Latest News for 4TC
We have loads to say!
We have loads to say!
Over the last 2 decades, no technology has had more of an impact on workplace IT than the Cloud. From small-scale data storage to the infrastructure that hosts large-scale corporate networks, cloud computing services offer versatile, scalable resources that can be adapted to the needs of large and small businesses alike.
As you read this, it’s likely your business utilises cloud computing to some degree. From storage services like Dropbox and workplace productivity suites like Microsoft 365, to hosting solutions for websites or databases, the cloud has helped many businesses remain competitive and agile over the last decade. Today, it’s estimated that around 94% of companies leverage cloud computing services in one form or another.
Despite the clamour to embrace the cloud in recent years, many businesses remain cautious about exploring further uses for cloud computing in their operations. This can often be attributed to misconception about the cloud, such as unfounded fears that it affords less privacy and control than on-premise hosting solutions. However, with careful configuration, and strategic guidance from a committed IT support provider, cloud computing can be a powerful force for business growth, delivering the flexible, cost-efficient and remote-ready solutions businesses need to stay competitive in today’s dynamic business environment.
Here are 4 ways Cloud computing can be harnessed to create value and drive growth in your business.
The access-anywhere nature of the cloud makes it an ideal fit for businesses looking to unite remote workforces. We saw this during the covid pandemic, which at its peak, saw almost half the UK workforce working remotely. Communication Platforms like Microsoft Teams and Zoom became household names, as smaller companies in particular chose cloud applications as the default tools for remote workforces.
While many of us have returned to the office, remote access solutions remain an integral feature of business IT, giving employees a degree of flexibility in their work schedules by retaining working-from-home as a viable option. While technologies like remote access VPNs and SD-WAN provide an option for secure remote access to business resources, cloud-hosting and cloud-based applications remain one of the simplest and most cost-effective ways to facilitate effective collaboration.
One solution that has arguably revolutionised workplace collaboration more than any other, is the world’s pre-eminent workplace productivity suite: Microsoft 365. Providing scalable file storage, a class-leading virtual meeting platform, customisable collaboration spaces, powerful task management features, plus several options for implementing workflow automation, Microsoft 365 delivers the tools and capabilities businesses need to empower focussed and efficient collaboration, both remotely and in the office.
Live document collaboration allows multiple Microsoft 365 users to collaborate on the same document in real-time, with revisions made immediately saved to the cloud. Plus, hundreds of third-party integrations allows businesses to customise their Microsoft 365 environment with the tools they’re already using, with support for the likes of Saleforce, Asana, Hubspot and Trello.
In 2022, the global cloud computing market was valued at $569.31 billion. By 2030, that figure is expected to hit $2.432 trillion. These forecasts illustrate the growth in cloud computing that’s still to come, as businesses both big and small expand their cloud footprint even further. As the cloud continues to grow, tech companies will shift their focus even further into the domain of cloud computing. This could leave businesses without a cloud presence unable to access the latest innovations, and the disruptive technologies that are likely to transform how we live and work over the coming years and decades.
Examples include technologies like AI and Machine learning, which have already made waves in the business technology space, with applications ranging from chatbots and data analysis to predictive security tools and sales forecasting.
Business process automation (BPA) represents another unexplored frontier for many businesses, with the cloud providing the easiest route-of-entry to this efficiency-boosting technology. From cloud-based accounting software that can automate expense management, invoice filing and financial reporting, to human resources management systems that deliver automation for payroll, employee onboarding and performance management, cloud-hosted software provides countless opportunities to introduce automation to your business’s workflows.
The cloud even provides options for introducing simple, no-code automations to rule-based repetitive tasks like data entry, data validation and form filling. Robotic process automation (RPA) platforms allow organisations to integrate applications that would otherwise require manual data transfer, thus giving staff more time to focus on activities that provide strategic business benefits.
In summary, by enabling seamless cross platform integration, and delivering the innovative tools businesses need to streamline time-consuming processes, the cloud is a compelling IT ecosystem for businesses that are keen to achieve efficiency-powered growth. Migrating to the cloud now will also ensure you’re able to exploit emerging technologies, helping you remain productive and competitive in an age of fast-paced technological change.
