Workplace Facial Screening is a Bad Idea – Progressive.org

Artificial intelligence has been on the rise in workplaces for at least the past decade. From consumer algorithms to quantum computing, AIs uses have grown in type and scope.

There are a number of risks associated with this technology. One of the more troubling is the apparent racial bias one that assigns more negative emotions to Black people than white people, even when they are smiling.

One of the more recent advances in AI technologies is the ability to read emotions through facial and behavioral analysis. While the emotional AI technology has largely been implemented in marketing campaigns and health care, a growing number of high-profile companies are using it in hiring decisions.

Companies should stop this immediately.

There are a number of risks associated with this technology. One of the more troubling is the apparent racial bias one that assigns more negative emotions to Black people than white people, even when they are smiling.

For example, Microsofts Face API software scored Black faces as three times more contemptuous than white faces. This bias is obviously harmful in a number of ways, but its especially devastating to non-white professionals who are disadvantaged in their the ability to secure a job and progress within their field.

Any workplace that uses a hiring algorithm that disproportionately sees Black and brown people as worse emotionally will further drive workplace inequalities and discriminatory treatment.

According to a Washington Post report, more than 100 companies are currently using emotional AI, and this technology has already been used to assess millions of job applicants. Among the top-tier companies deploying emotional AI are Hilton, Dunkin Donuts, IBM and the Boston Red Sox.

Emotional AI recognition has been estimated to be at least a $20 billion market.

The technology uses facial recognition to analyze emotional and cognitive ability. Generally, an interviewee will answer preselected questions during a recorded video interview, and be assessed by the AI algorithm. The assessment provides a grade or score on various characteristics, including verbal skills, facial movements, and even emotional characteristicsall of which aim to predict how likely the candidate will succeed in a position before taking next steps.

Supporters of the technology argue that it removes human prejudice from the equation. But replacing human bias with an artificial one cant be the solution.

Moreover, companies tend to use emotional AI to screen for a very limited data set to decide who gets marked as employable. These limited data sets usually favor majority groups while ignoring minority ones. For example, if someones first language isnt English and they speak with an accent or if an applicant is disabled, they will more likely be earmarked as less employable.

The technology can also work to the disadvantage of women.

For starters, much of the AI technology fails to properly identify women even iconic women such as Oprah Winfrey and Michelle Obama. Many examples have shown that, particularly in fields that are already male dominated, women applicants are downgraded and less likely to be recommended than male applicants.

There are a plethora of other anecdotes that highlight the biases of emotional AI, even outside the workplace. These include cameras that identify Asian faces as blinking and software that misgenders those with darker skin.

Of course, companies have been warned of the ongoing biases and have so far ignored them; many still use software like HireVue, which Princeton Professor of Computer Science Arvind Narayanan described as a bias perpetuation engine. Research institute AI Now, based at New York University, has called for a complete ban on emotional AI tech.

Until emotional AI is shown to be free of racial and gender biases, its unsafe for use in a world already struggling to overcome inequalities. If companies want to assist in that struggle, they should end the use of emotional AI in the workplace.

This column was produced for the Progressive Media Project, which is run by The Progressive magazine, and distributed by Tribune News Service.

September 17, 2020

12:32 PM

More:
Workplace Facial Screening is a Bad Idea - Progressive.org

QEDIT Joins Forces with Galois as Part of US Government-Funded Initiative to Advance Zero-Knowledge Proof Cryptography – PRNewswire

TEL AVIV, Israel, Sept. 16, 2020 /PRNewswire/ --QEDIT, a Privacy-Enhancing Technology provider, has announced its participation in a $12.6 million USD government-funded research project, geared towards harnessing advanced cryptography to preserve the integrity of complex software programs.

Funded by the Defense Advanced Research Projects Agency (DARPA), the $12.6 million contract was awarded to R&D specialist firm Galois to lead Project Fromager, with QEDIT being awarded $2 million of the funding allocation. Project Fromager is one of 12 projects being funded in conjunction with DARPA's Securing Information for Encrypted Verification and Evaluation (SIEVE) program, which aims to use Zero-Knowledge Proofs (ZKPs) to enable the verification of capabilities relevant to the Department of Defense without revealing the sensitive details associated with those capabilities.

