Showing posts with label OaaS. Show all posts
Showing posts with label OaaS. Show all posts

Daily Tech Digest - January 09, 2026


Quote for the day:

"Always remember, your focus determines your reality." -- George Lucas



The AI plateau: What smart CIOs will do when the hype cools

During the early stages of GenAI adoption, organizations were captivated by its potential -- often driven by the hype surrounding tools like ChatGPT. However, as the technology matures, enterprises are now grappling with the complexities of scaling AI tools, integrating them into existing workflows and using them to meet measurable business outcomes. ... History has shown that transformative technologies often go through similar cycles of hype, disillusionment and eventual stabilization. ... Early on, many organizations told every department to use AI to boost productivity. That approach created energy, but it also produced long lists of ideas that competed for attention and resources. At the plateau stage, CIOs are becoming more selective. Instead of experimenting with every possible use case, they are selecting a smaller number of use cases that clearly support business goals and can be scaled. The question is no longer whether a team can use AI, but whether it should. ... CIOs should take a two-speed approach that separates fast, short-term AI projects from larger, long-term efforts, Locandro said. Smaller initiatives help teams learn and deliver quick results. Bigger projects require more planning and investment, especially when they span multiple systems. ... A key challenge CIOs face with GenAI is avoiding long, drawn-out planning cycles that try to solve everything at once. As AI technology evolves rapidly, lengthy projects risk producing outdated tools. 


Middle East Tech 2026: 5 Non-AI Trends Shaping Regional Business

The Middle Eastern biotechnology market is rapidly maturing into a multi-billion-dollar industrial powerhouse, driven by national healthcare and climate agendas. In 2026, the industry is marking the shift toward manufacturing-scale deployment, as genomics, biofuels, and diagnostics projects move into operational phases. ... Quantum computing has moved past the stage of academic curiosity. In 2026, the Middle East is seeing the first wave of applied industrial pilots, particularly within the energy and material science sectors. ... While commercialization timelines remain long, the strategic value of early entry is high. Foreign suppliers who offer algorithm development or hardware-software integration for these early-stage pilots will find a highly receptive market among national energy champions. ... Geopatriation refers to the relocation of digital workloads and data onto sovereign-controlled clouds and local hardware and stands out as a major structural shift in 2026. Driven by national security concerns and the massive data requirements of AI, Middle Eastern states are reducing their reliance on cross-border digital architectures. This trend has extended beyond data residency to include the localization of critical hardware capabilities. ... the region is moving away from perimeter-based security models toward zero-trust architectures, under which no user, device, or system receives implicit trust. Security priorities now extend beyond office IT systems to cover operational technology


Scaling AI value demands industrial governance

"Capturing AI's value while minimizing risk starts with discipline," Puig said. "CIOs and their organizations need a clear strategy that ties AI initiatives to business outcomes, not just technology experiments. This means defining success criteria upfront, setting guardrails for ethics and compliance, and avoiding the trap of endless pilots with no plan for scale." ... Puig adds that trust is just as important as technology. "Transparency, governance, and training help people understand how AI decisions are made and where human judgment still matters. The goal isn't to chase every shiny use case; it's to create a framework where AI delivers value safely and sustainably." ... Data security and privacy emerge as critical issues, cited by 42% of respondents in the research. While other concerns -- such as response quality and accuracy, implementation costs, talent shortages, and regulatory compliance -- rank lower individually, they collectively represent substantial barriers. When aggregated, issues related to data security, privacy, legal and regulatory compliance, ethics, and bias form a formidable cluster of risk factors -- clearly indicating that trust and governance are top priorities for scaling AI adoption. ... At its core, governance ensures that data is safe for decision-making and autonomous agents. In "Competing in the Age of AI," authors Marco Iansiti and Karim Lakhani explain that AI allows organizations to rethink the traditional firm by powering up an "AI factory" -- a scalable decision-making engine that replaces manual processes with data-driven algorithms.


