How Applying an AI-Defined Infrastructure Can

Total Page:16

File Type:pdf, Size:1020Kb

How Applying an AI-Defined Infrastructure Can Cognizant 20-20 Insights Digital Systems & Technology How Applying an AI-Defined Infrastructure Can Boost Data Center Operations An artificial-intelligence-based infrastructure that uses the data available within the data center to optimize and automate infrastructure operations can enhance operational efficiencies and improve the quality of service offered to the business. Executive Summary It is hardly news that artificial intelligence (AI) is entering Moreover, the use of AI within the data center is growing the mainstream. In fact, Gartner predicts that by 2022 steadily. In this context, AI is being used to predict and AI will contribute nearly $3.9 trillion in business value automate many of the tasks that humans currently globally,1 and that 40% of all application development perform. This concept is known as an AI-defined data projects will have AI developers on their teams. Not center.3 As automation and the use of code to run the surprisingly, Gartner also places AI-based technologies data center through software-defined technologies strongly in the top trends for 2019.2 mature, data center operations are becoming much more efficient, with fewer mistakes due to manual August 2019 Cognizant 20-20 Insights interventions. The logical next step in increasing elements of its IT infrastructure operations.6 Other performance is the use of an AI-defined vendors such as Extreme Networks are reportedly infrastructure.4 readying AI to enhance operations capabilities within networks. Recent studies by EMC and Intel for Forbes Insights5 reveal that 70% of organizations classified This white paper explores the evolution of the data as leaders in digital transformation believe that center and details how an AI-defined infrastructure data and analytics will become integral to running can help businesses operate more efficiently. IT infrastructures within the next two to five years. It also provides high-level guidance on how IT Organizations such as Hitachi Vantara have already organizations can implement their own AI-defined begun incorporating AI technologies into storage data centers. Benefits of an AI-defined infrastructure The advantages — primarily operational — of using an AI-defined infrastructure include the following: ❙ Categorizing incidents automatically highlights ❙ Enhanced security and multilingual services of the key areas of the data center that operational an AI-defined infrastructure allow IT operations teams must focus on. to better use global teams. ❙ Using automated IT systems reduces the ❙ Increased data-driven insights into data center amount of human error in operational activities. operations raise awareness among leadership ❙ AI-based interactions with end users enhances teams for making efficiency gains. the quality of services provided to the business. ❙ Anomaly detection and quick automated ❙ Automatic assignment of capacity within the responses to threats further enhance the data center enables optimum cost utilization for security of data center operations. infrastructure. ❙ Predictive and preemptive resolution of incidents reduce down time for business applications. 2 / How Applying an AI-Defined Infrastructure Can Boost Data Center Operations Cognizant 20-20 Insights An AI engine for the data center The heart of an AI-defined data center is its AI engine. Figure 1 illustrates the architecture of AI-defined data centers. First, data from various sources needs to feed into then processes the data and provides an output, a central data repository, or data lake. The data which can be used either for reporting or to alert from that data lake is then fed into an AI engine, operations staff to take further steps or perform which features a combination of machine learning some activity automatically through automation (ML) and other AI-based capabilities. The engine technologies. Anatomy of an AI-defined data center Data Reporting/ Sources Alerting Data Lake Output Automatic AI Engine Operations Figure 1 Machine-learning algorithms 3. Clustering: These algorithms group data sets automatically into clusters based on similarities The four types of ML algorithms typically used for between data values. There are several clustering data learning and prediction are: algorithms available, all of which group data 1. Regression: These algorithms are used to values slightly differently. An example: “How do I forecast a numerical value based on the pattern group these servers based on their similarities in observed for the data series. An example: “What performance?” will the CPU utilization of my server be at 10 pm 4. Anomaly detection: These algorithms are used tomorrow night?” to automatically detect outliers in a data series 2. Classification: These algorithms are used to when the observed values do not follow the classify a data set into one of several predefined expected pattern. An example: “How do I detect categories. An example: “What is the priority a difference in network behavior when a virus has level of the ticket received — p1, p2 or p3?” attacked the network?” 