Sensor AI has a role not only in industry, but also in sectors such as medicine and consumer electronics

Corporate artificial intelligence and robotics are no longer just futuristic concepts but are becoming an integral part of everyday business operations. They enable companies to improve efficiency, productivity, and responsiveness to change. They also help with product innovation. One of the key aspects of this integration is the use of sensor AI, which allows for data collection and analysis using a variety of sensors and devices.

Let’s take a look at some examples of how sensory AI can transform various industries and innovate businesses. The following examples illustrate practices already in use today:

Industrial automation: In industrial automation, sensor AI is used to monitor and control manufacturing processes. Sensors can monitor essential parameters such as temperature, pressure, or humidity, but also detect microscopic changes in the environment that could signal potential issues. For example, sensors detecting changes in air pressure can warn of impending equipment failure, allowing maintenance to be carried out before the problem becomes serious.

Medicine: Sensors enable the monitoring of heart rate, blood pressure or glucose levels. This data can be analysed by artificial intelligence, for example to diagnose and monitor health conditions or to predict the future course of a disease or a patient’s response to treatment. Sensory AI detects patterns of changes in blood pressure that may predict when the next hypertensive crisis will occur and warn the doctor or patient well in advance.

Autonomous vehicles: Sensors are crucial for collecting data about the surrounding environment. In addition to traditional sensors such as lidar, radar and cameras, modern vehicles often use other advanced sensors such as ultrasonic sensors to detect obstacles in the vicinity of the vehicle or sensors to measure road quality. This information is essential for the proper functioning of autonomous systems, which must be able to quickly and accurately respond to various situations on the road to ensure safe driving.

Smart cities: Sensor AI in smart cities is used to monitor traffic, air quality, noise levels, and other factors affecting the environment. Modern sensors measure essential parameters and identify specific pollution or problems in public infrastructure. For example, a sensor network in a city can detect gas leaks in the distribution network and automatically alert the relevant authorities, enabling rapid action.

Wearables: Sensors in electronics such as smart watches or fitness bracelets collect data on movement, heart rate and other physiological parameters. This information is not only used for personal monitoring and improving the health of users but can also be shared in the form of anonymised data with research institutions or public health organisations to analyse and predict epidemics or to track population health trends.

Why don’t Czech companies use AI?

Despite all these potential benefits, many Czech companies are still hesitant to implement AI into their processes. There are several reasons for that.

Firstly, there is a shortage of qualified experts in the Czech Republic, who would be able to design and implement AI systems into corporate infrastructure.

According to RSM, a local IT consulting firm, 48% of companies have the technical conditions for rapid implementation of AI, but the development is hindered by both managers and legislation. According to the analysis, specific challenges such as managers’ low willingness to bear the risks associated with pioneering phases of AI implementation, including legislative and security aspects (e.g., personal data protection), are obstacles. It may be difficult to agree across the company on how the corporate AI should work. Moreover, significant revisions of existing legislation and updates to the national AI strategy are needed, a process that is still in its early stages.

Some companies don’t have a clear idea on how to use AI to improve their processes or innovate products and services. This lack of awareness may lead to a lack of motivation for investment in AI technologies.

However, organisations should not resist this trend. In countries such as Japan and the US, AI is already widely used, including in autonomous taxis. Once Czech companies overcome their concerns and embrace AI as an essential part of their operations, they can enjoy higher efficiency, innovation, and a competitive advantage. There is hardly any company that cannot benefit from what AI has to offer, be it from small things such as data processing and analysis, to process automation, automated car control, to fully autonomous factory or shop floor operation.

The age of semantic automation

The combination of Robotic Process Automation (RPA) and Artificial Intelligence (AI) creates a powerful symbiosis that can elevate business productivity and efficiency to a new level. Semantic automation, based on generative artificial intelligence, is a driving technology with the potential to fundamentally change the way companies operate.

In a time when digital transformation is a necessity rather than just a trend, RPA is becoming a major player. With its ability to automate mundane, repetitive tasks, RPA significantly enhances employee productivity. Together with AI, they form a synergistic duo, combining automation with the creativity of the human mind.

According to IDC, automation in companies reduces operating costs by 13.5% and saves an average of 1.9 hours of work per week (source: Worldwide Automation Spending Guide 2022 by IDC) per employee. These figures highlight the transformational potential of RPA and AI in increasing productivity and reducing costs.

RPA and generative AI – the combo for perfect automation

Generative artificial intelligence, as a subset of AI, focuses on the creation of content or data rather than just processing it. It uses machine learning techniques such as neural networks and deep learning to create new content in various forms. “Generative AI models learn from existing data and use this knowledge to produce original, creative and contextually relevant output,” explains Viktória Lukáčová Bracjunová, Head of Robotics and Automation at Soitron.

RPA excels in repetitive tasks, follows rules and procedures, doesn’t make mistakes and doesn’t need breaks. It dominates in structured processes, minimizing deviations. It is a key technology component for companies to reduce costs, reduce errors and speed up routine tasks.

Using semantic automation in a dynamic environment

In a dynamic automation environment, the combination of RPA and generative AI creates a powerful synergy that goes beyond the capabilities of either technology alone. “RPA successfully handles routine tasks, while generative AI is strong at processing complex, unstructured data and solving creative challenges. RPA ensures process consistency and minimises errors, while generative AI analyses data and provides deeper insights, improving the quality of strategic decisions,” says Viktória Lukáčová Bracjunová.

In the field of AI and natural language processing, semantics play a crucial role. It provides the foundation for creating advanced generative artificial intelligence systems that are better able to understand and interact with human language, which is crucial for the success of many AI applications.

Implementable in any company

RPA’s integration with existing systems and applications makes this technology an ideal choice for automating tasks within existing workflows. Next-generation automation can work with a variety of data types and formats, ensuring compatibility with a wide range of processes. Generative AI integration enhances customer experience through personalized interactions, understanding natural language and solving complex queries with empathy.

