The rush to incorporate artificial intelligence into processes often requires a deeper examination of which services should be AI-enabled.

Constellation’s latest framework for augmenting humanity encompasses seven factors (see Figure 1):

  1. Repetitiveness: The greater a process is repeated, the more likely the process should be AI-powered. One-offs and custom processes with minimal repetition are lower-priority candidates for artificial intelligence.
  2. Volume: When the volume of transactions and interactions exceed human capacity, the smart service should be AI-powered. Volumes within human capacity will remain human-powered.
  3. Time to complete: High time-to-market requirements favor AI-powered approaches. -Lower time-to-completion requirements will remain human-powered.
  4. Nodes of interaction: Simple interaction nodes will lean toward human-powered. AI best serves complex and high-volume nodes of interaction.
  5. Complexity: Good candidates for AI-powered include complexity beyond human comprehension and simple tasks that can be optimized by AI.
  6. Creativity: The cognitive processes required for creativity mostly reside with humans today. Higher creative powers will be less likely to be AI-powered. However, with advancements in cognitive learning, one can expect creativity to improve with AI-powered approaches over the next decade.
  7. Physical presence: Processes that require a heavy physical presence will most likely require human-powered capabilities. However, processes that put lives in jeopardy serve as great candidates for AI-powered automation. In general, low physical presence requirements play well to AI-powered approaches.

Learn more

Still not sure if you should automate? Explore “RPA: A no-hype buyer’s guide” and sign up for the no-cost, IBM Robotic Process Automation software trial.

More from Cloud

Get ready for change with IBM Cloud Training

2 min read - As generative AI creates new opportunities and transforms cloud operations, it is crucial to learn how to maximize the value of these tools. A recent report from the IBM Institute for Business Value found that 68% of hybrid cloud users already have a formal, organization-wide policy or approach for the use of generative AI. That same report also noted that 58% of global decision makers say that cloud skills remain a considerable challenge. Being proactive in your learning can significantly…

Data center consolidation: Strategy and best practices

7 min read - The modern pace of data creation is staggering. The average organization produces data constantly—perhaps even continuously—and soon it’s investing in servers to provide ample storage for that information. In time, and probably sooner than expected, the organization accrues more data and outgrows that server, so it invests in multiple servers. Or that company could tie into a data center, which is built to accommodate even larger warehouses of information. But the creation of new data never slows for long. And…

Hybrid cloud examples, applications and use cases

7 min read - To keep pace with the dynamic environment of digitally-driven business, organizations continue to embrace hybrid cloud, which combines and unifies public cloud, private cloud and on-premises infrastructure, while providing orchestration, management and application portability across all three. According to the IBM Transformation Index: State of Cloud, a 2022 survey commissioned by IBM and conducted by an independent research firm, more than 77% of business and IT professionals say they have adopted a hybrid cloud approach. By creating an agile, flexible and…

Tokens and login sessions in IBM Cloud

9 min read - IBM Cloud authentication and authorization relies on the industry-standard protocol OAuth 2.0. You can read more about OAuth 2.0 in RFC 6749—The OAuth 2.0 Authorization Framework. Like most adopters of OAuth 2.0, IBM has also extended some of OAuth 2.0 functionality to meet the requirements of IBM Cloud and its customers. Access and refresh tokens As specified in RFC 6749, applications are getting an access token to represent the identity that has been authenticated and its permissions. Additionally, in IBM…

IBM Newsletters

Get our newsletters and topic updates that deliver the latest thought leadership and insights on emerging trends.
Subscribe now More newsletters