<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>software applications Archives - Artificial Intelligence</title>
	<atom:link href="https://www.aiuniverse.xyz/tag/software-applications/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.aiuniverse.xyz/tag/software-applications/</link>
	<description>Exploring the universe of Intelligence</description>
	<lastBuildDate>Fri, 27 Jul 2018 06:00:21 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>
	<item>
		<title>New Deep Learning Strategy Could Enhance Computer Vision</title>
		<link>https://www.aiuniverse.xyz/new-deep-learning-strategy-could-enhance-computer-vision/</link>
					<comments>https://www.aiuniverse.xyz/new-deep-learning-strategy-could-enhance-computer-vision/#comments</comments>
		
		<dc:creator><![CDATA[aiuniverse]]></dc:creator>
		<pubDate>Fri, 27 Jul 2018 06:00:21 +0000</pubDate>
				<category><![CDATA[Artificial Intelligence]]></category>
		<category><![CDATA[Deep Learning]]></category>
		<category><![CDATA[deep learning]]></category>
		<category><![CDATA[deep learning algorithms]]></category>
		<category><![CDATA[smartphone]]></category>
		<category><![CDATA[software applications]]></category>
		<category><![CDATA[visual content]]></category>
		<guid isPermaLink="false">http://www.aiuniverse.xyz/?p=2668</guid>

					<description><![CDATA[<p>Source &#8211; edgylabs.com A deep learning system takes textual hints from the context of images to describe them without the need for prior human annotations. Since its humble beginnings at the turn of the millennium, deep learning, as both a scientific discipline and an industry, has come a long way. From smartphone assistants to pattern recognition software, <a class="read-more-link" href="https://www.aiuniverse.xyz/new-deep-learning-strategy-could-enhance-computer-vision/">Read More</a></p>
<p>The post <a href="https://www.aiuniverse.xyz/new-deep-learning-strategy-could-enhance-computer-vision/">New Deep Learning Strategy Could Enhance Computer Vision</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Source &#8211; edgylabs.com</p>
<p><i>A deep learning system takes textual hints from the context of images to describe them without the need for prior human annotations.</i></p>
<p>Since its humble beginnings at the turn of the millennium,<b> deep learning</b>, as both a scientific discipline and an industry, has come a long way.</p>
<p>From smartphone assistants to pattern recognition software, security solutions, and other applications, deep learning is becoming a multi-billion dollar business poised for great growth over the few next years.</p>
<p>However, for <b>deep learning agents</b> to reach their full potential, they have to “learn” how to learn on their own.</p>
<p>Herein lies the whole difference between <b>supervised </b>and <b>unsupervised deep learning.</b></p>
<h2>Self-Supervised Deep Learning</h2>
<p>The power and appeal of deep learning is all about their ability to recognize different types of patterns like faces, voices, objects, images, and codes.</p>
<p>AI software doesn’t understand what these things really are, and all they see is digital data, and they’re pretty good at that.</p>
<p>The great <b>computer vision</b> capability of deep learning algorithms enable them to tell these things apart, categorize, and classify them.</p>
<p>To do so, however, this software needs to be supervised.</p>
<p>They require human manual input in the form of annotations to guide them before they generalize and build on what they learned into new, similar situations.</p>
<p>Building and labeling large datasets is a complicated and time-consuming task.</p>
<p><b>Unsupervised machines</b> will be completely autonomous as all they need is data taken directly from their environment. From there, they would take the information to make predictions and yield the expected results.</p>
<p>To design unsupervised, or <b>self-supervised deep learning </b>systems, computer scientists take inspirations from how human intelligence works.</p>
<p>Now, an international team of computer vision scientists has devised a method to enable deep learning software to learn the visual features of images without the need for annotated examples.</p>
<p>Researchers from <b>Carnegie Mellon University</b> (U.S.), <b>Universitat Autonoma de Barcelona</b> (Spain), and <b>the International Institute of Information Technology</b>(India), worked on the study,</p>
<h3>Unsupervised Computer Vision Algorithms, it’s a Matter of Semantics</h3>
<p>In the study, the team built computational models that use textual information about images found on websites, like Wikipedia, and linked them to the visual features of these images.</p>
<p><i>“We aim to give computers the capability to read and understand textual information in any type of image in the real world,”</i> said Dimosthenis Karatzas, a research team member.</p>
<p>In the next step, researchers used the models to train deep learning algorithms to pick adequate visual features that textually describe images.</p>
<p>Instead of labeled information about the content of a particular image, the algorithm takes non-visual cues from the semantic textual information found around the image.</p>
<p><i>“Our experiments demonstrate state-of-the-art performance in image classification, object detection, and multi-modal retrieval compared to recent self-supervised or naturally-supervised approaches,” </i>wrote researchers in the paper.</p>