3 / How Applying an AI-Defined Infrastructure Can Boost Data Center Operations Cognizant 20-20 Insights Figure 2 shows the mapping of potential data inputs available in a data center to potential outputs of ML algorithms. Mapping data inputs to outputs through ML algorithms Anomaly Automatic Category Data Inputs Regression Classification Clustering Detection Operations End User • Patch levels • User base • Security risk • Automatically • Anomalies • Reporting Computing • User allocation predictions classifications grouping of in patching and planning users based statuses over for patch • App service • Predicting • User type on feature sets time management status patching classifications available requirements • App service • Anomalies in • Automatic types user access patch classification • Anomalies in management services running for failures Server • Patch levels • Patch level • Clustering of • Anomalies in • Automatic Operating • Server roles classifications servers based patch levels patch System on their usage management • App service • Classification • Unexpected characteristics for failures status of server types server roles to business • Unexpected • Services functions services running outage • Classification management of service types to business processes Server • CPU, memory, • Data center sizing • Utilization levels • Clustering of • Unexpected • Auto-scaling Infrastructure storage, predictions (high/medium/ infrastructure utilization • Automatic networks • Utilization low) based on usage behaviors rebooting utilization characteristics predictions • Alerting for • Cooling, power anomaly and data center analysis. consumption • Serial numbers and asset inventory Storage • IOPS • Utilization • Utilization levels • Grouping of • Unexpected • Automatic • Utilization, and capacity (high/medium/ LUNs based utilization provisioning capacity predictions low) on usage behaviors of additional • Classification parameters storage into storage types Networks • Bandwidth • Utilization • Utilization levels • Grouping of • Unexpected utilization and capacity (high/medium/ network zones utilization • Ports and traffic predictions low) based on usage behaviors types • Unexpected ports/traffic types Figure 2 (continues on next page) 4 / How Applying an AI-Defined Infrastructure Can Boost Data Center Operations Cognizant 20-20 Insights Anomaly Automatic Category Data Inputs Regression Classification Clustering Detection Operations Firewall • Type of firewall • Classification • Unexpected • Source, into business/ network destination, infrastructure/ transactions ports used others Security • Usage anomalies • User access • Classification • Grouping of • Unexpected • Blocking • Authentication predictions into user types usage patterns user access of insecure (location, transactions • User access IP address, • Automatically • User location authentication moving virus • User IP address attempts, etc.) workloads to DMZ Databases • Usage • Utilization • Utilization levels • Clustering of • Unexpected • Utilization and capacity (high/medium/ databases based utilization predictions low) on usage behaviors Monitoring • Outage metrics • Outage • Criticality • Clustering • Nonordinary • Automatic • Logs predictions classifications outage types monitoring alerts ticket (P1, P2, etc.) generation • Preemptive fixes Load • Uptime • Downtime • Classification • Unexpected • Auto-scaling Balancing • Certificate usage predictions into normal/HA/ behaviors • Invoking DR DR scenarios Service Desk • Ticket metrics • Ticket predictions • Classification • Clustering • Increase in • Auto- • Frequently into P1, P2, P3, tickets based tickets after assigning searched topics etc. on features for patching or tickets based • Classification further analysis upgrades on priority into responsible levels operational team Licensing • Usage metrics • Software usage • User workload • Grouping • Spike in usage – & Software • Licensing terms predictions segmentation of servers/ e.g., OSS/FOSS Metering • Licensing applications software calculations (for resulting in example, with Java consolidation for SE, processor- reduced TCO based metric for • Utilization trends servers and named of license types user plus XX- based metric for desktops) • 3. Licensing recommendations Figure 2 (continued) 5 / How Applying an AI-Defined Infrastructure Can Boost Data Center Operations Cognizant 20-20 Insights If the CPU of a virtual machine is expected to spike every weekend, then the AI engine can automatically