Information Management Trends in the Year Ahead

The digital workforce will make its presence felt. “Fleets of AI agents trained on proprietary data, governed by corporate policy, and audited like employees will appear in org charts, collaborate on projects, and request access through policy engines,” said Sergio Gago, CTO for Cloudera. “They will be contributing insights alongside their human colleagues.” A potential oversight framework may effectively be called an “HR department for AI.” AI agents are graduating from “copilots that suggest to accountable coworkers inside their digital environments,” agreed Arturo Buzzalino ... “Instead of pulling data into different environments, we’re bringing compute to the data,” said Scott Gnau, head of data platforms at InterSystems. “For a long time, the common approach was to move data to wherever the applications or models were running. AI depends on fast, reliable access to governed data. When teams make this change, they see faster results, better control, and fewer surprises in performance and cost.” ... The year ahead will see efforts to reign in the huge volume of AI projects now proliferating outside the scope of IT departments. “IT leaders are being called in to fix or unify fragmented, business-led AI projects, signaling a clear shift toward CIOs—like myself,” said Shelley Seewald, CIO at Tungsten Automation. The impetus is on IT leaders and managers to be “more involved much earlier in shaping AI strategy and governance. 


What is outcome as agentic solution (OaAS)?

The analyst firm, Gartner predicts that a new paradigm it’s named outcome as agentic solution (OaAS) will make some of the biggest waves, by replacing software as a service (SaaS). The new model will see enterprises contract for outcomes, instead of simply buying access to software tools. Instead of SaaS, where the customer is responsible for purchasing a tool and using it to achieve results, with OaAS providers embed AI agents and orchestration so the work is performed for you. This leaves the vendor responsible for automating decisions and delivering outcomes, says Vuk Janosevic, senior director analyst at Gartner. ... The ‘outcome scenario’ has been developing in the market for several years, first through managed services then value-based delivery models. “OaAS simply formalizes it with modern IT buyers, who want results over tools,” notes Thomas Kraus, global head of AI at Onix. OaAS providers are effectively transforming systems of record (SoR) into systems of action (SoA) by introducing orchestration control planes that bind execution directly to outcomes, says Janosevic. ... Goransson, however, advises enterprises carefully evaluate several areas of risk before adopting an agentic service model, Accountability is paramount, he notes, as without clear ownership structures and performance metrics, organizations may struggle to assess whether outcomes are being delivered as intended.


Bridging the Gap Between SRE and Security: A Unified Framework for Modern Reliability

SRE teams optimize for uptime, performance, scalability, automation and operational efficiency. Security teams focus on risk reduction, threat mitigation, compliance, access control and data protection. Both mandates are valid, but without shared KPIs, each team views the other as an obstacle to progress. Security controls — patch cycles, vulnerability scans, IAM restrictions and network changes — can slow deployments and reduce SRE flexibility. In SRE terms, these controls often increase toil, create unpredictable work and disrupt service-level objectives (SLOs). The SRE culture emphasizes continuous improvement and rapid rollback, whereas security relies on strict change approval and minimizing risk surfaces. ... This disconnect impacts organizations in measurable ways. Security incidents often trigger slow, manual escalations because security and operations lack common playbooks, increasing mean time to recovery (MTTR). Risk gets mis-prioritized when SRE sees a vulnerability as non-disruptive while security considers it critical. Fragmented tooling means that SRE leverages observability and automation while security uses scanning and SIEM tools with no shared telemetry, creating incomplete incident context. The result? Regulatory penalties, breaches from failures in patch automation or access governance and a culture of blame where security faults SRE for speed and SRE faults security for friction. 


The 2 faces of AI: How emerging models empower and endanger cybersecurity

More recently, the researchers at Google Threat Intelligence Group (GTIG) identified a disturbing new trend: malware that uses LLMs during execution to dynamically alter its own behavior and evade detection. This is not pre-generated code, this is code that adapts mid-execution. ... Anthropic recently disclosed a highly sophisticated cyber espionage operation, attributed to a state-sponsored threat actor, that leveraged its own Claude Codemodel to target roughly 30 organizations globally, including major financial institutions and government agencies. ... If adversaries are operating at AI speed, our defenses must too. The silver lining of this dual-use dynamic is that the most powerful LLMs are also being harnessed by defenders to create fundamentally new security capabilities. ... LLMs have shown extraordinary potential in identifying unknown, unpatched flaws (zero-days). These models significantly outperform conventional static analyzers, particularly in uncovering subtle logic flaws and buffer overflows in novel software. ... LLMs are transforming threat hunting from a manual, keyword-based search to an intelligent, contextual query process that focuses on behavioral anomalies. ... Ultimately, the challenge isn’t to halt AI progress but to guide it responsibly. That means building guardrails into models, improving transparency and developing governance frameworks that keep pace with emerging capabilities. It also requires organizations to rethink security strategies, recognizing that AI is both an opportunity and a risk multiplier.


