Gaye Watanabe 270002ME82 firstname.lastname@example.org Tags:  case education analytics training foundation ecm youtube 54 Visits
Gaye Watanabe 270002ME82 email@example.com Tags:  assistance services guardian ecm analytics offerings 108 Visits
Sanjay Kupae 2700050U55 firstname.lastname@example.org Tags:  #bigdata #contentanalytics ecm analytics #ibmiod 2,010 Visits
The thing about twitter is once in a while you come across something that is truly funny and explains what we really struggle to convey in 4 or 6 page whitepapers, one such tweet I came across was by Karen Lopez (Twitter: @datachick)
“"HELLO WORLD" on Hadoop should really be "HELLO YOU, YOU, YOU, YOU, YOU, YOU, YOU, YOU, YOU, YOU, YOU, YOU, YOU, YOU, YOU, YOU" #NoSQLNow
I will put my hand up and say I am geek who get its instantly and all of us who have at some point written a line of code will agree you could not describe personalization driven by Big Data better than that.
The very fact that we are able to process billions of pieces of information to find singular information about people is truly remarkable. The key to personalization is aggregation of information, isolation of facts from the aggregations and recognizing traits, sentiments and features from these facts. The key caveat about personalization is that we need the aggregation of information – demographics, web behavior, offer interaction, historical purchases, social media interactions, service call logs, satisfaction surveys.
Considering one or two sources of information to identify customers or customer types would result in inaccurate descriptions leading less effective personalization and in the end compromising product definition and promotions. Soon, in the Big Data world we will have the ability to aggregate structured and unstructured data and perform advanced analytics like Content Analytics on it- and truly identifying micro-segments of your marketplace and help product designers create products that address the specific needs and marketers can create messages and promotions that excite these micro-segments.
If you want to know more about how Content Analytics analyses information for true insights check out checkout the online demo.
We will be talking about Content Analytics @ IOD 2013 in November, join us in Vegas to converse with a wide range of experts on all things Big Data and Analytics.
Guest post by Michael Veenswyk, CEO at Integritie
Integritie is happy to participate at ECM’s Business Partner Leadership Forum this week. As a long-time partner with IBM, we welcome the opportunity to get a look at the product roadmap and give feedback on future development.
We’re also proud to be part of the team that helped with the successful implementation at Security First Insurance announced yesterday. This is a great example of a company with a business problem being helped through a partnership with a single focus – helping customers in need.
Florida has more property and people exposed to hurricanes than any state in the country. People whose homes have been damaged or destroyed by a hurricane are often displaced quickly, with little more than the clothes on their backs. Grabbing an insurance policy on the way out the door is often an afterthought. They’re relying on their insurance companies to have the information they need to help them get their lives back in order as quickly as possible.
Security First Insurance had mastered customer service through its call center and web portal but needed help with email and social media. Here’s where the partnership came into play.
Integritie configured a solution built on key IBM ECM software components, featuring IBM Content Analytics with Enterprise Search, IBM Content Collector for Email and IBM FileNet Content Manager software. Now called Social Media Capture 4 (SMC4), it offers four critical capabilities for managing social media platforms: capture, control, compliance and communication. For example, it logs all social networking interaction for Security First, captures content, monitors incoming and outgoing messages and archives all communication for compliance review.
The Content Analytics with Enterprise Search software that anchors the SMC4 solution provides the information necessary to help the company identify and address the most urgent cases first. The software automatically sifts through data in email and social media posts, tweets and comments using text mining, text analytics, natural language processing and sentiment analytics to detect words and tones that identify significant property damage or that convey distress. Security First can then prioritize the messages and route them to the proper personnel to provide reassurance, handle complaints or process a claim.
Security First wanted to be available to its customers no matter how they chose to get in touch. Today, policyholders use any means available to connect with an agent or claims representative, including posting a question or comment on the company’s Facebook page or Twitter account.
The result? Thanks to a great partnership with IBM, Security First is now one of the first insurance companies in Florida to make themselves available to customers whenever, wherever and however they choose to communicate.