Recommended publications
  • Cognizant—2019 Proxy Statement & Annual Meeting Notice
    2019Proxy Statement & Notice of Annual Meeting Proxy Guide 1 Chairman’s Letter 4 Notice of 2019 Annual Meeting 5 Corporate Governance 5 Governance Highlights 20 Committees of the Board 6 Board Overview 22 Human Capital Management and Talent Development 8 Proposal 1 Election of Directors 23 Commitment to Corporate Sustainability 8 Director Nominees 25 Director Compensation 14 Building an Experienced, Qualified and Diverse Board 26 Certain Relationships and Related Person Transactions 18 Director Selection and Voting Process 27 Stock Ownership and Reporting Corporate Governance Corporate 19 Risk Oversight 28 Compensation 35 Primary Compensation Elements 38 Compensation by Individual 28 Company Performance Snapshot 47 Other Elements of Compensation 29 Proposal 2 Advisory Vote on Executive Compensation 48 Company Policies Impacting Compensation (Say-on-Pay) 49 Compensation Committee Report 29 Compensation Discussion and Analysis 50 Executive Compensation Tables and Pay Ratio 30 Compensation Program Objectives Compensation 55 Potential Payments Upon Termination or 31 Compensation Structure Overview Change in Control 33 Compensation Setting Process 58 Audit Matters 58 Proposal 3 Ratification of Appointment of Independent Registered Public Accounting Firm 59 Auditor Fees 59 Audit Committee Report Audit Matters WHY ARE WE SENDING YOU THESE MATERIALS? On behalf of our board of directors, we are 60 Shareholder Proposals making these materials available to you 60 Proposal 4 Shareholder Proposal Regarding (beginning on April 18, 2019) in connection Political Disclosure with Cognizant’s solicitation of proxies for our 62 Proposal 5 Shareholder Proposal Regarding 2019 annual meeting of shareholders. Independent Board Chairman 64 Shareholder Proposals and Nominees for the WHAT DO WE NEED FROM YOU? 2020 Annual Meeting Please read these materials and submit Shareholder Proposals your vote and proxy using the Internet, by telephone or, if you received your materials by 65 Additional Information mail, you can also complete and return your proxy by mail.
    [Show full text]
  • Enabling Ubiquitous Buying Via Multichannel Fulfillment
    • Cognizant IBM Sterling Practice Overview Enabling Ubiquitous Buying via Multichannel Fulfillment Achieving True Multichannel Unique Nature of the Practice The retail landscape has changed dramatically over By remaining focused within the IBM Sterling com- the last few years, becoming increasingly complex merce space and seamlessly leveraging our vast as the “customer experience” spreads across capabilities in the areas of enterprise business retail channels. Customers today are “window- process consulting, change management, design, shopping” — researching, comparing and buying development, testing and QA among other areas, products online — and picking up or returning the our IBM Sterling commerce practice affords our product at stores. With the emergence of social customers an intimate consulting experience nor- and mobile commerce, customers want a seamless mally found in boutique consulting firms, but with shopping experience across channels. the added depth and breadth of a Tier 1 company. This cross-channel experience can be enabled We have some of the best IBM Sterling talent and only when there is a “buy anywhere, fulfill specialists — some with decades of implementa- anywhere” ability. tion experience. We team them up with business consultants who were retailers in the past and with IBM Sterling has a unique combination of powerful other IT practitioners with global project delivery capabilities: enterprise-wide inventory visibility; expertise. This combination of expertise can map a sophisticated order management mechanism retailer needs to the IBM Sterling product, suggest that can spawn multiple fulfillment channels; best practices and successfully implement in a inventory tracking across the entire supply chain; cost-optimized global delivery model. Our IBM and integration with multiple order capture Sterling practice is able to provide end-to-end systems.
