Getting Lost in Semantics Selecting the Right Search Engine

Size: px
Start display at page:

Download "Getting Lost in Semantics Selecting the Right Search Engine"

Transcription

1 Getting Lost in Semantics Selecting the Right Search Engine Steve Mann VP Sales Concept Searching Robert Piddocke VP Channel and Business Development Concept Searching

2 Steve Mann Vice President of Sales at Concept Searching has expertise in consulting, solutions delivery, sales, and project management. He is experienced in Microsoft technologies, and in providing guidance on best practices, technical advice, and solutions to address a wide range of business challenges, leveraging a combination of Microsoft and third-party technology. Robert Piddocke Vice President of Business and Channel Development at Concept Searching has over fifteen years of business development experience. With extensive Microsoft product knowledge and information management understanding, he has implemented hundreds of site and enterprise search solutions, and has authored two books on SharePoint Search.

3 Agenda Who we are and what we do Search engines Search components Demo How can we help?

4 Who Is Concept Searching? Company founded in 2002 Product launched in 2003 Focus on management of structured and unstructured information Profitable, debt free Technology Platform Delivered as a web service Automatic concept identification, content tagging, auto-classification, taxonomy management Only statistical vendor that can extract conceptual metadata 9 years KMWorld 100 Companies that Matter in Knowledge Management 9 years KMWorld Trend Setting Product Authority to Operate enterprise wide US Air Force, NETCON US Army, and Canadian SLSA Client base: Fortune 500/1000 organizations in Healthcare, Financial Services, Manufacturing, Energy, Professional Services, Pharmaceutical, Public sector and DoD Microsoft Gold Certification in Application Development Member of SharePoint PAC and TAP programs Suitable for all versions of SharePoint on-premises and SharePoint Online, including the vnext dedicated platform and the government cloud

5 What Is the Perfect Enterprise Search Engine? Google-esque Relevant Matches user intent Finds similar content, even when words in search string are not used Balances recall and precision Image Voice Video Safe Fast

6 Precision and Recall This is extremely important in data discovery and classification Enterprise search Knowledge management Research Collaboration Tunable In data discovery and classification, the ability to alter precision or recall easily is a significant advantage Manual is cumbersome and prone to error

7 Cognitive Models of Information Retrieval Cognitive Definition of cognitive 1: of, relating to, being, or involving conscious intellectual activity (such as thinking, reasoning, or remembering) cognitive impairment 2: based on or capable of being reduced to empirical factual knowledge cognitively adverb [kog-ni-tiv] Relating to cognition; concerned with the act or process of knowing, perceiving, etc. :cognitive development; cognitive functioning. Relating to the mental processes of perception, memory, judgment, and reasoning, contrasted with emotional and volitional processes.

8 Findability NOT Usability 2.73 words Users will attempt a search only twice in a given session If the right information isn t located in those two attempts, users assume it does not exist or that it is inaccessible Gartner Will spend 5-25 minutes Inability to find, share, reuse information Inability to find all relevant information presentations, documents, graphics, html Only 50% of content is correctly indexed, meta tagged or searchable 60% of documents are obsolete elaw Less than 1% of content is analyzed

9 Transactional search queries Users want to execute a transaction buy books or purchase an iphone 6 Navigational search queries Users want to visit a specific site or find a certain vendor Frankfurt city library Informational search queries Users are looking for certain information how to make coffee Search engines often support a fourth type of query that is used far less frequently Connectivity queries Questions that report on the connectivity of the indexed web graph Which links point to this URL?, How many pages are indexed from this domain name? How Do Your Users Search?

10 Four Modes When Searching for Information Known knowledge Users have an idea of what they want, can express it, aknow where to start looking. Exploring Users have an idea of what they want to know but may have difficulty expressing it, or cannot use the correct terms. Users often know when they have found the right content, but do not know if the amount of information is sufficient. Do not know what they need Users often do not know exactly what they need to know. They may believe that they need to know one thing, when in reality it is something else. Sometimes they visit an information source without any specific purpose. Retrieve In this mode, users are looking for information of which they have prior knowledge. They can remember where they saw it, the source, where to find it.

11 Google s Take On It

12 Why Is Web Search Different from Enterprise Search? Web Enterprise Content Web pages; largely homogenous Variety of data formats, data sources, heterogeneous Relevance Tolerates large number of results, as well as duplicated and overlapping information Demands small number of unique results with high degree of specifity Personalization Little personalization expected; expect list of returned results Analysis Generic Domain Specific Expectation of customized results (data access) aligned with user profiles (role, group, project, etc.)

13 38% of companies never tune the search engine 8% have tools that were never deployed Keywords Proximity User clicking 5 year replacement cycle How Do We Find Anything?

14 Intelligent Search with Machine Learning (Concept Searching) Document interpretation/topic and concept identification Categorization/ classification of data Query analysis/clustering Ranking results Sentiment analysis Entity identification Personalization of content/ recommendations Auto-complete/directed navigation

15 Natural Language Processing (NLP) Subset of machine learning (ML) Unstructured data acquisition Raw language processing Text mining, text expansion, query understanding for improved search Entity extraction Content categorization Content clustering Statistical natural language processing In many NLP projects, statistical techniques can provide a general understanding of documents as a whole Clustering Categorization Similarity Fact extraction Relationship extraction Topic analysis Word clouds Summarization

16 Branch of artificial intelligence that deals with generating, understanding, and analyzing the languages that humans naturally use in order to communicate with computers in both spoken and written ways, using natural human languages instead of computer languages Referred to as computational linguistics as some tasks involved, such as named entity extraction, deep analytics, sentence segmentation, co-reference resolution, part-of-speech tagging, and parsing Sits at the intersection of artificial intelligence, computational linguistics, and computer science Need to analyze maximum amount of data Not to be underestimated Natural Language Processing (NLP)

