ll summarize the chief anxieties as follows, arranging these in a spectrum from mildly unsettling to thoroughly unhinged:

  • Helplessness: This is the belief that cognitive apps have already entrenched themselves in so many roles in our lives that it’s too late to put the genie and its potential adverse consequences back in the bottle.
  • Bewilderment: This is the feeling that cognitive technologies are so complex and evolving so fast that nobody, not even the top experts, understand how it all works or can rein it all in if it happens to spin out of control.
  • Deprecation: This is the sense that that organic human intelligence will no longer seem special as general-purpose cognitive computing becomes agile enough to solve problems in any sphere of knowledge.
  • Usurpation: This is the worry that cognitive-powered programs, capable of natural language communication and empathetic engagement, enable systems to simulate “human touch” with actual authentic humans in the loop.
  • Unemployment: This is the Luddite-grade anxiety that cognitive systems will automate jobs at every skill level and pay scale, resulting in massive layoffs as careers and industries disappear seemingly overnight.
  • Impersonation: This is science-fiction-fueled panic about the possibility of cognitive systems, aided and abetted by self-fabricating smart materials, spawning a new race of “Terminator”-like humanoids that can pass for human and replicate themselves at will.
  • Annihilation: This is the cartoonish nightmare about cognitive-powered robots conspiring among themselves to destroy us, or possibly under the direction of a criminal human mastermind.

Clearly, there’s a broad ecosystem of popular naysaying that surrounds cognitive computing. However, it would be inappropriate to polarize the climate of opinion into distinct “for” or “against” camps. Many people have mixed thoughts on the topic. Well-informed people know that the technology drives many positive innovations, but they also harbor justified misgivings about its potential abuse.

A perfect case in point is Elon Musk, who has not been shy in voicing his opinions regarding the potential downsides of AI in society. As the founder of Tesla and SpaceX, Musk is obviously passionate about advanced technologies, has a futuristic vision about their transformative potential, and puts ample money where his mouth is. In addition to running his transportation-related businesses, Musk has also recently funded a global research program with the vague goal of “keeping AI beneficial to humanity.”

Getting down to brass tacks, Musk also recently co-founded OpenAI, which describes itself as a “non-profit artificial intelligence research company [that has the goal of advancing] digital intelligence in the way that is most likely to benefit humanity as a whole, unconstrained by a need to generate financial return.” The group’s initial projects are focused on the technology’s use in household robots, intelligent personal advisors, and virtual mini-world gaming environments.

We should note that many people who harp on cognitive computing’s downsides also hope to make money from the technology’s incorporation into their companies’ products and services. That’s certainly the case with Musk, and for Bill Gates as well. And there’s nothing wrong with that.

If you’re passionate about cognitive computing, you’ll want to defend it against those who attack it on the basis of ill-informed, unbalanced, speculative, conspiratorial, and dystopic fantasies about its potential for misuse. That, in turn, demands redoubled vigilance at mythbusting the most unwarranted negative beliefs about these technologies.

If you’re on the same page as me on this matter, I urge you to check out this article I published last year that busts several prevailing myths about cognitive computing.

June 27, 2016  9:59 AM

TechTarget’s weekly roundup (6/20 – 6/27)

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh
Dell, EMC, privacy

Privacy image via FreeImages

Where do you stand on the Rule 41 changes? Check out the viewpoints of each side in this week’s roundup.

1. Activists, DOJ spar over Rule 41 changes to enhance FBI searchers – Peter Loshin (SearchSecurity)

EFF and privacy activists oppose Rule 41 changes, while the Department of Justice claims the changes do not alter ‘traditional protections’ under the Fourth Amendment.

2. Dell software biz jettisoned to advance EMC buy, users’ views mixed – Ed Scannell and Robert Gates (SearchDataCenter)

Handing off most of its software business to private equity firms is one more step toward Dell’s mega-purchase of EMC, and it gives users both clarity and concerns.