Where semantic automation can help

  • Advanced Natural Language Processing (NLP) capabilities – it can understand and respond to the customer’s natural language, which is key to automating customer care, order processing and maintaining customer relationships.
  • Machine Learning (ML) – allows robots to learn from data and improve their performance over time, which is crucial for tasks requiring adaptivity or decision making.
  • Optical Character Recognition (OCR) – enables the reading of information from unstructured digitized documents such as PDFs and images.

Meeting the challenges of the modern market

In a rapidly evolving market environment, the combination of RPA and generative AI delivers precision automation, as well as creative innovation, providing a competitive advantage when deployed. Ignoring this technological symbiosis means missing an opportunity. “Now is the right time to let RPA and generative AI technologies collaborate and achieve improved results,” concludes Viktória Lukáčová Bracjunová.

Generational leap! Deploy Cisco Catalyst Center for campus network management

The corporate network infrastructure has undergone fundamental changes in recent years. Campus network management needs to respond to the way IT is currently consumed. Cloud environment, IoT and hybrid working create extreme demands on network performance and security. Cisco Catalyst Center (CCC) is a centralized virtual platform designed to simplify and streamline network management while significantly improving security posture.

Cisco Catalyst Center offers centralized, intuitive network management that makes it easy and fast to design, provision, and apply policies across the entire network environment. The Cisco Catalyst Center graphical user interface provides complete network visibility and uses network information to optimize network performance and deliver the best user and application experience. CCC can be deployed as a hardware appliance, but most customers appreciate the virtual platform option, which is available for the AWS cloud service and now also for VMware on-premise platform.

Firsthand experience

The Soitron team, an implementation Gold Partner of Cisco, is one of the top specialists in deploying Cisco Catalyst Center in corporate environments. Soitron was one of about 60 selected companies worldwide involved in testing the very first pre-production version of the tool (then known as Cisco DNA Center). “We used the platform to manage our own network in the Czech Republic, Slovakia and Bulgaria. We tested the tool for any issues with installation, resources, certificates, and security. Our actual telemetry data were made available to Cisco and used for further development,” said Marianna Richtáriková, Network Business Unit Manager at Soitron.

The scorecard for Catalyst Center

Having first hand practical experience with the tool, Soitron experts were able to identify the areas and situations in which the Cisco Catalyst platform has the highest added value.

Network Design: If you are building a new network from scratch, CCC makes it very easy to design connections in a hierarchical way, adding and defining additional elements in a single tool. Of course, it is also possible to gradually convert the legacy network infrastructure to a modern software-defined network infrastructure.

Centralization: Cisco Catalyst Center enables the centralized management of the entire network, simplifying device configuration and monitoring from a single dashboard.

Automation: CCC provides advanced tools for automating network operations, allowing for fast and consistent network deployment, reducing error rates, and saving time. Any configuration changes can be applied at once across an entire group of devices, minimizing the time a network administrator needs to spend on tedious manual tasks.

Analysis and Diagnostics: The tool provides extensive monitoring and analysis capabilities for network traffic and selected application services. It helps identify problems and respond quickly to outages or security incidents. CCC telemetry provides real-time as well as historical data, making diagnostics much easier.

Security: Cisco Catalyst Center integrates security features and makes it possible to monitor the network’s security status. It helps identify threats and enhance network protection. Automated procedures allow security policy to be prepared in advance and then applied from a single point to any device managed by CCC. For end-users, security policies are applied upon user login (authentication) to the network.

Integration: CCC is designed to be compatible with other Cisco products and technologies, allowing the functionality to be scaled as necessary. It can be connected to platforms such as ThousandEyes for network, internet, and cloud monitoring. An interesting integration is the connection of Apple, Samsung or Intel devices, enabling the monitoring of communication from the device end-user perspective. As for application services, CCC can evaluate and interpret the status of application services such as Webex, MS Teams, and others. An integral part of the solution is also the support for location-based services through integration with DNA Spaces.

Choosing Cisco Catalyst Center makes it possible to create connections not previously possible and transform slow manual processes into automated workflows.

Injecting Malicious Code into Generative AI Can Result in Worrying Data Exploitation

Chatbots such as ChatGPT, Google Bard and others are good servants, but they can also pose a great risk to society. They are vulnerable to attacks based on indirect, instant injection. In other words, they can easily be manipulated into doing things they shouldn’t.

Few people realise that systems that use artificial neural networks and artificial intelligence features that utilise large language model (LLM) technology can be flexibly modulated using special instruction sets. These sets make them susceptible to targeted attacks, known as indirect injection, by which attackers can override the original functionality of the system.

What is injection for LLMs?

An injection into a generative AI means that an attacker inserts malicious code (or an entire set) or data into the LLM input, initiating a sequence of events that can lead to various types of damage. These include, data theft, unauthorised transaction, system corruption, or a cyber attack.

This is considered by IT professionals to be one of the most alarming ways that hackers can exploit large language models. Large corporations as well as smaller start-ups often run or use public AI generation systems without realising the potential risks. This is why cybersecurity experts generally strive to raise awareness about potential risks. “Given that more and more companies use LLMs, and feed personal or corporate data into them on a large scale, this poses a significant risk. That is why attackers have focused on stealing AI Chatbot accounts – see for example Raccoon malware, which has already resulted in around 80,000 ChatGPT accounts being stolen and exposed on the Dark Web. If you use similar services in a corporate environment, we recommend setting up MFA as a priority for these tools, avoid inputting sensitive data into chats, and ideally not storing conversation histories,”explains Petr Kocmich, Global Cyber Security Delivery Manager at Soitron.

How injection for LLMs works

There are several ways an attacker can carry out injection into LLM. One of the most common methods is to insert malicious code or data into the input given to LLM. This input can be anything from text to an image.