Hacker Conversations: Katie Paxton-Fear Talks Autism, Morality and Hacking

“Life with autism is like living life without the instruction manual that everyone else has.” It’s confusing and difficult. “Computing provides that manual and makes it easier to make online friends. It provides accessibility without the overpowering emotions and ambiguities that exist in face-to-face real life relationships – so it’s almost helping you with your disability by providing that safe context you wouldn’t normally have.” Paxton-Fear became obsessed with computing at an early age. ... During the second year into her PhD study, a friend from her earlier university days invited her to a bug bounty event held by HackerOne. She went – not to take part in the event (she still didn’t think she was a hacker nor understood anything about hacking), she went to meet up with other friends from the university days. She thought to herself, ‘I’m not going to find anything. I don’t know anything about hacking.’ “But then, while there, I found my first two vulnerabilities.” ... he was driven by curiosity from an early age – but her skill was in disassembly without reassembly: she just needed to know how things work. And while many hackers are driven to computers as a shelter from social difficulties, she exhibits no serious or long lasting social difficulties. For her, the attraction of computers primarily comes from her dislike of ambiguity. She readily acknowledges that she sees life as unambiguously black or white with no shades of gray.


‘A wild future’: How economists are handling AI uncertainty in forecasts

Economists have time-tested models for projecting economic growth. But they’ve seen nothing like AI, which is a wild card complicating traditional economic playbooks. Some facts are clear: AI will make humans more productive and increase economic activity, with spillover effects on spending and employment. But there are many unknowns about AI. Economists can’t isolate AI’s impact on human labor as automation kicks in. Nailing down long-term factory job losses to AI is not possible. ... “We’re seeing an increase in terms of productivity enhancements over the next decade and a half. While it doesn’t capture AI directly… there is all kinds of upside potential to the productivity numbers because of AI. ... “There are basically two ways this can go. You can get more output for the same input. If you used to put in 100 and get 120, maybe now you get 140. That’s an expansion in total factor productivity. Or you can get the same output with fewer inputs. “It’s unclear how much of either will happen across industries or in the labor market. Will companies lean into AI, cut their workforce, and maintain revenue? Or will they keep their workforce, use AI to supplement them, and increase total output per worker? ... If AI and automation remove the human element from labor-intensive manufacturing, that cost advantage erodes. It makes it harder for developing countries to use cheap labor as a stepping stone toward industrialization.


Understanding transformers: What every leader should know about the architecture powering GenAI

Inside a transformer, attention is the mechanism that lets tokens talk to each other. The model compares every token’s query with every other token’s key to calculate a weight which is a measure of how relevant one token is to another. These weights are then used to blend information from all tokens into a new, context-aware representation called a value. In simple terms: attention allows the model to focus dynamically. If the model reads “The cat sat on the mat because it was tired,” attention helps it learn that “it” refers to “the cat,” not “the mat.” ... Transformers are powerful, but they’re also expensive. Training a model like GPT-4 requires thousands of GPUs and trillions of data tokens. Leaders don’t need to know tensor math, but they do need to understand scaling trade-offs. Techniques like quantization (reducing numerical precision), model sharding and caching can cut serving costs by 30–50% with minimal accuracy loss. The key insight: Architecture determines economics. Design choices in model serving directly impact latency, reliability and total cost of ownership. ... The transformer’s most profound breakthrough isn’t just technical — it’s architectural. It proved that intelligence could emerge from design — from systems that are distributed, parallel and context-aware. For engineering leaders, understanding transformers isn’t about learning equations; it’s about recognizing a new principle of system design.

Daily Tech Digest - October 22, 2024

GenAI surges in law firms: Will it spell the end of the billable hour?

All areas of law will use genAI, according to Joshua Lenon, Clio’s Lawyer in Residence. That’s because AI content generation and task automation tools can help the business side and practice efforts of law firms. However, areas that have repetitive workflows and large document volumes – like civil litigation – will adopt genAI e-discovery tools more quickly. Practice areas that charge exclusively flat fees – like traffic offenses and immigration – are already the largest adopters of genAi. ... Nearly three-quarters of a law firm’s hourly billable tasks are exposed to AI automation, with 81% of legal secretaries’ and administrative assistants’ tasks being automatable, compared to 57% of lawyers’ tasks, according a survey of both legal professionals (1,028) and another adults (1,003) in the U.S. general population, by Clio. Hourly billing has long been the preference of many professionals, from lawyers to consultants, but AI adoption is upending this model where clients are charged for the time spent on services. ... People have been talking about the demise of the billable hour for about 30 years “and nothing’s killed it yet,” said Ryan O’Leary, research director for privacy and legal technology at IDC. “But if anything will, it’ll be this.”