3. Potential PC replacements poised for enterprise prominence – Eddie Lockhart (SearchEnterpriseDesktop)

The PC has long been the top dog in the enterprise, but new, inexpensive devices such as the Raspberry Pi and Google’s Chromebook could threaten its title.

4. Pros, newbies seek new answers to cloud questions at Cloud Expo – Jason Sparapani (SearchCIO)

Consultants and job seekers joined practitioners at the Cloud Expo conference with cloud questions on topics ranging from container storage to the internet of things.

5. End of Dell Cloud Manager shows slow growth in multicloud – Trevor Jones (SearchCloudComputing)

Shuttering Dell Cloud Manager, an early piece of Dell’s move to trusted advisor in public cloud, underscores that the multicloud market has been more hype than reality — at least so far.

June 21, 2016  3:20 PM

Eliciting high-quality data science from non-traditional sources

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh
Data Science, Data scientist


Data image via FreeImages

By James Kobielus (@jameskobielus)

I’m a pragmatist. I like to think that you are what you do. So it you look, walk, and quack like a data scientist, you’re a data scientist, aren’t you?

This is not a metaphysical inquiry. As we encourage more people to acquire data science tools and skills, what point is there in distinguishing between data scientists and those who, for all intents and purposes, are of the same species, albeit without traditional track records, tools, and certifications?

This question occurred to me as I was reading about a new DARPA program called Data-Driven Discovery of Models (D3M). What it’s all about is enabling greater automation throughout the data-science lifecycle. The program recognizes that many of the most critical tasks will be performed by people who are new to this field and who may not fit the traditional profile of the professional data scientist. As stated by the agency, the program’s goal is to “develop algorithms and software to help overcome the data-science expertise gap by facilitating non-experts to construct complex empirical models through automation of large parts of the model-creation process.”

What’s exciting about this initiative is that it focuses on the imperative of multiplying the productivity of data-science teams. It seeks innovative approaches that use automated machine-learning algorithms to accelerate the upfront process of composing data-scientific models that are best suited to a particular analytic challenge. I like the fact that it focuses on giving subject matter experts the tools to specify the analytic challenge to be addressed, identify the data to be analyzed, and evaluate the findings from the machine-learning models that are automatically composed. I think it’s good that they’re building hooks into this environment that would allow established data scientists to evaluate the results of automated methods. And I’m encouraged that the program will also address automation of data-science initiatives that are underspecified in terms of the features to be modeled and the data sets to be analyzed.

If it realizes its objectives, DARPA’s program will enable everybody everywhere to enjoy the fruits of high-quality data-science tools. However, I take issue with the self-contradictory notion, as expressed by DARPA in its solicitation, that the subject matter experts who would use such a tool are “non-experts.” Fortunately, the agency expresses its intention more cogently at another point in the document when it states its aim of enabling “users with subject matter expertise but no data science background [to] create empirical models of real, complex processes.”

But that statement also suffers from a fundamental conceptual flaw. What DARPA spells out sounds very much like the core competency of an expert data scientist, rather than a “non-expert” dabbler. After all, the core competency of data scientists is the creation and testing of complex empirical models. No matter what their academic or professional background, data scientists specialize in identifying analytic problems to be solved; defining the principal features of that problem that can be statistically modeled; acquiring, evaluating, cleansing, and preparing data sources to be used in the modeling; and building, testing, evaluating, and refining the resultant models.

At another point in the solicitation, DARPA states that one of its program’s core objectives is to develop a framework for “formal definition of modeling problems and curation of automatically constructed models by users who are not data scientists.” But that’s a self-devouring distinction. If someone, of any background, is able to use such a tool to perform this entire lifecycle of data-science tasks, they are thereby a genuine data scientist. They are not merely some incorporeal “virtual data scientist” or robotic “automated data scientist” (to cite two marginalizing phrases that Network World uses in this article about the DARPA program). And they are not necessarily a “citizen data scientist,” in the “impassioned amateur” sense in which many construe that phrase.

