Only 13 Percent of Research Institutions Are Prepared for AI

A new survey commissioned by SHI International and Dell Technologies underscores the transformative potential of artificial intelligence (AI) while exposing significant gaps in preparedness at many research institutions.

The Center for Digital Education conducted the survey of leaders and IT professionals across the higher education space in the United States and found that around 50% of research universities have a defined strategy for deploying and managing AI technologies. However, only 13.2% say they are mostly or fully prepared to harness the power of AI effectively.

AI’s applications span a wide range in academia, with two use cases leading the way: chatbots (36.8%) and research tools (35.3%). The top five use cases are rounded out by automation of administrative tasks, predictive analytics, and student services (all 29.4%).

“Top research universities are at the forefront of innovation and have led to life-altering inventions like insulin, Wi-Fi technology, and the pacemaker, so getting AI implementation right for these schools is critical,” said Steve Troxel, Public Sector Field Solutions Engineer at SHI. “Having the right policies and guardrails in place makes for the easiest integrations and allows these institutions to take full advantage of the AI systems they’re using.”

According to the survey results, more than 80% of respondents didn’t feel policies had been fully implemented, but 70% were either already using AI or plan to within the next 12 months.

Other key findings from research institutions include:

  • 48.6% either have basic training in place or plan to provide training for their staff
  • Institutions need the most assistance developing an AI funding strategy (47.1%) and identifying available grants (44.1%)
  • Top barriers to implementation include too many competing priorities (36.8%), inadequate funding (36.8%), and lack of AI strategy or ownership (30.9%)
  • Only 16% say their infrastructure is ready for extensive AI integration for students
  • 29.4% have only somewhat or partially implemented data security and privacy measures into their AI systems

"The best thing institutions can do is hop on board the speeding AI train and figure out how to use it to best reach their destination or goal," said Adam Robyak, Field Chief Technology Officer and Principal Engineer at Dell.

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Nevada Transportation Commission Adopts AI-Based Gun Detection Technology

    ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the US Department of Homeland Security SAFETY Act Designation, announced it has been chosen by the Regional Transportation Commission of Southern Nevada (RTC) for wide-scale implementation. This marks the first transit agency in the United States to fully deploy weapons detection analytics, with RTC adding ZeroEyes to its state-of-the-art network to protect residents and visitors against gun-related violence. Read Now

  • Busy South Africa Building Integrates Custom Access Control System

    Nicol Corner, based in Bedfordview, Johannesburg, South Africa, is home to a six-star fitness club, prime office space, and an award-winning rooftop restaurant. This is the first building in South Africa to have its glass façade fully incorporate fritted glazing, saving 35% on energy consumption. Nicol Corner (Pty) LTD has developed a landmark with sophisticated design and unique architecture by collaborating with industry-leading partners and specifying world-class equipment throughout the project. This includes installing a high-spec, bespoke security and access control system. Read Now

  • Only 13 Percent of Research Institutions Are Prepared for AI

    A new survey commissioned by SHI International and Dell Technologies underscores the transformative potential of artificial intelligence (AI) while exposing significant gaps in preparedness at many research institutions. Read Now

Featured Cybersecurity

Webinars

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3