In the past, the notion of the cloud being inherently less secure than on-premise hosting was a myth in widespread circulation. Today, many businesses are realising that this simply isn’t the case, with as many as 94% reporting security improvements following cloud adoption.
Thanks to cyber security budgets amounting to billions of dollars, and data centres that feature advanced, enterprise-grade protections to defend against both cyber and physical threats, leading cloud services are safeguarded by defences most SMEs would struggle to establish in-house.
Microsoft Azure provides a good example of the types of protections applied to the data centres of large cloud service providers. Some of the key cyber security protections and measures incorporated in Azure’s data centres include:
Furthermore, many cloud platforms feature inbuilt security features that users can configure to further improve their security posture and safeguard sensitive data. Microsoft’s 365 data loss prevention features and advanced authentication protocols provide a good case in point, empowering users to take action to prevent unauthorised access to sensitive information in accordance with the stipulations of regulations such as the GDPR.
Other security controls and capabilities on offer include encryption, automated security updates and real-time threat detection and response that’s capable of providing network-wide identification and live threat neutralisation.
While cyber security may not seem instinctively related to business growth, it’s important to remember how damaging and potentially ruinous cyber breach events can be for small businesses, with as many as 60% of small businesses ceasing to trade following a data breach or cyber-attack. By embracing the cloud therefore, you help to protect the long-term success and viability of your business, by hosting your critical services and data in an environment equipped with some of the best security technologies around.
Growing businesses need fiscal headroom, and one of the ways to achieve this is by reducing operational expenditure.
The cloud allows businesses to run resource-efficient, cost-effective IT infrastructure thanks to flexible pricing mechanisms that are responsive to changing business demands. Pay-as-you-go, pay-per-user, reserved instances, and spot instances are just some of the pricing models used by cloud service providers, which give businesses the ability to scale-up and down according to fluctuating needs, and avoid the resource overprovisioning that’s so common in on-premise hosting setups.
Cloud-hosting provides a cost-effective alternative to housing databases, applications, email servers and other critical IT services in-house, and avoids the substantial capital expenditures that tend to accompany network and server infrastructure upgrades. Thanks to the flexible pricing models we’ve just mentioned, businesses can provision networking resources, storage, virtual machines, compute power and more without having to purchase deploy and manage the host infrastructure, thus avoiding maintenance and hardware lifecycle expenses.
Traditional IT projects can be a costly undertaking, with equipment acquisition, consultancy and installation costs capable of driving capital expenditure so high that many small businesses defer making vital infrastructure upgrades. By converting these capital expenses into manageable operational expenditure, the cloud makes it easy for resource-constrained businesses to run cutting-edge, growth-enabling IT infrastructure.
With a wealth of deployment options, SME-friendly pricing, and platforms that put efficiency-saving technologies within the reach of small businesses, the cloud provides endless opportunities for organisations keen on using technology as a catalyst for growth. Start a conversation with your IT support provide on ways to leverage the cloud to grow your business in the years ahead.
Secure, stable and optimised IT infrastructure is critical to the success of all businesses in our information age. 4TC helps businesses across London and the Southeast realise their potential through the delivery of expertly managed IT services and support, and solutions that solve business challenges by achieving perfect alignment between people, processes and technology. Get assistance with your IT challenges today by getting in touch, we’ll be glad to assist you!
Over the last decade, Enterprise IT has evolved at an unprecedented rate, with each passing year introducing innovative new technologies and solutions. Despite the rate of progress however, many organisations remain committed to running outdated legacy systems, which are thought to account for around 30% of the workplace technology we interact with.
So, what do we mean by ‘legacy technology?’ Legacy technology has no strict definition, but it generally refers to digital systems considered outdated by modern standards. Such systems are likely to integrate poorly with modern equivalents and may no longer be supported or maintained by their original developers. They are likely to segregate data, and provide no convenient option for the introduction of automation, resulting in inefficient, clunky workflows that demand a high degree of user interaction and manual data handling.
