Announcing availability of the first four courses out of five
planned for IBM Datacap V9.0
F220 IBM Datacap V9.0: Introduction*
This course introduces the features and components provided with IBM Datacap V9.0 :
IBM Datacap overview, Capture process, and architecture
Introduction to the tools to create, process, and monitor document batches
New features in the Datacap V9.0 release and migrating an application from previous releases
*Available as Instructor led training and Self-paced Virtual training.
F221 IBM Datacap V9.0: Application Builder with FastDoc*
In this course, you learn the skills that are required for:
Rapid application development
- Create an application from the Form template and configure the batch structure.
- Define page fingerprints and configure keyword look-up and field validation rulesets.
- Test rulesets with FastDoc test capability
- Export to IBM FileNet Content Manager.
Processing of the batches in FastDoc (Offline mode and Datacap Server (online) mode)
*Available as Instructor led training and Self-paced Virtual training.
F224 IBM Datacap V9.0: Configuration*
In this course, you learn the skills that are required to configure the following components:
Datacap Web Access and Datacap Web Server
Authentication modes and security groups
Datacap Server, Rulerunner, and Report Viewer
Web Client Upload Service and Datacap Maintenance Manager
*Available as Instructor led training and Self-paced Virtual training.
F225 IBM Datacap V9.0: Administration*
In this course, you learn the skills that are required to:
Configure store and queue by options, DB2 databases, and database connection parameters
Create shortcuts for Datacap Desktop and Web Client tasks
Monitor Datacap components with IBM System Dashboard and create reports
Do the system maintenance, disaster recovery, and configure event logs
*Available as Instructor led training and coming very soon as Self-paced Virtual training.
F222 IBM Datacap V9.0: Application Builder FastDoc and Datacap Studio
Coming very soon!
In this course, you learn the skills that are required to create and configure an application using FastDoc and then to enhance it using Datacap Studio. You will also learn to:
Configure a page match fingerprint and zones
Create a locate ruleset with RealZones and PopulateZNField and add it to a profile
Configure custom validation
Import a custom verify panel from an XML file
Configure a barcode to identify the page
Locate a field with a key list, key work locate, and intellocate.
Export to IBM FileNet Content Manager repository
Recognize fields using OCR and OMR
Configure Built-in Client to Run Batch Tasks
*We can assist you and your team members with your ECM training needs. Please send your class requests and ECM Education inquiries to WW ECM Education firstname.lastname@example.org.
Modified by Gaye Watanabe email@example.com
IBM Case Foundation V5.2.1 Delivers Reduced Complexity
Four new YouTube videos available for IBM Case Foundation 5.2.1:
Link to YouTube Playlist
Create an IBM Content Navigator desktop and configure it for workflow
Configure an IBM Content Navigator desktop to open Process Designer and Process Tracker
Create a connection point and isolated region with the Administration Console for Content Platform Engine
Create isolated region objects with the Administration Console for Content Platform Engine.
If you have any questions, comments or suggestions, please send an email to:
We can assist you and your team members with your ECM training needs. Please send your class requests and ECM Education inquiries to our WW ECM Education & Enablement leader, Janet Daspit.
IBM Guardian Assistance
for Installations and Upgrades Offering
The IBM Guardian Assistance for Installations and Upgrades offering provides on-going guidance and assistance with technical questions on performing an IBM ECM production installation or upgrade. It includes IBM Analytics Enterprise Content Management (ECM) Services participation in your projects to guide and advise with IBM ECM product installations and upgrades. Best practices, proven strategies and years of ECM Services’ experience can be leveraged.
This is a T&M offering and benefits include:
• Access to a Trusted Advisor; an experienced ECM Services implementation expert
• Reduced project risk
• A solid project foundation
• Reduced project complexity
• Best Practices based on years of IBM experience
For more details on ECM Software Services Offerings contact Analytics Services for ECM (firstname.lastname@example.org).
Modified by Sanjay Kupae email@example.com
The thing about twitter is once in a while you come across something that is truly funny and explains what we really struggle to convey in 4 or 6 page whitepapers, one such tweet I came across was by Karen Lopez (Twitter: @datachick)
“"HELLO WORLD" on Hadoop should really be "HELLO YOU, YOU, YOU, YOU, YOU, YOU, YOU, YOU, YOU, YOU, YOU, YOU, YOU, YOU, YOU, YOU" #NoSQLNow
I will put my hand up and say I am geek who get its instantly and all of us who have at some point written a line of code will agree you could not describe personalization driven by Big Data better than that.