IT security and government services: Balancing transparency and security

For cyber defenses, government IT leaders should invest in website hosting services with Secure Sockets Layer (SSL) encryption, and further enhancing security with HTTP Strict Transport Security (HSTS). These measures ensure that all data exchanged via government sites is encrypted, protecting resident self-service features such as online voter registration, permit submissions, utility bill payments, and more. By enforcing HSTS, websites are also protected from protocol downgrade attacks and cookie hijacking, ensuring that all connections remain secure, and reducing the risk of data interception. Other marks of a reliable website hosting solution provider include DDoS mitigation coverage and reliability around regular software patching and updates. For all digital partners, it’s essential to consider third-party risk. Some of the most valuable information residents should be able to access – meeting minutes, agendas, and other documents pertaining to local governing decisions – are hosted by document management vendors. To ensure this access is secure, each vendor must be vetted on its security capabilities, so that critical data is always protected, and hackers are not able to prevent access for residents or laterally move further into government networks.


Software buying trends are changing: From SaaS to outcome as a service

The last decade saw the rise of Software-as-a-Service (SaaS), transforming how businesses approached software deployment. This decade belongs to Outcomes-as-a-Service. CIOs are no longer interested in building large internal developer teams or experimenting with different platforms. They seek business impacting solutions with tangible outcomes that drive business success. Business teams need solutions that deliver results today, not tomorrow. ... AI-powered hyperautomation combines generative AI, BPM, RPA, integrations, analytics, and app-building to drive end-to-end outcomes. In today’s dynamic business environment, an integrated approach is essential. Siloed automation with narrowly focused platforms is no longer sufficient. ... AI-platforms excel in delivering outcomes at speed and scale. Leveraging automation expertise, they ensure outcomes linked to growth, efficiency, and compliance. The platform implements continuous cycles of process mining, implementation, adoption, and solution refinement until desired objectives are met.They also offer a comprehensive solution, managing everything from process definition and refinement to platform implementation, support, application development, and adoption. 


How Retailers Are Using Tech for Competitive Advantage

“While technology can streamline operations, an overreliance on automation without human touch can sometimes backfire,” Peters says. “Consumers still value human interaction, especially in complex support scenarios. It’s crucial for retailers to balance automation with human agents, particularly in areas that require empathy and nuanced decision-making.” ... Companies of all sizes benefit from greater organizational efficiency, and tech has been the fuel powering digital transformation. For example, Lowes uses AR for home improvement shopping while Sephora uses it for virtual make up try-ons. Walmart is stepping up automation in its battle against Amazon. But smaller retailers are benefiting, too. ... “One of our customer’s last large-scale automation took them five years from the time they started the concept to deployment,” Naslund says. “For context, the pandemic, was four and a half years, and the amount of volatility that the supply chain saw over the four years was insane. We saw inventory gluts, inventory shortages, and panic buying. Then you saw a warehouse shortage capacity, everybody's panicking to get warehouses. Then, they suddenly have too much space.”


Why and How IT Leaders Can Embrace the AI Revolution

AI software certainly has some consequences for IT departments. There may be some new types of workflows to manage, new user requests to support, and new application deployments to track. But unless your business is actually building complex AI solutions from scratch — which it probably isn't or shouldn't because sophisticated, mature AI tools and services are available from external vendors, complete with support plans and SLAs — implementing AI is not actually that challenging. That's because most third-party AI solutions boil down to SaaS apps that work just like any other SaaS: The vendor builds, manages, and supports them, with few resources and little effort necessary on the part of customers' IT departments. From the perspective of IT, implementing AI isn't all that different from implementing any other type of software. ... For IT, there are really not any novel data privacy or security risks at stake here. The app ingests financial data, but so do plenty of non-AI applications. IT's responsibility when it comes to managing data security for this type of app boils down to vetting the vendor by reviewing its data management and compliance practices. The fact that the app uses AI doesn't change this process.


Has the time come for integrated network and security platforms?

Interest in platformization is growing among enterprises, asserts Extreme Networks, which recently surveyed 200 CIOs and senior IT leaders for its research, CIO Insights Report: Priorities and Investment Plans in the Era of Platformization. ... A platform that helps organizations transition their network to the cloud to streamline IT efficiency and lower total cost of ownership is important, respondents said. In addition, 55% of respondents emphasized the need to integrate from a broad ecosystem of networking and security offerings, indicating a clear demand for unified platforms, Extreme concluded. ... “The message I got from the survey was that customers are operating in a world where there’s a massive proliferation of products, or applications, and that’s really translating into complexity. Complexity is equal to risk, and that complexity is happening in multiple places,” said Extreme Networks CTO Nabil Bukhari. Complexity is an interesting topic because it changes, Bukhari said. The first Ford cars were basically just an engine with brakes, but they were complicated to start and drive. “Now, if you look at a car, they are like data centers on wheels. But driving and owning them is exponentially easier,” Bukhari said.