Sanjay Kupae, Category Marketing Manager- Discovery & Analytics, IBM
Good experiences are shared. Bad experiences are shouted.
SHOUTED might not be a strong enough word because as customers are more connected, the speed and scale to which negative customer experiences travel the Internet is frightening.
The biggest source of grief for most customers is when they reach out to your contact center. Most customers are calling your contact center only after a long process of trying to fix their problem themselves. They're ready to shout even before they pick up the phone, so when you call for assistance, time and accuracy are critical to creating an exceptional experience for them.
The contact center call experience is one of the most important activities to build customer loyalty. When that customer reaches out to you, for that brief three- to-five minutes your service associate represents your brand and all it stands for.
The customer is speaking to your service associate because they need answers. Which means your service associate either knows what to say, or more often than not they need to look for the right information, somewhere hidden across the volumes on top of volumes of information spread across silos in your enterprise.
Three hundred seconds is not a lot of time, and it's even less time when your employees don't have the tools.
Content Analytics drives exceptional service experience in two ways –it enhances traditional enterprise search to recognize every piece of information residing in the enterprise and secondly it lets businesses analyze customer interactions to identify service challenges and train associates better.
A recent Aberdeen report says that “For companies with content analytics, the streamlined searching and fast response to queries had a trickle-down effect on several universal business metrics. In the last twelve months, these companies reported a 17% improvement in the accuracy of their business decisions, and a similar improvement in the quality and relevance of their overall analytics program. Furthermore, their data-centric business process – like handling customer complaints, processing invoices, managing inventory, or closing the books – became 12% more efficient. Companies without content analytics reported 2 to 6 times less improvement.
Content Analytics not just improves the customer experience during the interaction with the business, but has a definitive impact on retention, advocacy and revenue.
And it can reduce the shouting...
IBM has recently announced a new software offering designed to address the burgeoning challenge of fraud in commercial and public sector organizations.
IBM Intelligent Investigation Manager (IIM) optimizes the investigation of fraud for customers across many industries in the commercial and public sector spaces. It does so by enabling more efficient and effective investigations, capturing all of the relevant details and actions of the case and enabling investigators to dynamically collaborate on cases. It also integrates forensic and link analysis into the investigative process, providing investigators with investigative leads, helping them better understand the scope of the fraudulent activity and generating evidence.
The IBM fraud management portfolio enables the building of industry-specific solutions. IIM is one of the core parts of the IBM Smarter Analytics Solution – Fraud, Waste and Abuse and plays a key role in these solutions, providing investigative and analytic support for fraud use cases in healthcare, insurance, finance, and many other markets.
3 key benefits for commercial organizations:
(1) A more expeditious way of preventing or resolving fraudulent activities, by reducing false-positives when dealing with massive amount of data, makes for efficient, trackable investigations
(2) A reduction in the revenue lost from fraud, through better detection, resolution and prevention of, and protection of your customers, citizens and policy holders against fraud
(3) A reduction in the cost of fighting fraud, by reducing the resources needed to collect and assimilate data, removing the manual steps, and progressing toward a ‘just in time’ approach to fighting fraud
3 key benefits for Public Safety:
(1) IMM allows organizations to address the vast increase in data, the amount and the formats, much of which is unstructured
(2) It helps organizations make sense of data that’s often external, raw (often from unidentified sources, and apparently unconnected), or from mobile sources, and that which resides in internal systems
(3) It helps improve the efficiency of turning data into information, and reduces the cost of responding to issues and priorities that impact public safety
To learn more about this solution please watch our new video series – Fighting Fraud on Friday. Starting this month, a new video will be released every Friday. Each segment is presented by a subject matter expert and covers a unique topic to help you understand how IBM is making Intelligent Investigation a reality.
Well, I work in IT, and I am a "Client Technical Professional" (otherwise known as "tech sales", "pre sales", "solution consultant" and other variations less flattering), which kind of implies a certain level of familiarity or knowledge of IT on a technical level. But I am not really - I have had little IT in my formal education, and, worse, I lack the affinity and "feel" for the technical aspects of our work that make many tasks (like building demos or learning new products) so much easier for many of my colleagues.