For example, an attacker can insert malicious code into a chatbot’s input. If a user then asks the chatbot a question, this malicious code could execute the intended attack. Another method is exploiting a vulnerability in the application using LLM. Simply put, if someone can insert data into LLM, they can potentially manipulate what appears in the output.

Defence against injection for LLM

Security experts regularly demonstrate how indirect instant injection can be used for data manipulation or theft, and in the worst case, for remotely executing code.

There are several measures that developers and system administrators can take to protect systems from injection for LLM. One of the most important, but not trivial, is to properly protect the input to help prevent the insertion of malicious code or data.

 “Although chatbot developers have dedicated teams working on securing LLM systems, identifying and filtering injected code for data manipulation or exfiltration and remote code execution, it is not in their power to identify, treat and prevent all potentially dangerous inputs in advance. In cybersecurity, we have become accustomed to attackers using so-called code obfuscation. Here we are actually dealing with obfuscation at the level of natural language processing (NLP), where the desired functionality can be achieved by various types of written text,” points out Kocmich.

Dedicated solutions are also available

The above is another reason why companies are increasingly restricting the use of publicly available chatbots. Alternatively, they are considering how to integrate or implement generative AI into applications and services. This is because it needs to be understood that the moment information is received from third parties (e.g. from the Internet), the LLM can no longer be trusted. LLMs must therefore always be approached with caution.

In this case, a preferred solution are specialized generative systems specifically designed for corporate use, These systems allow the insertion of enterprise data, which never leaves the corporate environment, and the use of internal locally processed data. “An example of this is our Millada – a service which, although built on the ChatGPT model, works with data locally. Compared to other information technologies and systems, it is also much easier to implement as it works independently of the data processor,” says Kocmich, emphasising that while LLM is a helpful technology, it requires careful and responsible use.

Align your data centre with automation

We have been using automation for decades, and it has permeated virtually all areas of business. It’s not surprising that the operation of something as complex as a data centre is being automated as well. Even though this is the realm of ones and zeros, automation brings the same benefits as in industry: speeding up all operations, eliminating routine manual activities, increasing safety, and solving shortages of specialists.

Why introduce automation into a system where processes run seemingly without human intervention? A layman may think that as long as everything is running smoothly, data centres do not require manual interventions and the human factor usually comes into play only in the event of a crisis, incident, or failure.

However, the philosophy and architecture of today’s IT world has changed so much in recent years that it’s almost impossible to do without automation. This is due to the cloud, the use of SaaS services, and, above all, new approaches to the development and deployment of omnipresent applications. Any company that is serious about digitalization must implement automated processes because it simply won’t succeed in business with the old infrastructure.

Data centres are automated by software that provides centralized access to the configuration of most resources. This lets these technologies and resources be controlled and managed easily, and often without the knowledge of all the technical details. Accessing the required services is much easier and faster. Unlike in the past, when new application request handling typically took days to weeks, now the same task is likely to take just a few minutes.

Modern applications need automation

Companies are most often “forced” to use automation tools when they transition to the cloud or hybrid environments, want to quickly develop and deploy applications, or need to speed up the implementation of new environments and reduce dependence on human resources.

The time when applications were developed and tested over a period of weeks, or even months, is irretrievably gone. Today’s applications are built from many smaller parts (microservices), each of which can be independently changed or upgraded. In addition, development, testing, and deployment require an automated infrastructure that allows for rapid changes and modifications.

Another common scenario when automation is required is a company’s transition to the cloud, or, even more often, to a hybrid environment combining the cloud and an on-premise infrastructure. While clouds are automation ready, your own data centre environment requires automation and then these two environments need to be interconnected.

Finally, the deployment of automation is also motivated by the desire to accelerate the implementation of new environments and resolve human resource shortages. The shortage of top IT experts is a widespread phenomenon, so strategically it is useful for data centres to reduce their dependency on staff leaving the company or making mistakes.

Infrastructure as code

Soitron approaches automation by building automation platforms which allow automation procedures to be defined for any given datacentre environment (cloud, hybrid, or on-premise). This is actually a principle that is like the one used to create source code for applications. Rewriting the entire infrastructure into a code (Infrastructure as Code) brings many advantages over manually creating the environment.

When the infrastructure is defined by scripts, the same environment is recreated each time it is deployed. This approach is most beneficial when the customer wants to centrally manage their environment and dynamically change individual application environments. With scripts it is easy to make changes across the entire infrastructure. Let’s say a company determines that all its databases should be backed up ten times a day and that each database can be accessed by predefined administrators. Then they can set up a new branch and the conditions change. In this case, the company can simply use scripts to increase the number of daily backups or add more administrators as necessary.

Documentation serves as an infrastructure backup

Another advantage of automation is the documentation. The environment is defined by code, which makes it easy to see what is deployed and how everything is configured. The deployment can be replicated at any time (serving as an infrastructure backup) such as in the case of a failure or when you need to create a parallel testing environment.

“Documentation also solves the problem of staff substitutability or dependency because the moment you have a code-defined infrastructure, a much wider range of people can work with it rather than a single IT engineer who happens to remember how the system was originally setup,” explains Zbyszek Lugsch, a business development director at Soitron.

An environment standardized by scripts allows other people to work with such an environment and enter machine- or application-specific parameters. Scripting also allows the same security standards to be applied across the system, including when installing new servers.

Automation is a tailor-made project

To a large extent, data centre automation is always a unique project, as every company uses slightly different technologies and is at a different stage of automation deployment. The course of action is defined by the company’s intention, such as the need to create a suitable environment for developers or the desire to convert an on-premise centre to a hybrid architecture. One of the early steps is a proposal for replacement or extension of the data centre’s existing functions, components, or layers, followed by the implementation of the automation platform and the creation of scripts. The actual deployment takes place by gradually migrating existing systems to the new environment until the “old” environment can be shut down.

Starting to work in an environment that enables rapid application development and deployment will also reduce staffing requirements and offer superior security.

