Remove Authentication Remove Document Remove Enterprise Systems
article thumbnail

What gives IT leaders pause as they look to integrate agentic AI with legacy infrastructure

CIO Business Intelligence

And since the individual AI agents are powered by gen AI, they also speak plain English, which creates hassles when trying to connect them to enterprise systems. But when an agent whose primary purpose is understanding company documents and tries to speak XML, it can make mistakes.

article thumbnail

Prioritizing AI investments: Balancing short-term gains with long-term vision

CIO Business Intelligence

I state that with real conviction and genuinely authentic excitement. Consider: Approximately 15% of contact centers have integrated genAI capabilities to enhance customer authentication processes, streamline solution options and automate call summaries and follow-up recommendations. This time however, its different.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

PepsiCo IT redefines direct-to-store business model success

CIO Business Intelligence

Whether they are placing orders, making deliveries, or creating invoices, frontline employees need a dependable, feature-rich edge device that they can take into stores and reliably connect with key enterprise systems. Moving all the systems in our ecosystem to Okta was a major accomplishment.

Retail 246
article thumbnail

3 commandments that should drive every API strategy

CIO Business Intelligence

We are now bringing this approach to the more monolithic enterprise systems.” For example, to ensure consistency, access control should be centrally managed, with one identification and authentication scheme to be used by all APIs. New APIs should perform narrowly defined services that can be used by a variety of applications.

Strategy 345
article thumbnail

Wallets and Agents

Phil Windley

Maintaining relationships by communicating with other agents when DID documents are updated. This figure shows the relationship between an agent, a wallet, and the underlying operating system. Identity-related activities like authentication and credential exchange are built on top of these basic functions. Exchanging DIDs.