Getting Lost in Semantics Selecting the Right Search Engine
|
|
- Ruby Spencer
- 5 years ago
- Views:
Transcription
1 Getting Lost in Semantics Selecting the Right Search Engine Steve Mann VP Sales Concept Searching Robert Piddocke VP Channel and Business Development Concept Searching
2 Steve Mann Vice President of Sales at Concept Searching has expertise in consulting, solutions delivery, sales, and project management. He is experienced in Microsoft technologies, and in providing guidance on best practices, technical advice, and solutions to address a wide range of business challenges, leveraging a combination of Microsoft and third-party technology. Robert Piddocke Vice President of Business and Channel Development at Concept Searching has over fifteen years of business development experience. With extensive Microsoft product knowledge and information management understanding, he has implemented hundreds of site and enterprise search solutions, and has authored two books on SharePoint Search.
3 Agenda Who we are and what we do Search engines Search components Demo How can we help?
4 Who Is Concept Searching? Company founded in 2002 Product launched in 2003 Focus on management of structured and unstructured information Profitable, debt free Technology Platform Delivered as a web service Automatic concept identification, content tagging, auto-classification, taxonomy management Only statistical vendor that can extract conceptual metadata 9 years KMWorld 100 Companies that Matter in Knowledge Management 9 years KMWorld Trend Setting Product Authority to Operate enterprise wide US Air Force, NETCON US Army, and Canadian SLSA Client base: Fortune 500/1000 organizations in Healthcare, Financial Services, Manufacturing, Energy, Professional Services, Pharmaceutical, Public sector and DoD Microsoft Gold Certification in Application Development Member of SharePoint PAC and TAP programs Suitable for all versions of SharePoint on-premises and SharePoint Online, including the vnext dedicated platform and the government cloud
5 What Is the Perfect Enterprise Search Engine? Google-esque Relevant Matches user intent Finds similar content, even when words in search string are not used Balances recall and precision Image Voice Video Safe Fast
6 Precision and Recall This is extremely important in data discovery and classification Enterprise search Knowledge management Research Collaboration Tunable In data discovery and classification, the ability to alter precision or recall easily is a significant advantage Manual is cumbersome and prone to error
7 Cognitive Models of Information Retrieval Cognitive Definition of cognitive 1: of, relating to, being, or involving conscious intellectual activity (such as thinking, reasoning, or remembering) cognitive impairment 2: based on or capable of being reduced to empirical factual knowledge cognitively adverb [kog-ni-tiv] Relating to cognition; concerned with the act or process of knowing, perceiving, etc. :cognitive development; cognitive functioning. Relating to the mental processes of perception, memory, judgment, and reasoning, contrasted with emotional and volitional processes.
8 Findability NOT Usability 2.73 words Users will attempt a search only twice in a given session If the right information isn t located in those two attempts, users assume it does not exist or that it is inaccessible Gartner Will spend 5-25 minutes Inability to find, share, reuse information Inability to find all relevant information presentations, documents, graphics, html Only 50% of content is correctly indexed, meta tagged or searchable 60% of documents are obsolete elaw Less than 1% of content is analyzed
9 Transactional search queries Users want to execute a transaction buy books or purchase an iphone 6 Navigational search queries Users want to visit a specific site or find a certain vendor Frankfurt city library Informational search queries Users are looking for certain information how to make coffee Search engines often support a fourth type of query that is used far less frequently Connectivity queries Questions that report on the connectivity of the indexed web graph Which links point to this URL?, How many pages are indexed from this domain name? How Do Your Users Search?
10 Four Modes When Searching for Information Known knowledge Users have an idea of what they want, can express it, aknow where to start looking. Exploring Users have an idea of what they want to know but may have difficulty expressing it, or cannot use the correct terms. Users often know when they have found the right content, but do not know if the amount of information is sufficient. Do not know what they need Users often do not know exactly what they need to know. They may believe that they need to know one thing, when in reality it is something else. Sometimes they visit an information source without any specific purpose. Retrieve In this mode, users are looking for information of which they have prior knowledge. They can remember where they saw it, the source, where to find it.