When deciding whether a subject matter expert is also a bona fide data scientist, the fact that they performed these data-science functions in a largely tool-automated fashion, rather than through manual techniques, is irrelevant. DARPA’s discussion seems to be hung up on the bogus notion that “curation”—the core of their “non-data scientist” distinction–is something less than full-blooded data science. Essentially, the agency uses this term to refer to two distinct data-science lifecycle tasks: evaluating the relevance of data sources to a specific modeling problem, and assessing the predictive fit of a constructed model to that same problem. However, by anybody’s reckoning, these tasks are at the heart of professional data science. The former is central to data engineering, and the latter to data modeling.

But I should point out that, for all its scoping flaws, DARPA’s initiative is on the right track. Modeling automation initiatives such as this are driving the new era of democratized data science. If subject matter experts everywhere embrace self-service tools for high-quality data science, we will unlock a world of data-driven creativity and innovation.

June 20, 2016  3:08 PM

TechTarget’s weekly roundup (6/13 – 6/20)

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh
Docker, HPE, Linkedin, Machine learning, Microsoft

Social networking image via FreeImages

What can we expect from the Microsoft-LinkedIn deal? Check out all the details on the latest acquisition in this week’s roundup.

1. Microsoft-LinkedIn deal to shake up enterprise social networking – Brian Holak (SearchCIO)

The Microsoft-LinkedIn deal gives us a glimpse into a hyper-social business future. Will employees like what they see? Also in Searchlight: federal court upholds FCC net neutrality rules; big announcements from Apple’s WWDC.

2. Price isn’t everything: Google bets big on machine learning – Trevor Jones (SearchCloudComputing)

Google sees machine learning and deep analytics as the future of the cloud, as it seeks a strategy to stand out from the crowd beyond price.

3. HPE turns to Docker Engine to fuel server sales – Robert Gates (SearchDataCenter)

HPE has found a data center friend in Docker to ease container entry into the enterprise, but right now, it’s a step too far for some IT shops.

4. June Patch Tuesday addresses DNS, SMB Server vulnerabilities – Tayla Holman (SearchWindowsServer)

June’s batch of security bulletins included a number of updates to close Windows Server vulnerabilities, including a remote code execution flaw in DNS server.

5. LinkedIn could get UC features following Microsoft acquisition – Tracee Herbaugh (SearchUnifiedCommunications)

Analysts believe Microsoft will integrate UC features from Skype for Business into LinkedIn, opening up communications between users of the professional social network.

June 6, 2016  10:26 AM

TechTarget’s weekly roundup (5/30 – 6/6)

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh
Agile, DevOps, Mitel, Polycom, VMware NSX

Deal image via FreeImages

Do you think the Mitel-Polycom deal will go through? Check out the latest details in this week’s roundup.

1. Tech buyers watch fate of Mitel-Polycom deal after second offer made – Tracee Herbaugh (SearchUnifiedCommunications)

Tech buyers face benefits and drawbacks if a New York-based private equity group outbids Mitel for the video conferencing company Polycom.

2. Microsoft warns of rare ransomware worm – Michael Heller (SearchSecurity)

Microsoft warned users of a rare ransomware worm affecting older versions of Windows, but experts are wary of the recommended mitigation technique.

3. Users give thumbs-up to lower-end versions of VMware’s NSX – Ed Scannell (SearchServerVirtualization)

VMware looks to finally establish a foothold in corporate accounts with two low-end versions of NSX. But will the enterprise take the bait?

4. At Cloud Expo, get the latest thoughts on DevOps and Agile – Valerie Silverthorne (SearchSoftwareQuality)

Everyone wants to be Agile and do DevOps, but, of course, it’s harder than it seems. Find out what industry experts will be talking about at Cloud Expo.

