When you say AI, everybody knows what you mean. Artificial intelligence. Who isn’t talking about artificial intelligence these days? But let me explain why that term has some real shortcomings.
“Artificial” often suggests something made up, unreal, and abstract. That may be fine if you’re talking about applications such as gamification. But when it comes to the real world – the network and the facts that your appliances are gathering – you are interested in truth, not artificiality.
The term Assimilated Intelligence may be a better way to describe what it is we want. “Assimilated” indicates that we have gathered things together, that we have adapted, blended, and integrated the elements that are important to us. We have brought facts together to form new knowledge. Without a doubt, we must be able to depend upon this new knowledge being truthful.
An issue of security
It is really an issue of security. That is our first ingredient. Then we add trust, mix in some immutable data, and we move on to Assimilated Intelligence. It is a composition of many things, and focusing on any one of them doesn’t give us the big picture.
Let’s start with the indisputable fact that if information is valuable, and if it contains any notions of privacy, we have to do all we can to protect it.
Anytime you embark on an Assimilated Intelligence project, you must be able to verify and validate it as secure. Otherwise all you are doing is creating an opportunity to lose everything you have assimilated.
If you are using Assimilated Intelligence to make decisions – and that is the core notion of it –the effectiveness of your decision points is essentially worthless if you cannot absolutely count on the validity of the information. It could become a vicious circle of distrust.
Security and trust must reign from end to end, with the network at one end and the appliances at the other. And while most people think of a network as a distribution system, in the true future state that we want to achieve, the transactions of value that occur on a network must be peer-to-peer to assure validity.
Basically, there are really only two types of networks, a broadcast network or a peer-to-peer. If it is a broadcast network, I might as well be taking a megaphone and telling the world my secrets. But in a peer-to-peer network, my secrets remain between me and the other endpoint.
Security and trust are so critical here that if you are even thinking about Assimilated Intelligence, the first and absolute requirement is that you have that security-plus-trust paradigm in place. You must be able to trust both the network and the endpoints.
The four fundamentals
How do you do that? By focusing on four fundamental elements:
- The network upon which you will use this information. Always seek the most intelligent and highly qualified network system, with security credentials and the assurance of trust.
- The application. Is it secure, and can it be trusted by using certificates of authority if needed? Can you add higher degrees of intelligence and security to the application?
- The appliance itself. It’s one thing if the appliance is a toaster, and quite another if you are gathering Assimilated Intelligence from a car or a building. The criticality of security rises with the level of human interaction and engagement of the appliance.
- The service. Determine how easy it is to provision and assure that you understand its true costs. Also, be sure that it extends your credibility to those you do business with, by guaranteeing that the information being shared is safe, secure, and truthful.
In the end, Assimilated Intelligence is a network function. You must have a network to assimilate the data. An appliance cannot do that itself unless it has many sensors attached to it. But even in that case, in essence the appliance has just created its own network. The network will always be the core, and the crux, of Assimilated Intelligence.