<p>This is not a fully unsupervised system as algorithms still need models to train on, but the technique shows that deep learning algorithms can tap into the internet to enhance their unsupervised learning abilities.</p>
<p><i>“We will continue our work on the joint-embedding of textual and visual information,” </i>said Karatzas.<i> “looking for novel ways to perform semantic retrieval by tapping on noisy information available in the Web and Social Media.”</i></p>
<p>The post <a href="https://www.aiuniverse.xyz/new-deep-learning-strategy-could-enhance-computer-vision/">New Deep Learning Strategy Could Enhance Computer Vision</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.aiuniverse.xyz/new-deep-learning-strategy-could-enhance-computer-vision/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>Security in the world of microservices</title>
		<link>https://www.aiuniverse.xyz/security-in-the-world-of-microservices/</link>
					<comments>https://www.aiuniverse.xyz/security-in-the-world-of-microservices/#comments</comments>
		
		<dc:creator><![CDATA[aiuniverse]]></dc:creator>
		<pubDate>Sat, 25 Nov 2017 05:41:11 +0000</pubDate>
				<category><![CDATA[Microservices]]></category>
		<category><![CDATA[applications Security]]></category>
		<category><![CDATA[Microservices Security]]></category>
		<category><![CDATA[software applications]]></category>
		<guid isPermaLink="false">http://www.aiuniverse.xyz/?p=1771</guid>

					<description><![CDATA[<p>Source &#8211; itproportal.com In the world of microservices, the goal is to have a small piece of software that performs a well-defined set of tasks. Microservices are software applications that are self-contained. They are small, independently deployable modular services that run a unique process and communicate through a well-defined, lightweight mechanism to serve a specific goal. <a class="read-more-link" href="https://www.aiuniverse.xyz/security-in-the-world-of-microservices/">Read More</a></p>
<p>The post <a href="https://www.aiuniverse.xyz/security-in-the-world-of-microservices/">Security in the world of microservices</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Source &#8211; <strong>itproportal.com</strong></p>
<p>In the world of microservices, the goal is to have a small piece of software that performs a well-defined set of tasks. Microservices are software applications that are self-contained. They are small, independently deployable modular services that run a unique process and communicate through a well-defined, lightweight mechanism to serve a specific goal.</p>
<p>Typically, clear boundaries are set with regards to what your microservice can or cannot do. The move to microservices requires not only a change in architecture, but also a solid foundation of trust between the different teams who are working together to develop these microservices. Building this trust gives them the confidence they need to rely on the services’ availability and adherence to the agreed upon service contract for standard APIs.</p>
<p>Without a high level of trust between teams of developers, chaos will quickly ensue in your development organisation. Each team will build whatever they want and/or change APIs without notifying the rest of the organisation. In this state of disarray, functionality will break and your software development will come to a grinding halt.</p>
<p>While trust is extremely important in developing microservices, planning ahead for potential security issues is even more critical. Unfortunately, security considerations are often overlooked in the process of transitioning to microservices. The consequences of security failings can be devastating for your company.</p>
<p>For example, let’s say you are deploying a microservice that accepts input from a user and passes that input to a backend database. If your service is not secure and the input is not validated, hackers will be able to inject malicious code into the system and bring down your service — or perhaps even worse, compromise your entire system.</p>
<h3 id="a-plethora-of-microservices">A plethora of microservices</h3>
<p>As your repertoire of services and applications grows, it is probably safe to assume that the number of available microservices will grow as well. As the number of options increases, more and more security issues are bound to come up. In this post, we will review some of the issues and potential solutions that you should take into consideration before your business makes the shift to using microservices.</p>
<h3 id="reuse-of-code">Reuse of code</h3>
<p>Using shared code and libraries can help you jumpstart your move to microservices, but it can also be a double-edged sword. If you choose to borrow and use something off of the internet (i.e., an open-source solution), you are forever tied to that code and all of its shortcomings.</p>
<p>On one hand, reuse of industry standard technology can be a good thing since it has already been tested and used around the world. On the other hand, widespread usage of standard technology can be problematic. If a component vulnerability surfaces, your company and other companies that are using the technology will need to apply emergency patches to mitigate critical flaws in all of your applications. Imagine what it would be like to have to either deploy all of your services again because of a new security package, or to patch the servers with a whole new binary. Such a scenario sounds like a nightmare, doesn’t it?</p>