Here at 4TC, we provide IT support, management and solutions to SMEs across London and the Southeast. Our mission is to empower businesses with secure, optimised and reliable technology that supports sustained business growth and success. One of the ways we deliver on these aims is by helping businesses identify ways to tackle persistent challenges and issues using the best modern solutions. This practice is otherwise known as ‘Digital Transformation.’
A digital transformation is a process or strategy that leverages advancements in technology to fundamentally change how a business operates and delivers value to its customers. The objective of digital transformation is to improve efficiency, competitiveness, customer satisfaction, security and innovation, in an age when digital adoption is so integral to business success.
We accept that the term ‘digital transformation’ can seem a bit misleading or ambiguous, after all, every business uses digital technology in one way or another. It’s best to think of a digital transformation as an ongoing, evolutionary process rather than a fixed state. Your business embraces digital transformation by considering inefficiencies, bottlenecks and pain points across your digital environment, and devising ways to tackle these issues by aligning processes with up-to-date solutions that perform to the standards today’s employees and customers expect.
For many businesses, slow, inefficient, and poorly integrated legacy technology is one of the greatest stumbling blocks to undertaking a comprehensive digital transformation.
Some of the legacy solutions still used by businesses today can trace their roots all the way back to the 70s, 80s and 90s. In those early days of digital evolution, the capabilities available to developers, and as a result, the priorities of the developers themselves, were very different to those of today. The result is applications and programmes that fall significantly short of modern performance and security standards, and that fail to offer the features, capabilities and integrations today’s users expect.
Despite the obvious shortcomings, legacy systems remain entrenched in the operations of many SMEs, underpinning some of their most critical functions and processes. There is a natural reluctance among many business owners to explore a replacement for these systems, with concerns often expressed about the cost, disruption, risks and learning curve involved in the migration process. As we’ll explore in our next blog, many of these fears are unfounded, with modern alternatives to legacy technologies offering low-impact deployment, minimal upfront costs and intuitive user interfaces that require little in the way of staff training.
Let’s now look at 6 key reasons your business should consider a replacing its legacy technology sooner rather than later:
Many of the legacy applications still in use today date back to the latter decades of the 20th century. This was a period of rapid change, but one in which the cyber security landscape was vastly different to how it is today. Software developers in those days, focussed on speed of delivery, often rushing out programmes that contained significant code flaws and security vulnerabilities. Often, little consideration was given to cyber security, in fact, it could be argued that even Microsoft didn’t take security seriously until the early 2000s.
This culture of cyber security complacency coupled with software development practices that prioritised speed of delivery over code integrity, resulted in systems laced with security vulnerabilities, and programmes that lack the security controls and protocols today’s hostile threat landscape necessitates.
Using unsupported software is not only risky from a data security standpoint, it can also present distinct maintenance challenges and heighten business continuity risks.
Outdated coding languages, like COBOL for instance, are becoming increasingly difficult to support, as professionals familiar with it are retiring out of the industry. As such skills become rarer, they subsequently become more expensive, resulting in growing maintenance costs over time.
Maintenance struggles become particularly acute when business-critical faults that require urgent attention arise. If such a scenario were to develop, you could find yourself struggling to locate an engineer with the niche skills and knowledge required to reinstate your vital systems. In a worst-case scenario, this could leave you without the applications you need to run your business and serve your customers effectively, for a prolonged period of time.
A data silo refers to a depository of information that sits in isolation, lacking the ability to be easily shared and integrated with other digital systems or departments within an organisation. Data silos present efficiency challenges and inhibit a business’s ability to harness data as a means to drive value creation.
Many legacy systems were developed in a time when data analysis was only common practice among larger companies, and when manual data handling was simply considered an unavoidable fact-of-life. As such many systems feature no cross-platform compatibility by default, isolating strategically valuable information, and providing no option for data transfer between systems other than slow, inefficient manual data entry. Siloed data stands as a barrier to collaboration, damages productivity, prohibits the use of business process automation and makes it more difficult to leverage insights from data across your business.
Many legacy applications are incompatible with modern IT infrastructure, and as such, require archaic hardware to be maintained to support it. As this hardware ages, components begin slowing down and performance issues escalate into recurring system outages that hamper business productivity and damage staff morale.