A #Cisco ExpertTip by Martin Divis, a systems engineer at Cisco: Deploy ICO

One of the most comprehensive automation tools is Cisco’s Intersight Cloud Orchestrator (ICO). ICO is a Software as a Service (SaaS) platform that allows managing a wide range of technologies such as servers, network devices, data storage, and more across your entire enterprise infrastructure.

The main advantage of ICO is its multi-domain and multi-vendor approach, which allows the tool to be used regardless of the current implementation. ICO includes an extensive library of predefined tasks that can be deployed for recurring tasks or processes in managed infrastructures. ICO works in a low code/no code design and allows drag-and-drop task setup and running. It is designed with a maximum emphasis on ease of use, making automation operations accessible to a wide range of IT team members.

The NIS2 Directive can increase the security level of organizations in the Czech Republic

The European NIS2 (Network and Information Security Directive 2) can make things more difficult for Czech organizations, but it can also help them solve their cybersecurity problems. This is particularly the case for those organizations that have not yet addressed this serious threat until now or could not justify the necessary budget for sufficiently qualified staff.

The NIS2 Directive aims to make the EU’s digital infrastructure more resilient to cyber attacks and improve coordination and incident response capabilities. “Many entities in the Czech Republic and elsewhere are not taking these matters seriously enough. This is due to the fact that there is a shortage of IT experts – let alone cybersecurity experts – on the market. Since the entities affected by the new directive will be obliged to ensure that their IT networks and information systems are sufficiently protected against cyber threats, this problem may become even worse,” says Petr Kocmich, Global Cyber Security Delivery Manager at Soitron.

What the directive changes

The institutions concerned must implement measures to prevent cyber attacks and threats, such as performing regular software updates, securing network devices, and providing protection against phishing attacks. In addition, they must prepare contingency plans for cyber incidents and establish mechanisms to deal with them quickly and effectively.

Major incidents must be reported within twenty-four hours of becoming aware of the incident and cooperation with national security authorities will be required. Any company that fails to comply with these requirements may be subject to fines and other sanctions.

Dvě mouchy jednou ranou

It would be great if the NIS2 Directive could help end the shortage of cyber security experts; however, this is unlikely, and, at first glance, it might even seem to exacerbate the problem. Having said that, the new regulation is an excellent opportunity to make organizations more secure. External cybersecurity service providers can help. They have sufficient capabilities that organizations are lacking. “Specialized companies focus on providing these services and can help entities implement security measures and risk management as a complete package, i.e. a turnkey service or a solution delivery including support and compliance with the NIS2 Directive,” says Kocmich.

notebook

Specialized companies can help organizations solve both problems in ensuring compliance with the new requirement and improving previously incomplete security of their IT infrastructure and information systems; however, even if organizations use the services of such providers, the responsibility is still theirs.

They should choose their service provider cautiously and ensure that they are sufficiently qualified, experienced, and certified. It is also important to make sure the tasks are properly assigned and that the contractor’s performance is monitored. To ensure the efficiency and effectiveness of the model, the roles and responsibilities should be clearly defined in the contract between the organization and the cybersecurity service provider. It should be understood that the quality of the service delivered often reflects the quality and management capabilities of the provider.

Who the NIS2 Directive applies to and from when

The directive will mean greater obligations for companies in the Czech Republic in relation to network and information system cybersecurity and protection. However, it will also improve protection and resilience against cyber threats and cooperation between European countries. Last but not least, meeting the requirements of the NIS2 Directive can help organizations gain the trust of their customers and partners, who will be more satisfied with the protection of their data and information. Overall, the directive could help entities to improve their security practices and minimize risks.

The NIS2 Directive applies to electricity producers, healthcare providers, electronic communications services, and over sixty other services categorized into eighteen sectors. In the Czech Republic, the directive will start to apply on 16 October 2024 and will cover up to 15,000 entities – these are medium and large companies with over fifty employees and companies with an annual turnover of over CZK 250 million. Although the NIS2 Directive will only apply to organizations that meet the defined criteria, and others are not directly obliged to comply with the requirements, it is worth considering using it as a recommendation for improving general cybersecurity in other companies.

Opportunities for other entities

“It is estimated that up to 70% of domestic organizations have a problem with their cybersecurity. Smaller and medium-sized enterprises in particular do not have sufficiently secure IT systems and do not comply with basic security measures,” says Kocmich. Common problems include benevolent user access rights, a lack of two/multi-factor authentication in combination with weak passwords (including those of administrators), mismanagement and the decentralization of user identities, outdated and unpatched hardware and software containing vulnerabilities, missing network segmentation, weak or missing email and Internet access protection, inadequate perimeter protection, low visibility into network traffic, low or missing endpoint security, a lack of central log management, and inadequate employee training. “Cybersecurity is a big issue for many companies in the country. They can become easy targets for attackers. The NIS2 Directive should help raise awareness and protection against cyber threats,” adds Kocmich.

For more information on obligations under the NIS2 Directive, see the dedicated website (http://nis2.nukib.cz) of the National Cyber and Information Security Bureau (NCISB).

The ChatGPT AI chatbot could be a gamechanger in the cybersecurity, experts say

From the surgical debugging of programming code, to instantly writing an entire block of functional code, and the stopping of cybercriminals, OpenAI’s newly launched popular ChatGPT AI chatbot is changing the game and its capabilities are virtually limitless. And not just in IT.

It has only been around since 30 November last year, but in just a few months it has already been discovered by millions of people around the world. We are talking about an artificial intelligence platform able to answer any question and help with various problems. ChatGPT can answer any general question; write letters, poems, and articles; and even debug and write programming code.