17 Machine Learning (ML) Subset of artificial intelligence (AI) Large data sets training set is critical Data set emphasis on data quality, expert input is vital Continuously self-learning Machine-generated predictions Using a subset of machine learning called natural language processing (NLP), users are able to ask a question in a conversational manner, and enterprise search applications can predict which data sources are most relevant Can get complicated to manage and maintain

18 Artificial Intelligence (AI) Can identify the past but not the future Use when and where it delivers specific and measurable business value to the organization Lack of support and investment from big vendors Splintered into areas of expertise Coveo/customer service Attivio/data source discovery Splunk/log file analysis It s neither here yet nor will it overtake organizations like a magical wave of utopian pixie dust. This lack of inevitability is because there are two significant problems when it comes to leveraging machine learning in the enterprise: data and bias. Charles Araujo, CIO Magazine

19 Artificial Intelligence (AI) The term developing systems endowed with the intellectual processes characteristic of humans, such as the ability to reason, discover meaning, generalize, or learn from past experience Moving forward on a project? Expert data scientists Accurate data Lots of data Watson swallowed 800 million pages of Wikipedia alone Extensive testing, patience Deep pockets Address future changes Best suited for questions and answers We need not decide if a machine can think ; we need only decide if a machine can act as intelligently as a human being.

20 Concept Searching

21 Must-Haves Centralized metadata management that supports users' language connects experts terminology with novices The metadata management should also provide support to other information systems, or directly to content creators, to provide feedback on how findable the information will be once published Master data management (MDM), Product information management (PIM) and reference data to identify businesses physical and digital items from information available Directories to traverse the structure of the organization and commonly used directories

22 Solution A pragmatic, easy-to-deploy taxonomy approach More effective than the typical academic approach, where complex ontologies are used Creates metadata repositories and taxonomies that are optimized for each organization Delivers the right information, distilled from a variety of distinct content, making available useable knowledge Concept Searching

23 conceptclassifier Platform Automatically generates multi-term metadata, auto-classifies and manipulates it, eliminating manual, time-consuming, and error-prone tasks Cleans up, optimizes, and organizes file share content Improves search, mitigates risk and information exposures, manages records, and prepares content for intelligent migration Integrates and operates in Microsoft environments Unique compound term processing Advanced taxonomy tools Concept Searching

24 Benefits Reduces the cost of content ownership Identifies and remediates threats of noncompliance Applies and enforces governance policies, in real time Delivers a platform for defensible deletion Improves search and ediscovery Reduces risk with searchable, findable, and organized content Increases accuracy of metadata by eliminating end user tagging, improving productivity, and enabling concept-based searching Unique concept identification enables the creation of organizationallydefined taxonomies Reduces taxonomy development time by 80 percent compared with competitive products Tagging and auto-classification of content aligned to business goals Concept Searching

25 Next Webinar in Metadata-Driven World Series Why You Need Metadata-Driven Records Management Wednesday, October 17, 2018 Register Microsoft is continually adding new features to Office 365, and it is easy to get lost in information. This is particularly true when you need to deploy new functionality in your own organization. Join us as we explore records management in Office 365 and SharePoint. What is useful, what could be improved, and what are potential drawbacks? Understand the importance of metadata in driving records, the synergy with classification labels in the Office 365 Security and Compliance Center, and how it is part of effective records management. Read more and register in the Upcoming Webinars area of our website. Concept Searching

26 Thank You Steve Mann VP Sales Concept Searching Robert Piddocke VP Channel and Business Development Concept Searching Concept Searching

October 28, 2017 WELCOME SHAREPOINT SATURDAY OTTAWA. Going Meta How to use metadata in SharePoint

October 28, 2017 WELCOME SHAREPOINT SATURDAY OTTAWA. Going Meta How to use metadata in SharePoint October 28, 2017 WELCOME SHAREPOINT SATURDAY OTTAWA Going Meta How to use metadata in SharePoint Agenda What is metadata and why should we use it? Types of metadata Metadata in SharePoint Metadata and

More information

Why Information Architecture is Vital for Effective Information Management. J. Kevin Parker, CIP, INFO CEO & Principal Architect at Kwestix

Why Information Architecture is Vital for Effective Information Management. J. Kevin Parker, CIP, INFO CEO & Principal Architect at Kwestix Why Information Architecture is Vital for Effective Information Management J. Kevin Parker, CIP, INFO CEO & Principal Architect at Kwestix J. Kevin Parker, CIP, INFO CEO & Principal Architect, Kwestix

More information

Powering Knowledge Discovery. Insights from big data with Linguamatics I2E

Powering Knowledge Discovery. Insights from big data with Linguamatics I2E Powering Knowledge Discovery Insights from big data with Linguamatics I2E Gain actionable insights from unstructured data The world now generates an overwhelming amount of data, most of it written in natural

More information

Enhancing applications with Cognitive APIs IBM Corporation

Enhancing applications with Cognitive APIs IBM Corporation Enhancing applications with Cognitive APIs After you complete this section, you should understand: The Watson Developer Cloud offerings and APIs The benefits of commonly used Cognitive services 2 Watson

More information

An Oracle White Paper October Oracle Social Cloud Platform Text Analytics

An Oracle White Paper October Oracle Social Cloud Platform Text Analytics An Oracle White Paper October 2012 Oracle Social Cloud Platform Text Analytics Executive Overview Oracle s social cloud text analytics platform is able to process unstructured text-based conversations

More information

Introduction to Text Mining. Hongning Wang

Introduction to Text Mining. Hongning Wang Introduction to Text Mining Hongning Wang CS@UVa Who Am I? Hongning Wang Assistant professor in CS@UVa since August 2014 Research areas Information retrieval Data mining Machine learning CS@UVa CS6501:

More information

This tutorial will help computer science graduates to understand the basic-to-advanced concepts related to data warehousing.

