Raising AI to Benefit
Business and Society
The End of Distance
The Importance of
Built to Partner
INTELLIGENT ENTERPRISE UNLEASHED
The Accenture Technology Vision 2018 predicts the rapid
technology advancements that will improve how people work and live.
A recent study led by researchers at
the University of Michigan found that
accelerometers used in smartphones
to track walking distance and other
movement-related metrics can be
by a single acoustic tone
– some indefinitely.
2,100 steps in 40 minutes.
Stationary for 40 minutes.
The recently uncovered “Methbot” used
600,000 realistic IP addresses registered to
real Internet Service Providers to generate
anywhere between $3 to $5 million a day in
false advertising revenue.
Other botnets, like Mirai, have taken down
ISPs and telephone networks through
massive DDoS attacks. These attacks
increasingly exploit consumer IoT devices in
ways the manufacturers don’t realize, or
even know, to look for.
CREATING A DATA
Existing capabilities within cybersecurity and analytics practices provide
a foundation on which to build a new “data intelligence” practice. It will
work to build data veracity, and uncover business practices that might
be encouraging manipulated data. These initiatives will help businesses
be confident in their insights, while remaining alert to new potential threats.
Companies can address irregularities and maintain
integrity with additional safeguards…
Each Dragon Capsule produced by SpaceX
uses six computers operating
in pairs to validate calculations, ensuring that
spacecraft flight and International Space
Station docking maneuvers are made with
the utmost certainty.
Each pair checks its calculations against the
others, and only proceeds when at least two
pairs return the same result.
GO NO GO
…and compare questionable data with external
sources for additional verification.
Google is using machine learning to remove apps with overreaching permissions from its Play Store.
• Camera flash LED.
• Ambient light sensor.
• Camera Flash LED.
• Ambient Light Sensor.
• Phone Contacts.
• Location Data.
• Browser History.
data monitoring, auditing,
and verification services will
be a core offering
from cloud providers; leaders
will go a step further to offer
services that will proactively
notify its customers if they
detect gaming of automated
there will be a major war
started by state-sponsored
cyberattack. Through 2025,
most IoT devices will still lack
cybersecurity features and
will be a primary injection
for those looking to game
the first business will
be effectively shuttered
by regulators for failure
to sufficiently protect