Two hundred-year-olds speculate – will AI take our jobs?

When IBM was recently invited to give their yearly guest lecture at Stockholm School of Economics within the course “Humans vs. Algorithms: Judgment, Prediction and Nudges”, AI & ethics had a spot in the schedule, with extra focus on interactive assistants. As you may have guessed, centenarians were missing both in front of and behind […]

Continue reading

What is compliance and why is it important? Part 2

If you missed out on part 1 of the interview then please click here. I touch upon what compliance is and the risks related to a lack thereof. In conversation with Frank Oestergaard – Part 2 out of 2 Frank Oestergaard is a digital visionary and an experienced leader. He is the Director for Executive […]

Continue reading

How a supply chain attack closed one of Sweden’s largest supermarket chains

Last week, when heading out for some groceries, I was met with a note on the entrance to my local grocery store saying the store was closed due to IT problems. Working in IT security this immediately sparked my curiosity. What was going on? I quickly pulled up my mobile phone to check the news. […]

Continue reading

What is compliance and why is it important?

In this conversation with Frank Oestergaard we will cover the topic of compliance for businesses: what it is about, what risks to face and how to combat these.

Continue reading

Create a better world with a more fair and ethical AI

Just like electricity changed the last centuries for the better, AI will transform this era. AI can help society scale new heights – making us healthier, more prosperous and more sustainable. But as we celebrate and anticipate AI’s enormous potential for economic and social good, there are - as with any new wave of technology - questions and concerns.

Continue reading

Data breaches – a game of Russian roulette, carefully selected targets or exploiting the circumstances?

From a criminal viewpoint, cybercrime has grown into an international and profitable business, one among other business fields. Behind data breaches one can usually find hacker groups supported by authoritarian governments, independent criminal groups or individuals skilled in information technology who have fallen onto the wrong side of the law, whose day jobs involve scanning through corporate web interfaces for gaps the size of a single line of code or malware.

Continue reading

Data virtualization challenges traditional technologies

Data virtualization, which has emerged alongside traditional solutions, aims to achieve the same end results data lakes and data warehouses. Which is better: self-service virtualization or a comprehensive data warehouse?

Continue reading

Technical implementation of data virtualization

The traditional way of implementing data virtualization is based on data federation, where the central coordinator of the network collects and partially processes the data sent by all nodes.

Continue reading

What to consider when choosing a tool and platform for an interactive assistant

When I was one of the speakers at the webinar “Interactive Assistants - Give the customer the right answer in all situations”, I was asked how to avoid including sensitive data in chatbot logs and the problems it can cause in terms of data security issues.

Continue reading