<p>Take the Heartbleed bug for example. When the bug was discovered in April of 2014, approximately 66 per cent of the internet’s web servers needed to be patched because the software that included the vulnerable libraries was used on almost all of the world’s web servers. This catastrophe required the patching and rebooting of hundreds of thousands of servers in a very short period of time.</p>
<p>If you happen to have a smaller number of servers, the solutions of deploying everything again or patching with a new binary are doable, either manually or with a basic amount of scripting. But when you scale, these are no longer viable options for solving your problem. In these cases with scaling, you need to have a tried and tested method of orchestration already in place in order for you to perform mass operations quickly to alleviate the problems.</p>
<h3 id="denial-of-service">Denial of service</h3>
<p>Ensuring that your applications are secure is no easy feat, and managing a number of services that have multiple entry points from the outside can be difficult. As the number of services grow, the magnitude of this issue is amplified. Managing security groups appropriately will help you ensure that only the correct ports are exposed. Doing so can help save you and your applications a significant amount of pain and anguish if a malicious party targets your product in an attack.</p>
<p>Setting up a firewall application or an alternative solution in front of your system can correct a problem like this by ensuring that only the appropriate traffic arrives at your application’s front door and that it does not contain malicious codes or threats.</p>
<h3 id="traffic-between-microservices">Traffic between microservices</h3>
<p>Each microservice passes information from one to another. When the traffic is in a segregated part of your own network, it is safe to assume that your risk of having an eavesdropper is decreased since you are usually behind a corporate firewall, which makes you less susceptible to man-in-the-middle attacks.</p>
<p>When you move to the cloud, this assumption is no longer valid. Traffic between your microservices should be encrypted on the cloud. This means that, in addition to your microservices handling encrypted traffic, they will also need to ensure that the performance of your underlying applications does not suffer as a result of the extra work they have to perform with encrypting and decrypting information.</p>
<p>There are a number of methods that you can use to mitigate this problem. One such solution is creating a Virtual Private Cloud (VPC), which will enable you to segregate your workloads in the cloud without allowing a malicious intruder into the system who could eavesdrop on your traffic. However, this is not a foolproof solution, and it still has a number of attack vectors that you will need to address. Another option is offloading the encryption to an external service (e.g., a load balancing service) that will enable traffic protection with minimal disruption or changes to your current system.</p>
<h3 id="secret-sharing">Secret sharing</h3>
<p>In order to make sure that your microservices are not open to the world, we suggest that you add authentication between the services in your system. Doing so will ensure that only the correct pieces are allowed to talk with each other and that they have the proper credentials to do so.</p>
<p>Embedding these secrets into your applications is a very bad idea. Best practices for modern architecture strongly advise against storing any credentials on your servers. Of course, this brings up the question of how you will allow applications to authenticate with each other and third-party services if the credentials cannot be stored locally?</p>
<p>There are a few ways to tackle this problem. One strategy is to use third-party tools or the tools and services that are already available from most cloud providers. The concept is pretty simple. When you initiate an authentication request, you ask another service to request a temporary set of credentials on your behalf, which allows you access for a set period of time. This solves the issue of longevity of credentials because they expire after a certain period of time, and because there are no credentials that are embedded in the microservice itself.</p>
<h3 id="security-across-the-board">Security across the board</h3>
<p>It is highly unlikely that those who are producing the microservice will actually belong to a single team. It makes sense that each team will develop, test, and deploy their own microservice (or set thereof). Therefore, the responsibility of securing the service cannot lie solely with a single, traditional operation security team and organisation—it should lie with all of the teams that are producing the software.</p>
<p>In order to ensure that your company will be protected and secure from outside attackers, we recommend that you consider some sort of partnership between the traditional OPSEC team and the developers. Establishing such a partnership will help the participants work together so that the software they are producing is secure by default, hardened, and continuously tested for compliance against a baseline of security requirements before it goes out the door. When the responsibility also lies with the teams who are creating the service, their level of engagement and awareness will definitely increase.</p>
