From customer service to meeting management, AI has started to take over the busy work for us humans. However, the verdict on where it will lead us is still out there. Will it allow us to focus on essential things in work and life? Or will it be just another technology? A closer look at previous technological upheavals…
Category: AI
Expert Panel: 20 Questions To Ask A SaaS Vendor
It’s essential to ask a series of important questions—and it’s also essential that the potential SaaS vendor can give satisfactory answers.
Clone Me: Data Ownership In The Age Of AI
AI has started to supercharge scams, and with the data we share on social media, it is becoming far too easy for attackers to take control of our identities.
Open-Source and LLMs: We Need an Honest Partnership
Are many of the current “open-source” Large Language Models genuinely Open? Join me to find out about the ideas behind open-source and the current state of AI.
Risk In AI – Tackling Data Privacy Head On
Privacy rights have become an expensive risk. Yet, companies utilize customer data to train AI models. Let us look at the implications on risk management.
AI Exploits Our Social Media Habits To Supercharge Scam Attacks
Identity theft and social engineering aren’t new, yet AI is supercharging them. It is social media into a danger to our digital identities.
AI Investment: Different or Same Old Story
Venture investment sums have tanked in all fields except for AI. Why is AI different and should it be? Learn more about AI investments and working strategies.
Strategic Risk and End of OpenAI at Start-Ups
OpenAI has been at the forefront of the latest hypercycle in Artificial Intelligence. Yet, we shouldn’t make our companies dependent on a single partner.
AI Strategy: Your Board-Level Topic of the Future?
AI is a convenient topic when discussing IT strategy with the board of directors. Let us look at three situations when to do so and when to skip.
Opening Up To Open Source: Why AI Needs To Become A Community Affair
From Mentoring to medical diagnostics, AI has many applications. Yet, in many cases, the general models available today must be tweaked and adapted to fit the purpose. After all, giving affirmations and detecting cybersecurity threats are very different ideas. Yet, the same open-source basis can be used for many scenarios. Being able to own the…