This tutorial will help computer science graduates to understand the basic-to-advanced concepts related to data warehousing. About the Tutorial A data warehouse is constructed by integrating data from multiple heterogeneous sources. It supports analytical reporting, structured and/or ad hoc queries and decision making. This

More information

ACCELERATE YOUR SHAREPOINT ADOPTION AND ROI WITH CONTENT INTELLIGENCE

ACCELERATE YOUR SHAREPOINT ADOPTION AND ROI WITH CONTENT INTELLIGENCE June 30, 2012 San Diego Convention Center ACCELERATE YOUR SHAREPOINT ADOPTION AND ROI WITH CONTENT INTELLIGENCE Stuart Laurie, Senior Consultant #SPSSAN Agenda 1. Challenges 2. What comes out of the box

More information

AZURE CLOUD SECURITY GUIDE: 6 BEST PRACTICES. To Secure Azure and Hybrid Cloud Environments

AZURE CLOUD SECURITY GUIDE: 6 BEST PRACTICES. To Secure Azure and Hybrid Cloud Environments AZURE CLOUD SECURITY GUIDE: 6 BEST PRACTICES To Secure Azure and Hybrid Cloud Environments Introduction Cloud is at the core of every successful digital transformation initiative. With cloud comes new

More information

CA ERwin Data Profiler

CA ERwin Data Profiler PRODUCT BRIEF: CA ERWIN DATA PROFILER CA ERwin Data Profiler CA ERWIN DATA PROFILER HELPS ORGANIZATIONS LOWER THE COSTS AND RISK ASSOCIATED WITH DATA INTEGRATION BY PROVIDING REUSABLE, AUTOMATED, CROSS-DATA-SOURCE

More information

Content Enrichment. An essential strategic capability for every publisher. Enriched content. Delivered.

Content Enrichment. An essential strategic capability for every publisher. Enriched content. Delivered. Content Enrichment An essential strategic capability for every publisher Enriched content. Delivered. An essential strategic capability for every publisher Overview Content is at the centre of everything

More information

Risk: Security s New Compliance. Torsten George VP Worldwide Marketing and Products, Agiliance Professional Strategies - S23

Risk: Security s New Compliance. Torsten George VP Worldwide Marketing and Products, Agiliance Professional Strategies - S23 Risk: Security s New Compliance Torsten George VP Worldwide Marketing and Products, Agiliance Professional Strategies - S23 Agenda Market Dynamics Organizational Challenges Risk: Security s New Compliance

More information

Information Retrieval

Information Retrieval Multimedia Computing: Algorithms, Systems, and Applications: Information Retrieval and Search Engine By Dr. Yu Cao Department of Computer Science The University of Massachusetts Lowell Lowell, MA 01854,

More information

Applying Auto-Data Classification Techniques for Large Data Sets

Applying Auto-Data Classification Techniques for Large Data Sets SESSION ID: PDAC-W02 Applying Auto-Data Classification Techniques for Large Data Sets Anchit Arora Program Manager InfoSec, Cisco The proliferation of data and increase in complexity 1995 2006 2014 2020

More information

LIDER Survey. Overview. Number of participants: 24. Participant profile (organisation type, industry sector) Relevant use-cases

LIDER Survey. Overview. Number of participants: 24. Participant profile (organisation type, industry sector) Relevant use-cases LIDER Survey Overview Participant profile (organisation type, industry sector) Relevant use-cases Discovering and extracting information Understanding opinion Content and data (Data Management) Monitoring

More information

Data Management Glossary

Data Management Glossary Data Management Glossary A Access path: The route through a system by which data is found, accessed and retrieved Agile methodology: An approach to software development which takes incremental, iterative

More information

2 The IBM Data Governance Unified Process

2 The IBM Data Governance Unified Process 2 The IBM Data Governance Unified Process The benefits of a commitment to a comprehensive enterprise Data Governance initiative are many and varied, and so are the challenges to achieving strong Data Governance.

More information

Knowledge Retrieval. Franz J. Kurfess. Computer Science Department California Polytechnic State University San Luis Obispo, CA, U.S.A.

Knowledge Retrieval. Franz J. Kurfess. Computer Science Department California Polytechnic State University San Luis Obispo, CA, U.S.A. Knowledge Retrieval Franz J. Kurfess Computer Science Department California Polytechnic State University San Luis Obispo, CA, U.S.A. 1 Acknowledgements This lecture series has been sponsored by the European

More information

Go mobile. Stay in control.

