Daily Tech Digest - February 17, 2025


Quote for the day:

"Hardships often prepare ordinary people for an extraordinary destiny." -- C.S. Lewis


Like it or not, AI is learning how to influence you

We need to consider the psychological impact that will occur when we humans start to believe that the AI agents giving us advice are smarter than us on nearly every front. When AI achieves a perceived state of “cognitive supremacy” with respect to the average person, it will likely cause us to blindly accept its guidance rather than using our own critical thinking. This deference to a perceived superior intelligence (whether truly superior or not) will make agent manipulation that much easier to deploy. I am not a fan of overly aggressive regulation, but we need smart, narrow restrictions on AI to avoid superhuman manipulation by conversational agents. Without protections, these agents will convince us to buy things we don’t need, believe things that are untrue and accept things that are not in our best interest. It’s easy to tell yourself you won’t be susceptible, but with AI optimizing every word they say to us, it is likely we will all be outmatched. One solution is to ban AI agents from establishing feedback loops in which they optimize their persuasiveness by analyzing our reactions and repeatedly adjusting their tactics. In addition, AI agents should be required to inform you of their objectives. If their goal is to convince you to buy a car, vote for a politician or pressure your family doctor for a new medication, those objectives should be stated up front.


Leveraging AI for Business Continuity and Disaster Recovery in the Work-From-Home Era

AI-driven tools can monitor the health and performance of hardware and predict hardware failure before it happens using anomaly detection algorithms. For example, if a hard drive is starting to fail or there’s unusual network activity, AI systems can flag the activity/potential problem early and send an email to alert the WFH user or corporate IT staff, allowing businesses to take preventative action. ... AI can detect anomalies in network traffic or access patterns which may indicate a cyberattack (e.g., ransomware, phishing, or data breach). AI-powered cybersecurity tools, such as intrusion detection systems (IDS) and endpoint protection software, can respond automatically to threats by isolating affected systems or rolling back malicious changes. ... Small businesses may not have reliable or frequent data backups or rely on manual processes (e.g., external hard drives) that aren’t automated or secure. It may be difficult to recover without a proper backup strategy if critical data is lost due to hardware failure, cyber-attacks, or natural disasters. ... AI-assisted BC and DR solutions offer a range of benefits, particularly for SOHO and WFH users. These offerings are becoming essential as businesses of all sizes seek to maintain operational resilience in an ever-changing technological landscape. 


GenAI can make us dumber — even while boosting efficiency

“A key irony of automation is that by mechanizing routine tasks and leaving exception-handling to the human user, you deprive the user of the routine opportunities to practice their judgement and strengthen their cognitive musculature, leaving them atrophied and unprepared when the exceptions do arise,” the study found. Overall, workers’ confidence in genAI’s abilities correlates with less effort in critical thinking. The focus of critical thinking shifts from gathering information to verifying it, from problem-solving to integrating AI responses, and from executing tasks to overseeing them. The study suggests that genAI tools should be designed to better support critical thinking by addressing workers’ awareness, motivation, and ability barriers. ... As Agentic AI becomes common, people may come to rely on it for problem-solving — but how will we know it’s doing things correctly, Gold said. People might accept its results without questioning, potentially limiting their own skills development by allowing technology to handle tasks. Lev Tankelevitch, a senior researcher with Microsoft Research, said not all genAI use is bad. He said there’s clear evidence in education that it can enhance critical thinking and learning outcomes. 


How to harness APIs and AI for intelligent automation

APIs are the steady bridges connecting diverse systems and data sources. This reliable technology, which emerged in the 1960s and matured during the noughties ecommerce boom, is bridging today’s next-gen technologies. APIs allow data transfer to be automated, which is essential for training AI models efficiently. Rather than building complex integrations from scratch, they standardize data flow to ensure the data that feeds AI models is accurate and reliable. ... Data preprocessing is the critical step before training any AI model. APIs can ensure that AI applications and models only receive preprocessed data. This minimizes manual errors which smoothes the AI training pipeline. With a direct interface to standardized data, developers can focus on refining the model architecture rather than spending excessive time on data cleanup. Real-time evaluation keeps AI models in check in dynamic environments. By feeding real-time performance data back into the system, developers can quickly adjust parameters to improve the model. ... As your data volumes and transaction rates increase, your APIs must scale accordingly. Performance issues like latency or downtime can disrupt AI training and real-time processing. To be responsive under heavy loads, design APIs with load balancing, caching, and built-in redundancy to maintain consistent performance during peak use. 


Applying Behavioral Economics to Phishing and Social Engineering Attacks

It’s all about deeply and thoroughly understanding human behavior and how these behaviors are impacted by influences that use cognitive biases, emotions, social influences, and contextual factors to drive decisions. Bad actors in the world of cybersecurity also prey upon these human tendencies to drive actions that put organizations at risk. ... Humans are social creatures that trust those they believe are authorities. They’re driven by fear, greed, and curiosity that can cloud their judgement. And they’re prone to cognitive shortcuts—biases that often drive behaviors. Understanding the power of these drivers can help organizations put strategies into place to thwart them. ... Here are some important steps that can help employees make better decisions:Training employees about the threat of cyberattacks, the form these attacks generally take, and their role in helping to avert them is an important first step. Training should be ongoing, not a single instance or once a year event. Phishing simulations have proven to be a very effective way to tangibly reduce security breakdowns. These simulations serve to test employee awareness and identify areas of opportunity for improvement. Strong authentication measures can help keep accounts secure by requiring two or more methods of identification and verification—muti-factor authentication—before allowing access to information or systems.