How legacy IT systems can hold your business back

While legacy IT systems may still be functional, they can hold a business back from reaching its full potential – especially if market competitors are busy upgrading their own systems. Companies need to carefully evaluate the costs and benefits of keeping legacy systems in place and develop a plan to modernize their IT infrastructure. Investing in a modern data center solution can, over time, improve business agility, security, and your organization’s bottom line. ... This is especially true when it comes to next-generation applications using LLMs and machine learning (ML) for AI-dependent applications. Enterprise servers, storage and networking hardware, and software manufactured before about 2016 were not designed with scaled-up data workloads in mind – especially workloads for genAI, which just started to take off in 2021. This can hinder growth and force companies to invest in additional hardware or software just to maintain their current operations. Legacy systems are also more prone to failures and outages due to aging hardware and software. This downtime disrupts operations and leads to lost revenue, especially for critical business functions. Additionally, data loss from system crashes can be costly to recover from.


Architecture Inversion: Scale by Moving Computation, Not Data

Now why should the rest of us care, blessed as we are with a lack of most of the billions of users TikTok, Google and the likes are burdened with? A number of factors are becoming relevant:ML algorithms are improving and so is local compute capacity, meaning fully scoring items gives a larger boost in quality and ultimately profit than used to be the case. With the advent of vector embeddings, the signals consumed by such algorithms have grown by one to two orders of magnitude, making the network bottleneck more severe. Applying ever more data to solve problems is increasingly cost effective, which means more data needs to be rescored to maintain a constant quality loss. As the consumers of data from such systems move from being mostly humans to mostly LLMs in RAG solutions, it becomes beneficial to deliver larger amounts of scored data faster in more applications than before. ... For these reasons, the scaling tricks of the very biggest players are becoming increasingly relevant for the rest of us, which has led to the current proliferation of architecture inversion, going from traditional two-tier systems where data is looked up from a search engine or database and sent to a stateless compute tier to inserting that compute into the data itself.


The secret to successful digital initiatives is pretty simple, according to Gartner

As with all technologies, seeing results from AI comes down to focusing like a laser beam on the problem at hand: "In my experience, the businesses that start with a real use case and problem are seeing an ROI," Julian LaNeve, chief technology officer at Astronomer, a data platform company, told ZDNET. "They define a well-scoped, impactful problem and use gen AI to solve [it], and it's easy to measure success and ROI. The most successful business cases identify how to solve a problem that the business already cares deeply about and [will] deliver additional value to customers." Technology maturity also makes a difference in success rates. "Previous generations of AI were narrower in scope but have been successful," said Dominic Sartorio, vice president at Denodo, a data management provider. "AI is helping with predictive maintenance of manufactured goods, predicting demand spikes in [the] markets, and finding the optimal routes for logistics, and [has] been successful for many years." Furthermore, according to Gartner, companies that treat their digital initiatives in a collaborative fashion -- between business and IT leaders -- rather than leaving all things digital up to their IT departments are successful with technology. 


Showing AI users diversity in training data can boost perceived fairness and trust

The work investigated whether displaying racial diversity cues—the visual signals on AI interfaces that communicate the racial composition of the training data and the backgrounds of the typically crowd-sourced workers who labeled it—can enhance users' expectations of algorithmic fairness and trust. Their findings were recently published in the journal Human-Computer Interaction. AI training data is often systematically biased in terms of race, gender and other characteristics, according to S. Shyam Sundar, Evan Pugh University Professor and director of the Center for Socially Responsible Artificial Intelligence at Penn State. "Users may not realize that they could be perpetuating biased human decision-making by using certain AI systems," he said. Lead author Cheng "Chris" Chen, assistant professor of communication design at Elon University, who earned her doctorate in mass communications from Penn State, explained that users are often unable to evaluate biases embedded in the AI systems because they don't have information about the training data or the trainers. "This bias presents itself after the user has completed their task, meaning the harm has already been inflicted, so users don't have enough information to decide if they trust the AI before they use it," Chen said



Quote for the day:

"It takes courage and maturity to know the difference between a hoping and a wishing." -- Rashida Jourdain