SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
© 2016 IBM Corporation
Takashi Mukaida
IBM Resiliency Services
IBM Japan, Ltd.
One chart presentation
Positioning to utilize cognitive
technologies in BCP/BCM world
© 2016 IBM Corporation
IBM Resiliency Services
Positioning to utilize cognitive technologies in BCP/BCM world
2
Data collection method
Objective
Single
incident
Predict
future
Analyze
the past
Multiple
incidents
Type1
Incident
Analysis
Type2
Dynamic
Alerts
Type3
Knowledge
share
Big data analysis for an earthquake.
Preventive maintenance for IT.
Dynamic cyber risk detection.
Find un-expected risks.
(Notes) The chart is my own and doesn't necessarily represent IBM's positions, strategies or opinions.
Cognitive technologies are utilized from past analysis to predict future in
BCP/BCM world.
© 2016 IBM Corporation
IBM Resiliency Services
Positioning to utilize cognitive technologies in BCP/BCM world
(Speakerʼs note)
The deployment scenario of cognitive technologies in BCP/BCP area can be mapped in the frame based on ʻObjectiveʼ and ʻData
collection methodʼ.
ʻObjectiveʼ means what we want to make clear. It means ʻAnalyze the pastʼ or ʻPredict futureʼ.
ʻData collection methodsʼ means what data we collect for the input of cognitive system. It means ʻCollect the data for the single
incident( for example, a large earthquake)ʼ or ʻCollect multiple incidentsʼ
The deployment scenario can be categorized in three types in the current Japanʼs market.
Type1 Incident analysis
Collect several data (Big data) about a critical incident (earthquake etc.), perform simulations to know what happened at the
incident, and solve the issues found in the simulations to mitigate the damage from the similar incidents in the future. For
example, collect GPS data of cellular phones in the damaged area at Tohoku Earthquake and simulate how people evacuated
at that time. The type is mainly attempted by local governments and the mass media in Japan.
Type2 Dynamic alerts
Collect all incidents at the specific environment in the long period, analyze the correlation of the incidents, then issue the
real-time alert when the similar incidentʼs patterns are occurred. The popular deployment cases are ʻPreventive maintenance
for ITʼ and ʻDynamic cyber risk detectionʼ.
Type3 Knowledge share
Collect any incidents throughout projects, companies, countries and regions, then share the findings as a common cognitive
service for users to be advised un-expected or brand-new risks which they arenʼt even noticed. For example, get the advice
customized by local situation when a company starts a global business in a new place. Also get an alert when pandemic
occurred near the userʼs place.
3
© 2016 IBM Corporation
IBM Resiliency Services
End
4

Contenu connexe

En vedette

Asymmetric Policy sebagai Inovasi untuk Akselerasi Pembangunan Perbatasan Negara
Asymmetric Policy sebagai Inovasi untuk Akselerasi Pembangunan Perbatasan NegaraAsymmetric Policy sebagai Inovasi untuk Akselerasi Pembangunan Perbatasan Negara
Asymmetric Policy sebagai Inovasi untuk Akselerasi Pembangunan Perbatasan NegaraTri Widodo W. UTOMO
 
FMEA and Six sigma By Ihsanullah mansoor
FMEA and Six sigma By Ihsanullah mansoorFMEA and Six sigma By Ihsanullah mansoor
FMEA and Six sigma By Ihsanullah mansoorihsan467
 
Laboratorium Inovasi 2015: Kota Yogyakarta, Kabupaten Majalengka, Kabupaten M...
Laboratorium Inovasi 2015: Kota Yogyakarta, Kabupaten Majalengka, Kabupaten M...Laboratorium Inovasi 2015: Kota Yogyakarta, Kabupaten Majalengka, Kabupaten M...
Laboratorium Inovasi 2015: Kota Yogyakarta, Kabupaten Majalengka, Kabupaten M...Tri Widodo W. UTOMO
 
Final industrial report (SQUARE Textiles Limited)
Final industrial report (SQUARE Textiles Limited)Final industrial report (SQUARE Textiles Limited)
Final industrial report (SQUARE Textiles Limited)Taukir Kabir Tusar
 

En vedette (6)