This is not as bad as it may seem. While I do think a certain level of competence and ability is required (how it still irritates me when a manager, consultant or sales person proclaims his/her ignorance of all things technical as if it were a badge of honour), I feel very strongly that a non-technical view of our products and solutions can be very helpful, even in my seemingly predominantly technical role. A good example of this is how we position IBM Content Analytics with our partners and customers.
I think IBM Content Analytics is fantastic. Well, let me restate this - I think what we can do with IBM Content Analytics is fantastic, amazing. And I feel very strongly that the greatest value delivered by ICAwES is in its text analysis capabilities. I think that the Content Miner is great, and offers a lot of value to our customers. But for me, the even more value is created by its text modelling capabilities. Taking this a level deeper, I feel very strongly that the tooling we offer with ICAwES 3.0 to design, develop and even deploy text analysis models (this is known as Content Analytics Studio) is of enormous value to our customers and partners. Why is this so? After all, we are talking about a modelling tool, not the stuff that normally send customers hearts all aflutter. Perhaps I can best make this argument with a diagram. Its a pretty simple one, and we have all seen it in one form or another:
OK, so nothing too exciting here either, right? Well, this is where I believe IBM´s approach creates real value. One of the characteristics I have seen in most products and solutions that deliver some form of text analysis is that someone like me cannot make any substantive changes to the model, other than maybe changing some terms in a dictionary. I need to either call in the vendor, contract a partner or invest in building programming skills. In the words of a very learned respected colleague of mine, the Content Analytics Studio tool takes text modelling out of our lab and puts it where it belongs - with the customer. It gives the customer control over the entire create/modify - build - validate - analyze process. And when you think about it, isn´t this where it belongs? After all, the customer knows their own content - knows who has created it and what it means to them right? I would argue that our customers do, and I would argue something further - this transfer of control to the customer is perhaps the single most important innovation in ICAwES. I´ll explain why I make this claim in my next entry.
Sanjay Kupae 2700050U55 email@example.com Tags:  analyze content iod2012 analytics ecm safety 2,564 Visits
Guest post by Campbell Robertson, Program Director Industry Strategy and Market Development - Public Sector, IBM Enterprise Content Management
Post 2008, governments across the world are forced to re-prioritize their focus and are under severe pressures to do ever more with ever less; while expectations continue to increase. This mandate is especially true for Public Safety organizations.
With rising population in cities, shifting demographics, technological developments and accelerating globalization there are increasing social and commercial risks of crime. Public safety organizations across the globe are looking at adopting transformative technologies to make smarter decisions, deliver results and demonstrate accountability.
Be it traditional crimes like burglary, vandalism or mail fraud to difficult-to-trace crimes such as terrorism, money laundering and hate crime- investigative work is highly information driven. Traditionally, crime Investigation meant manually sifting through multiple reports and documents scattered across multiple structured and unstructured sources. The manual intelligence access and analysis meant a typical successful case taking weeks or months; and public safety agencies know that time is detrimental to success.
Combining technology and information is key to successful crime and threat investigations, law enforcement agencies need technology that can speed up the process of discovering, analyzing and linking information. Content Analytics provides the capability to extract, search and analyze crucial information from disparate sources and improve the speed and quality of intelligence gathering. By using content analytics tools, agencies can not only solve cases more quickly but also identify non-obvious relationships within data that could possibly prevent a crime from happening in the first place.
A UK law enforcement agency used IBM Content Analytics to perform high-precision text analytics to identify phone numbers from investigative reports which was then used to cross-reference all of the phone numbers so that when a new document arrived, the analyst was presented with a list of all phone numbers and for each number, a list of previous references to that phone number. This solution would reduce analyst’s efforts by 6 hours, which meant faster analysis of information and in the long run more successful investigations.
To know more about how IBM address investigation challenges of Public Safety agencies, attend the Building an IBM i2 and Case Manager Solution for Public Safety and Commercial Fraud and Future Analytics Platform for Law Enforcement and Public Safety sessions at Information OnDemand 2012 Global Conference at Las Vegas in October 2012.