The very fact that we are able to process billions of pieces of information to find singular information about people is truly remarkable. The key to personalization is aggregation of information, isolation of facts from the aggregations and recognizing traits, sentiments and features from these facts. The key caveat about personalization is that we need the aggregation of information – demographics, web behavior, offer interaction, historical purchases, social media interactions, service call logs, satisfaction surveys.
Considering one or two sources of information to identify customers or customer types would result in inaccurate descriptions leading less effective personalization and in the end compromising product definition and promotions. Soon, in the Big Data world we will have the ability to aggregate structured and unstructured data and perform advanced analytics like Content Analytics on it- and truly identifying micro-segments of your marketplace and help product designers create products that address the specific needs and marketers can create messages and promotions that excite these micro-segments.
If you want to know more about how Content Analytics analyses information for true insights check out checkout the online demo.
We will be talking about Content Analytics @ IOD 2013 in November, join us in Vegas to converse with a wide range of experts on all things Big Data and Analytics.
Guest post by Michael Veenswyk, CEO at Integritie
Integritie is happy to participate at ECM’s Business Partner Leadership Forum this week. As a long-time partner with IBM, we welcome the opportunity to get a look at the product roadmap and give feedback on future development.
We’re also proud to be part of the team that helped with the successful implementation at Security First Insurance announced yesterday. This is a great example of a company with a business problem being helped through a partnership with a single focus – helping customers in need.
Florida has more property and people exposed to hurricanes than any state in the country. People whose homes have been damaged or destroyed by a hurricane are often displaced quickly, with little more than the clothes on their backs. Grabbing an insurance policy on the way out the door is often an afterthought. They’re relying on their insurance companies to have the information they need to help them get their lives back in order as quickly as possible.
Security First Insurance had mastered customer service through its call center and web portal but needed help with email and social media. Here’s where the partnership came into play.
Integritie configured a solution built on key IBM ECM software components, featuring IBM Content Analytics with Enterprise Search, IBM Content Collector for Email and IBM FileNet Content Manager software. Now called Social Media Capture 4 (SMC4), it offers four critical capabilities for managing social media platforms: capture, control, compliance and communication. For example, it logs all social networking interaction for Security First, captures content, monitors incoming and outgoing messages and archives all communication for compliance review.
The Content Analytics with Enterprise Search software that anchors the SMC4 solution provides the information necessary to help the company identify and address the most urgent cases first. The software automatically sifts through data in email and social media posts, tweets and comments using text mining, text analytics, natural language processing and sentiment analytics to detect words and tones that identify significant property damage or that convey distress. Security First can then prioritize the messages and route them to the proper personnel to provide reassurance, handle complaints or process a claim.
Security First wanted to be available to its customers no matter how they chose to get in touch. Today, policyholders use any means available to connect with an agent or claims representative, including posting a question or comment on the company’s Facebook page or Twitter account.
The result? Thanks to a great partnership with IBM, Security First is now one of the first insurance companies in Florida to make themselves available to customers whenever, wherever and however they choose to communicate.
Modified by Sanjay Kupae firstname.lastname@example.org
Sanjay Kupae, Category Marketing Manager- Discovery & Analytics, IBM
Good experiences are shared. Bad experiences are shouted.
SHOUTED might not be a strong enough word because as customers are more connected, the speed and scale to which negative customer experiences travel the Internet is frightening.
The biggest source of grief for most customers is when they reach out to your contact center. Most customers are calling your contact center only after a long process of trying to fix their problem themselves. They're ready to shout even before they pick up the phone, so when you call for assistance, time and accuracy are critical to creating an exceptional experience for them.
The contact center call experience is one of the most important activities to build customer loyalty. When that customer reaches out to you, for that brief three- to-five minutes your service associate represents your brand and all it stands for.
The customer is speaking to your service associate because they need answers. Which means your service associate either knows what to say, or more often than not they need to look for the right information, somewhere hidden across the volumes on top of volumes of information spread across silos in your enterprise.
Three hundred seconds is not a lot of time, and it's even less time when your employees don't have the tools.
Content Analytics drives exceptional service experience in two ways –it enhances traditional enterprise search to recognize every piece of information residing in the enterprise and secondly it lets businesses analyze customer interactions to identify service challenges and train associates better.
