{"id":46198,"date":"2021-09-13T02:27:52","date_gmt":"2021-09-13T06:27:52","guid":{"rendered":"http:\/\/blog.cybercon1.com\/?p=46198"},"modified":"2021-09-13T02:27:52","modified_gmt":"2021-09-13T06:27:52","slug":"a-framework-for-explaining-the-power-of-intelligent-automation","status":"publish","type":"post","link":"https:\/\/blog.cyberconservices.com\/index.php\/2021\/09\/13\/a-framework-for-explaining-the-power-of-intelligent-automation\/","title":{"rendered":"A Framework For Explaining The Power Of Intelligent Automation"},"content":{"rendered":"<p>By <a class=\"contrib-link--name remove-underline\" href=\"https:\/\/www.forbes.com\/sites\/forbestechcouncil\/people\/pascalbornet\/\">Pascal Bornet<\/a> &#8211; Applications of computer vision in a physical environment include robots recognizing objects and self-driving cars interpreting signs and road markings. In a digital environment, computer vision is used for intelligent character recognition (ICR), which can digitize and interpret documents. Finally, computer vision can automate the analysis of images and videos. This has a vast range of applications, including medical diagnostics, business process documentation, biometrics and retail store automation, such as <a class=\"color-link\" title=\"https:\/\/www.nytimes.com\/2018\/01\/21\/technology\/inside-amazon-go-a-store-of-the-future.html\" href=\"https:\/\/www.nytimes.com\/2018\/01\/21\/technology\/inside-amazon-go-a-store-of-the-future.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/www.nytimes.com\/2018\/01\/21\/technology\/inside-amazon-go-a-store-of-the-future.html\" aria-label=\"Amazon Go\">Amazon Go<\/a>.<\/p>\n<p>As businesses began considering how to adopt computer vision, they should understand that a large amount of training data may be needed, especially for applications like medical diagnostics or biometrics. The technology behind Amazon Go is also still very expensive and out of the reach of most small and medium enterprises.<\/p>\n<p>Execution involves actually doing things \u2014 accomplishing tasks in digital environments. The execution capability acts as a glue to connect the other capabilities together in a streamlined way. For example, with the help of the language capability, it can collect sales data using the vision or language capabilities, automatically convey the data to the thinking and learning capability for analysis and compile and send out a report about the findings.<\/p>\n<div class=\"article_paragraph_7\"><\/div>\n<p>The key technologies supporting the execution capability are smart workflow, low-code platforms and robotic process automation (RPA). Smart workflow platforms help to automate predefined standard processes. Low-code platforms allow business users without coding skills to develop automated programs. RPA is used to automate any tasks that a human can do on a computer, such as opening applications, clicking menu items, entering text or copying and pasting. It learns by recording the actions of the human user and automating them.\u00a0\u00a0<a href=\"https:\/\/www.google.com\/url?rct=j&amp;sa=t&amp;url=https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2021\/09\/09\/a-framework-for-explaining-the-power-of-intelligent-automation\/&amp;ct=ga&amp;cd=CAEYACoUMTA5MzM2MTc4NTMxNzM5MzgxNjYyGjRhYzkyN2Y3ZGEzYjNiNWE6Y29tOmVuOlVT&amp;usg=AFQjCNFRELRdNPydJjV1q0YSpneOBL5vOA\">Read On:<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Pascal Bornet &#8211; Applications of computer vision in a physical environment include robots recognizing objects and self-driving cars interpreting signs and road markings. In a digital environment, computer vision is used for intelligent character recognition (ICR), which can digitize <span class=\"excerpt-dots\">&hellip;<\/span> <a class=\"more-link\" href=\"https:\/\/blog.cyberconservices.com\/index.php\/2021\/09\/13\/a-framework-for-explaining-the-power-of-intelligent-automation\/\"><span class=\"more-msg\">Continue reading &rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":46199,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[635,628,53],"tags":[],"class_list":["post-46198","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business-process-automation","category-rpa","category-workflow"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/46198","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/comments?post=46198"}],"version-history":[{"count":0,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/46198\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/media?parent=46198"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/categories?post=46198"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/tags?post=46198"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}