Additionally, outdated hardware is less likely to support or integrate with modern security tools, leaving the data stored in legacy systems more vulnerable to cyber-attacks and data breaches.
Continuing to operate aging hardware to support your legacy applications could therefore be subjecting your data to an unacceptable level of risk, and leave staff struggling with buggy, slow and unreliable technology that falls well below modern performance standards.
Legacy systems are rarely easy on the eye. They look old fashioned because they are old fashioned, often featuring dated user interfaces that lack the finesse and crisp graphics found on modern systems. Using a legacy system in any capacity, be it public-facing or not, may portray your business as stuck-in-the-past and reluctant to innovate, damaging your image, and eroding confidence in your service or product offering.
Dated technology can also impact employee satisfaction. Slow, unreliable and unintuitive technology can leave staff feeling demoralised, and can make it harder to deliver a high-quality customer experience, particularly in embarrassing situations where customers are aware of the issues and limitations of your technology.
By operating legacy technology, you leave your business vulnerable to reputational damage that could see you lose the trust of customers, and you run the risk of missing out on new opportunities and revenue streams.
Depending on the type of information your legacy technology hosts, you could find it very difficult to take the steps necessary to achieve compliance with data protection regulations like UK GDPR.
Under such regulations, data controllers are required to defend the integrity, confidentiality, and availability of personal information, using a range of technical and organisational controls and measures, including the likes of firewalls, anti-malware measures, user access controls, data backups and rigorous authentication protocols. Due to a lack of centralised oversight and widespread compatibility issues with modern security tools, legacy technology makes satisfying the requirements of leading data protection regimes an uphill struggle. This could leave sensitive data susceptible to misuse, loss, theft, accidental deletion, or unauthorised access, and could result in fines issued against your organisation for non-compliance.
From security vulnerabilities that expose data to online threats, to data silos that present obstacles to automation and collaboration, legacy technology can represent a serious barrier to running a secure, productive, resilient and compliant operation that supports the growth ambitions of your business. By embracing digital transformation, you create a synergy between your technology processes and people, enabling a productive, secure and streamlined workplace.
In our next article we introduce some of the compelling modern alternatives to legacy technology and explore some of the benefits that businesses can unleash by undertaking a digital transformation.
Secure, stable and optimised IT infrastructure is critical to the success of all businesses in our information age. 4TC helps businesses across London and the Southeast realise their potential through the delivery of expertly managed IT services and support, and solutions that solve business challenges by achieving perfect alignment between people, processes and technology. Get assistance with your IT challenges today by getting in touch, we’ll be glad to assist you!
Based on OpenAI’s DALL-E text-to-image platform, Paint Cocreator will conjure up images in Windows Paint based on your descriptions.
Those of you who’ve ever struggled to draw your own artwork in Microsoft Paint will soon be able to turn to AI to automatically generate your desired images.
In a Windows Insider blog post published Wednesday, Microsoft announced a new AI-powered tool for the Paint app in Windows 11 that will create images for you. Known as Paint Cocreator and based on OpenAI’s DALL-E text-to-image platform, the feature is currently on its way to Windows Insiders.
Like other AI-based image generators, Paint Cocreator will cook up images based on your descriptions. You can submit anything from a few general words to a couple of sentences. But you’ll want to be as descriptive as possible to improve your odds of getting just the right image.
You can also select a particular style of art. When you’re ready, the tool will create and display three different images from which to choose. Select the one you like and you can then fine-tune it in the Paint canvas if you wish.
To let you use Cocreator, however, Microsoft is imposing a credits system as virtual currency, according to its support page for the tool.
By Joining Cocreator, you start you off with 50 credits. Each time you create an image, one credit is used. You can always see how many credits you have left by checking the bottom right area of the Cocreator pane.
Microsoft didn’t explain what would happen if you run out of credits and need more. But hopefully that will get ironed out before the tool hits the release version of Windows 11, assuming this credits system sticks around.
To ensure that Cocreator is being used responsibly, Microsoft will also employ content filtering. The aim here is to prevent people from creating images that are considered harmful, offensive, or inappropriate. The content filter is based on certain standards, such as human dignity, diversity, and inclusion, according to Microsoft.