Go mobile. Stay in control. Go mobile. Stay in control. Enterprise Mobility + Security Jeff Alexander Sr. Technical Evangelist http://about.me/jeffa36 Mobile-first, cloud-first reality 63% 80% 0.6% Data breaches Shadow IT IT Budget

More information

Informatica Enterprise Information Catalog

Informatica Enterprise Information Catalog Data Sheet Informatica Enterprise Information Catalog Benefits Automatically catalog and classify all types of data across the enterprise using an AI-powered catalog Identify domains and entities with

More information

7 Steps to Complete Privileged Account Management. September 5, 2017 Fabricio Simao Country Manager

7 Steps to Complete Privileged Account Management. September 5, 2017 Fabricio Simao Country Manager 7 Steps to Complete Privileged Account Management September 5, 2017 Fabricio Simao Country Manager AGENDA Implications of less mature privileged account management What does a more mature approach look

More information

Automate Transform Analyze

Automate Transform Analyze Competitive Intelligence 2.0 Turning the Web s Big Data into Big Insights Automate Transform Analyze Introduction Today, the web continues to grow at a dizzying pace. There are more than 1 billion websites

More information

Full file at

Full file at Chapter 2 Data Warehousing True-False Questions 1. A real-time, enterprise-level data warehouse combined with a strategy for its use in decision support can leverage data to provide massive financial benefits

More information

RiskSense Attack Surface Validation for IoT Systems

RiskSense Attack Surface Validation for IoT Systems RiskSense Attack Surface Validation for IoT Systems 2018 RiskSense, Inc. Surfacing Double Exposure Risks Changing Times and Assessment Focus Our view of security assessments has changed. There is diminishing

More information

UNIT-V WEB MINING. 3/18/2012 Prof. Asha Ambhaikar, RCET Bhilai.

UNIT-V WEB MINING. 3/18/2012 Prof. Asha Ambhaikar, RCET Bhilai. UNIT-V WEB MINING 1 Mining the World-Wide Web 2 What is Web Mining? Discovering useful information from the World-Wide Web and its usage patterns. 3 Web search engines Index-based: search the Web, index

More information

AWS Machine Learning Transformation Day - Munich. 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.

AWS Machine Learning Transformation Day - Munich. 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Machine Learning Transformation Day - Munich ML at Amazon Search & Discovery Fulfilment & Logistics Existing Products New Initiatives Investments in ML for more than 20 years. Thousands of engineers

More information

ODPi and Data Governance Free Your MetaData! October 10, 2018

ODPi and Data Governance Free Your MetaData! October 10, 2018 ODPi and Data Governance Free Your MetaData! October 10, 2018 Today s reality @ODPiOrg Imagine An enterprise data catalogue that lists all of your data, where it is located, its origin (lineage), owner,

More information

Vulnerability Assessments and Penetration Testing

Vulnerability Assessments and Penetration Testing CYBERSECURITY Vulnerability Assessments and Penetration Testing A guide to understanding vulnerability assessments and penetration tests. OVERVIEW When organizations begin developing a strategy to analyze

More information

APPLYING THE POWER OF AI TO YOUR VIDEO PRODUCTION STORAGE

APPLYING THE POWER OF AI TO YOUR VIDEO PRODUCTION STORAGE APPLYING THE POWER OF AI TO YOUR VIDEO PRODUCTION STORAGE FINDING WHAT YOU NEED IN YOUR IN-HOUSE VIDEO STORAGE SECTION 1 You need ways to generate metadata for stored videos without time-consuming manual

More information

Natural Language Processing with PoolParty

Natural Language Processing with PoolParty Natural Language Processing with PoolParty Table of Content Introduction to PoolParty 2 Resolving Language Problems 4 Key Features 5 Entity Extraction and Term Extraction 5 Shadow Concepts 6 Word Sense

More information

The Modeling and Simulation Catalog for Discovery, Knowledge, and Reuse

The Modeling and Simulation Catalog for Discovery, Knowledge, and Reuse The Modeling and Simulation Catalog for Discovery, Knowledge, and Reuse Stephen Hunt OSD CAPE Joint Data Support (SAIC) Stephen.Hunt.ctr@osd.mil The DoD Office of Security Review has cleared this report

More information

Microsoft SharePoint Server 2013 Plan, Configure & Manage

Microsoft SharePoint Server 2013 Plan, Configure & Manage Microsoft SharePoint Server 2013 Plan, Configure & Manage Course 20331-20332B 5 Days Instructor-led, Hands on Course Information This five day instructor-led course omits the overlap and redundancy that

More information

IBM Advantage: IBM Watson Compare and Comply Element Classification

IBM Advantage: IBM Watson Compare and Comply Element Classification IBM Advantage: IBM Watson Compare and Comply Element Classification Executive overview... 1 Introducing Watson Compare and Comply... 2 Definitions... 3 Element Classification insights... 4 Sample use cases...

More information

Netwrix Auditor. Know Your Data. Protect What Matters. Roy Lopez Solutions Engineer

Netwrix Auditor. Know Your Data. Protect What Matters. Roy Lopez Solutions Engineer Netwrix Auditor Know Your Data. Protect What Matters. Roy Lopez Solutions Engineer Agenda Company overview Briefly about Netwrix Auditor Netwrix Auditor Data Discovery and Classification Edition Product

More information

Transform Your Enterprise Search and ediscovery on the AWS Cloud.

Transform Your Enterprise Search and ediscovery on the AWS Cloud. Transform Your Enterprise Search and ediscovery on the AWS Cloud. Welcome Sheri Sullivan Senior Partner Marketing Manager Amazon Web Services Webinar Overview Submit Your Questions using the Q&A tool.