5. Falling into the tech skills gap? Try a new recruiting tack – Jason Sparapani (SearchCIO)

Organizations forging into the digital future often come up short in a search for talent. But there are novel ways to close the tech skills gap, say execs at the MIT Sloan CIO Symposium.

May 31, 2016  10:29 AM

TechTarget’s weekly roundup (5/23 – 5/30)

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh
Cisco, Citrix, HPE

CEO image via FreeImages

What do you make of Citrix’s new look? Find out how IT professionals reacted in this week’s roundup.

1. Citrix gets a new look under CEO Kirill Tatarinov – Ramin Edmond (SearchVirtualDesktop)

Citrix is shouting its message from the rooftops that the company will focus on supporting cloud technology, Microsoft integrations and its core end-user computing products going forward.

2. Delivering composable infrastructure holds SDDC key for HPE – Ed Scannell and Robert Gates (SearchDataCenter)

Running hard to catch up with competitors, HPE gets ready to deliver a new approach to help users realize their long-held vision for a software-defined data center.

3. Should IT be looking at a Cisco alternative? – Eamon McCarthy Earls (SearchNetworking)

This week, bloggers debate whether it would be better if the industry found a Cisco alternative and reveal what one survey indicated will be the top IT priorities in 2016.

4. ‘Ingenious’ attack mixes memory deduplication with Rowhammer – Michael Heller (SearchSecurity)

Researchers demonstrated an exploit that combines rare attacks on memory deduplication and Rowhammer in order to allow an adversary access to read or write system memory.

5. Mitel’s Polycom acquisition could spawn cloud video, mobile UC services – Katherine Finnell (SearchUnifiedCommunications)

The UC buyer could see new products and services emerge after Mitel’s Polycom acquisition. Analysts envision cloud video services and mobile UC offerings.

May 23, 2016  9:32 AM

TechTarget’s weekly roundup (5/16 – 5/23)

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh
Linkedin, Panzura, Public Cloud, VMware

Security image via FreeImages

What can you learn from LinkedIn’s 2012 data breach? Check out several key lessons in this week’s roundup.

1. Lessons from LinkedIn data breach revelations – Warwick Ashford (ComputerWeekly)

There are several important lessons to be learned from revelations about LinkedIn’s 2012 data breach, say security experts.

2. Public cloud vendors jump on serverless computing bandwagon – Trevor Jones (SearchCloudComputing)

Serverless computing is all the rage with cloud providers, and tools such as AWS Lambda may change the way resources are utilized — though it’s still early days.

3. New CEO talks Panzura cloud controller, Nirvanix downfall – Sonia Lelii (SearchCloudStorage)

Nirvanix founder and new Panzura CEO Harr says his company is in the sweet spot for expanding the use of cloud storage and seeks to double business over the next year.

4. VMware customers express frustration, confusion – Ryan Lanigan (SearchVMware)

VMware continues to evolve as a company but there are still users who are frustrated and confused about their products.

5. 2016 GRC conference calendar for IT leaders – Mekhala Roy (SearchCompliance)

Attending a GRC conference can keep you up to speed on compliance regulations, risk management strategies and governance trends. Check out our list of upcoming GRC conferences.

May 16, 2016  11:08 AM

TechTarget’s weekly roundup (5/9 – 5/16)

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh
Dell, DevOps, EMC, Microsoft Patch Tuesday

Dell image via FreeImages

Do you think EMC and Dell have made progress on their pending merger? Find out what’s working in the companies’ favor in this week’s roundup.

1. ‘Astonishing how open’ EMC and Dell are about merger – Carol Sliwa (SearchStorage)

Evaluator Group’s Randy Kerns looks at how Dell and EMC said all the right things at the recent EMC World and notes a key factor working in the companies’ favor.

2. Enterprises offer own twist on DevOps adoption – Margie Semilof (SearchDataCenter)

For many companies, DevOps remains a long-term goal, and they are putting their own spin on how to best adopt it.

