Andreas Wieweg: I’d probably want to add a little bit of the Shell use case. Sramana Mitra: I would like to understand how it’s built together. What are the data sources? How does this get implemented from a technical point of view? Andreas Wieweg: In terms of data sources, in my experience, they vary a
Sramana Mitra: I’d like to understand what customers you are going after and what the use cases are in those customers. Andy Peart: Since it’s a platform, we, our partners, or indeed our clients can use it to build a range of different point solutions. We would refer to something like Siri as something of
Have you used Siri? Have you used Amazon’s Echo? Have you used any other natural language assisted personal assistant? The world of AI is rife with speculations on where this field is going, and this discussion is a wonderful expose on that topic. Sramana Mitra: Let’s start by introducing our audience to Artificial Solutions and to the
Dave O’Flanagan: The second step is using these different systems and data to be able to infer what the next best action is. That takes into account anywhere between 5 and 20 different features that are configurable by our customer. We believe that most of our customers are more than capable of being able to
Sramana Mitra: What are the parameters against which you do the personalization? Dave O’Flanagan: There’s a number of different parts. There are three key things that feed into our algorithm. One is that we build a very deep transactional view or behavioural view of the customers. The interesting thing in travel is that I can
Learn how the airline industry is using Artificial Intelligence to market to their customers in context, with personalization. Sramana Mitra: Let’s start by introducing our audience to yourself as well as to Boxever. Dave O’Flanagan: I’m the CEO and Co-Founder of Boxever. Our customer intelligence cloud powers one-to-one customer experiences for some of the biggest
Amir Husain: Within our own area of cyber security, one of the things that’s happening at the large-scale level is that cyber security is being weaponized. This is very sad but it’s true. Cyber security is now becoming a weapon of warfare. You’ve seen where digital weaponry was used to rollback the Iranian nuclear program
Amir Husain: There are lots of examples where we found binaries that were not registering on any one of the 60 different anti-virus engines and yet our machine learning anti-virus capability gave them threat rating as high as 80%. As we actually investigated the envelope manually, we discovered that there was an embedded threat, and