With all the buzz and interest surrounding AI, image generators have taken off among people who need to generate drawings, paintings, artwork, and other types of graphics. OpenAI offers its DALL-E image creator on which other tools are based. The company is currently testing a new version known as DALL-E 3.
Microsoft’s DALL-E-powered Bing Image Creator works as a standalone tool and as part of its Bing AI chatbot. Other popular tools include Midjourney, Stable Diffusion, DreamStudio, and Craiyon.
To try Cocreator at this point, you’ll need to be registered with the Windows Insider program for Windows 11. You’ll also need to be running the Dev or Canary build of Windows 11. And for now, the tool is available only in the US, UK, France, Australia, Canada, Italy, and Germany.
Make sure you’ve downloaded and installed the latest updates for your Windows 11 build. Once Cocreator is accessible, you’ll still need to join a waitlist to use the tool as Microsoft is rolling it out slowly at first. To do this, click the Waitlist button in the Cocreator pane when the tool shows up in your build. You’ll receive an email notice when you’ve been approved to use it.
Source: Microsoft is testing an AI-powered image creator for Windows 11 Paint | ZDNET
Are you feeling overwhelmed with all the technical problems in your business? Trying to manage IT issues on top of everything else can be extremely stressful, but it doesn’t have to be. This guide covers actionable advice on how to handle typical IT support dilemmas so that you can focus your time and energy on what matters most: growing your business.
You’ll learn tips and tricks for budgeting resources, finding reliable help, preventing network security threats, and much more – allowing you to build a strong foundation for success. So fasten your seatbelt as we dive deeper into the world of successful IT strategies!
As technology continues to advance, businesses are increasingly reliant on IT support to ensure their operations run smoothly. However, with the IT support dilemma, businesses must navigate the challenge of providing adequate tech support to employees while managing costs.
Lackluster IT support can lead to lost productivity and a potential loss of customers, making it essential for businesses to confront this challenge head-on. Investing in effective IT support can help businesses stay ahead of the curve and ensure their technology stays up-to-date, reliable, and secure. Whether it’s through an in-house IT team or outsourcing to a third-party provider, confronting the IT support dilemma is essential for any business that wants to remain competitive in today’s tech-driven landscape. Plus, with the right IT support, your employees can focus on their core responsibilities without getting bogged down by technical issues, a win-win situation for everyone involved.
Setting up an IT support system can be a daunting task, especially if you’re not familiar with the process. However, it’s undeniable that a well-planned support system can make all the difference when it comes to efficiency and issue resolution. The first step in the process is evaluating your current setup. Take a look at what’s currently in place and determine what’s working and what’s not. Once you have an understanding of your current situation, it’s time to explore the different options available.
From hiring in-house support to outsourcing to a third-party vendor, there are pros and cons to each approach. Furthermore, when it comes to outsourcing, you can always find a guide to outsourcing IT support online. That way, you can make an informed decision that is best for your business. When making your decision, consider your budget, business needs, and long-term goals. With the right IT support system in place, you’ll be able to focus on what really matters – growing your business.
Cybersecurity is a growing concern for individuals and businesses alike. With the increased use of technology and the internet, it’s more important than ever to secure your network and protect your data from malicious attacks.
Best practices for strengthening cybersecurity include regularly updating your software and operating systems, using strong and unique passwords, implementing antivirus and anti-malware software, and limiting access to sensitive data. Taking these steps and remaining vigilant can only help you with keeping your information safe from cyber threats. Don’t wait until it’s too late to take action – start securing your network today.
Now, this can be a daunting task, especially when you need to cut costs without compromising on the quality of your operations. However, with the right strategies, you can identify areas where you can reduce costs and optimize your budget without compromising the efficiency of your business.
One such strategy is to analyze your IT assets and determine which ones are underutilized or obsolete. You can then eliminate or replace them with more cost-effective alternatives. Another useful approach is to leverage cloud computing instead of investing in expensive hardware and software, as it allows you to pay only for the resources you use. Implementing these and other cost-cutting strategies can not only help you manage your IT budget more wisely but also boost your organization’s overall performance and profitability.