How the ChatGPT AI robot works

This conversational chatbot, backed also by the well-known visionary Elon Musk, who has been involved in AI for years, was developed by OpenAI. ChatGPT is designed to interact with humans in an entertaining way and answer their questions using natural language, which has made it an instant hit among professionals as well as the general public. It works by analysing huge amounts of text. Most of the texts were sourced from the internet, but the chatbot is currently not connected online, which means it won’t tell you the result of yesterday’s Sparta vs Pardubice game. It sees the interaction with the user in context, and hence it can tailor its response to be relevant to the situation. In this way, everyone can learn something.

Experts even suggest that the AI chatbot has the potential to replace the Google search function in the future: “Another very promising feature is its ability to write programming code in any user-selected programming language. This helps developers work on and debug their code, and it helps experts secure their systems,” points out Petr Kocmich, the Global Cyber Security Delivery Manager at Soitron.

How ChatGPT can be used by developers

Today, writing code is not a problem for ChatGPT. What is more, it is absolutely free. On the other hand – at least for now – it is advisable to avoid having the chatbot generate complete codes, especially those that are linked to other codes. The current form of the platform is still in the early stages of development, so it is naive for programmers to expect it to do all the work for them. Having said that, coders and developers can still find the tool useful.

They can use it to find bugs in the code they have written. And they can also finetune a problematic code they had spent long hours writing. ChatGPT can help find a bug or a potential problem, and it can offer a possible solution to end those sleepless nights. Its ample computing power saves hours of debugging work and can even help develop source code to test the entire IT infrastructure.

There are some risks

Without much exaggeration, it could be said that ChatGPT can turn anyone into a cybercriminal, making it easier to carry out a ransomware, phishing, or malware attack. It may seem that the AI robot just needs to be asked to “generate the code for a ransomware attack” and then you just wait for the result. But, as Kocmich points out, it’s fortunately not that easy: “Conversations are regularly checked by AI trainers, and responses to this type of query, as well as other potentially harmful queries, are restricted by ChatGPT. Actually, the chatbot responds by saying that it does not support any illegal activities.”

On the other hand, even if it evaluates a question to be potentially harmful and thus refuses to give an answer, this does not necessarily mean that people can’t get to the answer some other way. “The problem with these safeguards is that they rely on the AI recognizing that the user is trying to generate malicious code; however, the true intent may be hidden by rephrasing the question or breaking it into multiple steps,” says Kocmich. Moreover, nobody can guarantee that some other similar AI robot would not refuse to answer such a question.

What to think about ChatGPT


As is often the case, there are two sides to every coin. While AI bots can be exploited by cybercriminals, they can also be used to defend against them. In the meantime, coders could gradually turn into “poets”. They would tell the AI chatbot that they need to write such-and-such a code that does this and doesn’t do that, or describe the same in a case study, and then they just wait for the AI bot to generate the code.

“Already, ChatGPT is being used by security teams around the world for defensive purposes such as code testing, reducing the potential for cyber-attacks by increasing the current level of security in organizations, and training – such as for increasing security awareness,” says Kocmich, adding in the same breath that we should always bear in mind that no tool or software is inherently bad until it is misused.

Cloud communication makes customers happier and employees more loyal

To acquire and retain customers is a challenging task in a competitive environment. Now, more than ever, a high-quality product or service is a must. But it’s not enough on its own. The key factor determining if a customer stays or goes to a competitor is customer experience. And that is based on communication.

In retail, as well as other sectors, it is likely that the first thing a customer comes into contact with is a contact platform they communicate with when choosing or returning goods, or when booking an appointment. “Today’s digitally savvy consumers demand a fast, interactive, and personalized response; however, given the multitude of various communication channels and platforms, it may be difficult to keep the customer’s journey clear and simple,” explains Marcel Vejmelka, Senior Business Consultant at Soitron. Thankfully, there are solutions on the market that eliminate this problem and bring this very important part of business to the next level.

It is essential to get rid of silos

There are many systems and platforms ready to meet all requirements. One platform designed specifically for this purpose is Webex Cloud Contact Center (Webex CC): “By deploying it, you can break down communication silos and create an omnichannel environment in which separate channels work together. This includes voice services, SMS, chatbot, web, WhatsApp, Facebook, and other communication channels,” says Vejmelka. This solution also goes beyond a simple connection with the customer. It is directed inwards and supports communication with the company’s business systems and in-house customer data.

It is this interconnection, trend analysis, feedback, and identification of various events in a customer’s life that enables an organization to move towards a personalized customer experience. “For instance, you can set up an automated process to trigger specific communication a month and a week before (or after) a contract expires. You can also customize contacts to specific types of customers, such as loyal customers, high spenders, and Apple or Android users. The possibilities are virtually endless,” says Vejmelka.

A platform as a service

Cisco has built the entire platform as a service; its parameters are set explicitly to fit the needs of a specific customer. The platform is rented by a partner/integrator. Before it can be deployed in an organization, it is necessary to conduct a business process analysis. “It is only then that the business processes are implemented and deployed in the platform. This ensures that the investment actually makes sense,” says Jaroslav Martan, Cisco’s Collaboration Specialist.

#CiscoExpertTip – odborníka Cisco pro oblast collaboration Jaroslava Martana: Webex CC nepotřebuje složité programování

The Webex CC platform is a low code/no code solution. The individual building blocks of the platform can be moved within the communication logic with no complex programming: “This is a major benefit because it allows sales people who are most familiar with the intricacies of customer relationships to be directly involved in the actual platform configuration,” Martan explains.

Since it works with customer data, Webex CC also carefully addresses the issue of security. Cisco cloud solutions adhere to the highest security standards. For example, the content of all phone calls is encrypted so that no unauthorized person can play it back. For European customers, Cisco guarantees that their data will not leave the EU as well as GDPR compliance.

kontaktne centra kresleny obrazok cisco expert tip

Getting rid of operator turnover

Webex CC offers more than just benefits for customer relationships. In today’s environment, where hybrid working has become very popular, the system offers functionality for remote operators, allowing them to work from anywhere and at any time. The platform eliminates the majority of on-premise hardware, servers, and other devices requiring regular upgrades or replacement.