The SIEVE program also seeks to advance the performance and efficiency of ZKPs and broaden the accessibility of ZKP technology to new swathes of platform-agnostic developers.

Jonathan Rouach, CEO and Co-Founder of QEDIT, said, "QEDIT is delighted to partner with Galois and other esteemed academic institutions aspart of this landmark research project on behalf of DARPA. This project underlines the pronounced value of ZKP cryptography as a means of delivering a new, more powerful standard of privacy at the highest levels of industry and government. We are proud to accelerate the global deployment of ZKPs for practical applications."

Project Fromager is expected to run through to 2024, and aims to use ZKPs to swiftly test the integrity of complex software programs to ensure that the code has not been compromised. It will be spearheaded by Galois, and will also leverage the academic resources of Denmark's Aarhus University, New York's Columbia University, and Belgium's Ku Leuven University.

Dr. Alex Malozemoff, Principal Researcher at Galois, said, "We at Galois are constantly striving to close the gap between research and real-world deployment. The current state of Zero-Knowledge Proof technology is right at this point. While Zero-Knowledge Proofs have seen wide deployment in cryptocurrencies, more general approaches are just now beginning to be seen as viable in commercial and governmental settings. We are excited to team up with QEDIT: their industry experience, alongside being leaders in the standardization effort around zero-knowledge, is invaluable to the maturation of these technologies."

QEDIT offers a suite of enterprise solutions based on ZKP cryptography and other privacy-enhancing techniques to help businesses mitigate risk and stay competitive through privacy-compliant, cross-organizational data collaboration. The company provides a platform that facilitates fraud detection between insurance competitors, intelligence-sharing among banks to identify financial crime, as well as more streamlined and efficient identity and certification management processes.

Aviv Zohar, QEDIT Chief Scientist and Co-Founder said, "Research is deeply ingrained in the fabric of QEDIT's DNA and our ongoing work with the global ZKProof standardization initiative is a measure of this. Project Fromager represents a tremendous opportunity to bolster our credentials as the standard-setter for ZKP solutions, but it's also a platform to explore the potential use of QEDIT's zkInterface, which is currently under review for standardization at ZKProof, to facilitate interoperability between solutions developed by various SIEVE teams. QEDIT's team of seasoned cryptographers and advisors have broad theoretical and practical experience when it comes to developing efficient ZKP systems and we can't wait to get started."

For more information, visithttps://qed-it.com/

About QEDIT

QEDIT helps enterprises leverage third-party data through the use of privacy-enhancing technologies (PET). Founded by a world-class team of accomplished entrepreneurs, researchers, and developers, QEDIT empowers businesses by enabling them to safely share intelligence, without relinquishing data ownership and without violating local data privacy regulations.Through the use of Zero-Knowledge Proof (ZKP) cryptography and other cutting-edge, cryptographically-secure techniques, QEDIT's suite of enterprise solutions removes data-driven barriers to industry-wide privacy challenges in the fields of finance, supply chain, insurance, and human resources. For more information, visithttps://qed-it.com.

This material is based upon work supported by the Defense Advanced Research Projects Agency (DARPA) under Contract No. HR001120C0085. Any opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the Defense Advanced Research Projects Agency (DARPA).Distribution Statement "A" (Approved for Public Release, Distribution Unlimited)

SOURCE QEDIT

See the original post here:
QEDIT Joins Forces with Galois as Part of US Government-Funded Initiative to Advance Zero-Knowledge Proof Cryptography - PRNewswire

Global Quantum Cryptography Market 2020: Insights By Revenue, Upcoming Trends And Top Players Forecast Til … – Fresno Observer