Asymmetric Policy sebagai Inovasi untuk Akselerasi Pembangunan Perbatasan Negara
Asymmetric Policy sebagai Inovasi untuk Akselerasi Pembangunan Perbatasan NegaraAsymmetric Policy sebagai Inovasi untuk Akselerasi Pembangunan Perbatasan Negara
Asymmetric Policy sebagai Inovasi untuk Akselerasi Pembangunan Perbatasan Negara
 
Kupang Kabupaten Inovasi
Kupang Kabupaten InovasiKupang Kabupaten Inovasi
Kupang Kabupaten Inovasi
 
FMEA and Six sigma By Ihsanullah mansoor
FMEA and Six sigma By Ihsanullah mansoorFMEA and Six sigma By Ihsanullah mansoor
FMEA and Six sigma By Ihsanullah mansoor
 
Laboratorium Inovasi 2015: Kota Yogyakarta, Kabupaten Majalengka, Kabupaten M...
Laboratorium Inovasi 2015: Kota Yogyakarta, Kabupaten Majalengka, Kabupaten M...Laboratorium Inovasi 2015: Kota Yogyakarta, Kabupaten Majalengka, Kabupaten M...
Laboratorium Inovasi 2015: Kota Yogyakarta, Kabupaten Majalengka, Kabupaten M...
 
Dyeing
DyeingDyeing
Dyeing
 
Final industrial report (SQUARE Textiles Limited)
Final industrial report (SQUARE Textiles Limited)Final industrial report (SQUARE Textiles Limited)
Final industrial report (SQUARE Textiles Limited)
 

Dernier

Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxUdaiappa Ramachandran
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXTarek Kalaji
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 

Dernier (20)

Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
 
20230104 - machine vision
20230104 - machine vision20230104 - machine vision
20230104 - machine vision
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
201610817 - edge part1
201610817 - edge part1201610817 - edge part1
201610817 - edge part1
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBX
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 

Positioning to utilize cognitive technologies in BCP/BCM world

  • 1. © 2016 IBM Corporation Takashi Mukaida IBM Resiliency Services IBM Japan, Ltd. One chart presentation Positioning to utilize cognitive technologies in BCP/BCM world
  • 2. © 2016 IBM Corporation IBM Resiliency Services Positioning to utilize cognitive technologies in BCP/BCM world 2 Data collection method Objective Single incident Predict future Analyze the past Multiple incidents Type1 Incident Analysis Type2 Dynamic Alerts Type3 Knowledge share Big data analysis for an earthquake. Preventive maintenance for IT. Dynamic cyber risk detection. Find un-expected risks. (Notes) The chart is my own and doesn't necessarily represent IBM's positions, strategies or opinions. Cognitive technologies are utilized from past analysis to predict future in BCP/BCM world.
  • 3. © 2016 IBM Corporation IBM Resiliency Services Positioning to utilize cognitive technologies in BCP/BCM world (Speakerʼs note) The deployment scenario of cognitive technologies in BCP/BCP area can be mapped in the frame based on ʻObjectiveʼ and ʻData collection methodʼ. ʻObjectiveʼ means what we want to make clear. It means ʻAnalyze the pastʼ or ʻPredict futureʼ. ʻData collection methodsʼ means what data we collect for the input of cognitive system. It means ʻCollect the data for the single incident( for example, a large earthquake)ʼ or ʻCollect multiple incidentsʼ The deployment scenario can be categorized in three types in the current Japanʼs market. Type1 Incident analysis Collect several data (Big data) about a critical incident (earthquake etc.), perform simulations to know what happened at the incident, and solve the issues found in the simulations to mitigate the damage from the similar incidents in the future. For example, collect GPS data of cellular phones in the damaged area at Tohoku Earthquake and simulate how people evacuated at that time. The type is mainly attempted by local governments and the mass media in Japan. Type2 Dynamic alerts Collect all incidents at the specific environment in the long period, analyze the correlation of the incidents, then issue the real-time alert when the similar incidentʼs patterns are occurred. The popular deployment cases are ʻPreventive maintenance for ITʼ and ʻDynamic cyber risk detectionʼ. Type3 Knowledge share Collect any incidents throughout projects, companies, countries and regions, then share the findings as a common cognitive service for users to be advised un-expected or brand-new risks which they arenʼt even noticed. For example, get the advice customized by local situation when a company starts a global business in a new place. Also get an alert when pandemic occurred near the userʼs place. 3
  • 4. © 2016 IBM Corporation IBM Resiliency Services End 4