We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byEric Cupps
Modified about 1 year ago
© 2010 IBM Corporation 1 Content Analytics Solutions September, 2010
© 2009 IBM Corporation 2 Social Network Analysis Showing relationships between people, organisations, phone numbers, etc. Event Timeline Analysis Plotting specific events against a timeline. Social Network and Event Timeline Analysis are just two examples of this – there are many more. Content Analytics – An Increasingly Important Solution Component
© 2009 IBM Corporation 3 SOURCEEXTRACTCORRELATEDFUSED Structured File System Web Articles URN Born 1970 Luke Born 22/01/1970 J S Luke Age mid-30s URN Born 1970 URN Born 22/01/1970 URN Age mid-30s URN Name J S Luke Born 22/01/1970 Age 34 An Open Information Centric Architecture
© 2009 IBM Corporation 4 SOURCEEXTRACT STORE DATENAMELOCATION 19/04/03LukeUK ….. 24/07/02BentUSA NAMEDATEFLIGHT Biddle29/08/2004BA 256 ….. Coates21/07/2001QA 725 CORRELATION & FUSION TOOLS Structured Web Articles NAMEDOB Luke22/01/1970 ….. Bent25/12/0000 Visualisation i2 GIS ESRI Tenet Search & Discovery Engines OmniFind IBM Content Analytics Data Fusion & Mining SPSS EAS ….. File System An Open Information Centric Architecture
© 2009 IBM Corporation 5 An IBM Content Analytics Solution In Law Enforcement Now, this police department can: Check for errors & inconsistencies with existing databases Provide management with actionable information Have improved search capabilities Perform identity resolution and relationship mining Lockable pocket knife Evidence_2_Description 1 oz Cannabis Resin Evidence_1_Description IpswichSuspect_Addr_Town 22 East Dene RidgeSuspect_Addr_Street Ford MondeoSuspect_Vehicle_Make White Suspect_Vehicle_Colour W563WDLSuspect_VRN SetsukoSuspect_Surname JohnSuspect_Forename 15/06/2006 : 23:47Arrest_Date_Time PC 143Arresting_Officer PC 143 (Hunter) 15 June :47 Suspect identified himself as John Setsuko. Matched description given by night club doorman (IC1, Male, Ag yrs, blue Everton shirt). Stopped whilst driving White Ford Mondeo, W563 WDL. Address given as 22 East Dene Ridge, Copdock, Ipswich. Searched at scene and found in possession of 1oz Cannabis Resin and lockable pocket knife.
© 2009 IBM Corporation 6
7 SOURCEEXTRACT STORE DATENAMELOCATION 19/04/03LukeUK ….. 24/07/02BentUSA NAMEDATEFLIGHT Biddle29/08/2004BA 256 ….. Coates21/07/2001QA 725 CORRELATION & FUSION TOOLS Structured Web Articles NAMEDOB Luke22/01/1970 ….. Bent25/12/0000 Visualisation i2 GIS ESRI Tenet Search & Discovery Engines OmniFind IBM Content Analytics Data Fusion & Mining SPSS EAS ….. File System Open Information Architecture
© 2009 IBM Corporation 8 IBM Visual Search For A Government Agency The Goal:The Problem:The Solution: Reducing analysts time in locating relevant information. Keyword search technologies do not allow the definition of complex searches. For example, “find every person mentioned in a document describing drug smuggling associated with another person mentioned in a document describing organised crime.” Deployment of a graphical search interface enabling the definition of complex patterns.
© 2009 IBM Corporation 9 Find groups of 3 people who are linked together and are associated with the same organization
© 2009 IBM Corporation 10 IBM Success at a Government Agency The automated solution saved each analyst over 6 hours per day, improving the quality and consistency of analysis The Goal:The Problem:The Solution: I dentify the re-occurrence of phone numbers within historical documents. Using keyword search technologies had historically resulted in large numbers of false hits for credit card, visa and other reference numbers. The tedious nature of the task also resulted in oversights and errors. Deployment of an automated software solution to analyze documents and identify recurring phone numbers Semantic rules were used to ensure a high degree of accuracy All extracted phone numbers were compared against other documents with the results visualized through a carefully designed User Interface.
© 2009 IBM Corporation 11 What’s the business case? How good is the text analytics? How do we know how good the text analytics is? How do we respond to changes in the content and of course the business environment? Are we creating, rather than solving a problem, when we invest in text analytics? What Are The Inhibitors?