<h3 id="code-changes">Code changes</h3>
<p>The last issue we will address is the lifecycle of the application. No one writes software that is 100 per cent perfect the first time around — there will always be some bugs to fix before the software runs as efficiently as it is supposed to. For example, the foundation of Agile methodology is reiterated all the time, providing only the minimal viable product and improving as you progress with the project.</p>
<p>When you are dealing with microservices, there can be several changes each day. When you upgrade your application by changing or adding functionality, you will need to ensure that your code is (at minimum) the same as it was before, if not even better. This requires scanning the added code for vulnerabilities and weaknesses before the code is even deployed. You will need to tie this into your continuous integration processes so that this is performed as part of your release process.</p>
<h3 id="summary">Summary</h3>
<p>Maintaining a secure system is usually a daunting task, and with the shift to microservices, there is an additional vector that needs to be addressed. Each microservice has its respective weak points that need to be secured, hardened, and continuously monitored for vulnerabilities.</p>
<p>The scope of this task should not be underestimated — as your use of microservice architecture grows, security issues become more significant and urgent. To protect yourself and your company, you should address these security issues early and often. We encourage you to use the suggestions from this post to help you with the process of securing your microservices.</p>
<p>The post <a href="https://www.aiuniverse.xyz/security-in-the-world-of-microservices/">Security in the world of microservices</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.aiuniverse.xyz/security-in-the-world-of-microservices/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>6 Ways Big Data is enhancing the global supply chain</title>
		<link>https://www.aiuniverse.xyz/6-ways-big-data-is-enhancing-the-global-supply-chain/</link>
					<comments>https://www.aiuniverse.xyz/6-ways-big-data-is-enhancing-the-global-supply-chain/#comments</comments>
		
		<dc:creator><![CDATA[aiuniverse]]></dc:creator>
		<pubDate>Wed, 30 Aug 2017 10:37:12 +0000</pubDate>
				<category><![CDATA[Artificial Intelligence]]></category>
		<category><![CDATA[Big Data]]></category>
		<category><![CDATA[Big data]]></category>
		<category><![CDATA[data mining]]></category>
		<category><![CDATA[develop software app]]></category>
		<category><![CDATA[digital world]]></category>
		<category><![CDATA[future challenges]]></category>
		<category><![CDATA[Machine learning]]></category>
		<category><![CDATA[software applications]]></category>
		<guid isPermaLink="false">http://www.aiuniverse.xyz/?p=835</guid>

					<description><![CDATA[<p>Source &#8211; logisticsmgmt.com Defined as the massive volume of structured and unstructured data that can’t possibly be processed using traditional software or database strategies, Big Data is affecting every corner of the business world. It’s no surprise, really, seeing that more data has been created in the past two years than in the entire history of <a class="read-more-link" href="https://www.aiuniverse.xyz/6-ways-big-data-is-enhancing-the-global-supply-chain/">Read More</a></p>
<p>The post <a href="https://www.aiuniverse.xyz/6-ways-big-data-is-enhancing-the-global-supply-chain/">6 Ways Big Data is enhancing the global supply chain</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Source &#8211; logisticsmgmt.com</p>
<p>Defined as the massive volume of structured and unstructured data that can’t possibly be processed using traditional software or database strategies, Big Data is affecting every corner of the business world. It’s no surprise, really, seeing that more data has been created in the past two years than in the entire history of the human race. By 2020, roughly 1.7 megabytes of new information will be created for every second for every human being and, at that point, the digital universe will be 44 zettabytes strong (up from a current 4.4 zettabytes).</p>
<p>As supply chain managers scramble to wrap their arms around the reams of information now at their fingertips, a growing number of software providers are making the task more manageable and useful. In other words, simply having the data at your avail isn’t enough; it’s about taking that information and transforming it into actionable insights that help drive operational efficiencies across the supply chain.</p>
<p>“Supply chains are more complex than ever, and with these complexities come many challenges,” says Shannon Vaillancourt, president at RateLinx. “Big Data allows companies to diagnose the issue so they truly understand what is causing it.” Of course, capturing the data and then using it to make good decisions are two entirely different things. To help fill that “gap,” Vaillancourt says software developers are focusing on the<strong> 5 Vs of Big Data: variety, velocity, veracity, volume and value.</strong></p>
