Aditya Abeysinghe

Composable Enterprises: Adaptability with a common caller By Aditya Abeysinghe Enterprises these days cater wide range of services to customers. Use of a wide range of services not only boosts the name of the provider, but also the marginal profit of the provider. The speed of adopting a new business line into an existing set of services is the adaptability of an organization. This speed depends on the enterprise, external factors and on customers. With uncertainty and rivalry at peak levels, at present, adaptability of an enterprise is one of the factors for its survival. Composability as a factor So, why should one think about composability? The word composable means building something from a modular method. Think of this as a set of blocks joined together to form the set of services in an enterprise. Each block has its own function, own data inputs and outputs and own business logic. ...

Read More →

Using Embedded AI for analyzing data – By Aditya Abeysinghe   The term AI (Artificial Intelligence) is often thought to be a term used with heavy computation and memory. Applications using AI are usually deployed in PCs and servers. However, with the growing use of analysis on systems using AI, the use of PCs and servers for monitoring and then analyzing tasks is often inefficient. Therefore, a new method of using AI within systems has been tested. This usage is known as embedded AI. What is the use of Embedded AI? With the use of sensors and other devices for monitoring systems, especially in factories analysis of data at real-time has become a necessity. The usual method of analysis is transferring data to connected PCs and servers due to low computational and memory capacity in devices that directly capture data. However, real-time analysis of data is often necessary in systems ...

Read More →

The art of building new content: Generative AI By Aditya Abeysinghe   At present, regenerating images and audio from existing images and audio is a common activity. Most images are edited to attract viewers and audio files are edited to enhance listening quality. However, creating new content from existing files, especially generating images and other media files has been a trend that sprung recently. This process of using artificial intelligence (AI) to generate new content is known as generative AI. What is the use of generative AI? One of the uses of generative AI is to generate synthetic content inexpensively. For example, think about photos of models for image recognition. Unless these photos are publicly available, they can rarely be used for commercial purposes due to copyright issues. However, with generative AI, new images can be generated with machine learning for humans that didn’t even exist. Thus, generative AI can ...

Read More →

Synthetic Data: Dataset generation for your need By Aditya Abeysinghe   During the last few decades, research into various fields has expanded rapidly with advances in technology and tools used for research. In many fields, data is expensive to be generated or found from sources matching research requirements and sometimes is inaccessible due to privacy concerns or sometimes data is unavailable. In these kinds of cases, data needs to be artificially generated to match real world data and tested. These kind of data is called synthetic data and is now considered an emerging topic in many research fields. Synthetic data is not a new model; it has its origins since 1980s when researches started to grow with advances in technologies. However, it became an emerging topic with emerging technologies such as self-driving cars where data required for training using algorithms is hard to be found. Meanwhile, many restrictions on data ...

Read More →

Ensuring protection in data sharing: Privacy Enhancing Computation By Aditya Abeysinghe   Data privacy has become a much debated issue with a plethora of personal and business communication applications, websites and mobile apps available today. Who intercepts data, who has authority over data and what is done to these stored data without user consent has caused users to concern about their privacy when communicating over third party applications. While many applications today ensure encryption, masking and other techniques to hide the original form during transmission between two users many say that these techniques are easily decodable by eavesdropping middle parties during transmission. Therefore, research has focused on a new avenue to solve this issue by enforcing technologies that ensure privacy of data. These collections of technologies used for ensuring consumer privacy is called Privacy Enhancing Computation (PEC). How does PEC ensure privacy? Data used at present is mainly of two ...

Read More →

Hyperautomation: Article 3 of a series of articles on Hyperautomation By Aditya Abeysinghe   This article series discussed about what is automation, how to identify which processes are to be automated and how robotic process automation can be used to automate processes. Robotic process automation (RPA) used robots to automate tasks which are usually performed by humans using multiple processes and tools. Using Artificial Intelligence (AI) and Machine Learning (ML) processes can be further automated, so that the dependency on humans is further minimized. This type of combining automations using AI and ML to automate processes is called hyperautomation. Why hyperautomation? Before addressing why hyperautomation is necessary, we must understand the difference between automation and hyperautomation. Consider the same example, I used in the RPA article *. A robot is used to read a list of contacts and send invoices to these contacts via email. In this process, the list ...

Read More →

Intelligent Process Discovery: Article 2 of a series of articles on Hyperautomation By Aditya Abeysinghe   In the last article I wrote about Robotic Process Automation (RPA – automating processes using robots or automated bots), its advantages and drawbacks of using RPA. However, users who use RPA should know which processes need to be automated and should separate processes which are more useful compared to others in business processes. This task is handled by intelligent process discovery where it “intelligently” discovers processes that could be automated. Why do we need software to discover processes? As such, one might ask if business processes are created, handled and maintained by humans, why is it necessary to use software to discover which processes need to be automated. One of the main reasons for using software is that the flow of tasks in a software is consistent. Software is also considered as not being ...

Read More →

Robotic Process Automation: Article 1 of a series of articles on Hyperautomation By Aditya Abeysinghe   I have discussed about the usage of robots as agents for delivering consumer goods in my article titled “Personal Delivery Devices” and about the use of robots in the cloud in my article titled “Cloud Robotics”. Besides these emerging uses of robots, another emerging use of robots is to automate tasks that are repetitive in nature. When I say repetitive, I mean repetitive tasks related to computers. For example, filling forms, completing keystrokes and reading screens can be repetitive in many processes we use today. The use of automation to automate tasks is known as process automation. When robots or bots are used for this process, it is called Robotic Process Automation (RPA). Why RPA? Process automation is not a new process. From conveyor belts to day-to-day household equipment, automation changed the way people ...

Read More →

Cyber security Mesh: Clusters of network monitoring redefining security By Aditya Abeysinghe   Conventional network security monitoring involves establishing a security perimeter around all devices of a network. This method has been followed since the kindergarten days of computer networks and is the de facto standard used to monitor and secure most internal networks at present too. While this may sound easy for monitoring and securing devices in a network, the main disadvantage is that if the perimeter is hacked in some way, then the entire network could be vulnerable to attacks. Furthermore, security policies are often imposed at the edge of the network rather than at identity or other access management levels. Cyber security mesh is a concept that addresses these issues by enforcing security at each access point or similar level, thereby clustering these networks into a mesh of networks that are monitored separately.   Covid-19 and network ...

Read More →

Is tracked data changing consumer behavior? By Aditya Abeysinghe   From smartwatches to smart homes Internet of Things (IoT) changed the way consumers use day to day appliances. However, IoT also sends collected sensor and other data to vendors and other parties. These data are then analyzed and are used for advertising, test product usages etc. Data analyzed are also used to explore knowledge and wisdom on how consumer activities could be adjusted. This part of analysis and then changing consumer behavior on data generated from IoTs is called Internet of Behavior. Behavior is not only about how consumers perceive about an IoT device but also about the emotions, decisions and the mutual bond they link to a device. For example, a smartwatch can measure the miles a customer walks and health related aspects such as sleep monitors, blood pressure monitors. These data can be then analyzed and recommendations could ...

Read More →