Why Digital Projects Need Transparency and Accountability

As a CIO, it is easy to underestimate the time it will take to build forward. In the public sector, this takes longer due to inherent risk aversion. In my first few months at DWP, I felt I was making a difference, but after the first few months, the size of the prize began to take its toll and the risk factors of going forward began to set in. As CIOs, it is our role to persuade, influence and keep in mind where we are trying to get to. We landed that vision with the senior team but DWP's size and geographic spread made it harder to get the spokes of the business to hear the same story and grasp the same benefits. If I had my time again, I would spend more time with the business, less at the center and try to build momentum that was unstoppable. As I completed my first 100 days in the CIO role at Segro, one of the key takeaways from DWP was making sure the digital leadership team knew how to act together. In my new role, I am able to replicate that at a faster pace. Brand identity matters. At Segro, we are not known as the digital team, and I am striving to change that. The organization will benefit from unifying its understanding of technology, transformation and data. 


Navigating Europe’s AI Code of Practice Before the Clock Runs Out

The Code of Practice for general-purpose AI demonstrates a sincere effort to get the details right. Yet, in a rush to cover every contingency, it risks overlooking the bigger picture: spurring the next generation of AI-driven breakthroughs that can speed up drug discovery, modernize public services, and let small farmers use new predictive tools for planting and harvesting. Innovation is a delicate process, especially in emerging areas like large-scale language models or real-time climate analytics. Europe possesses the scientific expertise and market size to shape a future where these tools become transformative assets in every corner of the continent. But that future hinges on how carefully policymakers, industry players, and civil society calibrate the rules. ... Europe’s AI revolution will not happen on autopilot. Real progress demands revamping processes, investing in talent, and scaling up what works. The public sector must also move faster if Europe is to modernize healthcare, education, and core government services. Tangled or rigid rules risk derailing Europe’s ambitions. Europe’s digital regulations already weigh heavily on businesses. Over the past 25 years, the number of economy-wide laws doubled, and the EU has rolled out close to 100 tech-focused laws. High-minded ideals often mix with fragmented enforcement and overlapping rules.


Seven Common Reasons Why Data Science Projects Fail

Large organizations may own hundreds of data assets spread across sprawling, multi-faceted IT infrastructures. Unless they have a detailed, continuously updated data catalog in place that tracks all of those assets – which many don’t – simply finding the data that the team needs to complete a project can present a major challenge. Here again, however, tools and techniques are available that can help. The major solution is data discovery software, which can automatically identify data resources, including those that are not documented. ... Too often, businesses decide that they want to do something with their data, but they don’t know exactly what. For example, they might establish a high-level goal like using data-derived insights to grow revenue, without determining exactly which types of revenue-related challenges they want to solve with help from data. Avoiding this pitfall is simple: You need to articulate precise deliverables and outcomes at the start of your project. There’s always room to adjust the details a bit once a project is underway, but you should know from the beginning what the overarching outcomes of the project should be. ... A final key challenge that can thwart data science project success is the failure to understand what the goals of data science are, and which methodologies and resources data science requires.


What’s changing the rules of enterprise AI adoption for IT leaders

As model costs fall and the value from AI migrates up to the application layer, enterprises are going to have even greater choice in business solutions, either from third parties or those developed inhouse. For CIOs with access to the right resources, building applications internally is now a more realistic proposition. This becomes increasingly attractive in the context of complex business processes that may be unique to enterprises. As the costs of running models fall to near zero, the ROI equation shifts dramatically. According to Forrester Research, the ability to run hyper-efficient models like DeepSeek locally on PCs opens up a new era of edge intelligence, which businesses can deploy across organizations. “The real value in AI isn’t just in building bigger models, but innovating on top of them and in implementing them efficiently,” says Devesh Mishra, president of CoreAI at digital transformation specialists Keystone. “Companies that pair foundation model advancements with deep business and operational expertise will lead the next phase of AI-driven ROI.” This deep understanding of industry verticals and their specific issues and needs will define success for many vendors as they increasingly compete with inhouse development teams. 


Rowing in the Same Direction: 6 Tips for Stronger IT and Security Collaboration

Due to market dominance, many software vendors focus on Windows, but IT fleets today include a mix of Chromebooks, Linux systems and Apple devices. Security and IT teams must recognize that the weakest endpoint determines the overall defense posture. By ensuring IT and security teams are aligned on what’s in the environment, you can break down silos and work together toward shared security goals, such as zero-trust implementation. ... Security and IT teams should collaborate to ensure policies protect the overall business mission, not just the bottom line. For example, if security requires an agent to collect telemetry for advanced analysis (e.g., CrowdStrike, Halcyon, etc.), what’s the performance impact on endpoints? If the agent is running AI/ML workloads, how is it optimized for performance on XPU and non-XPU systems? IT fleet leaders care about security BUT they also demand top performance and battery life from devices. Both security and IT teams together can align solutions that offer best-in-class security without degrading fleet performance. ... Ownership in IT and security is one of the hardest challenges to solve. In many cases, responsibility over cloud workloads, applications and ephemeral systems isn’t always clearly defined. 


No comments:

Post a Comment