<p>Vaillancourt says the final “v” is extremely important and often overlooked. “Companies need to be looking for software that turns all of their data into value—or, actionable,” he points out. “Actionable data is created through analytics; it’s the analytics that tells the user what to do, and ultimately what action to take.”</p>
<hr />
<h2>Top 20 Supply Chain Managment Sofware Suppliers</h2>
<p><strong>SCM (SCE, SCP, Procurement) Total Software Revenue</strong></p>
<table class="tg">
<tbody>
<tr>
<th class="tg-yw4l"><strong>No.</strong></th>
<th class="tg-yw4l"><strong>Supplier</strong></th>
<th class="tg-yw4l"><strong>2015 Revenue</strong></th>
<th class="tg-yw4l"><strong>2016 Revenue</strong></th>
<th class="tg-yw4l"><strong>SCP</strong></th>
<th class="tg-yw4l"><strong>WMS</strong></th>
<th class="tg-yw4l"><strong>MES/MRP</strong></th>
<th class="tg-yw4l"><strong>TMS</strong></th>
<th class="tg-yw4l"><strong>Procurement</strong></th>
<th class="tg-yw4l"><strong>Website</strong></th>
</tr>
<tr>
<td class="tg-yw4l">1</td>
<td class="tg-yw4l">SAP</td>
<td class="tg-yw4l">2,666.80</td>
<td class="tg-yw4l">2,932.40</td>
<td class="tg-yw4l">x</td>
<td class="tg-yw4l">x</td>
<td class="tg-yw4l">x</td>
<td class="tg-yw4l">x</td>
<td class="tg-yw4l">x</td>
<td class="tg-yw4l">sap.com</td>
</tr>
<tr>
<td class="tg-yw4l">2</td>
<td class="tg-yw4l">Oracle</td>
<td class="tg-yw4l">1,447.80</td>
<td class="tg-yw4l">1,552.90</td>
<td class="tg-yw4l">x</td>
<td class="tg-yw4l">x</td>
<td class="tg-yw4l">x</td>
<td class="tg-yw4l">x</td>
<td class="tg-yw4l">x</td>
<td class="tg-yw4l">oracle.com</td>
</tr>
<tr>
<td class="tg-yw4l">3</td>
<td class="tg-yw4l">JDA Software</td>
<td class="tg-yw4l">467.8</td>
<td class="tg-yw4l">475.9</td>
<td class="tg-yw4l">x</td>
<td class="tg-yw4l">x</td>
<td class="tg-yw4l"></td>
<td class="tg-yw4l">x</td>
<td class="tg-yw4l"></td>
<td class="tg-yw4l">jda.com</td>
</tr>
<tr>
<td class="tg-yw4l">4</td>
<td class="tg-yw4l">Infor Global Solutions</td>
<td class="tg-yw4l">105.5</td>
<td class="tg-yw4l">243.3</td>
<td class="tg-yw4l">x</td>
<td class="tg-yw4l">x</td>
<td class="tg-yw4l">x</td>
<td class="tg-yw4l">x</td>
<td class="tg-yw4l">x</td>
<td class="tg-yw4l">infor.com</td>
</tr>
<tr>
<td class="tg-yw4l">5</td>
<td class="tg-yw4l">Manhattan Associates</td>
<td class="tg-yw4l">209.3</td>
<td class="tg-yw4l">218.8</td>
<td class="tg-yw4l">x</td>
<td class="tg-yw4l">x</td>
<td class="tg-yw4l"></td>
<td class="tg-yw4l">x</td>
<td class="tg-yw4l"></td>
<td class="tg-yw4l">manh.com</td>
</tr>
<tr>
<td class="tg-yw4l">6</td>
<td class="tg-yw4l">Epicor</td>
<td class="tg-yw4l">162.1</td>
<td class="tg-yw4l">191.6</td>
<td class="tg-yw4l">x</td>
<td class="tg-yw4l">x</td>
<td class="tg-yw4l"></td>
<td class="tg-yw4l">x</td>
<td class="tg-yw4l">x</td>
<td class="tg-yw4l">epicor.com</td>
</tr>
<tr>
<td class="tg-yw4l">7</td>
<td class="tg-yw4l">Descartes Systems Group</td>
<td class="tg-yw4l">145.3</td>
<td class="tg-yw4l">159.2</td>
<td class="tg-yw4l"></td>
<td class="tg-yw4l"></td>
<td class="tg-yw4l"></td>
<td class="tg-yw4l">x</td>
<td class="tg-yw4l"></td>
<td class="tg-yw4l">descartes.com</td>
</tr>
<tr>
<td class="tg-yw4l">8</td>
<td class="tg-yw4l">HighJump</td>
<td class="tg-yw4l">129.7</td>
<td class="tg-yw4l">134.9</td>
<td class="tg-yw4l">x</td>
<td class="tg-yw4l">x</td>
<td class="tg-yw4l"></td>
<td class="tg-yw4l">x</td>
<td class="tg-yw4l"></td>
<td class="tg-yw4l">highjump.com</td>
</tr>
<tr>
<td class="tg-yw4l">9</td>
<td class="tg-yw4l">Basware</td>
<td class="tg-yw4l">112.6</td>
<td class="tg-yw4l">122.3</td>
<td class="tg-yw4l"></td>
<td class="tg-yw4l"></td>
<td class="tg-yw4l"></td>
<td class="tg-yw4l"></td>
<td class="tg-yw4l">x</td>
<td class="tg-yw4l">basware.com</td>
</tr>
<tr>
<td class="tg-yw4l">10</td>
<td class="tg-yw4l">Coupa</td>
<td class="tg-yw4l">72.4</td>
<td class="tg-yw4l">114.3</td>
<td class="tg-yw4l"></td>
<td class="tg-yw4l"></td>
<td class="tg-yw4l"></td>
<td class="tg-yw4l"></td>
<td class="tg-yw4l">x</td>
<td class="tg-yw4l">coupa.com</td>
</tr>
<tr>
<td class="tg-yw4l">11</td>
<td class="tg-yw4l">IBM</td>
<td class="tg-yw4l">126.6</td>
<td class="tg-yw4l">112</td>
<td class="tg-yw4l">x</td>
<td class="tg-yw4l"></td>
<td class="tg-yw4l"></td>
<td class="tg-yw4l"></td>
<td class="tg-yw4l">x</td>
<td class="tg-yw4l">ibm.com</td>
</tr>
<tr>
<td class="tg-yw4l">12</td>
<td class="tg-yw4l">PTC</td>
<td class="tg-yw4l">105.8</td>
<td class="tg-yw4l">104.6</td>
<td class="tg-yw4l">x</td>
<td class="tg-yw4l"></td>
<td class="tg-yw4l"></td>
<td class="tg-yw4l"></td>
<td class="tg-yw4l">x</td>
<td class="tg-yw4l">ptc.com</td>
</tr>
<tr>
<td class="tg-yw4l">13</td>
<td class="tg-yw4l">Dassault Systemes</td>
<td class="tg-yw4l">74.9</td>
<td class="tg-yw4l">92.9</td>
<td class="tg-yw4l">x</td>
<td class="tg-yw4l"></td>
<td class="tg-yw4l">x</td>
<td class="tg-yw4l">x</td>
<td class="tg-yw4l"></td>
<td class="tg-yw4l">3ds.com</td>
</tr>
<tr>
<td class="tg-yw4l">14</td>
<td class="tg-yw4l">BluJay</td>
<td class="tg-yw4l">76.6</td>
<td class="tg-yw4l">85.8</td>
<td class="tg-yw4l"></td>
<td class="tg-yw4l"></td>
<td class="tg-yw4l"></td>
<td class="tg-yw4l">x</td>
<td class="tg-yw4l"></td>
<td class="tg-yw4l">blujaysolutions.com</td>
</tr>
<tr>
<td class="tg-yw4l">15</td>
<td class="tg-yw4l">Jaggaer</td>
<td class="tg-yw4l">82.2</td>
<td class="tg-yw4l">84</td>
<td class="tg-yw4l"></td>
<td class="tg-yw4l"></td>
<td class="tg-yw4l"></td>