© 2009 IBM Corporation 12 New Architectural Models For Text Analytics
© 2009 IBM Corporation 13 New Architectural Models For Text Analytics Real-time Analysis Index Driven Annotation Engine Node 1 … Interactive Rule Development & Manual Annotation Enterprise Services Geospatial Analysis Network Analysis Semantic Search … Node 1 Node 2 Node n Large scale development / training / test corpus Near real-time feedback on impact Analytics as opposed to speculation (mining instead of prospecting)
© 2010 IBM Corporation 14 IBM Text Analytics Solution November, 2009
Global Business Services © Copyright IBM Corporation 2005| ITS L1+L2 – Package Preparation Examples of Good & Bad Skill Evidences Dinu George.
Management Information Systems MANAGING THE DIGITAL FIRM, 12 TH EDITION GLOBAL EDITION FOUNDATIONS OF BUSINESS INTELLIGENCE: DATABASES AND INFORMATION.
Click to add text IBM Case Manager An Architectural Overview Mike Marin Distinguished Engineer IBM.
Database Management. Module 6 Objectives Next Discuss the functions common to most DBMSs Identify the qualities of valuable information Explain why data.
Infrastructure for E-Business DIS 302: E-Business Laudon & Laudon.
Chapter 7 Requirement Modeling : Flow, Behaviour, Patterns And WebApps Unit - II.
Software Gets Smarter Artificial Intelligence in the Enterprise Dr Kaustubh Chokshi CEO, Intelligent Business Systems.
DATA PROCESSING CHAPTER 7 NURSING INFORMATICS. Defining Data, Databases, Information & Information Systems Data - raw uninterrupted facts that are without.
Introduction to knowledge management. What is knowledge management Knowledge management can be difficult to define, because it encompasses a wide range.
Intelligence Through Learning from Data Monash University Semester 1, March 2006.
Brian Browning | Senior Director of Client Services Jason Arden | Director of Partner Engineering.
INTERNAL CONTROL BASED ON THE COSO REPORT. Objective COSO C OBI T To use COSO, the Corporate Governance model, and C OBI T, the Information Technology.
IBM Software Group Tivoli Software from IBM Storage Resource Management Webcast Tele-Rep Training Manual Prepared by: Wunderman Customer Dialogue Group.
Workshop ESS NET ON MICRO DATA LINKING AND DATA WAREHOUSING IN STATISTICAL PRODUCTION 22 & 23 SEPTEMBER 2011 “Mapping the GSBPM on a SDW architecture”
1 SAS Global Forum 2009 Marty Ellingsworth (iiA) The views expressed by the presenter does not necessarily represent the views, positions, or opinions.
Requirements Management Tools ents_Management_Tools.html.
1 © 2014 by McGraw-Hill Education. This is proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner.
PRISM ® : Intelligent Fraud Monitoring Presentation to Retail Decisions, Inc
Taxonomy Development An Infrastructure Model Tom Reamy Chief Knowledge Architect KAPS Group Knowledge Architecture Professional Services
Digital Object Architcture An open approach to Information Management on the Net Bibliotheca Alexandrina Dr. Robert E. Kahn Corporation for National Research.
Interface Development: Integrating M&Ms Designer and Azteca Cityworks at the City of Concord, North Carolina June 2005 Copyright © 2005 O ne GIS, Inc.
Of An Expert System. Introduction What is AI? Intelligent in Human & Machine? What is Expert System? How are Expert System used? Elements of ES Who are.
Management Information Systems MANAGING THE DIGITAL FIRM, 12 TH EDITION BUILDING INFORMATION SYSTEMS Chapter 13 VIDEO CASES Case 1: IBM: Business Process.
1 Customer Relationship Management (CRM) Introduction.
“SG-Systems” (Smart Grid – Operational Applications Integration) “Boot Camp” Overview Greg Robinson, Co-Chair, SG-Systems Brent Hodges, Chair, SG-Systems.
An Introduction to Object Modeling An Introduction to Object Modeling The approach of using object modeling during systems analysis and design is called.
Software Engineering Model Driven Architecture Software Engineering 2011 Department of Computer Science Ben-Gurion university Based on the book: MDA Explained:
SOA for Egov Pilot Michael Lang, Vitria Technologies,Inc Dave McPherson, Vitria Technologies, Inc Brooke Stevenson, Spry Technologies, Inc Using BPM software.
Taxonomy Development in an Enterprise Context Tom Reamy Chief Knowledge Architect KAPS Group Knowledge Architecture Professional Services
© 2016 SlidePlayer.com Inc. All rights reserved.