Tuesday, 28 December 2021

VB Daily | December 28 - Increased intelligence coming to RPA in 2022

Daily Roundup
Presented by   
The Lead
[2] Why IoT is the cornerstone of  AWS's zero-trust strategy
[3] Computer vision teams worldwide say projects are delayed by insufficient data
The Follow
[1] In 2021, enterprise teams turned to robotic process automation (RPA) to simplify workflows and bring some order to office tasks. 2022 promises to bring more of the same sophisticated artificial intelligence and task optimization so more offices can liberate their staff from repetitive chores.
The product area remains one of the poorly named buzzwords in enterprise computing, as there are no robots in sight. The tools are generally deployed to fix what was once known as paperwork, but they rarely touch much paper. They do their work gluing together legacy systems by pushing virtual buttons and juggling the multiple data formats so that the various teams can keep track of the work moving through their offices.
In 2022, the RPA marketplace will likely shift in the following key ways:
  • Better integration
  • Lower code and higher code
  • An increase in AI
  • Divergence
  • Rising intelligence level
  • Blockchain solutions for workflows 
[2] At its re:Invent conference this fall, AWS made two IoT cybersecurity announcements that reflect how machine identities are a core part of its zero-trust security strategy. IoT ExpressLink, is a cloud service designed to fast-track new IoT devices through secured DevOps cycles, and it is integrated with AWS IoT Device Defender. Improvements to AWS IoT Greengrass include features to assist AWS customers in performing patch management at scale across fleets of IoT and network devices, all of which have their own machine identities.
IT administrators often struggle with tracking patch updates across the large inventories of endpoints that they have, which is one of the primary design goals that guided the latest release. Getting a centralized view of all devices on an enterprise network is essential for all IT departments, both from an asset management and cybersecurity standpoint, which led AWS to continually improve endpoint monitoring. Endpoint visibility and control is the most challenging area of zero-trust frameworks to sustain and secure, which is why AWS turned it into a design objective for current and future cloud services. >> Read more.
[3] According to new research by Datagen, 99% of computer vision (CV) teams have had a machine learning project canceled due to insufficient training data. Delays, meanwhile, appear ubiquitous, with 100% of surveyed teams reporting experiencing significant project delays due to insufficient training data. The research also indicates that these training data challenges come in many forms and affect CV teams in near-equal measures. The top issues experienced by CV teams include poor annotation, inadequate domain coverage, and simple scarcity.
The scarcity of robust, domain-specific training data is only compounded by the fact that the field of computer vision is lacking well-defined standards or best practices. When asked how training data is typically gathered at their organizations, respondents revealed a patchwork of sources and methodologies are being employed both across the field and within individual organizations. Whether synthetic or real, collected in-house or sourced from public datasets, organizations appear to be utilizing any and all data they can in order to train their computer vision models.
This wave of synthetic data adoption is consistent with a number of recent industry reports predicting that 2022 will be a breakout year for synthetic data. >> Read more.
Event Marketing Strategy for Dummies

 

The Buzz
Rebecca Enonchong
Right technology. Wrong business model. Minitel lost out to the internet. https://t.co/ahaNEpooim
Anthony Lee Zhang
Data cleaning + visualization software, in academia at least, seems to have been in a bit of a plateau for the last 5 years or so? In 2013 I was using R/data.table/ggplot2 and python/pandas, in 2021 it seems everyone's still using these
Event Marketing Strategy for Dummies
Sources Say
Kubernetes security will have a breakout year in 2022
While it's come a long way over the past year, Kubernetes security has not yet reached maturity. However, judging from the level of investment in 2021 into technologies for securing Kubernetes — the now-dominant container orchestration platform — enterprises can expect major advancements in the area during the coming year.
With Kubernetes, "it's really difficult to divorce the code development and the application development from the underlying architecture," said Frank Dickson, program vice president for security and trust at IDC.
Getting companies to grasp that securing containerized apps will involve bringing security earlier into the app development lifecycle is a crucial step.
"We don't yet know all the answers to the problem," Dickson said. "But we've finally started to understand the questions." >> Read more.
Did someone share VB Daily with you because they knew you'd love it? Sign up to get top data, AI, and tech news delivered to your inbox every weekday >>
Did you enjoy this issue?
VentureBeat
By VentureBeat

Catch up on VentureBeat's latest top stories.

In order to unsubscribe, click here.
Powered by Revue
500 Sansome St. #404, San Francisco, CA 94111

No comments:

Post a Comment

[New post] Giants

...