<td class="tg-yw4l"></td>
<td class="tg-yw4l">x</td>
<td class="tg-yw4l">jaggaer.com</td>
</tr>
<tr>
<td class="tg-yw4l">16</td>
<td class="tg-yw4l">Kinaxis</td>
<td class="tg-yw4l">66.3</td>
<td class="tg-yw4l">82.8</td>
<td class="tg-yw4l">x</td>
<td class="tg-yw4l"></td>
<td class="tg-yw4l"></td>
<td class="tg-yw4l"></td>
<td class="tg-yw4l"></td>
<td class="tg-yw4l">kinaxis.com</td>
</tr>
<tr>
<td class="tg-yw4l">17</td>
<td class="tg-yw4l">Perfect Commerce</td>
<td class="tg-yw4l">44.5</td>
<td class="tg-yw4l">72</td>
<td class="tg-yw4l"></td>
<td class="tg-yw4l"></td>
<td class="tg-yw4l"></td>
<td class="tg-yw4l"></td>
<td class="tg-yw4l">x</td>
<td class="tg-yw4l">perfect.com</td>
</tr>
<tr>
<td class="tg-yw4l">18</td>
<td class="tg-yw4l">e2open</td>
<td class="tg-yw4l">57.7</td>
<td class="tg-yw4l">69.8</td>
<td class="tg-yw4l">x</td>
<td class="tg-yw4l"></td>
<td class="tg-yw4l"></td>
<td class="tg-yw4l">x</td>
<td class="tg-yw4l">x</td>
<td class="tg-yw4l">e2open.com</td>
</tr>
<tr>
<td class="tg-yw4l">19</td>
<td class="tg-yw4l">Zycus</td>
<td class="tg-yw4l">49.4</td>
<td class="tg-yw4l">65</td>
<td class="tg-yw4l"></td>
<td class="tg-yw4l"></td>
<td class="tg-yw4l"></td>
<td class="tg-yw4l"></td>
<td class="tg-yw4l">x</td>
<td class="tg-yw4l">zycus.com</td>
</tr>
<tr>
<td class="tg-yw4l">20</td>
<td class="tg-yw4l">GEP</td>
<td class="tg-yw4l">55</td>
<td class="tg-yw4l">63.3</td>
<td class="tg-yw4l"></td>
<td class="tg-yw4l"></td>
<td class="tg-yw4l"></td>
<td class="tg-yw4l"></td>
<td class="tg-yw4l">x</td>
<td class="tg-yw4l">gep.com</td>
</tr>
</tbody>
</table>
<h3></h3>
<h3>Following are six big ways that Big Data is affecting the supply chain and helping companies take the right actions.</h3>
<p><strong>1. Get better diagnostic information.</strong></p>
<p>To solve problems and circumvent future challenges, companies need good diagnostic data. Big Datagives them that, according to Vaillancourt, while also ensuring that their future strategies are based on solid historical information. “Big Data can help companies diagnose many issues, which will in turn allow them to develop strategies to solve the issues,” he says, “and then ultimately deploy the strategies successfully.”</p>
<p>For example, the organization that wants to leverage Big Data for track and trace of its products can do so by combining the purchase order (PO) details, shipment information and the carrier’s tracking information. Then, once that data is standardized and cleansed, analytics can be applied to it in a way that truly makes the information actionable. “If the analytics notifies the user about a late shipment before the carrier issues the notification,” Vaillancourt explains, “then that user can enact a contingency plan and get the product faster from an alternate source.”</p>
<p><strong>2. Get a clearer “crystal ball” for the future</strong>.</p>
<p>Defined as the data mining, statistics, modeling, machine learning, and artificial intelligence used to analyze current data to make predictions about the future, predictive analytics is the modern-day supply chain manager’s crystal ball. “Predictive analytics makes it possible to analyze data and create assumptions as to what will happen to not only predict the future, but influence it as well,” says Marcell Vollmer, chief digital officer at SAP Ariba.</p>
<p>In Kansas City, for instance, a local police department is using data to stop crime before it happens by identifying “hot spots,” patrolling those areas more aggressively and then more closely monitoring the activities of recent parolees. In the business world, predictive analytics is allowing firms to more clearly understand customer needs and adapt their business to accommodate them. Take pricing, for example. Using predictive analytics, companies can predict equilibrium before releasing a new product, thus maximizing the revenue of the solution out of the gate while also understanding future demand. “Data is the new currency,” Vollmer adds, “and predictive analytics is the key to collecting the dividends it pays.”</p>
<p><strong>3. Manage external factors that are beyond your control.</strong></p>
<p>External factors can have a substantial impact on supply chains, yet in many cases these outside forces are hard to control and even detect. “From weather to oil prices to consumer demand, supply chain executives who can quantify and anticipate such impact can better plan their materials and inventory,” says Rich Wagner, CEO at Prevedere. He says retailers are particularly well positioned to leverage this advantage, namely because they’re operating in a dynamic environment where consumers expect quick, accurate deliveries. “If a product is unavailable, manufacturers and retailers alike risk not only losing a customer forever, but also a digital media backlash,” Wagner points out. How can Big Data help? By helping firms better predict demand, and therefore better plan their inventory to mitigate against shortages. The same benefits apply on a global scale, where both supply chains and operations are becoming more interconnected and, subsequently, more impacted by world events. “By coupling Big Data with predictive analytics,” Wagner says, “it’s quite possible to keep a handle on numerous economic and consumer behavior metrics to be better prepared for what’s coming next.”</p>
