Minimising maintenance

November 2017 Security Services & Risk Management

The idea to use a form of autonomous decision-making engine was birthed when Gerhard Furter, the creator of Naxian Systems’ ANNIE (Artificial Neural Network Inside Everything), was busy with a project for a government department in the justice sphere. It was realised that a lot of the decisions that the operators had to make were very habitual, but also based on more information than a ‘normal’ human could realistically process. These decisions could, however, be repeated by a machine if the machine could be made to understand the ‘why’ of the decision.

Furter developed suitable algorithms and ANNIE almost immediately took over 40% to 50% of the operators’ work. “She rapidly grew as clients posed a challenge based on some strange requirements, whereafter I would engineer a way for ANNIE to solve the problem, and a new set of algorithms would be spliced into ANNIE’s persona,” says Furter.

ANNIE’s purpose is very simple: to learn about and understand the environment in which she is implemented and use this knowledge to identify when something may go wrong. In ANNIE terms, a situation in which the environment is working as it should, is referred to as state 0 (zero), or zero risk.

To understand the environment, ANNIE acquires information using whatever systems she can integrate into, and attempts to identify ‘normal’ through the use of typical behaviours exhibited by the various groups or populations of assets and people. She then benchmarks and trends anything she can measure, and identifies patterns that describe habits, processes and associations between assets, people and events.

The resulting model is a real-world depiction of what her environment looks like. She uses this model to study all changes, deviations and exceptions with the intention of not only identifying problems as they evolve, but also to anticipate (predict) when something will happen that is not advantageous to the client’s operations. ANNIE will use whatever methods the client allows to try to solve the issue, or to prevent it from actually occurring, using a simple warning SMS or launching a full-blown intervention using digital or electronic devices.

To date, ANNIE’s application has facilitated a number of positive results for organisations that include:

• Increased transparency. By applying ANNIE to historic data, organisations can for the first time make sense of big data because she indicates trends, behaviours, patterns and associations that are traditionally not exposed by business intelligence resources and tools.

• Decreased risk. By applying ANNIE to real-time data in any operational environment she is able to detect anomalies that humans can never detect. This is because she looks at everything, all of the time, and then compares this to everything she has trended as ‘typical’ from past knowledge inside an environment. For anything detected outside of typical, she will raise a ‘watch dog’, which is an early indication to organisations that something suspicious may be in progress.

• Increased profits. Because of the fact that ANNIE is aware of all environments that she is connected to, at all times, she will always find the most optimal way of deploying resources. In for example the case of maintenance of systems and devices, ANNIE will ensure that the most proficient resource is sent to a faulty site, by way of the optimal route based on traffic and weather conditions, with the right tools and/or stock in hand to resolve any technical issues on site.

“Where most other AI’s will implement features that are more suited to the boardroom or data science laboratory, ANNIE will roll up her sleeves and do the dirty work of not just analysing the data, but also causing physical changes in the environment entrusted to her,” says Furter.

The AI development team at Naxian is engaging with Microsoft as a cloud partner to ensure that ANNIE is made available as a service through cloud platforms such as Microsoft Azure. “However, as we connect billions of things to the Internet, it is unreasonable and impractical to expect that all data and signals are sent to centralised or distributed cloud environments in order to apply the AI.

“Rather, we believe that AI should sit on the edge devices themselves. Instead of the weather station, traffic analytics service, video surveillance camera, access control device, etc. having to send data to a central point in order to collaborate and produce a result through the application of AI, these devices should have the AI embedded or attached at the edge and talk to each other. Our immediate core future focus is to ensure that we ‘port’ our intelligence onto edge devices such as Raspberry Pies and other microcomputer platforms,” says Furter.

For more information contact Naxian, +27 (0)87 820 0620, bernard@naxian.co.za, www.naxian.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

“This Is Theft!” SASA slams Mafoko Security
News & Events Security Services & Risk Management Associations
The Security Association of South Africa (SASA) has issued a stark warning that the long-running Mafoko Security Patrols scandal is no longer an isolated case of employer misconduct, but evidence of a systemic failure in South Africa’s regulatory and governance structures.

Read more...
Making a mesh for security
Information Security Security Services & Risk Management
Credential-based attacks have reached epidemic levels. For African CISOs in particular, the message is clear: identity is now the perimeter, and defences must reflect that reality with coherence and context.

Read more...
Privacy by design or by accident
Security Services & Risk Management Infrastructure
Africa’s data future depends on getting it right at the start. If privacy controls do not withstand real-world conditions, such as unstable power, fragile last-mile connectivity, shared devices, and decentralised branch environments, then privacy exists only on paper.

Read more...
From friction to trust
Information Security Security Services & Risk Management Financial (Industry)
Historically, fraud prevention has been viewed as a trade-off between robust security and a seamless customer journey, with security often prevailing. However, this can impair business functionality or complicate the customer journey with multiple logins and authentication steps.

Read more...
Security ready to move out of the basement
AI & Data Analytics Security Services & Risk Management
Panaseer believes that in 2026, a board member at a major corporation will lose their job amid rising breaches and legal scrutiny, as organisations recognise that cyber risk is a business risk that CISOs cannot shoulder alone.

Read more...
Cyber remains top business risk, but AI fastest riser at #2
News & Events Security Services & Risk Management
The Allianz Risk Barometer 2026 ranks cybersecurity, especially ransomware attacks, as the #1 risk, while AI is the biggest riser and jumps from #10 to #2, highlighting the emerging risks for companies in almost all industry sectors.

Read more...
OT calculator to align cyber investments with business goals
Industrial (Industry) Information Security Security Services & Risk Management
The OT Calculator has been developed specifically for industrial organisations to assess the potential costs of insufficient operational technology (OT) security. By offering detailed financial forecasts, the calculator empowers senior management to make well-informed decisions.

Read more...
From digital transformation to digital sovereignty
Security Services & Risk Management IoT & Automation
As cyberthreats grow, data regulations tighten, and AI becomes central to economic competitiveness, countries are recognising the need to control and protect their own digital assets.

Read more...
The age of Lean 4.0: Orchestrating intelligence and efficiency
Security Services & Risk Management
The convergence of Lean principles and AI (what we now call Lean 4.0) is no longer a theoretical exercise; it is the defining operational paradigm for survival and growth in a complex, data-intensive economy.

Read more...
Risks of open-source intelligence escalating in crime
Security Services & Risk Management Residential Estate (Industry) Smart Home Automation
CMS estimates that open-source intelligence has played a role in 20 - 30% of robberies over the past 12 months. In cybercrime, global research consistently shows that many offences rely on some form of open-source data exploitation.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.