    [Show full text]
  • GETTING AHEAD in CYBER RISK a Differentiated Approach for Communications, Media and Technology Providers
    GETTING AHEAD IN CYBER RISK A differentiated approach for Communications, Media and Technology providers KEY TAKEAWAYS Companies in the Communications, Media and Technology (CMT) industry, especially in the 1 telecommunications sector, operate across multiple technology platforms and jurisdictions, exposing them to wide-ranging cyber risks. The industry often acts as a conduit for information and transaction flows and forms a fundamental component of other key sectors, making it a particularly attractive target. Business interruptions and reputational damage are perceived to be the most critical cyber 2 loss scenarios for CMT companies and their stakeholders. A cyber incident can cause significant financial losses stemming from service disruption, as well as loss of trust due to breach of customer privacy. In the case of reputational damage, on average it is much more pronounced for the CMT industry than other industries. In the face of a cyberattack, the CMT industry is perceived to incur the highest financial cost 3 across all surveyed industries. Among cyber threats, financially-motivated ones are the biggest concern for CMT companies. As shown by results of the latest Marsh Microsoft Global Cyber Risk Perception Survey, more than 80 percent of respondents from the CMT industry expect a cyber breach to cost them more than $1 million per case, as compared to a cross-industry average of 65 percent.1 Proactive measures are needed to increase the visibility of cyber risk issues within CMT 4 companies, and cyber risk management should be made a shared responsibility across the firm. While the risks have been recognized by the industry, more can be done by CMT companies to establish and implement a holistic framework, encompassing cyber hygiene, governance, quantification of risks, and adequate board oversight.
    [Show full text]
  • The Forrester Wave™: Microsoft Dynamics 365 Services, Q2 2019 the 12 Providers That Matter Most and How They Stack up by Leslie Joseph May 21, 2019
    LICENSED FOR INDIVIDUAL USE ONLY The Forrester Wave™: Microsoft Dynamics 365 Services, Q2 2019 The 12 Providers That Matter Most And How They Stack Up by Leslie Joseph May 21, 2019 Why Read This Report Key Takeaways In our 23-criterion evaluation of Microsoft Avanade, HCL Technologies, And PwC Lead Dynamics 365 service providers, we identified the The Pack 12 most significant ones — Avanade, Cognizant, Forrester’s research uncovered a market in DXC Technology, HCL Technologies, Hitachi which Avanade, HCL Technologies, and PwC Solutions, IBM, Infosys, KPMG, PwC, Sonata are Leaders; DXC Technology, Hitachi Solutions, Software, Tata Consultancy Services (TCS), and Infosys, KPMG, and Sonata Software are Strong Wipro — and researched, analyzed, and scored Performers; and Cognizant, IBM, TCS, and Wipro them. This report shows how each provider are Contenders. measures up and helps application development Business Consulting, Cloud, And Delivery and delivery professionals select the right one for Excellence Are Key Differentiators their needs. As Microsoft Dynamics evolves into a business applications platform, breadth of consulting and delivery capabilities and depth in intellectual property (IP) and domain knowledge will dictate which providers will lead the pack. Vendors that can provide these capabilities position themselves to successfully deliver Microsoft Dynamics services to their customers for high business impact at low risk. This PDF is only licensed for individual use when downloaded from forrester.com or reprints.forrester.com. All
    [Show full text]
  • Everest Group PEAK Matrix™ for Devops Service Providers 2019
    ® Everest Group PEAK Matrix™ for DevOps Service Providers 2019 Focus on Capgemini September 2019 ® ™ Copyright © 2019 Everest Global, Inc. This document has been licensed for exclusive use and distribution by Capgemini EGR-2019-32-E-3316 Introduction and scope Everest Group recently released its report titled “DevOps Services PEAK Matrix™ Assessment and Market Trends 2019 – Siloed DevOps is No DevOps! ” This report analyzes the changing dynamics of the DevOps services landscape and assesses service providers across several key dimensions. As a part of this report, Everest Group updated its classification of 20 service providers on the Everest Group PEAK Matrix™ for DevOps services into Leaders, Major Contenders, and Aspirants. The PEAK Matrix is a framework that provides an objective, data-driven, and comparative assessment of DevOps service providers based on their absolute market success and delivery capability. Based on the analysis, Capgemini emerged as a Leader. This document focuses on Capgemini’s DevOps services experience and capabilities and includes: ⚫ Capgemini’s position on the DevOps PEAK Matrix ⚫ Detailed DevOps services profile of Capgemini Buyers can use the PEAK Matrix to identify and evaluate different service providers. It helps them understand the service providers’ relative strengths and gaps. However, it is also important to note that while the PEAK Matrix is a useful starting point, the results from the assessment may not be directly prescriptive for each buyer. Buyers will have to consider their unique situation and requirements, and match them against service provider capability for an ideal fit. Source: Everest Group (2019) unless cited otherwise ® Copyright © 2019, Everest Global, Inc.
