1. Automatic logging of meetings
Objective: to record interviews, discussions and work sessions without manual notes.
Applications:
Otter.ai https://otter.ai
Fireflies.ai https://fireflies.ai
Fathom https://fathom .video
Tl;dv https://tldv.io
Usage: connect the recording and get a transcript, summary and a list of actions.
2. Synthesis of analytical materials
Task: to analyze public reports, research, PDF and annual reports of companies.
Applications:
Perplexity https://www.perplexity.ai if you have a PayPal Pro subscription for a year for free https://www.perplexity.ai/join/p/paypal-subscription it costs 200 euros per year
ChatGPT ADA https://chat.openai.com
Claude https://claude.ai
Usage: upload open source materials and receive structured conclusions and comparisons.
3. Preparation of presentations
Task: to quickly assemble slide drafts and a logical outline of presentations.
Applications:
Gamma https://gamma.app
Volume https://tome.app
Beautiful.ai https://www.beautiful.ai
StoryD https://storyd.ai
Usage: enter hypotheses and key ideas, the AI forms a draft deck.
4. Modeling and verification of calculations
Objective: to accelerate work with models and graphs based on impersonal data.
Applications:
Microsoft 365 Copilot https://www.microsoft.com/microsoft-365/copilot
Sheet AI https://www.sheetai.app
Arcwise https://arcwise.app
Usage: AI suggests formulas, alternative scenarios, and identifies errors.
5. Analysis of interviews and qualitative research
Objective: to quickly analyze interviews, in-depth surveys and research notes.
Applications:
Dovetail https://dovetail.com
NVivo AI https://nvivo.de/en
Miro AI https://miro.com/ai/ai-overview
Usage: Upload anonymous transcripts and notes, the AI groups topics, highlights patterns, and forms short conclusions.
Important about security and privacy
1. Do not upload confidential client data to public models, such as numbers, databases, or commercially sensitive information.
2. For everything sensitive – only:
• on-prem/private versions of models;
• or tools approved by information security and lawyers!