Companies that seek to streamline their operations and save time and money are turning to technology to help them achieve those goals. Automation tools can be used in a variety of ways, from automating repetitive tasks to providing data analysis that can help businesses make better decisions. Making use of these tools and services can enable companies to reduce human error, improve efficiency, and ultimately increase their bottom line.
Furthermore, automation technology is constantly evolving, giving businesses access to even more advanced solutions that can make them more competitive in their markets. Regardless if it’s through automating manufacturing processes or improving customer service through chatbots, there are endless options available to those willing to embrace automation.
Ensuring reliable performance is crucial for any business, which is why tracking performance trends and addressing any issues quickly is essential. By monitoring performance trends, you can identify areas that require improvement and take proactive steps to maintain productivity and efficiency.
However, it’s not always easy to stay on top of performance metrics, especially if you lack technical expertise. This is where expert support comes in. With the right support, you can have peace of mind knowing that any performance issues will be addressed quickly and efficiently. In turn, this will help you focus on optimizing your business operations and achieving your goals. Therefore, whether you’re dealing with technical issues or simply need some guidance, don’t hesitate to rely on expert support for all your performance monitoring needs.
To sum it up, it is evident that having an effective IT support system in place for your business is a must and one that should not be taken lightly. Taking the time to evaluate your current setup, review different options, secure your network with best-in-class practices, manage your IT budget wisely, make use of automation tools and services, and monitor performance reliably will help take your company from good to great. Don’t forget to enlist the help of expert professionals when you need advanced insight or further assistance addressing matters related to any of these areas. After all, preventing unforeseen problems is much easier than cleaning up a mess once it’s already been made.
Source: The IT Support Dilemma: Your Ultimate Guide to Business Survival (swindonlink.com)
In recent months, the NCSC has been accelerating its approach to data-driven cyber (DDC). Our goal is to encourage the adoption of an evidence-based approach to cyber security decisions, not only in how we advise external organisations, but also in how we address our own security.
We acknowledge that enterprise cyber security is becoming increasingly complex, and many teams are reluctant to introduce an additional ‘data layer’ due to concerns of becoming overwhelmed. In this blog post, we aim to demonstrate how concentrating on manageable, actionable insights can help teams embrace data-driven cyber security.
Our example showcases a collaboration between two teams within the NCSC:
The Vulnerability Management Team leads the NCSC’s response to vulnerabilities, while DCMA use their expertise in data science and analysis to provide the NCSC Government Team with evidence based security insights.
Many government teams, including the VRS, gather and manage vast amounts of valuable data. The challenge they face is how to best analyse this, given the misconception that developing any useful insights requires a complete overhaul of existing workflows.
This misconception stems from the idea that implementing DDC involves plugging all data into a complex ‘master formula’ to unveil hidden insights and narratives. However, it’s essential to recognise that, especially in the beginning, DDC should be viewed as a tool for generating ‘small yet actionable insights’ that can enhance decision-making. This simpler and more focused approach can yield significant benefits.
In the case of the VRS we did exactly that, starting with the data sets that were available to the team and then focusing on a single insight that could be used to have a meaningful evidence-based security conversation.
To this end we created the Vulnerability Avoidability Assessment (VAA), an analytic that uses two internal data sources and one public source to determine what proportion of vulnerability reports were a result of out-of-date software. The data sources comprised of:
We created this analytic knowing that patch management is one category of vulnerability that could be influenced, and that diving deeper into the link between patch management and the vulnerabilities reported through the VRS would provide us with a security discussion point about how vulnerabilities can potentially be avoided or reduced.
We gained a deeper insight into the impact of unpatched software on government systems by comparing the number of vulnerability reports resulting from outdated software with information from an open source database. This database provided estimates of how long these vulnerabilities had been publicly known, and when patches had become available.
Using the above approach we were able to define an ‘avoidable vulnerability’ as one that has been publicly known for a considerable time, to the extent that a responsible organisation would reasonably be expected to have taken the necessary actions to apply the required updates and patches.