With Webex CC, there is no need to build and maintain a physical contact centre. This solves the problem of employee turnover, which is usually huge in this service segment. Operators who work remotely are happier and more loyal, and they ultimately know much more about customer needs. For example, at the telecommunications giant T-Mobile, they were able to move 12,000 operators from contact centres to remote environments with the help of Webex.

No closing time and excellent ROI

Once deployed, Webex CC’s sophisticated configuration delivers very concrete and precisely quantifiable savings. In a paper entitled “The Total Economic Impact of Cisco Webex Contact Center”, Forrester Research analysts calculated that the payback on Webex CC would take thirteen months and that the ROI would be 262%. The cloud platform has no limitations on operation times and can run 24/7 with no problems. It is a more than suitable solution for the e-commerce, healthcare, and financial services segments.

We can deploy various types of robots in your company

With Robotic Process Automation (RPA), i.e. software robots, we can streamline and speed up many business processes while reducing the error rate to a minimum. When deploying a specific type of a robot, it is essential to clearly describe the processes in which the robot is to be involved and to define the exact criteria it should follow. The following examples will show you what types of robots are available and what kind of tasks they can handle either with or without human assistance.

A robot: your trusted colleague

One of the simpler software robots is an On-Demand Robot that works only when you need it. Let’s take the example of a contact centre. If a customer calls the contact centre with a request to cancel part of a purchase order, you as the operator then type in the purchase order number; this initiates the robot, which will find the necessary information about the customer and the ordered goods across various systems. The inquiry takes a few seconds. You then verify the information with the customer and modify the purchase order as requested. A more sophisticated solution is an Attended Robot working in tandem with you as the employee. Once the robot is running, you do not wait for the result and you can fully focus on the customer and other activities. The robot works in the background and notifies you when everything is completed. These types of robots function as virtual assistants, helping you when you need them, and are especially suitable for back-office tasks at Finance, HR, IT, and many other departments.

More work for the robot means less for the employee

By combining the two previous types of robots, we get a Hybrid Robot. This is particularly useful if the work takes a little longer to complete. An operator or other employee at the contact centre provides input data to the robot, which will check the original purchase order in all the necessary systems. This part is relatively fast, and the customer can stay on the line and be immediately informed that their request is ready to be processed. As the operator needs to continue using this robot, the collected data is sent to another robot that works independently. After working hours, or at a specifically chosen time, the second robot launches the completion process of things like cancelling all collected orders. When finished, it sends a notification about the job completion.

The robot can also work Partially Unattended, and hence you do not have to wait for the outcome. For example, if a company needs to refund a customer, a Finance Department staff member enters this request into a file (such as an Excel spreadsheet). At a specific time, the robot automatically activates itself, reads the file, checks the data, and then processes all the refunds. Similarly, this type of robot can also be utilised by IT departments for the onboarding of new employees, or for another process where you can enter specific input data and do not need to immediately work with the outcome of the robot’s work; in this case, the IT specialist only enters the necessary data, and the robot orders new devices for the new employee or generates access to the company’s systems. If a new hire is replacing a leaving employee, the robot revokes access for the offboarded employee and then generates access to the same applications and orders the same devices for the newly onboarded employee.

For processes that can be fully automated, you can use a Fully Unattended Robot. These robots need no assistance or activation. Whenever the robot detects a new request, it activates itself and performs the tasks based on predefined criteria. Flawlessly. We know from our own experience that the robot works reliably without any fluctuations according to the way we and our clients jointly set it up. If a new invoice arrives in our accountant’s e-mail, the robot opens, reads, processes, and books the invoice in all the required systems and we only get the final notification. We have used full automation for our clients to do things like process power supply disconnection and reconnection requests, generate various regular reports, and execute GDPR compliance processes where the robot’s task was to delete sensitive customer data.

Even though many business processes can be partially or completely automated, there are activities where the human factor is necessary and irreplaceable. Processes that cannot be completely automated include those where the robot does not have clearly set-up criteria for it to work reliably, where a decision or approval of a physical person is required, and where several departments need to be involved in the process: for example, a handwritten document can be digitised, but the robot cannot guarantee the collection of all the necessary data from it unless it is a structured document. A loan approval may require an assessment of the applicant’s current income and liabilities, but another important factor is the applicant’s behaviour during their interactions with banking staff. In such cases, we deploy Long-Running Robots combining the work of a human with various types of robots. When the robot completes part of its work and the next step requires human involvement, the robot creates a task for the human, clearly specifying the expected outcome, and waits for the task to be completed. It then resumes the automatic task processing.
The robot can therefore help with the processing and preparation of all necessary information, do the necessary checks, and display all the relevant information to the human employee. The task for the employee is to make a single-click decision about the next steps. The robot then completes the job.

Flawlessly and with a quick return on investment

Robots work exactly the way they were set up. If we enter the right criteria together, the robot makes the right decisions. It accesses systems based on how we have set it up. It never gets tired or stops working due to being bored of repetitive processes. It is not a problem even if the system is overloaded or if it crashes. The robot reopens the system and resumes working where it left off because it continuously logs all completed operations. If you decide to invest into partial or full automation, the return on your investment depends on the size of the automated process. It may vary from three months for simpler solutions to one or one and a half years for automating more complex processes. The robots will also save you labour costs and eliminate errors. If you need advice on how to start or extend process automation and digitisation, we will be happy to help you, analyse options, and prepare a strategy for your company. Getting all the necessary licences will not be a problem for you either. We can rent them (RPA as a service) or get them for you. The benefit of renting is that you get all the updates as well as the IT support and service. At Soitron we take care of the robot completely. If you decide to purchase a full licence, we can train your specialists and provide them with all the necessary information.