The global quantum cryptography market is expected to rise with an impressive CAGR and generate the highest revenue by 2026.Fortune Business Insights in its latest report published this information. The report is titled Quantum Cryptography Market Size, Share and Global Trend By Component (Hardware & Services), By Services (Consulting, Support and Maintenance, Integration and Deployment), By Applications (Application Security, Network Security, Database Encryption), By Industry Verticals (Banking, Finance Services, Insurance, Consumer Good and Retail, Government & Defence, Healthcare and Life sciences, Telecom and IT) and Geography Forecast till 2025. The report discusses research objectives, research scope, methodology, timeline and challenges during the entire forecast period. It also offers an exclusive insight into various details such as revenues, market share, strategies, growth rate, product & their pricing by region/country for all major companies.

For more information, Get sample pdf @ https://www.fortunebusinessinsights.com/enquiry/request-sample-pdf/quantum-cryptography-market-100211

The report provides a 360-degree overview of the market, listing various factors restricting, propelling, and obstructing the market in the forecast duration. The report also provides additional information such as interesting insights, key industry developments, detailed segmentation of the market, list of prominent players operating in the market, and other quantum cryptography market trends. The report is available for sale on the company website.

List of the key players operating in the global quantum cryptography market:

Rising Adoption of Cyber-security to Support the Markets Expansion

Increasing demand for cyber-security solutions and tools and rising adoption of cloud-based software are a few factors expected to drive the global market during the forecast period. Furthermore, rapid digitalization and Internet penetration is a factor likely to increase the growth rate in the market.

InfoSec Global and ID Quantique collaborated in 2018. The aim of the collaboration is to ensure network security and application security by offering security transmission for wide-area communication. Together the organizations offer Quantum-Powered Crypto-Agile VPN, a cloud-based Quantum cryptography solution. This in response is likely to boost the global quantum cryptography market.

On the contrary, rising security concerns in a cloud-based cryptography solution is a factor that may restrain the market to a certain extent. Additionally, increasing cyber-attacks is a major factor that might hamper the growth in the global market.

View press release for more information @ https://www.marketwatch.com/press-release/quantum-cryptography-market-analysis-and-demand-with-future-forecast-to-2026-2020-07-30

Regional Analysis for Quantum Cryptography Market:

Major Table of Contents for Quantum Cryptography Market:

Other Exclusive Reports:

Video on Demand Market

Virtual Reality in Gaming and Entertainment Market

Accounting Software Market 2020: Ravishing Growth With Major Industry Factors And Key Players Till 2026

Artificial Intelligence Market Size, Analysis By Segmentation And Geography Overview

Blockchain Technology Market In Depth Analysis By Total Revenue And Industry Growth Rate Forecast Till 2025

Enterprise Content Management Market Size, Key Technology And Industry Trends Till 2026

About Us:Fortune Business Insights offers expert corporate analysis and accurate data, helping organizations of all sizes make timely decisions. Our reports contain a unique mix of tangible insights and qualitative analysis to help companies achieve sustainable growth. Our team of experienced analysts and consultants use industry-leading research tools and techniques to compile comprehensive market studies, interspersed with relevant data.

Contact:Name: Ashwin AroraEmail: [emailprotected]Phone: US +1 424 253 0390 / UK +44 2071 939123 / APAC: +91 744 740 1245

Link:
Global Quantum Cryptography Market 2020: Insights By Revenue, Upcoming Trends And Top Players Forecast Til ... - Fresno Observer

Write Code That Protects Sensitive User Data – Security Boulevard

Sensitive data exposure is currently at number 3 in the??OWASP Top 10??list of the most critical application security risks.

In this blog post, we will describe common scenarios of incorrect sensitive data handling and suggest ways to protect sensitive data. We will illustrate our suggestions with code samples in C# that can be used in ASP.NET Core applications.

OWASP lists passwords, credit card numbers, health records, personal information and business secrets as sensitive data.

Social security numbers, passwords, biometric data, trade memberships and criminal records can also be thought of at sensitive data.

What exactly sensitive data means for you will depend on:

In software applications, we can think of sensitive data as:

Various sources and authorities may have different definitions of sensitive data. However, if youre a business that develops an application that works with user data, its in your best interest to use a broad interpretation of sensitive data and do your best to protect it.

Lets discuss some of the most common vulnerabilities that can expose sensitive user data.

Due to inadequate access control, users who are not expected to see sensitive data may in fact be able to access it, even though the data is not referenced by the application in any way. An attack called force browsing takes advantage of this situation.

Imagine youre a regular user of a web application, and when you look around the UI, you dont see any administrative functionality available. Still, if you manually enter a URL that you think may be available to admin users (such as??https://www.myapp.com/admin), you do see the admin UI. This is forced browsing: the application didnt guide you to a restricted resource, but neither did it prevent you from accessing it.

Improperly managed sessions

When sessions are managed improperly, session IDs of authenticated users are at risk of being exposed, and attackers can take advantage of this to impersonate legitimate users. Two common attacks that are made possible by improper session management are session hijacking and session fixation. Attacks like these can have a severe impact if targeted at privileged accounts and can cause massive leakage of sensitive data.

One major reason why sessions can be mismanaged is that developers sometimes write their custom authentication and session management schemes instead of using battlefield-tested solutions, but doing this correctly is hard.

Insecure cryptographic storage??refers to unsafe practices of storing sensitive data, most prominently user passwords. This is not about not protecting data at all, which results in storing passwords as plain text. Instead, this is about applying a wrong cryptographic process or a surrogate, such as:

This vulnerability is extra important because secure cryptographic storage is the last line of defense: strong cryptography saves the data once it has been exposed by other risks in an application.

Lets see what kind of??secure coding practices??can help you avoid vulnerabilities such as the ones listed above, and minimize the risk of disclosing sensitive data.

This is a hidden page!

However, if the??Home??controllers??Hidden??action is not configured as available to logged-in users only, an anonymous user would still be available to enter the direct URL and access the hidden page. To prevent this, the controller action should be protected as well:

Weve learned how applying a set of secure coding practices in access control, session management and cryptographic storage can help you avoid a set of vulnerabilities and minimize the risk of disclosing sensitive data.

Theres one more fundamental advice that OWASP gives:??dont store sensitive data unless you absolutely need to. Data that is not stored cannot be compromised.

Whatever decisions you make on data storage policy, remember to detect vulnerable code early with continuous testing, code review, static and dynamic analysis.

*** This is a Security Bloggers Network syndicated blog from Application Security Research, News, and Education Blog authored by jlane@veracode.com (jlane). Read the original post at: https://www.veracode.com/blog/secure-development/write-code-protects-sensitive-user-data

See more here:
Write Code That Protects Sensitive User Data - Security Boulevard

Silex Insight and Faraday Extend Strategic Partnership to Deliver Secure IoT and AI Solutions – Embedded Computing Design

Silex Insight, a provider of flexible security IP cores, and Faraday Technology Corporation, an ASIC design service and IP provider, announced their collaboration for delivering secure IoT solutions for a wide range of ASIC applications.Silex Insight and Faraday extend their partnership beyond ASIC design services, by providing a combined platform comprised of Faraday ASIC solutions along with a library of Silex Insight's cryptography IP cores. Crypto Coprocessors, True Random Number Generators, and AES crypto engines are some of the IP cores being used in a variety of products, like doorbells, smart wristbands and smart grids.

For more information, visit http://www.silexinsight.com or http://www.faraday-tech.com

Tiera Oliver, edtorial intern for Embedded Computing Design, is responsible for web content edits as well as newsletter updates. She also assists in news content as far as constructing and editing stories. Before interning for ECD, Tiera had recently graduated from Northern Arizona University where she received her B.A. in journalism and political science and worked as a news reporter for the university's student led newspaper, The Lumberjack.

See the original post:
Silex Insight and Faraday Extend Strategic Partnership to Deliver Secure IoT and AI Solutions - Embedded Computing Design

Who is targeting $100 million in investments and which Israeli company has partnered with BMW? – CTech

Team8 launches new fintech startup founding platform, targeting $100 million in investments. The group will found and invest in early stage companies in exchange for 50% of their equity. Read more

Medigate completes $30 million series B round to expand Tel Aviv R&D center. Medigates solution addresses patient safety and privacy by automatically locating, identifying, and managing the security posture of all devices connected to the network. Read more

HR Post Covid | Working from home means we could meet each others families, says IntSights HR Director. Efrat Dror joins CTech for its HR Post Covid series, where she discusses how WFH created a new personalised way of working. Read more

Israeli startup Blue White Robotics raises $10 million for autonomous vehicle platform. The investment will enable BWR to expand its global presence, services and customers, and actively recruit new employees to its R&D center in Tel-Aviv. Read more

Israel-based Sternum raises $6.5 million in series A for IoT devices cyber protection. The round was led by Square Peg and joined existing investors Merle Hinrich, BTOV, and private investor Eyal Shavit. Read more

Intel expanding Ignite startup program on back of Israeli success. "Israel is such an important part of our company," said Intel CEO Bob Swan, describing Israel as "a microcosm of Intel as a whole." Read more

BMW to incorporate Israel-based Tactile Mobility tech in all new models. Tactile Mobility develops technology that analyzes data from car sensors and enables autonomous vehicles of different levels to get a feel of the road, using tactile data and artificial intelligence. Read more

Behavioral recognition system viisights selected by Mexican city to help track Covid-19. The technology will help citizens comply with social distancing measures and alert police of violent behavior. Read more

Bored young hackers are responsible for part of the dramatic increase in cyberattacks amid Covid-19. Israeli cybersecurity experts discuss the latest threats and how to overcome them at a panel during Calcalist and Googles Startup Week. Read more

Israels QEDIT awarded $2 million funding in DARPA cryptography research program. The research project is geared towards harnessing advanced cryptography to preserve the integrity of complex software programs. Read more

Read more:
Who is targeting $100 million in investments and which Israeli company has partnered with BMW? - CTech

Riverside Research Welcomes Dr. William Casebeer, Director of Artificial Intelligence and Machine Learning – PRNewswire

Dr. Casebeer's career began with the United States Air Force from which he retired from duty as a Lieutenant Colonel and intelligence analyst in 2011. He brings two decades of experience leading and growing research programs from within the Department of Defense and as a contractor. Dr. Casebeer held leadership roles at Scientific Systems, Beyond Conflict, Lockheed Martin, and Defense Advanced Research Projects Agency (DARPA).

"We are so happy to have Dr. Casebeer join our team," said Dr. Steve Omick, President and CEO. "His wealth of knowledge will be extremely valuable to not only the growth of our research and development in AI/ML but also to our other business units."

As a key member of the company's OIC, Dr. Casebeer will lead the advancement of neuromorphic computing, adversarial artificial intelligence, human-machine teaming, virtual reality for training and insight,and object and activity recognition. He will also pursue and grow opportunities with government research organizations and the intelligence community.

About Riverside Research

Riverside Research is a not-for-profit organization chartered to advance scientific research for the benefit of the US government and in the public interest. Through the company's open innovation concept, it invests in multi-disciplinary research and development and encourages collaboration to accelerate innovation and advance science. Riverside Research conducts independent research in machine learning, trusted and resilient systems, optics and photonics, electromagnetics, plasma physics, and acoustics. Learn more at http://www.riversideresearch.org.

SOURCE Riverside Research

http://www.riversideresearch.org

Continued here:
Riverside Research Welcomes Dr. William Casebeer, Director of Artificial Intelligence and Machine Learning - PRNewswire

Proximity matters: Using machine learning and geospatial analytics to reduce COVID-19 exposure risk – Healthcare IT News

Since the earliest days of the COVID-19 pandemic, one of the biggest challenges for health systems has been to gain an understanding of the community spread of this virus and to determine how likely is it that a person walking through the doors of a facility is at a higher risk of being COVID-19 positive.

Without adequate access to testing data, health systems early-on were often forced to rely on individuals to answer questions such as whether they had traveled to certain high-risk regions. Even that unreliable method of assessing risk started becoming meaningless as local community spread took hold.

Parkland Health & Hospital System, the safety net health system for Dallas County, Texas, and PCCI, a Dallas-based non-profit with expertise in the practical applications of advanced data science and social determinants of health, had a better idea.

Community spread of an infectious disease is made possible through physical proximity and density of active carriers and non-infected individuals. Thus, to understand the risk of an individual contracting the disease (exposure risk), it was necessary to assess their proximity to confirmed COVID-19 cases based on their address and population density of those locations.

If an "exposure risk" index could be created, then Parkland could use it to minimize exposure for their patients and health workers and provide targeted educational outreach in highly vulnerable zip codes.

PCCIs data science and clinical team worked diligently in collaboration with the Parkland Informatics team to develop an innovative machine learning driven predictive model called Proximity Index. Proximity Index predicts for an individuals COVID-19 exposure risk, based on their proximity to test positive cases and the population density.

This model was put into action at Parkland through PCCIs cloud-based advanced analytics and machine learning platform called Isthmus. PCCIs machine learning engineering team generated geospatial analysis for the model and, with support from the Parkland IT team, integrated it with their electronic health record system.

Since April 22, Parklands population health team has utilized the Proximity Index for four key system-wide initiatives to triage more than 100,000 patient encounters and to assess needs, proactively:

In the future, PCCI is planning on offering Proximity Index to other organizations in the community schools, employers, etc., as well as to individuals to provide them with a data driven tool to help in decision making around reopening the economy and society in a safe, thoughtful manner.

Many teams across the Parkland family collaborated on this project, including the IT team led by Brett Moran, MD, Senior Vice President, Associate Chief Medical Officer and Chief Medical Information Officer at Parkland Health and Hospital System.

Original post:
Proximity matters: Using machine learning and geospatial analytics to reduce COVID-19 exposure risk - Healthcare IT News

Dive Into Data and Machine Learning With 30 Hours of Top-Rated Training for $40 – iMore

From movie recommendations to self-driving cars, most cutting-edge technology is powered by big data.The Deep Learning & Data Analysis Certification Bundlehelps you dive into this exciting field, with 30 hours of expert instructionfor just $39.99.

To make smart decisions, both humans and machines need to run the numbers. For this reason, data scientists are always in demand. Whether you want to become a data specialist or simply improve your rsum, this bundle offers some essential training.

Through eight engaging video courses, you discover how to analyze and visualize data by writing code. Along the way, you learn to work with Python, R, Google Data Studio, PyTorch, Keras, and other tools.

The training also looks at artificial intelligence, machine learning, and image processing. Through hands-on tutorials, you discover how to build smart software that can reveal key insights.

Your instructor is Minerva Singh, a data scientist who has taught over 63,000 students.

These courses are worth $1,600, but you canget them today for just $39.99.

See Deal

Prices subject to change

Do you have your stay-at-home essentials?Here are some you may have missed.

Continued here:
Dive Into Data and Machine Learning With 30 Hours of Top-Rated Training for $40 - iMore

How Amazon Automated Work and Put Its People to Better Use – Harvard Business Review

Executive Summary

Replacing people with AI may seem tempting, but its also likely a mistake. Amazons hands off the wheel initiative might be a model for how companies can adopt AI to automate repetitive jobs, but keep employees on the payroll by transferring them to more creative roles where they can add more value to the company. Amazons choice to eliminate jobs but retain the workers and move them into new roles allowed the company to be more nimble and find new ways to stay ahead of competitors.

At an automation conference in late 2018, a high-ranking banking official looked up from his buffet plate and stated his objective without hesitation: Im here, he told me, to eliminate full-time employees. I was at the conference becauseafter spending months researching how Amazon automates workat its headquarters,I was eager to learn how other firms thought about this powerful technology. After one short interaction, it was clear that some have it completely wrong.

For the past decade, Amazon has been pushing to automate office work under a program now known as Hands off the Wheel. The purpose was not to eliminate jobs but to automate tasks so that the company could reassign people to build new products to do more with the people on staff, rather than doing the same with fewer people. The strategy appears to have paid off: At a time when its possible to start new businesses faster and cheaper than ever before, Hands off the Wheel has kept Amazon operating nimbly, propelled it ahead of its competitors, and shownthat automating in order to fire can mean missing bigopportunities. As companies look at how to integrate increasingly powerful AI capabilities into their businesses, theyd do well to consider this example.

The animating idea behind Hands off the Wheel originated at Amazons South Lake Union office towers, where the company began automating work in the mid-2010s under an initiative some called Project Yoda. At the time, employees in Amazons retail management division spent their days making deals and working out product promotions as well as determining what items to stock in its warehouses, in what quantities, and for what price. But with two decades worth of retail data at its disposal, Amazons leadership decided to use the force (machine learning) to handle the formulaic processes involved in keeping warehouses stocked. When you have actions that can be predicted over and over again, you dont need people doing them, Neil Ackerman, an ex-Amazon general manager, told me.

The project began in 2012, when Amazon hired Ralf Herbrich as its director of machine learning and made the automation effort one of his launch projects. Getting the software to be goodat inventory management and pricing predictions took years, Herbrich told me, because his team had to account for low-volume product orders that befuddled its data-hungry machine-learning algorithms. By 2015, the teams machine-learning predictions were good enough that Amazons leadership placed them in employees software tools, turning them into a kind of copilot for human workers. But at that point the humans could override the suggestions, and many did, setting back progress.

Eventually, though, automation took hold. It took a few years to slowly roll it out, because there was training to be done, Herbrich said. If the system couldnt make its own decisions, he explained, it couldnt learn. Leadership required employees to automate a large number of tasks, though that varied across divisions. In 2016, my goals for Hands off the Wheel were 80% of all my activity, one ex-employee told me. By 2018 Hands off the Wheel was part of business as usual. Having delivered on his project, Herbrich left the company in 2020.

The transition to Hands off the Wheel wasnt easy. The retail division employees were despondent at first, recognizing that their jobs were transforming. It was a total change, the former employee mentioned above said. Something that you were incentivized to do, now youre being disincentivized to do. Yet in time, many saw the logic. When we heard that ordering was going to be automated by algorithms, on the one hand, its like, OK, whats happening to my job? another former employee, Elaine Kwon, told me. On the other hand, youre also not surprised. Youre like, OK, as a business this makes sense.

Although some companies might have seen an opportunity to reduce head count, Amazon assigned the employees new work. The companys retail division workers largely moved into product and program manager jobs fast-growing roles within Amazon that typically belong to professional inventors. Productmanagers oversee new product development, while program managers oversee groups of projects. People who were doing these mundane repeated tasks are now being freed up to do tasks that are about invention, Jeff Wilke, Amazons departing CEO of Worldwide Consumer, told me. The things that are harder for machines to do.

Had Amazon eliminated those jobs, it would have made its flagship business more profitable but most likely would have caused itself to miss its next new businesses. Instead of automating to milk a single asset, it set out to build new ones. Consider Amazon Go, the companys checkout-free convenience store. Go was founded, in part, by Dilip Kumar, an executive once in charge of the companys pricing and promotions operations. While Kumar spent two years acting as a technical adviser to CEO Jeff Bezos, Amazons machine learning engineers began automating work in his old division, so he took a new lead role in a project aimed at eliminating the most annoying part of shopping in real life: checking out. Kumar helped dream up Go, which is now a pillar of Amazons broader strategy.

If Amazon is any indication, businesses that reassign employees after automating their work will thrive. Those that dont risk falling behind.In shaky economic times, the need for cost-cutting could make it tempting to replace people with machines, but Ill offer a word of warning: Think twice before doing that. Its a message I wish I had shared with the banker.

See the original post:
How Amazon Automated Work and Put Its People to Better Use - Harvard Business Review