Our analysis of data from 2022 (refer to Table 1, below) revealed that each month the VRS receives a considerable number of vulnerability reports directly linked to software that was no longer up to date. Ranging from 1.6% to a peak of 30.7% of vulnerabilities in a single month, over the course of the year.
We also investigated how long the software vulnerabilities went unpatched before they were exploited. Referring to NCSC guidance, which recommends applying all released updates for critical or high risk vulnerabilities within 14 days (NCSC Cyber Essentials guidance on ‘Security Update Management’, Page 13), we chose a 30-day buffer as a consistent timeframe for applying patches, regardless of their severity. Separating the timelines into these increments, we found that 70% of outdated software vulnerabilities reported to the VRS were due to software remaining unpatched for more than 30 days (refer to Chart 1, below).
This newfound understanding provided the VRS team with sufficient data to have an evidenced based discussion with stakeholders regarding their approach to patch management. Providing the data insights to support a case for meaningfully reducing the number of vulnerability reports received by the VRS against government systems.
The journey towards DDC has highlighted the immense value of leveraging data to make evidence-based security decisions. The collaboration between the VRS and the DCMA team serves as a concrete example of how data can inform decision making. It is essential for organisations to recognise that adopting DDC does not require a complete overhaul of existing systems, but rather the ability to focus on extracting small but actionable insights that can drive behaviours and decisions.
Source: Data-driven cyber: empowering government security with… – NCSC.GOV.UK
The chatbots will have “personality” and specialise in certain subjects, like holidays or cooking advice.
It is the latest salvo in a chatbot arms race between tech companies desperate to produce more accurate and personalised artificial intelligence.
The chatbots are still a work in progress with “limitations”, said boss Mark Zuckerberg.
In California, during Meta’s first in-person event since before the pandemic, Mr Zuckerberg said that it had been an “amazing year for AI”.
The company is calling its main chatbot “Meta AI” and can be used in messaging. For example, users can ask Meta AI questions in chat “to settle arguments” or ask other questions.
The BBC has not yet tested the chatbot which is based on Llama 2, the large language model that the company released for public commercial use in July.
Several celebrities have also signed up to lend their personalities to different types of chatbots, including Snoop Dogg and Kendall Jenner.
The idea is to create chatbots that are not just designed to answer questions.
“This isn’t just going to be about answering queries,” Zuckerberg said. “This is about entertainment”.
According to Meta, NFL star Tom Brady will play an AI character called ‘Bru’, “a wisecracking sports debater” and YouTube star MrBeast will play ‘Zach’, a big brother “who will roast you”.
Mr Zuckerberg said there were still “a lot of limitations” around what the bots could answer.
The chatbots will be rolled out in the coming days and only in the US initially.
Mr Zuckerberg also discussed the metaverse – a virtual world – which is a concept that Mr Zuckerberg has so far spent tens of billions of dollars on.
Although Meta had already announced its new virtual reality headset, Quest 3, the company gave further details at the event.
Meta’s boss described the headset as the first “mainstream” mixed reality headset. Cameras facing forward will mean the headset will allow for augmented reality. It will be available from 10 October.
The firm’s big, long-term bet on the metaverse still appears yet to pay off, with Meta’s VR division suffering $21bn (£17bn) in losses since the start of 2022.
The Quest 3 came after Apple entered the higher-priced mixed reality hardware market with the Vision Pro earlier this year.
Mat Day, global gaming strategy director for EssenceMediacom, said Mark Zuckerberg had “reinvigorated” the VR sector.
“Meta’s VR roadmap is now firmly positioned around hardware priced for the mass market. This is a stark contrast to Apple’s approach which is aimed at the high end tech enthusiast,” he said.
Meta’s announcement came on the same day as rival OpenAI, the Microsoft-backed creator of ChatGPT, confirmed its chatbot can now browse the internet to provide users with current information. The artificial intelligence-powered system was previously trained only using data up to September 2021.
Source: Meta announces AI chatbots with ‘personality’ – BBC News
Email: support@4tc.co.uk
Tel: 020 7250 3840
5th Floor, 167‑169 Great Portland Street
London
W1W 5PF
Dew Gates The Street
High Roding
Essex
CM6 1NT