A recent Aberdeen report says that “For companies with content analytics, the streamlined searching and fast response to queries had a trickle-down effect on several universal business metrics. In the last twelve months, these companies reported a 17% improvement in the accuracy of their business decisions, and a similar improvement in the quality and relevance of their overall analytics program. Furthermore, their data-centric business process – like handling customer complaints, processing invoices, managing inventory, or closing the books – became 12% more efficient. Companies without content analytics reported 2 to 6 times less improvement.
Content Analytics not just improves the customer experience during the interaction with the business, but has a definitive impact on retention, advocacy and revenue.
And it can reduce the shouting...
For more information read the full Aberdeen Group whitepaper or better still visit the Smarter Commerce Global Summit at Nashville , TN between May 21 to 23rd and talk to us
IBM has recently announced a new software offering designed to address the burgeoning challenge of fraud in commercial and public sector organizations.
IBM Intelligent Investigation Manager (IIM) optimizes the investigation of fraud for customers across many industries in the commercial and public sector spaces. It does so by enabling more efficient and effective investigations, capturing all of the relevant details and actions of the case and enabling investigators to dynamically collaborate on cases. It also integrates forensic and link analysis into the investigative process, providing investigators with investigative leads, helping them better understand the scope of the fraudulent activity and generating evidence.
The IBM fraud management portfolio enables the building of industry-specific solutions. IIM is one of the core parts of the IBM Smarter Analytics Solution – Fraud, Waste and Abuse and plays a key role in these solutions, providing investigative and analytic support for fraud use cases in healthcare, insurance, finance, and many other markets.
3 key benefits for commercial organizations:
(1) A more expeditious way of preventing or resolving fraudulent activities, by reducing false-positives when dealing with massive amount of data, makes for efficient, trackable investigations
(2) A reduction in the revenue lost from fraud, through better detection, resolution and prevention of, and protection of your customers, citizens and policy holders against fraud
(3) A reduction in the cost of fighting fraud, by reducing the resources needed to collect and assimilate data, removing the manual steps, and progressing toward a ‘just in time’ approach to fighting fraud
3 key benefits for Public Safety:
(1) IMM allows organizations to address the vast increase in data, the amount and the formats, much of which is unstructured
(2) It helps organizations make sense of data that’s often external, raw (often from unidentified sources, and apparently unconnected), or from mobile sources, and that which resides in internal systems
(3) It helps improve the efficiency of turning data into information, and reduces the cost of responding to issues and priorities that impact public safety
To learn more about this solution please watch our new video series – Fighting Fraud on Friday
. Starting this month, a new video will be released every Friday. Each segment is presented by a subject matter expert and covers a unique topic to help you understand how IBM is making Intelligent Investigation a reality.
I am not an IT person...
Well, I work in IT, and I am a "Client Technical Professional" (otherwise known as "tech sales", "pre sales", "solution consultant" and other variations less flattering), which kind of implies a certain level of familiarity or knowledge of IT on a technical level. But I am not really - I have had little IT in my formal education, and, worse, I lack the affinity and "feel" for the technical aspects of our work that make many tasks (like building demos or learning new products) so much easier for many of my colleagues.
This is not as bad as it may seem. While I do think a certain level of competence and ability is required (how it still irritates me when a manager, consultant or sales person proclaims his/her ignorance of all things technical as if it were a badge of honour), I feel very strongly that a non-technical view of our products and solutions can be very helpful, even in my seemingly predominantly technical role. A good example of this is how we position IBM Content Analytics with our partners and customers.
I think IBM Content Analytics is fantastic. Well, let me restate this - I think what we can do with IBM Content Analytics is fantastic, amazing. And I feel very strongly that the greatest value delivered by ICAwES is in its text analysis capabilities. I think that the Content Miner is great, and offers a lot of value to our customers. But for me, the even more value is created by its text modelling capabilities. Taking this a level deeper, I feel very strongly that the tooling we offer with ICAwES 3.0 to design, develop and even deploy text analysis models (this is known as Content Analytics Studio) is of enormous value to our customers and partners. Why is this so? After all, we are talking about a modelling tool, not the stuff that normally send customers hearts all aflutter. Perhaps I can best make this argument with a diagram. Its a pretty simple one, and we have all seen it in one form or another:
OK, so nothing too exciting here either, right? Well, this is where I believe IBM´s approach creates real value. One of the characteristics I have seen in most products and solutions that deliver some form of text analysis is that someone like me cannot make any substantive changes to the model, other than maybe changing some terms in a dictionary. I need to either call in the vendor, contract a partner or invest in building programming skills. In the words of a very learned respected colleague of mine, the Content Analytics Studio tool takes text modelling out of our lab and puts it where it belongs - with the customer. It gives the customer control over the entire create/modify - build - validate - analyze process. And when you think about it, isn´t this where it belongs? After all, the customer knows their own content - knows who has created it and what it means to them right? I would argue that our customers do, and I would argue something further - this transfer of control to the customer is perhaps the single most important innovation in ICAwES. I´ll explain why I make this claim in my next entry.