5 basic questions that need to be answered when choosing an RPA supplier

Viktoria Lukáčová Bracjunová

VIKTÓRIA LUKÁČOVÁ BRACJUNOVÁ

Digitalisation, robotisation, and automation have become an essential part of the strategic thinking of all managers and entrepreneurs who look for ways to improve performance of their companies so that they do not miss the boat and lose their competitiveness.

Anyone who has learned about the benefits of Robotic Process Automation (RPA) and decided to use this technology to increase people’s productivity, reduce costs, speed up processes, and improve efficiency and customer service is inevitably faced with the dilemma of choosing a supplier.

Since process automation solutions can be based on several different technologies, and companies that implement RPA systems may be very different in nature, choosing the right supplier can be quite challenging. Soitron consultants have suggested five questions that need to be answered carefully when choosing an RPA supplier.

  1. What technology will we use?

    For robotic process automation, it is necessary to choose a supplier who will implement the RPA solution as well as the software technology the solution will be based on. The most frequently used tools include UiPath, Automation Anywhere, and Blue Prism.

    Naturally, each of them has its pros and cons that make it more suitable (or unsuitable) for certain cases. They differ in what options they offer, the ways they are used, their abilities to collaborate with existing systems, and in their licence pricing.

    This is why if the decision on which RPA to use is made by a company’s business department, it is advisable to also consult IT specialists or choose a supplier who is a partner of several RPA tool manufacturers, who can thus recommend the most suitable technology to each customer based on practical experience.

  2. What type of supplier should we choose?

    Today RPA solutions are offered by a plethora of different companies, such as consulting firms, software houses, and system integrators. There are pros and cons associated with each type of supplier.

    Companies who have a core business of consulting may emphasise that they have a good understanding of business processes and have extensive experience in optimising them. On the other hand, technology companies may highlight the technical know-how needed to acquire digital data from various systems and integrate the RPA with the existing IT environment.

    The ideal choice seems to be a supplier who has the consulting capacity for optimising business processes as well as strong development and integration skills that allow it to overcome potential technical issues and make automation work well with existing information systems and applications.

  3. How are we going to operate the RPA?

    In addition to choosing the tool and the supplier when implementing a robotic process-automation solution, it is necessary to decide how you intend to operate the software and how you want to pay for it. One option is to purchase all the necessary licences and install the RPA in your own IT environment.

    However, a good supplier will also allow its customers to use software automation as a service. This option may be especially suitable for companies that do not have strong IT departments, or who lack the time and human resources to dedicate to automation.

    Moreover, few companies have processes that require a non-stop robot usage. Some companies need to activate automation for no more than one to two hours a day. In such cases, it may be more cost effective not to purchase licences but rather to pay only for the time that the robot actually works.

  4. How do we maintain and further develop the RPA?

    Software process automation solutions are not off-the-shelf software. That is why it is better to avoid suppliers who approach RPA implementation as a one-off project which is completed by signing the acceptance protocols.

    The way a supplier suggests handling the implementation says a lot about their approach. There is a world of difference between blindly following a customer’s assignment and striving to understand and analyse in detail what impact the automation will have on other related processes. It is equally important to test the solution in different scenarios before handing it over.

    Thorough documentation and testing of the automated process reduces the risk of the solution not working properly. However, a fair supplier will also monitor the process in its live operation for some time and then guarantee support for possible changes in the future.

  5. Will data be handled in compliance with legislation during automation?

    Due to strict data protection legislation, companies must be extremely careful when handling data, including data processed by software robots.

    That is why when choosing an RPA, one should inquire if the supplier can prove what activities the robot performs during the process and if they can support this with corresponding documentation if necessary. It is also important to make sure that companies involved in the project have developers who are certified according to the standards of the technology being used. Moreover, the supplier should guarantee that no data is permanently stored anywhere where it could be exposed to the risk of misuse or of being leaked without the customer’s knowledge.

    Before handing the solution over, a meticulous supplier goes through the source code with the client and transparently explains what the software robot does in individual steps, what data is accessed by the robot, and how it is handled.
Viktoria Lukáčová Bracjunová

Viktória Lukáčová Bracjunová

Business & New Technologies Products Development Manager
viktoria.bracjunova@soitron.com

Three questions to answer before RPA deployment

If you have ever been interested in Robotic Process Automation (RPA), you are most likely familiar with its benefits, which include increasing productivity and efficiency as well as reducing cost.

A software robot never sleeps, which saves a lot of time and speeds up processes; it also relieves people of time-consuming and routine tasks. This results in improved services for customers and the general public as well as higher employee satisfaction.

But even RPA technology cannot do everything. For it to be successfully deployed, some necessary prerequisites must be met. Here are the three basic things to keep in mind before implementing RPA.

1. Nothing is done without input data

RPA needs digital data; it cannot handle paper documents. If you want the software to automate things, such as the processing of written customer complaints or invoices arriving by traditional mail, these documents need to be digitised first.

Ideally, input data should be “structured”, i.e., organised in a predefined way. The data available in companies and organisations (such as emails, audio recordings, videos, and images as well as digitised handwritten forms) is often unstructured, which may seem to be a major obstacle to the effective implementation of RPA.

However, having data in a form inappropriate for robotic processing is not an insurmountable problem. Today, paper documents can be quite reliably “read” using Optical Character Recognition technology. Similarly, there are solutions for transcribing audio recordings from contact centres and turning them into text files.

2. A software robot has no brain

Robotic software can process anything it was programmed to do, but it is not intelligent enough or able to learn on its own. So you cannot expect it to answer questions that have no clear answer to them. Such questions require careful consideration by humans and cannot be outsourced to robots.

For example, when approving loans or any other type of application where an applicant may meet some yet not all criteria, an automatic rejection could possibly mean the loss of business or an unhappy customer. This is why the automated application approval process should be complemented in some cases with the expert opinion of an experienced person which may be partly based on feelings.