More information

Give Your DITA wings with taxonomy & modern web design. Joe Pairman

Give Your DITA wings with taxonomy & modern web design. Joe Pairman Give Your DITA wings with taxonomy & modern web design Joe Pairman What do we all want? What do we all want? ~ Free beer What do we all want? ~ Free beer ~ We want our content to be effective What do we

More information

Enterprise Knowledge Map: Toward Subject Centric Computing. March 21st, 2007 Dmitry Bogachev

Enterprise Knowledge Map: Toward Subject Centric Computing. March 21st, 2007 Dmitry Bogachev Enterprise Knowledge Map: Toward Subject Centric Computing March 21st, 2007 Dmitry Bogachev Are we ready?...the idea of an application is an artificial one, convenient to the programmer but not to the

More information

PLUS. Checklist. 5 top tips. on content marketing. Marketing WHS HR Business Growth International Trade Legal

PLUS. Checklist. 5 top tips. on content marketing. Marketing WHS HR Business Growth International Trade Legal PLUS 5 top tips on content marketing Checklist Marketing WHS HR Business Growth International Trade Legal The ABCS SEO Checklist How are you performing with your SEO? Take our checklist and find out! Check

More information

Micro Focus Security Fortify Audit Assistant

Micro Focus Security Fortify Audit Assistant White Paper Security Micro Focus Security Fortify Audit Assistant Table of Contents page Introduction... 1 Why Static Application Security Testing?............................................. 1 Confirmation

More information

A Survey Of Different Text Mining Techniques Varsha C. Pande 1 and Dr. A.S. Khandelwal 2

A Survey Of Different Text Mining Techniques Varsha C. Pande 1 and Dr. A.S. Khandelwal 2 A Survey Of Different Text Mining Techniques Varsha C. Pande 1 and Dr. A.S. Khandelwal 2 1 Department of Electronics & Comp. Sc, RTMNU, Nagpur, India 2 Department of Computer Science, Hislop College, Nagpur,

More information

Introduction to Data Mining and Data Analytics

Introduction to Data Mining and Data Analytics 1/28/2016 MIST.7060 Data Analytics 1 Introduction to Data Mining and Data Analytics What Are Data Mining and Data Analytics? Data mining is the process of discovering hidden patterns in data, where Patterns

More information

OpenText Buys Guidance Software

OpenText Buys Guidance Software OpenText Buys Guidance Software September 14, 2017 NASDAQ: OTEX TSX: OTEX Safe Harbor Statement Certain statements in this presentation, including statements regarding OpenText's plans, objectives, expectations

More information

AVOIDING SILOED DATA AND SILOED DATA MANAGEMENT

AVOIDING SILOED DATA AND SILOED DATA MANAGEMENT AVOIDING SILOED DATA AND SILOED DATA MANAGEMENT Dalton Cervo Author, Consultant, Data Management Expert March 2016 This presentation contains extracts from books that are: Copyright 2011 John Wiley & Sons,

More information

Realizing the Army Net-Centric Data Strategy (ANCDS) in a Service Oriented Architecture (SOA)

Realizing the Army Net-Centric Data Strategy (ANCDS) in a Service Oriented Architecture (SOA) Realizing the Army Net-Centric Data Strategy (ANCDS) in a Service Oriented Architecture (SOA) A presentation to GMU/AFCEA symposium "Critical Issues in C4I" Michelle Dirner, James Blalock, Eric Yuan National

More information

Technical Brief: Domain Risk Score Proactively uncover threats using DNS and data science

Technical Brief: Domain Risk Score Proactively uncover threats using DNS and data science Technical Brief: Domain Risk Score Proactively uncover threats using DNS and data science 310 Million + Current Domain Names 11 Billion+ Historical Domain Profiles 5 Million+ New Domain Profiles Daily

More information

Protecting Your SaaS Investment: Monitoring Office 365 Performance

Protecting Your SaaS Investment: Monitoring Office 365 Performance Protecting Your SaaS Investment: Monitoring Office 365 Performance Utilizing the ExtraHop platform to ensure high performance from your Office 365 applications Achieving Higher Productivity and Business

More information

Part I: Data Mining Foundations

Part I: Data Mining Foundations Table of Contents 1. Introduction 1 1.1. What is the World Wide Web? 1 1.2. A Brief History of the Web and the Internet 2 1.3. Web Data Mining 4 1.3.1. What is Data Mining? 6 1.3.2. What is Web Mining?

More information

Symantec Document Retention and Discovery

Symantec Document Retention and Discovery IT POLICY COMPLIANCE Symantec Document Retention and Discovery A state-of-the-art solution that simplifies the discovery of email and other files, enhances litigation readiness, and helps ensure compliance

More information

Introduction p. 1 What is the World Wide Web? p. 1 A Brief History of the Web and the Internet p. 2 Web Data Mining p. 4 What is Data Mining? p.

Introduction p. 1 What is the World Wide Web? p. 1 A Brief History of the Web and the Internet p. 2 Web Data Mining p. 4 What is Data Mining? p. Introduction p. 1 What is the World Wide Web? p. 1 A Brief History of the Web and the Internet p. 2 Web Data Mining p. 4 What is Data Mining? p. 6 What is Web Mining? p. 6 Summary of Chapters p. 8 How

More information

MDM Partner Summit 2015 Oracle Enterprise Data Quality Overview & Roadmap

MDM Partner Summit 2015 Oracle Enterprise Data Quality Overview & Roadmap MDM Partner Summit 2015 Oracle Enterprise Data Quality Overview & Roadmap Steve Tuck Senior Director, Product Strategy Todd Blackmon Senior Director, Sales Consulting David Gengenbach Sales Consultant

More information

HPE ControlPoint. Bill Manago, CRM IG Lead Solutions Consultant HPE Software

HPE ControlPoint. Bill Manago, CRM IG Lead Solutions Consultant HPE Software HPE ControlPoint Bill Manago, CRM IG Lead Solutions Consultant HPE Software Today s BIG Unstructured Data Challenges How do I reduce cost associated with IT and information processes? Information footprint

More information

RHM Presentation. Maas 360 Mobile device management

RHM Presentation. Maas 360 Mobile device management RHM Presentation Maas 360 Mobile device management Strong adoption in the enterprise Manufacturing Financial Consumer Healthcare Public Others 2 Trusted by over 9,000 customers Recognized Industry Leadership