post by Campbell Robertson, Program Director Industry Strategy and
Market Development - Public Sector, IBM Enterprise Content Management
Post 2008, governments across the world are
forced to re-prioritize their focus and are under severe pressures to do ever
more with ever less; while expectations continue to increase. This mandate is
especially true for Public Safety organizations.
With rising population in cities,
shifting demographics, technological developments and accelerating
globalization there are increasing social and commercial risks of crime. Public
safety organizations across the globe are looking at adopting transformative
technologies to make smarter decisions, deliver results and demonstrate
Be it traditional crimes like burglary,
vandalism or mail fraud to difficult-to-trace crimes such as terrorism, money
laundering and hate crime- investigative work is highly information driven.
Traditionally, crime Investigation meant manually sifting through multiple
reports and documents scattered across multiple structured and unstructured
sources. The manual intelligence access and analysis meant a typical successful
case taking weeks or months; and public safety agencies know that time is
detrimental to success.
Combining technology and information is key to
successful crime and threat investigations, law enforcement agencies need
technology that can speed up the process of discovering, analyzing and linking
information. Content Analytics provides the capability to extract, search and
analyze crucial information from disparate sources and improve the speed and
quality of intelligence gathering. By using content analytics tools, agencies
can not only solve cases more quickly but also identify non-obvious
relationships within data that could possibly prevent a crime from happening in
the first place.
A UK law enforcement agency used IBM Content
Analytics to perform high-precision text analytics to identify phone numbers
from investigative reports which was then used to cross-reference all of the
phone numbers so that when a new document arrived, the analyst was presented
with a list of all phone numbers and for each number, a list of previous
references to that phone number. This solution would reduce analyst’s efforts
by 6 hours, which meant faster analysis of information and in the long run more
To know more about how IBM address
investigation challenges of Public Safety agencies, attend the Building an IBM i2 and
Case Manager Solution for Public Safety and Commercial Fraud and Future
Analytics Platform for Law Enforcement and Public Safety sessions at
Information OnDemand 2012 Global Conference at Las Vegas in October 2012.
Guest Blog post by Julie Vaccaro, Offering Manager IBM Content Classification
Everything in our life is categorized and classified in some
Ask 4 people in one household “where is the proper place to
store the toothpaste?” and you will likely get 4 different answers, including “on
the counter”, “in the toothbrush holder”, “under the sink” and “in a drawer”. This
may work well for a household environment, since every person probably has
their own “instance” of a toothpaste tube. But, what if this is a shared
toothpaste tube, that everyone needs access to? Where is the right place to
store it so that each person can get to it when they need it?
This may seems like a simplistic
analogy, but think about these questions. What if you walked into the Library
of Congress and there was no Dewey Decimal System? What if you went into the
hardware store and the items were not organized by their department or use,
such as Plumbing, Electrical, Paint, etc.? How would you ever find anything?
Now think about your business and all of its unstructured
content. Where do you store content so that anyone who needs it can access it,
use it, govern it and analyze it?
Individuals make classification judgments every day. I might
think it best to categorize all resumes into a single category called “Human
Resources Resumes” and store them all together. Another person, from the Human
Resources department, may believe that you should have a category for each
skill set, such as Marketing Resumes, Development Resumes, Janitorial Resumes,
and the like.
Content should be classified and organized such that it is
accessible, so that you can find it when you need it. Content needs to be
usable so that it is available when business decisions are made, either through
manual or automated processes. Content must be governed so that a business
complies with local, state, federal and business mandates. And finally, content
needs to been analyzed and understood to realize its full value.
Properly organizing content is like building a good
foundation. You need to build a house or some other structure on a good
foundation. When you do that the building of the structure becomes easier,
lasts longer and is easier to change later. If you don’t build a strong
foundation, it does not necessarily mean the structure will collapse, but it
will likely cause problem down the road.
The Bottom Line: To start extracting value out of content, a clear Classification strategy is a must.
See what's possible in Content Classification in your industry. IBM's largest EXPO invites
you to experience products, services and solutions in action.