However, the need for human judgement and decision making at some stages of the process does not automatically mean that the activity is not suitable for automation. It only means that the automated process conducted by a robot may sometimes require the involvement of a human. This can be done, for example, by a window popping up on the screen of the person in charge whenever the robot is unable or unauthorised to do something on its own.

The lack of RPA intelligence can also be dealt with by incorporating artificial intelligence and machine learning elements. In such a combination, the software robot is able to adapt and learn to make decisions based on the broader context as well as past experience.

3. Necessary integration

For RPA to be effective, it may sometimes be necessary to process large amounts of data in a variety of formats from multiple sources. For example, accounting departments tend to receive invoices from multiple vendors in a variety of formats, with individual data being located in different parts of the document. For the software to be able to read the data, it is necessary to either unify the format or adapt the robot to be able to read the data from any required form and shape.

As with the previous points, the diversity of formats and data sources is not an insurmountable obstacle. It is merely a complication to consider when determining the total labour intensity and making a costs-benefit analysis when deciding which processes are cost effective for automation and where the return on the investment may no longer be adequate.

When considering limitations and possible obstacles to the implementation of RPA, it is worth remembering that a software robot will not fix an essentially faulty or inefficient process. This is the reason why we at Soitron analyse the affected processes and, if necessary, propose how they can be improved using business process management tools before the automation.

To sum it up, when considering RPA, it is essential to find a partner who knows the prerequisites for the successful implementation of automation very well and who provides a wide range of services (including integration and process management) that may be critical for the effective use of RPA.

Utopian visions versus real experience: What lessons have companies learned from the cloud?

“The end of the IT department – is it in the cloud?” This was the question asked by the headline of the British magazine Computer Weekly back in 2009. Ten years ago, this new five-letter technology started to appear on the covers of technology and business magazines. Which parts of what was promised came true? And which parts have been a lesson in over-optimism? Together with three IT specialists from Soitron, we dissected the cloud into bits and pieces.


One of the first cloud ads dates back to 1993. It was an ad by AT&T simply entitled “What Is The Cloud?” (the video is still available on YouTube). The three advertised key benefits of this completely unknown technology were choice, control, and convenience.

The king is dead. Long live … many kings

There is no denying the fact that the cloud has made IT services more accessible. All of a sudden, the traditional players had new competition. Who would have said in its early days that one day Amazon would be selling computing power and data storage as well as material goods?


The arrival of the Windows 7 operating system in 2009 was a major milestone for the cloud. Despite the commercial success of this new system, the cloud market has been much more strongly affected by its competitors.
Source: reprofoto, The Economist

The cloud simplified the calculation and comparison of corporate IT costs. “The cloud made it much easier for IT people to provide relevant arguments about the costs. This is much clearer for CFOs – unlike in the past, when IT departments would say that, in addition to CRM systems, they also needed to buy additional data storage, add servers, increase computing power, and so on,” says Zbyszek Lugsch, an IT consultant from Soitron. On the other hand, it led to the misleading impression that the cloud was always less expensive. “Since the advent of the cloud, new technologies have emerged, such as hyperconverged infrastructure: this has brought the price of on-premises solutions down so much that when I compare the cost of the same computing power, servers, storage, and so on in the cloud, and I also include the management costs, I realize that having my own on-premises infrastructure would actually be less expensive.”

IT specialist: The cloud is not for everyone, but every company can enjoy its benefits

Many companies cannot afford to move their sensitive data and critical applications to the cloud, but they would love to use something that is just as easy to manage – where storage or a new server is just a few clicks away, and you can use it immediately.

One solution is a “hyperconverged infrastructure” integrating all three hardware components – storage disks, computing power, and networking – into a single “box” with unified management. This eliminates the need to change or set up hardware every time a new application or an upgrade is deployed.

Our data is safe … somewhere else

The problem is more than just the protection of sensitive data and GDPR compliance. Many companies cannot migrate fully to the cloud, because the downtime or unavailability of their critical applications would cripple their operations.

“Let’s take the example of a local manufacturing plant that produces parts for car manufacturers using a ‘just in sequence’ system [i.e. parts arrive at the assembly line exactly at the moment they are needed]. They have their information system in a data centre in Germany. Can you imagine what would happen if they lost connectivity to Germany? Their production would stop. In their case, this would mean fines that they have no chance of paying. That is why they have a second data centre in the plant as part of their own hyperconverged infrastructure, where they keep a copy of the information system,” explains Lugsch.


The automotive industry is a sector where there is simply no room for downtime.

This is why some companies that have tried the cloud are considering at least a partial return to their own “on-premises” infrastructure. “For instance, large retail chains used to have strictly centralized systems, but today they tend to switch to distributed systems. This means that they have at least part of their infrastructure in their subsidiaries.”

Sit back, relax … and wait

Lugsch’s colleague Marianna Richtáriková is in charge of computer networks. “Our customers, even the really large ones with the latest broadband connections, sometimes experience sudden traffic overloads and application slow-downs, and then we discover, for example, that this was caused by Microsoft updates,” says Richtáriková, correcting the misconception that with high-speed guaranteed internet corporate IT would be as fast as if the company had it on their own premises. “If someone had believed that the connections would become so inexpensive that it would not be a concern anymore, and that the capacity would increase, this turned out not to be entirely true.”

The bottleneck is not just the line speed and throughput but also the availability of services and, more importantly, data. Many data centres guarantee 99 per cent (or even higher) availability. But it is important to know what it actually means.

The availability of services and the availability of data are two different things. “Services include things like email. It will run with 99 per cent availability – i.e. the mail server may be down for only a few hours a year. However, the availability of your corporate data, such as the data you have stored in your SharePoint, is something entirely different. Information about data availability is often hidden somewhere deep in the small print. If you manage to find it, you realize how much it would cost you to ensure the 99 per cent availability of your files. As a result, you need to either create some backup scenarios so that you can restore the data, or you need to buy another service. And suddenly the price is in a totally different ballpark,” says Soitron consultant Štefan Pater in conclusion.