More information

Overview. Data-mining. Commercial & Scientific Applications. Ongoing Research Activities. From Research to Technology Transfer

Overview. Data-mining. Commercial & Scientific Applications. Ongoing Research Activities. From Research to Technology Transfer Data Mining George Karypis Department of Computer Science Digital Technology Center University of Minnesota, Minneapolis, USA. http://www.cs.umn.edu/~karypis karypis@cs.umn.edu Overview Data-mining What

More information

Convergence and Collaboration: Transforming Business Process and Workflows

Convergence and Collaboration: Transforming Business Process and Workflows Convergence and Collaboration: Transforming Business Process and Workflows Steven Hagan, Vice President, Server Technologies 1 Copyright 2011, Oracle and/or its affiliates. All rights Convergence & Collaboration:

More information

Popular SIEM vs aisiem

Popular SIEM vs aisiem Popular SIEM vs aisiem You cannot flip a page in any Cybersecurity magazine, or scroll through security blogging sites without a mention of Next Gen SIEM. You can understand why traditional SIEM vendors

More information

TECHNOLOGY BRIEF: CA ERWIN DATA PROFILER. Combining Data Profiling and Data Modeling for Better Data Quality

TECHNOLOGY BRIEF: CA ERWIN DATA PROFILER. Combining Data Profiling and Data Modeling for Better Data Quality TECHNOLOGY BRIEF: CA ERWIN DATA PROFILER Combining Data Profiling and Data Modeling for Better Data Quality Table of Contents Executive Summary SECTION 1: CHALLENGE 2 Reducing the Cost and Risk of Data

More information

CISM - Certified Information Security Manager. Course Outline. CISM - Certified Information Security Manager. 22 Mar

CISM - Certified Information Security Manager. Course Outline. CISM - Certified Information Security Manager. 22 Mar Course Outline CISM - Certified Information Security Manager 22 Mar 2019 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led

More information

Microsoft FAST Search Server 2010 for SharePoint Evaluation Guide

Microsoft FAST Search Server 2010 for SharePoint Evaluation Guide Microsoft FAST Search Server 2010 for SharePoint Evaluation Guide 1 www.microsoft.com/sharepoint The information contained in this document represents the current view of Microsoft Corporation on the issues

More information

Management Information Systems MANAGING THE DIGITAL FIRM, 12 TH EDITION FOUNDATIONS OF BUSINESS INTELLIGENCE: DATABASES AND INFORMATION MANAGEMENT

Management Information Systems MANAGING THE DIGITAL FIRM, 12 TH EDITION FOUNDATIONS OF BUSINESS INTELLIGENCE: DATABASES AND INFORMATION MANAGEMENT MANAGING THE DIGITAL FIRM, 12 TH EDITION Chapter 6 FOUNDATIONS OF BUSINESS INTELLIGENCE: DATABASES AND INFORMATION MANAGEMENT VIDEO CASES Case 1: Maruti Suzuki Business Intelligence and Enterprise Databases

More information

Q Information Security Market Landscape Study Learn how your peers plan for and purchase Information Security Technologies

Q Information Security Market Landscape Study Learn how your peers plan for and purchase Information Security Technologies Q1 2016 Information Security Market Landscape Study Learn how your peers plan for and purchase Information Security Technologies March 2016 About Ken Male Ken Male SVP and GM TechTarget Research Ken is

More information

Big Data Analytics: What is Big Data? Stony Brook University CSE545, Fall 2016 the inaugural edition

Big Data Analytics: What is Big Data? Stony Brook University CSE545, Fall 2016 the inaugural edition Big Data Analytics: What is Big Data? Stony Brook University CSE545, Fall 2016 the inaugural edition What s the BIG deal?! 2011 2011 2008 2010 2012 What s the BIG deal?! (Gartner Hype Cycle) What s the

More information

Making a Business Case for Electronic Document or Records Management

Making a Business Case for Electronic Document or Records Management Making a Business Case for Electronic Document or Records Management Building and maintaining an edms system is a significant investment in both tools and people. It requires on-going care and attention.

More information

SIEM: Five Requirements that Solve the Bigger Business Issues

SIEM: Five Requirements that Solve the Bigger Business Issues SIEM: Five Requirements that Solve the Bigger Business Issues After more than a decade functioning in production environments, security information and event management (SIEM) solutions are now considered

More information

10 STEPS TO BUILD UP A GOOD SEO

10 STEPS TO BUILD UP A GOOD SEO The SEO (search engine optimization) tools enable the company to improve their website s accessibility instantly and easily and to attain the top ranking in the search results. By typing any keyword, you

More information

Management Information Systems Review Questions. Chapter 6 Foundations of Business Intelligence: Databases and Information Management

Management Information Systems Review Questions. Chapter 6 Foundations of Business Intelligence: Databases and Information Management Management Information Systems Review Questions Chapter 6 Foundations of Business Intelligence: Databases and Information Management 1) The traditional file environment does not typically have a problem

More information

Maximizing the Value of STM Content through Semantic Enrichment. Frank Stumpf December 1, 2009

Maximizing the Value of STM Content through Semantic Enrichment. Frank Stumpf December 1, 2009 Maximizing the Value of STM Content through Semantic Enrichment Frank Stumpf December 1, 2009 What is Semantics and Semantic Processing? Content Knowledge Framework Technology Framework Search Text Images

More information

Sensitive Data Loss is NOT Inevitable

Sensitive Data Loss is NOT Inevitable Sensitive Data Loss is NOT Inevitable Dan Geer, CISO In-Q-Tel Featured Speaker Heidi Shey, Security Analyst, Forrester Research Agenda Introduction Time for a Change Dan Geer, In-Q-Tel How to Overcome

More information

Archiving Market Update

Archiving Market Update The Radicati Group, Inc. www.radicati.com Email Archiving Market Update A Radicati Group, Inc. Webconference The Radicati Group, Inc. Copyright September 2010, Reproduction Prohibited 9:30 am, PT September

More information

Project Management Learning & coaching User Adoption E-learning Governance Support

Project Management Learning & coaching User Adoption E-learning Governance Support 45 consultants Architecture Migrations Business Analysis Functional analysis Branding Development Project Management Learning & coaching User Adoption E-learning Governance Support POWER SharePoint Service

More information

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective Mapping Your Requirements to the NIST Cybersecurity Framework Industry Perspective 1 Quest has the solutions and services to help your organization identify, protect, detect, respond and recover, better

More information

Run the business. Not the risks.

Run the business. Not the risks. Run the business. Not the risks. RISK-RESILIENCE FOR THE DIGITAL BUSINESS Cyber-attacks are a known risk to business. Today, with enterprises becoming pervasively digital, these risks have grown multifold.

More information

Search Engines. Charles Severance

Search Engines. Charles Severance Search Engines Charles Severance Google Architecture Web Crawling Index Building Searching http://infolab.stanford.edu/~backrub/google.html Google Search Google I/O '08 Keynote by Marissa Mayer Usablity

More information

Product Overview Archive2Azure TM. Compliance Storage Solution Based on Microsoft Azure. From Archive360

Product Overview Archive2Azure TM. Compliance Storage Solution Based on Microsoft Azure. From Archive360 Product Overview Compliance Storage Solution Based on Microsoft Azure From Archive360 1 Introduction The cloud has quickly become the preferred option for companies to help reverse the growing issues associated

More information

Things to consider when using Semantics in your Information Management strategy. Toby Conrad Smartlogic

Things to consider when using Semantics in your Information Management strategy. Toby Conrad Smartlogic Things to consider when using Semantics in your Information Management strategy Toby Conrad Smartlogic toby.conrad@smartlogic.com +1 773 251 0824 Some of Smartlogic s 250+ Customers Awards Trend Setting

More information

Emerging Technologies in Knowledge Management By Ramana Rao, CTO of Inxight Software, Inc.

Emerging Technologies in Knowledge Management By Ramana Rao, CTO of Inxight Software, Inc. Emerging Technologies in Knowledge Management By Ramana Rao, CTO of Inxight Software, Inc. This paper provides an overview of a presentation at the Internet Librarian International conference in London

More information

Security Compliance and Data Governance: Dual problems, single solution CON8015

Security Compliance and Data Governance: Dual problems, single solution CON8015 Security Compliance and Data Governance: Dual problems, single solution CON8015 David Wolf Director of Product Management Oracle Development, Enterprise Manager Steve Ries Senior Systems Architect Technology

More information

Hybrid IT for SMBs. HPE addressing SMB and channel partner Hybrid IT demands ANALYST ANURAG AGRAWAL REPORT : HPE. October 2018

Hybrid IT for SMBs. HPE addressing SMB and channel partner Hybrid IT demands ANALYST ANURAG AGRAWAL REPORT : HPE. October 2018 V REPORT : HPE Hybrid IT for SMBs HPE addressing SMB and channel partner Hybrid IT demands October 2018 ANALYST ANURAG AGRAWAL Data You Can Rely On Analysis You Can Act Upon HPE addressing SMB and partner

More information

Taxonomy Tools: Collaboration, Creation & Integration. Dow Jones & Company

Taxonomy Tools: Collaboration, Creation & Integration. Dow Jones & Company Taxonomy Tools: Collaboration, Creation & Integration Dave Clarke Global Taxonomy Director dave.clarke@dowjones.com Dow Jones & Company Introduction Software Tools for Taxonomy 1. Collaboration 2. Creation

More information

Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services

Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services Solution Overview Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services OPTIMIZE YOUR CLOUD SERVICES TO DRIVE BETTER BUSINESS OUTCOMES Reduce Cloud Business Risks and Costs

More information

Microsoft SharePoint Online for Administrators

Microsoft SharePoint Online for Administrators 1800 ULEARN (853 276) www.ddls.com.au Microsoft 55238 - SharePoint Online for Administrators Length 3 days Price $2750.00 (inc GST) Version A Overview This course will introduce the audience to SharePoint

More information

Enabling Data Governance Leveraging Critical Data Elements

Enabling Data Governance Leveraging Critical Data Elements Adaptive Presentation at DAMA-NYC October 19 th, 2017 Enabling Data Governance Leveraging Critical Data Elements Jeff Goins, President, Jeff.goins@adaptive.com James Cerrato, Chief, Product Evangelist,

More information

GLOBAL PKI TRENDS STUDY

GLOBAL PKI TRENDS STUDY 2018 GLOBAL PKI TRENDS STUDY Sponsored by Thales esecurity Independently conducted by Ponemon Institute LLC SEPTEMBER 2018 EXECUTIVE SUMMARY #2018GlobalPKI Mi Ponemon Institute is pleased to present the

More information

CISM - Certified Information Security Manager. Course Outline. CISM - Certified Information Security Manager.

CISM - Certified Information Security Manager. Course Outline. CISM - Certified Information Security Manager. Course Outline CISM - Certified Information Security Manager 20 Nov 2017 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led

More information

Security Metrics Establishing unambiguous and logically defensible security metrics. Steven Piliero CSO The Center for Internet Security

Security Metrics Establishing unambiguous and logically defensible security metrics. Steven Piliero CSO The Center for Internet Security Security Metrics Establishing unambiguous and logically defensible security metrics Steven Piliero CSO The Center for Internet Security The Center for Internet Security (CIS) Formed - October 2000 As a

More information

INTELLIGENCE DRIVEN GRC FOR SECURITY

INTELLIGENCE DRIVEN GRC FOR SECURITY INTELLIGENCE DRIVEN GRC FOR SECURITY OVERVIEW Organizations today strive to keep their business and technology infrastructure organized, controllable, and understandable, not only to have the ability to

More information

Envision IT Office 365 Productivity Series Experience, Branding and Navigation. June 24, 2015

Envision IT Office 365 Productivity Series Experience, Branding and Navigation. June 24, 2015 Envision IT Office 365 Productivity Series Experience, Branding and Navigation June 24, 2015 Peter Carson President, Envision IT SharePoint MVP Microsoft Canada Partner Seller peter@envisionit.com http://blog.petercarson.ca

More information

DATACENTER SERVICES DATACENTER

DATACENTER SERVICES DATACENTER SERVICES SOLUTION SUMMARY ALL CHANGE React, grow and innovate faster with Computacenter s agile infrastructure services Customers expect an always-on, superfast response. Businesses need to release new

More information

Semantics, Metadata and Identifying Master Data

Semantics, Metadata and Identifying Master Data Semantics, Metadata and Identifying Master Data A DataFlux White Paper Prepared by: David Loshin, President, Knowledge Integrity, Inc. Once you have determined that your organization can achieve the benefits

More information

Google Analytics. powerful simplicity, practical insight

Google Analytics. powerful simplicity, practical insight Google Analytics powerful simplicity, practical insight 1 Overview Google Analytics Improve your site and increase marketing ROI Free, hosted web analytics service View over 80+ reports online, for download,

More information

SEARCHMETRICS WHITEPAPER RANKING FACTORS Targeted Analysis for more Success on Google and in your Online Market

SEARCHMETRICS WHITEPAPER RANKING FACTORS Targeted Analysis for more Success on Google and in your Online Market 2018 SEARCHMETRICS WHITEPAPER RANKING FACTORS 2018 Targeted for more Success on Google and in your Online Market Table of Contents Introduction: Why ranking factors for niches?... 3 Methodology: Which

More information

Accelerate your Azure Hybrid Cloud Business with HPE. Ken Won, HPE Director, Cloud Product Marketing

Accelerate your Azure Hybrid Cloud Business with HPE. Ken Won, HPE Director, Cloud Product Marketing Accelerate your Azure Hybrid Cloud Business with HPE Ken Won, HPE Director, Cloud Product Marketing Mega trend: Customers are increasingly buying cloud services from external service providers Speed of

More information

It s not about technology it s about people!

It s not about technology it s about people! It s not about technology it s about people! BCS Search Solutions 2012 Intranet Focus Ltd Martin White Managing Director, Intranet Focus Ltd. martin.white@intranetfocus.com @intranetfocus About me Chemist

More information

Foundations. The Golden Record is Not Enough: The Case For Data Orchestration. CPDAs Highly Recommend

Foundations. The Golden Record is Not Enough: The Case For Data Orchestration. CPDAs Highly Recommend Foundations Journal of the Professional Petroleum Data Management Association Print: ISSN 2368-7533 - Online: ISSN 2368-7541 Volume 2 Issue 3 4Q2015 The Golden Record is Not Enough: The Case For Data Orchestration

More information

Seven Decision Points When Considering Containers

Seven Decision Points When Considering Containers Market Guide Seven Decision Points When Considering Containers A Continuum of Deployment Choices More than ever, developers and systems architects have a range of choices when it comes to deploying applications,

More information

Noam Ikar R&DVP. Complex Event Processing and Situational Awareness in the Digital Age

Noam Ikar R&DVP. Complex Event Processing and Situational Awareness in the Digital Age Noam Ikar R&DVP Complex Event Processing and Situational Awareness in the Digital Age We need to correlate events from inside and outside the organization by a smart layer Cyberint CEO, Dec 2017. Wikipedia

More information

NCHRP Project 20-97: Improving Findability and Relevance of Transportation Information. Part I: Project Overview Gordon Kennedy, Washington State DOT

NCHRP Project 20-97: Improving Findability and Relevance of Transportation Information. Part I: Project Overview Gordon Kennedy, Washington State DOT NCHRP Project 20-97: Improving Findability and Relevance of Transportation Information Part I: Project Overview Gordon Kennedy, Washington State DOT November, 2017 NCHRP is a State-Driven Program Sponsored

More information

DATA MINING - 1DL105, 1DL111

DATA MINING - 1DL105, 1DL111 1 DATA MINING - 1DL105, 1DL111 Fall 2007 An introductory class in data mining http://user.it.uu.se/~udbl/dut-ht2007/ alt. http://www.it.uu.se/edu/course/homepage/infoutv/ht07 Kjell Orsborn Uppsala Database

More information

SEPTEMBER 2018

SEPTEMBER 2018 www.prismlit.com SEPTEMBER 2018 Don t Stop Believin : The Staying Power of Search Term Optimization Since the first model T rolled off of Henry Ford s assembly line, all cars have been made with a steering

More information

Master Data Management And Data Governance 2 E

Master Data Management And Data Governance 2 E We have made it easy for you to find a PDF Ebooks without any digging. And by having access to our ebooks online or by storing it on your computer, you have convenient answers with master data management

More information

ClickLearn Studio. - A technical guide 9/18/2017

ClickLearn Studio. - A technical guide 9/18/2017 ClickLearn Studio - A technical guide 9/18/2017 All products and companies mentioned in this document are or may be registered trademarks of their respective companies or owners. ClickLearn ApS reserves

More information