<p><strong>4. Make more profitable supply chain demand forecasts.</strong></p>
<p>Access to global data, combined with the power of Cloud computing, is giving technology more power to tackle even the toughest supply chain challenges. “With today’s advancements in machine learning, companies can use technology to constantly monitor those external forces,” says Wagner, “and get a real-time view of what’s ahead.” He sees this as a fundamental change in demand planning—compared to traditional forecasts built on past performance with the assumption of stable economic conditions. “Executives know that they can’t rely on precedence and they need insights to make decisions about the future with certainty,” says Wagner. “This desire to be immediately notified of shifts in momentum is now a reality.” For example, one global beverage manufacturer saved about $9 million by improving product distribution through predictive demand models. “The manufacturer realized that external factors (e.g., the architectural billings index) were leading indicators of performance,” says Wagner, “so it adapted its supply chain planning across 400 brands and 21 distributors.”</p>
<p><strong>5. Reduce demand variability and cycle times.</strong></p>
<p>Big Data is turning supply chain managers into “mind readers,” allowing them to predict and react to buyer behaviors in new ways. On the demand side, for instance, Big Data helps companies gain better understanding over consumer behaviors, foot traffic, buyer preferences and the actions that their competitors are taking. “This gives companies a solid offensive footing,” says Dennis Groseclose, president and CEO at TransVoyant, “and allows them to fuse external data and demand patterns to more effectively reduce demand variability.” Having actionable data also helps companies better manage lead times, variability and capacity. This, in turn, helps them better understand manufacturer and carrier behaviors. “With this information in hand, companies can squish planning cycle times down to one month vs. five months,” says Groseclose, “or to one week vs. five weeks.”</p>
<p><strong>6. Prepare for the “SNEW” wave.</strong></p>
<p>Here’s a buzzword you may not have heard of yet: SNEW, or social media, news, event and weather data, is the next acronym that’s either going to make supply chain managers sit up and take notice, or make them roll their eyes and groan. Either way, SNEW data promises to help improve supply chain capabilities and give companies even more data to sift through, digest and make sense of. An existing forecast, for example, can be adjusted accordingly when accurate weather predictions are factored into the equation.</p>
<p>Driven by the Internet of Things (IoT), SNEW uses a “combination of data feeds to determine the best routing, risk management, and other supply chain decisions,” according to Steve Banker, vice president, supply chain management at ARC Advisory Services, who sees SNEW as a potential player in the future of supply chain visibility and risk avoidance (or mitigation).</p>
<p>“This is a new solution to the market, and it’s being driven by the emergence of new technological capabilities,” Banker notes. The integration of social media, news, event and weather data into the manufacturing and distribution process is also getting a boost from the ongoing digitization of the supply chain.</p>
<p>“What we’re looking at is a series of technologies that are either rapidly emerging or already further along in terms of emergence,” says Banker, noting that while IoT is a bit further along in terms of maturity, concepts like SNEW and blockchain (i.e., a digital ledger where transactions made in bitcoin are recorded chronologically and publicly) are still nascent. “Over time,” he concludes, “these innovations will continue to generate Big Data that companies will use for decision making.”</p>
<p>The post <a href="https://www.aiuniverse.xyz/6-ways-big-data-is-enhancing-the-global-supply-chain/">6 Ways Big Data is enhancing the global supply chain</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.aiuniverse.xyz/6-ways-big-data-is-enhancing-the-global-supply-chain/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
		<item>
		<title>Contact centre intelligence: emotional or artificial?</title>
		<link>https://www.aiuniverse.xyz/contact-centre-intelligence-emotional-or-artificial/</link>
					<comments>https://www.aiuniverse.xyz/contact-centre-intelligence-emotional-or-artificial/#comments</comments>
		
		<dc:creator><![CDATA[aiuniverse]]></dc:creator>
		<pubDate>Tue, 29 Aug 2017 10:41:01 +0000</pubDate>
				<category><![CDATA[Artificial Intelligence]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[emotional intelligence]]></category>
		<category><![CDATA[software applications]]></category>
		<guid isPermaLink="false">http://www.aiuniverse.xyz/?p=819</guid>

					<description><![CDATA[<p>Source &#8211; whatech.com 44% of contact centres have no intentions to introduce AI. 40% of contact centres agree that emotional intelligence is an area they need to explore. Emotional intelligence has been eagerly embraced by the contact centre industry. You’ve no doubt heard about artificial intelligence making inroads into the contact centre, initially in the form <a class="read-more-link" href="https://www.aiuniverse.xyz/contact-centre-intelligence-emotional-or-artificial/">Read More</a></p>