3. May Patch Tuesday brings critical updates for browsers, Microsoft Office – Tayla Holman (SearchWindowsServer)

Microsoft issued 16 security bulletins for May’s Patch Tuesday, including critical updates for its Internet Explorer and Edge browsers, as well as Microsoft Office.

4. Consumers still eye smart home technologies warily – Lauren Horwitz (SearchCRM)

Despite the ever-ballooning list of smart home products on the market, consumers still see smart home technologies with reticence and as unnecessary.

5. SAP and Apple join to link SAP HANA Cloud Platform with iOS – Jim O’Donnell (SearchSAP)

A new partnership between SAP and Apple for an SDK that enables developers to build iOS apps that link with SAP HANA Cloud Platform underwhelms some observers.

May 9, 2016  11:33 AM

TechTarget’s weekly roundup (5/2 – 5/9)

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh
Bitcoin, Business Intelligence, Citrix, Google

IT company image via FreeImages

What does the future hold for Citrix? Find out why the company’s landscape looks much clearer in this week’s roundup.

1. Future of Citrix looks clearer after turmoil – Gabe Knuth (SearchVirtualDesktop)

Heading into Citrix Synergy 2016, the company is in much better shape than it was last year. Citrix pared down its product portfolio, but it didn’t make any moves that will affect its end-user computing customers.

2. Google cloud security plays catch-up with AWS, Azure – Trevor Jones (SearchCloudComputing)

New Google security certifications are welcome, if belated, additions to the cloud platform, providing assurances to enterprise customers about protecting their data.

3. Craig Wright fails, again, to prove he’s the bitcoin creator – Michael Heller (SearchSecurity)

Craig Wright’s second attempt to prove he’s the bitcoin creator, Satoshi Nakamoto, was debunked after fooling the mainstream press, but his motives are still a mystery.

4. Survey: BI implementation remains top software priority – Ed Burns (SearchBusinessAnalytics)

You might think that in today’s big data world it’s all about advanced analytics, but Tech Target’s IT Priorities survey shows basic BI software tools are still a hot commodity.

5. OAUG head Dues talks tech plans, Oracle cloud applications – Jessica Sirkin (SearchOracle)

OAUG president Patricia Dues talks about the technology that has the OAUG’s attention and why it’s important to learn about the cloud even if you aren’t planning to use it.

May 1, 2016  7:42 PM

TechTarget’s weekly roundup (4/25 – 5/2)

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh
Apple, OpenStack, VMware

Apple image via FreeImages

Are you surprised by Apple’s declining earnings report? Find out why the company shouldn’t be worried in this week’s roundup.

1. One bad Apple earnings report doesn’t signal a mighty fall – Jason Sparapani (SearchCIO)

After 13 years of consistent growth, Apple earnings show a decline. Also in Searchlight: Amazon and Facebook revenues soar; ‘Snowden’ preview goes online.

2. Make the bed, enterprise OpenStack deployment is moving in – Robert Gates (SearchDataCenter)

A typical OpenStack deployment is still for ‘net new’ workloads outside of the world’s largest enterprises, but some big names have started to show off their use of OpenStack.

3. Clarity is key in improving VMware private cloud strategy – Ryan Lanigan (SearchVMware)

VMware has stressed its dedication to the private cloud. The SearchVMware Advisory Board weighs in on what VMware needs to do to take the next step.

4. Apple/FBI battle continues over iPhone vulnerabilities – Peter Loshin (SearchSecurity)

More fallout from the Apple/FBI conflict: The second iPhone suit was dropped; the FBI can’t provide details of a tool used to unlock the San Bernardino shooter’s phone.

5. Apple’s shift on WebRTC technology lacks details – Tracee Herbaugh (SearchUnifiedCommunications)

Apple has said it is developing WebRTC technology, but enterprises won’t see any benefits in online communication applications until the vendor installs the code in Safari.

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: