Read the news today and there is likely to be an article on how generative artificial intelligence (GenAI) is going to change the world. One story will praise the transformative potential of GenAI, the next will shout doom and gloom. Neither is 100% right and neither is 100% wrong.
The mixed perceived potential of GenAI can be seen in responses to the “2023 Gartner Supply Chain Technology User Wants and Needs Survey.” We asked respondents to rate how important they currently saw certain emerging technologies like GenAI and how transformative they felt these technologies were going to be over the next decade. GenAI was an interesting case study. Respondents saw it as one of the most potentially transformative emerging technologies over the long term. But, at this time, it was rated as one of the least currently important technologies.
At this point, many organizations are struggling to prove and realize value from their GenAI investments and pilot projects. Accordingly, Gartner research predicts that at least 30% of GenAI projects will be abandoned after proof of concept by the end of 2025.
The survey findings highlight that before they invest heavily in a technology, companies must honestly assess who they are and what their risk tolerance is. Different supply chain organizations view the value and importance of technology differently, and they should align their investment strategies with their unique identity. Every supply chain and logistics organization has its own culture, and this culture has a significant influence on how leaders must approach and manage their technology investment decisions.
What’s your tech adoption profile?
Distribution of supply chain technology adoption profiles
"2023 Gartner Supply Chain Technology User Wants and Needs Survey"
As part of gaining an understanding of what types of technology they should invest in, supply chain leaders must honestly and candidly assess their organization's risk tolerance. This is because risk tolerance has a notable impact on which technology investments are right for an organization, at what time, and for what reasons.
Gartner research has identified five adoption profiles:
Cautious: These organizations wait until technologies are fully mature and several iterations of the technology have been released.
Conservative: These organizations adopt mainstream technologies once they are proven and lower risk solutions are available.
Adventurer: These organizations prefer to adopt adolescent but maturing technologies with manageable risk.
Pioneer: These organizations may adopt emerging technologies in the early stages of commercialization when there are successful deployments by industry leaders.
Maverick: These organizations favor adopting embryonic, emerging, and often unproven technologies that are relatively new and riskier.
The figure above shows the distribution of adoption profiles among respondents to the “Wants and Needs” survey. As can be seen in the chart, there is a notable disparity among companies in how they approach purchasing and adopting technology.
If buying decisions are not aligned with the organization’s adoption behavior, then investments may be made at the wrong time or for the wrong reasons—or both—and organizations will fail to meet their intended goals and objectives. For example, risk-intolerant companies, like cautious or conservative adopters, should be very cautious of investing in technologies like GenAI today, while risk-exploiting companies (those that are willing to put capital at risk for big payoffs) should take the plunge.
Taking a closer look
In addition to their application profile, there are three other dimensions that supply chain leaders should take into account when deciding what technology they should invest in and when and how these technologies should be implemented: planning, control, and pace of change.
Planning identifies the organization’s approach to creating and adhering to a strategic technology plan. There are three general profile attributes:
Strict—The majority of technology decisions will be driven by and to fit to the plan.
Accommodating—The strategic plan is typically adjusted only under certain situations, such as changes in the business climate or the urgency of responding to new, unanticipated events.
Flexible—The plan is less of a definitive driver for technology decisions, and users have more autonomy to pursue other opportunities where they make business sense.
Control identifies the locus of power for driving the technology agenda, with the following profile attributes:
IT-led—The IT organization and a strong chief information officer drive the technology agenda.
Collaborative—Business and IT work together to determine the technology path.
Business-led—Leaders from the business largely guide the agenda.
Pace of change explores the organization’s receptivity to new ideas and technology approaches, building upon the technology adoption approaches outlined previously with the following profile attributes:
Measured—The enterprise prefers to observe the impact of events and new technology before acting.
Responsive—The enterprise looks for technology to help it react and respond to external events.
Dynamic—The enterprise aggressively pursues new technologies and reacts quickly to external events in pursuit of competitive advantage.
These categories are more indicative of an organization’s buying propensity in terms of when, who, and how they make technology decisions than traditional factors such as company size, geography, or even industry.
These considerations also go a step beyond traditional technology maturity models. Maturity models are a good first step for gaining an understanding of “who are you,” “what you do,” and “how you perform” compared to other companies. However, the three dimensions above help you unlock another level of insight—the “why you do what you do” and the way you do it. This provides leaders with a deeper level of understanding of organizational behavioral traits, much like psychographic targeting in consumer marketing.
These insights can help leaders gain perspective on how cultural differences influence an organization’s supply chain technology adoption behaviors. Thus, they can use the information to determine which technology strategies and investment plans will be most effective with their organization’s unique temperament.
Hackers are beginning to extend their computer attacks to ever-larger organizations in their hunt for greater criminal profits, which could drive an anticipated increase in credit risk and push insurers to charge more for their policies, according to the “2025 Cyber Outlook” from Moody’s Ratings.
In Moody’s forecast, cyber risk will intensify in 2025 as attackers switch tactics in response to better corporate cyber defenses and as advances in artificial intelligence increase the volume and sophistication of their strikes. Meanwhile, the incoming Trump administration will likely scale back cyber defense regulations in the US, while a new UN treaty on cyber crime will strengthen the global fight against this threat, the report said.
“Ransomware perpetrators are now targeting larger organizations in search of higher ransom demands, leading to greater credit impact. This shift is likely to increase the cyber risk for entities rated by Moody's and could lead to increased loss ratios for cyber insurers, impacting premium rates in the U.S.," Leroy Terrelonge, Moody’s Ratings Vice President and author of the Outlook report, said in a statement.
The warning comes just weeks after global supply chain software vendor Blue Yonder was hit by a ransomware attack that snarled many of its customers’ retail, labor, and transportation platforms in the midst of the winter holiday shopping surge.
That successful attack shows that while larger businesses tend to have more advanced cybersecurity defenses, their risk is not necessarily diminished. According to Moody’s, their networks are generally more complex, making it easier to overlook vulnerabilities, and when they have grown in size over time, they are more likely to have older systems that are more difficult to secure.
Another factor fueling the problem is Generative AI, which will will enable attackers to craft personalized, compelling messages that mimic legitimate communications from trusted entities, thus turbocharging the phishing attacks which aim to entice a user into clicking a malicious link.
Complex supply chains further compound the problem, since cybercriminals often find the easiest attack path is through third-party software suppliers that are typically not as well protected as large companies. And by compromising one supplier, they can attack a wide swath of that supplier's customers.
In the face of that rising threat, a new Republican administration will likely soften U.S. cyber regulations, Moody’s said. The administration will likely roll back cybersecurity mandates and potentially curtail the activities of the US Cybersecurity and Infrastructure Security Agency (CISA), thus heightening the risk of cyberattack.
Benefits for Amazon's customers--who include marketplace retailers and logistics services customers, as well as companies who use its Amazon Web Services (AWS) platform and the e-commerce shoppers who buy goods on the website--will include generative AI (Gen AI) solutions that offer real-world value, the company said.
The launch is based on “Amazon Nova,” the company’s new generation of foundation models, the company said in a blog post. Data scientists use foundation models (FMs) to develop machine learning (ML) platforms more quickly than starting from scratch, allowing them to create artificial intelligence applications capable of performing a wide variety of general tasks, since they were trained on a broad spectrum of generalized data, Amazon says.
The new models are integrated with Amazon Bedrock, a managed service that makes FMs from AI companies and Amazon available for use through a single API. Using Amazon Bedrock, customers can experiment with and evaluate Amazon Nova models, as well as other FMs, to determine the best model for an application.
Calling the launch “the next step in our AI journey,” the company says Amazon Nova has the ability to process text, image, and video as prompts, so customers can use Amazon Nova-powered generative AI applications to understand videos, charts, and documents, or to generate videos and other multimedia content.
“Inside Amazon, we have about 1,000 Gen AI applications in motion, and we’ve had a bird’s-eye view of what application builders are still grappling with,” Rohit Prasad, SVP of Amazon Artificial General Intelligence, said in a release. “Our new Amazon Nova models are intended to help with these challenges for internal and external builders, and provide compelling intelligence and content generation while also delivering meaningful progress on latency, cost-effectiveness, customization, information grounding, and agentic capabilities.”
The new Amazon Nova models available in Amazon Bedrock include:
Amazon Nova Micro, a text-only model that delivers the lowest latency responses at very low cost.
Amazon Nova Lite, a very low-cost multimodal model that is lightning fast for processing image, video, and text inputs.
Amazon Nova Pro, a highly capable multimodal model with the best combination of accuracy, speed, and cost for a wide range of tasks.
Amazon Nova Premier, the most capable of Amazon’s multimodal models for complex reasoning tasks and for use as the best teacher for distilling custom models
Amazon Nova Canvas, a state-of-the-art image generation model.
Amazon Nova Reel, a state-of-the-art video generation model that can transform a single image input into a brief video with the prompt: dolly forward.
Grocers and retailers are struggling to get their systems back online just before the winter holiday peak, following a software hack that hit the supply chain software provider Blue Yonder this week.
The ransomware attack is snarling inventory distribution patterns because of its impact on systems such as the employee scheduling system for coffee stalwart Starbucks, according to a published report. Scottsdale, Arizona-based Blue Yonder provides a wide range of supply chain software, including warehouse management system (WMS), transportation management system (TMS), order management and commerce, network and control tower, returns management, and others.
Blue Yonder today acknowledged the disruptions, saying they were the result of a ransomware incident affecting its managed services hosted environment. The company has established a dedicated cybersecurity incident update webpage to communicate its recovery progress, but it had not been updated for nearly two days as of Tuesday afternoon. “Since learning of the incident, the Blue Yonder team has been working diligently together with external cybersecurity firms to make progress in their recovery process. We have implemented several defensive and forensic protocols,” a Blue Yonder spokesperson said in an email.
The timing of the attack suggests that hackers may have targeted Blue Yonder in a calculated attack based on the upcoming Thanksgiving break, since many U.S. organizations downsize their security staffing on holidays and weekends, according to a statement from Dan Lattimer, VP of Semperis, a New Jersey-based computer and network security firm.
“While details on the specifics of the Blue Yonder attack are scant, it is yet another reminder how damaging supply chain disruptions become when suppliers are taken offline. Kudos to Blue Yonder for dealing with this cyberattack head on but we still don’t know how far reaching the business disruptions will be in the UK, U.S. and other countries,” Lattimer said. “Now is time for organizations to fight back against threat actors. Deciding whether or not to pay a ransom is a personal decision that each company has to make, but paying emboldens threat actors and throws more fuel onto an already burning inferno. Simply, it doesn’t pay-to-pay,” he said.
The incident closely followed an unrelated cybersecurity issue at the grocery giant Ahold Delhaize, which has been recovering from impacts to the Stop & Shop chain that it across the U.S. Northeast region. In a statement apologizing to customers for the inconvenience of the cybersecurity issue, Netherlands-based Ahold Delhaize said its top priority is the security of its customers, associates and partners, and that the company’s internal IT security staff was working with external cybersecurity experts and law enforcement to speed recovery. “Our teams are taking steps to assess and mitigate the issue. This includes taking some systems offline to help protect them. This issue and subsequent mitigating actions have affected certain Ahold Delhaize USA brands and services including a number of pharmacies and certain e-commerce operations,” the company said.
Editor's note:This article was revised on November 27 to indicate that the cybersecurity issue at Ahold Delhaize was unrelated to the Blue Yonder hack.
The new funding brings Amazon's total investment in Anthropic to $8 billion, while maintaining the e-commerce giant’s position as a minority investor, according to Anthropic. The partnership was launched in 2023, when Amazon invested its first $4 billion round in the firm.
Anthropic’s “Claude” family of AI assistant models is available on AWS’s Amazon Bedrock, which is a cloud-based managed service that lets companies build specialized generative AI applications by choosing from an array of foundation models (FMs) developed by AI providers like AI21 Labs, Anthropic, Cohere, Meta, Mistral AI, Stability AI, and Amazon itself.
According to Amazon, tens of thousands of customers, from startups to enterprises and government institutions, are currently running their generative AI workloads using Anthropic’s models in the AWS cloud. Those GenAI tools are powering tasks such as customer service chatbots, coding assistants, translation applications, drug discovery, engineering design, and complex business processes.
"The response from AWS customers who are developing generative AI applications powered by Anthropic in Amazon Bedrock has been remarkable," Matt Garman, AWS CEO, said in a release. "By continuing to deploy Anthropic models in Amazon Bedrock and collaborating with Anthropic on the development of our custom Trainium chips, we’ll keep pushing the boundaries of what customers can achieve with generative AI technologies. We’ve been impressed by Anthropic’s pace of innovation and commitment to responsible development of generative AI, and look forward to deepening our collaboration."
A growing number of organizations are identifying ways to use GenAI to streamline their operations and accelerate innovation, using that new automation and efficiency to cut costs, carry out tasks faster and more accurately, and foster the creation of new products and services for additional revenue streams. That was the conclusion from ISG’s “2024 ISG Provider Lens global Generative AI Services” report.
The most rapid development of enterprise GenAI projects today is happening on text-based applications, primarily due to relatively simple interfaces, rapid ROI, and broad usefulness. Companies have been especially aggressive in implementing chatbots powered by large language models (LLMs), which can provide personalized assistance, customer support, and automated communication on a massive scale, ISG said.
However, most organizations have yet to tap GenAI’s potential for applications based on images, audio, video and data, the report says. Multimodal GenAI is still evolving toward mainstream adoption, but use cases are rapidly emerging, and with ongoing advances in neural networks and deep learning, they are expected to become highly integrated and sophisticated soon.
Future GenAI projects will also be more customized, as the sector sees a major shift from fine-tuning of LLMs to smaller models that serve specific industries, such as healthcare, finance, and manufacturing, ISG says. Enterprises and service providers increasingly recognize that customized, domain-specific AI models offer significant advantages in terms of cost, scalability, and performance. Customized GenAI can also deliver on demands like the need for privacy and security, specialization of tasks, and integration of AI into existing operations.