    [Show full text]
  • COGNIZANT TECHNOLOGY SOLUTIONS CORPORATION (Exact Name of Registrant As Specified in Its Charter)
    Table of Contents UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 FORM 10-K FOR ANNUAL AND TRANSITION REPORTS PURSUANT TO SECTIONS 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 (Mark One) ☒ ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the fiscal year ended December 31, 2020 OR ☐ TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the transition period from to Commission File Number 0-24429 COGNIZANT TECHNOLOGY SOLUTIONS CORPORATION (Exact Name of Registrant as Specified in Its Charter) Delaware 13-3728359 (State or Other Jurisdiction of (I.R.S. Employer Incorporation or Organization) Identification No.) 300 Frank W. Burr Blvd. Teaneck, New Jersey 07666 (Address of Principal Executive Offices including Zip Code) Registrant’s telephone number, including area code: (201) 801-0233 Securities registered pursuant to Section 12(b) of the Act: Title of each class Name of each exchange on which registered Trading Symbol(s) Class A Common Stock, $0.01 par value per share CTSH The Nasdaq Stock Market LLC Securities registered pursuant to Section 12(g) of the Act: None Indicate by check mark if the registrant is a well-known seasoned issuer, as defined in Rule 405 of the Securities Act. ☒ Yes ☐ No Indicate by check mark if the registrant is not required to file reports pursuant to Section 13 or Section 15(d) of the Act. ☐ Yes ☒ No Indicate by check mark whether the registrant (1) has filed all reports required to be filed by Section 13 or 15(d) of the Securities Exchange Act of 1934 during the preceding 12 months (or for such shorter period that the registrant was required to file such reports), and (2) has been subject to such filing requirements for the past 90 days.
    [Show full text]
  • Everest Group PEAK Matrix for Insurance Analytics and Insights (AI) Third-Party Services 2020
    Everest Group PEAK Matrix® for Insurance Analytics and Insights (A&I) Third-party Service Providers 2020 Focus on Cognizant August 2020 Copyright © 2020 Everest Global, Inc. This document has been licensed for exclusive use and distribution by Cognizant EGR-2020-28-E-3907 Insurance Analytics and Insights (A&I) Third-party Services PEAK Matrix® Assessment 2020 Background and methodology of the research In recent times, insurance Analytics & Insights (A&I) has emerged as a fast-growing, high-potential market. Insurance enterprises are looking beyond traditional data management services to focus on customer experience. To tap into the dynamically changing consumer needs of today and optimize their product portfolios with targeted offerings, insurers have started leveraging third-party support for analytics services. Service providers, in turn, have started investing in advanced analytics, in addition to visualization and reporting services. In this research, we present detailed assessments of 17 insurance A&I service providers, based on their vision, capabilities, and market impact, and look at their relative positioning on the Everest Group PEAK Matrix® for Insurance A&I Services. Our assessment is based on Everest Group’s annual RFI process for H2 2019, interactions with leading insurance A&I service providers, client reference checks, and an ongoing analysis of the insurance A&I services market. This report features 17 insurance A&I service provider profiles, each of which includes: ⚫ Relative positioning of the service provider on Everest
    [Show full text]
  • ISG Providerlens™ Quadrant Report
    Salesforce Ecosystem Partners Germany 2020 A research report comparing provider Quadrant Report strengths, challenges and competetive differentiators. March 2020 Customized report courtesy of: ISG Provider Lens™ Quadrant Report | March 2020 Section Name About this Report Information Services Group, Inc. is solely responsible for the content of this report. ISG Provider Lens™ delivers leading-edge and actionable research studies, reports and consulting services focused on technology and service providers’ strengths and Unless otherwise cited, all content, including illustrations, research, conclusions, weaknesses and how they are positioned relative to their peers in the market. These assertions and positions contained in this report were developed by and are the sole reports provide influential insights accessed by our large pool of advisors who are property of Information Services Group, Inc. actively advising outsourcing deals as well as large numbers of ISG enterprise clients who are potential outsourcers. The research and analysis presented in this report includes research from the ISG Provider Lens™ program, ongoing ISG Research programs, interviews with ISG advisors, For more information about our studies, please email [email protected], briefings with services providers and analysis of publicly available market information call +49 (0) 561-50697537, or visit ISG Provider Lens™ under ISG Provider Lens™. from multiple sources. The data collected for this report represents information that ISG believes to be current as of February 2020 for providers who actively participated as well as for providers who did not. ISG recognizes that many mergers and acquisitions have taken place since that time, but those changes are not reflected in this report.