<p>The post <a href="https://www.aiuniverse.xyz/contact-centre-intelligence-emotional-or-artificial/">Contact centre intelligence: emotional or artificial?</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Source &#8211; <strong>whatech.com</strong></p>
<ul>
<li class="intro">44% of contact centres have no intentions to introduce AI.</li>
<li class="intro">40% of contact centres agree that emotional intelligence is an area they need to explore.</li>
<li class="intro">Emotional intelligence has been eagerly embraced by the contact centre industry.</li>
</ul>
<p>You’ve no doubt heard about artificial intelligence making inroads into the contact centre, initially in the form of chatbots: AI-powered software applications that can take customer queries, either textual or verbal, and produce useful, relevant answers with consistency and accuracy that can match a human operator.</p>
<p>Depending on whose views you read, AI is either going to enhance the role of human operators, freeing them to handle the more challenging and rewarding queries, or it’s going to relegate them to the ranks of the unemployed.</p>
<p>SMAART Recruitment surveyed over 150 contact centre leaders and decision makers around Australia for its 2017 Contact Centre Leaders Survey. It reported: “Around seven percent of Australian contact centres currently use AI in their interactions with customers, with an additional 11 percent planning to introduce it in the coming 12 months. A high percentage of remaining contact centres are currently exploring the idea, however 44 percent of contact centres have no intentions to introduce AI.”</p>
<blockquote><p><strong>“Around seven percent of Australian contact centres currently use AI in their interactions with customers.”</strong></p></blockquote>
<p>You would not expect a recruitment company to be telegraphing mass reduction in employee numbers and a blog discussing the survey’s findings concluded: “Australian contact centres are taking a steady and careful approach to introducing artificial intelligence (AI) into their contact centres … AI presents contact centres with great opportunities and challenges in the coming years.</p>
<p>Those that learn from it and understand it quickly will be the first to benefit.”</p>
<p>However, SMAART Recruitment also focused on another kind of intelligence that will likely be much more challenging for technology to emulate and/or replace: emotional intelligence.</p>
<blockquote><p><strong>“Increasing staff emotional intelligence (EQ) is one of the key areas of focus for Australian contact centres.”</strong></p></blockquote>
<p>In another blog reporting additional results from the survey, it said: “Increasing staff emotional intelligence (EI) is one of the key areas of focus for Australian contact centres. In a recent study of contact centre managers and leaders, over 40 percent of respondents indicated that this was an area they needed to explore more and improve in the next 12 months.”</p>
<p>If you look at the definition of EI on Wikipedia, you will see why computer emulation of EI is challenging. It is defined as “the capability of individuals to recognise their own and other people&#8217;s emotions, discern between different feelings and label them appropriately, use emotional information to guide thinking and behaviour, and manage and/or adjust emotions to adapt to environments or achieve one&#8217;s goal(s).”</p>
<p>Wikipedia says the term first appeared in a 1964 paper by Michael Beldoch and gained popularity in the 1995 book by that title, written by author, psychologist, and science journalist Daniel Goleman.</p>
<p>It goes on to note that the concept has not been universally accepted. “Goleman&#8217;s 1995 analysis of EI has been criticised within the scientific community, despite prolific reports of its usefulness in the popular press.”</p>
<p>However there is no doubt EI has been eagerly embraced by the contact centre industry. A Google search will yield many results such as “Does Your Contact Center Lack Emotional Intelligence?”; “Is Your Contact Center Emotionally Intelligent?”,“Emotional Intelligence and Its Importance in the Call Center” and, intriguingly one that seems to be having a bet each way: “AI Can Help Boost Agents&#8217; Emotional Intelligence.”</p>
<p>In our next post we’ll explore some of these ideas in more detail.</p>
<div class="moduletable">
<p><strong>Premier Technologies</strong></p>
<p>Premier Contact Point provides a hosted contact solution that meets the needs of the modern contact centre. This cost effective solution provides a means of directing calls to the agent who is best suited to meet the needs of the customer, without having to be transferred multiple times. Businesses choose this hosted contact solution because there is no need to purchase and maintain costly hardware like there is with traditional PBX systems. This means the need for capital expenditure is minimal, all a contact centre agent needs is a phone, PC and an Internet connection.</p>
</div>
<p>The post <a href="https://www.aiuniverse.xyz/contact-centre-intelligence-emotional-or-artificial/">Contact centre intelligence: emotional or artificial?</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.aiuniverse.xyz/contact-centre-intelligence-emotional-or-artificial/feed/</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
			</item>
	</channel>
</rss>