    [Show full text]
  • 2018 Top 200 Employers for STEM OPT Students
    2018 Top 200 Employers for OPT and STEM OPT Students Number of Students Number of Students Number of Students Participating in Top 200 Employer Names Participating in OPT or STEM OPT Participating in OPT in 2018 STEM OPT in 2018 in 2018 Amazon 2,911 851 2,395 Integra Technologies LLC 2,081 1,302 936 Intel Corporation 1,348 368 1,111 Google 1,193 308 996 Microsoft Corporation 867 243 690 AZTech Technologies LLC 854 705 188 Deloitte 747 216 579 Facebook 725 259 528 XCG Design Corporation 680 355 362 Tellon Trading, Inc 647 455 229 IBM 628 143 563 Veridic Solutions 558 332 307 Apple, Inc 538 166 433 CG Max Design Corp 521 224 326 Global IT Experts, Inc 467 442 28 Marlabs, Inc 448 166 311 Randstad 439 231 231 Ernst & Young 432 157 298 Qualcomm Technologies, Inc 416 118 351 PricewaterhouseCoopers 412 160 273 Cisco System, Inc 411 133 322 Populus Group 381 137 275 Cerner Corporation 380 94 313 Modis E&T LLC 374 120 281 Capgemini America 370 99 312 Insight Global 357 160 217 eBay or PayPal 350 116 274 JP Morgan Chase 348 68 295 Robert Half 346 260 96 University of Florida 335 224 118 Saibersys 330 144 203 Cloud Big Data 324 251 98 2018 Top 200 Employers for OPT and STEM OPT Students Walmart 320 124 224 Massachusetts Institute of Technology 315 119 220 Sinocontech 315 252 73 Cummins 312 90 241 Findream, LLC 312 112 209 Goldman Sachs 312 112 232 Stanford University 306 113 215 Oracle 305 73 256 Cognizant 301 54 258 Collabera 300 149 161 Arizona State University 298 258 59 Tesla, Inc 296 126 198 Elbum LLC 291 236 60 Apex Systems 282 115 182 Pioneer
    [Show full text]
  • Everest Group Healthcare Provider Digital Services PEAK Matrix
    ® Everest Group PEAK Matrix® for Healthcare Provider Digital Services 2020 Focus on Cognizant July 2020 ® Copyright © 2020 Everest Global, Inc. This document has been licensed for exclusive use and distribution by Cognizant EGR-2020-45-E-3864 Background of the research Healthcare providers have historically been mired down by the legacy IT estate and regulations that have had the unfortunate consequence of incentivizing them to maintain the status quo. However, that is not an option anymore, particularly as healthcare providers scramble to meet the unprecedented needs of a world disrupted by the COVID-19 pandemic. Healthcare providers are now being forced to jump on the digital bandwagon to meet the demands faced by the healthcare ecosystem to battle this outbreak. To support enterprises on their digital journeys, service providers are ramping up capabilities through healthcare-specific partnerships and acquisitions. This, in turn, is driving the need for research and market intelligence on demand and supply trends in healthcare provider digital services. Everest Group’s healthcare ITS research program addresses this market need by analyzing demand themes and service provider capabilities in healthcare provider digital services. In this report, we analyze the capabilities of 22 IT service providers specific to the healthcare provider sector globally. These service providers are mapped on the Everest Group PEAK Matrix®, which is a composite index of a range of distinct metrics related to a provider’s capability and market impact. We focus on: Provider digital services Digital services themes Assessment of the service providers Everest Group’s independent market size and growth for healthcare providers on several capability- and market remarks on service providers success-related dimensions Scope of this report ⚫ Geography: Global ⚫ Services: Digital services ⚫ Industry: Healthcare provider ® Copyright © 2020, Everest Global, Inc.
    [Show full text]
  • HFS Enterprise AI Services Top 10 Report – Excerpt for KPMG
    HFS Enterprise AI Services Top 10 Report – Excerpt for KPMG Reetika Fleming, Research Vice President Tapati Bandopadhyay, Research Vice President September 2019 Madhuparna Banerjee, Knowledge Analyst © 2019, HFS Research Ltd - Excerpt for KPMG “The services market for artificial intelligence technologies is rapidly maturing on the back of several years of learning and a realization—delivering AI is unlike delivering any other technology thus far. Delivering on the promise of AI calls for far more collaboration between service providers, tech vendors, and enterprise clients.” —Reetika Fleming, Research Vice President “The biggest differentiator in enterprise AI services, as described by most of the customer leaders, is the quality of people—not just the quantity available for a specific skill. Domain understanding and data engineering capabilities are top priorities. A culture of innovation, experimentation, collaboration, and cocreation with customers is the key winning formula here.” —Tapati Bandopadhyay, Research Vice President 2 © 2019, HFS Research Ltd - Excerpt for KPMG What you’ll read Topic Page Introduction, methodology, and definitions 4 Executive summary 11 The HFS Top 10 Enterprise AI services provider results 16 Enterprise AI service provider profiles 19 About the authors 21 3 © 2019, HFS Research Ltd - Excerpt for KPMG Introduction, methodology, and definitions 4 © 2019, HFS Research Ltd - Excerpt for KPMG Introduction ● Artificial intelligence (AI) may be perceived as a buzzword, but it is undoubtedly also cementing itself as a key change agent in the way enterprises do business. Its capacity to derive deep insights from unstructured data, to learn and improve from its activity, and to optimize business operations means that despite still being a nascent technology, its value to organizations is clear.
    [Show full text]
  • Application Management and Development - Takeaways from IBM Services
    Application Management and Development - Takeaways from IBM Services FEATURING RESEARCH FROM FORRESTER The Forrester Wave™: Applications Management And Digital Operations Services, Q4 2017 2 Application Management and Development - Takeaways from IBM Services Today’s enterprises are continuously challenged to keep pace in a business world increasingly populated by nimble startups and born-digital companies, especially those that achieve formidable scale very fast. These incumbent enterprises once relied on their IT cores as a source of competitive advantage. Now, those same IT cores are increasingly making it difficult for them to adapt to a “new normal” in terms of speed, efficiency and resilience: Speed: Traditional release cycles took months. With the help of agile development methods, and tightly integrated team structures, today’s leading businesses are able to deploy with hyper-frequency, allowing them to introduce new features and capabilities on a continuous basis. Efficiency: Through greater business integration, automation and the adoption of agile principles, IN THIS DOCUMENT organizations can become more efficient. Prioritizing business requirements and driving out unnecessary scope and feature bloat are key to the new-normal efficiency. 1 Application Management and Resilience: With multiple levels of proactive self-healing mechanisms, today’s organizations are Development - making zero-downtime systems a reality. To adapt, organizations must replace or modernize their Takeaways from IBM Services applications. This means an ambidextrous approach to application modernization is needed where the organization pursues multiple different performance zones simultaneously: Research From 3 • Optimize the core: By continuing to use traditional ADM techniques, but refining them with Forrester: The Forrester Wave™: modern tools and approaches like AI, Machine Learning and Automation, organizations can Applications optimize their existing IT cores to help cut costs and maximize efficiency.
    [Show full text]