11 Google s Take On It
12 Why Is Web Search Different from Enterprise Search? Web Enterprise Content Web pages; largely homogenous Variety of data formats, data sources, heterogeneous Relevance Tolerates large number of results, as well as duplicated and overlapping information Demands small number of unique results with high degree of specifity Personalization Little personalization expected; expect list of returned results Analysis Generic Domain Specific Expectation of customized results (data access) aligned with user profiles (role, group, project, etc.)
13 38% of companies never tune the search engine 8% have tools that were never deployed Keywords Proximity User clicking 5 year replacement cycle How Do We Find Anything?
14 Intelligent Search with Machine Learning (Concept Searching) Document interpretation/topic and concept identification Categorization/ classification of data Query analysis/clustering Ranking results Sentiment analysis Entity identification Personalization of content/ recommendations Auto-complete/directed navigation
15 Natural Language Processing (NLP) Subset of machine learning (ML) Unstructured data acquisition Raw language processing Text mining, text expansion, query understanding for improved search Entity extraction Content categorization Content clustering Statistical natural language processing In many NLP projects, statistical techniques can provide a general understanding of documents as a whole Clustering Categorization Similarity Fact extraction Relationship extraction Topic analysis Word clouds Summarization
16 Branch of artificial intelligence that deals with generating, understanding, and analyzing the languages that humans naturally use in order to communicate with computers in both spoken and written ways, using natural human languages instead of computer languages Referred to as computational linguistics as some tasks involved, such as named entity extraction, deep analytics, sentence segmentation, co-reference resolution, part-of-speech tagging, and parsing Sits at the intersection of artificial intelligence, computational linguistics, and computer science Need to analyze maximum amount of data Not to be underestimated Natural Language Processing (NLP)
17 Machine Learning (ML) Subset of artificial intelligence (AI) Large data sets training set is critical Data set emphasis on data quality, expert input is vital Continuously self-learning Machine-generated predictions Using a subset of machine learning called natural language processing (NLP), users are able to ask a question in a conversational manner, and enterprise search applications can predict which data sources are most relevant Can get complicated to manage and maintain
18 Artificial Intelligence (AI) Can identify the past but not the future Use when and where it delivers specific and measurable business value to the organization Lack of support and investment from big vendors Splintered into areas of expertise Coveo/customer service Attivio/data source discovery Splunk/log file analysis It s neither here yet nor will it overtake organizations like a magical wave of utopian pixie dust. This lack of inevitability is because there are two significant problems when it comes to leveraging machine learning in the enterprise: data and bias. Charles Araujo, CIO Magazine
19 Artificial Intelligence (AI) The term developing systems endowed with the intellectual processes characteristic of humans, such as the ability to reason, discover meaning, generalize, or learn from past experience Moving forward on a project? Expert data scientists Accurate data Lots of data Watson swallowed 800 million pages of Wikipedia alone Extensive testing, patience Deep pockets Address future changes Best suited for questions and answers We need not decide if a machine can think ; we need only decide if a machine can act as intelligently as a human being.
20 Concept Searching
21 Must-Haves Centralized metadata management that supports users' language connects experts terminology with novices The metadata management should also provide support to other information systems, or directly to content creators, to provide feedback on how findable the information will be once published Master data management (MDM), Product information management (PIM) and reference data to identify businesses physical and digital items from information available Directories to traverse the structure of the organization and commonly used directories
22 Solution A pragmatic, easy-to-deploy taxonomy approach More effective than the typical academic approach, where complex ontologies are used Creates metadata repositories and taxonomies that are optimized for each organization Delivers the right information, distilled from a variety of distinct content, making available useable knowledge Concept Searching
23 conceptclassifier Platform Automatically generates multi-term metadata, auto-classifies and manipulates it, eliminating manual, time-consuming, and error-prone tasks Cleans up, optimizes, and organizes file share content Improves search, mitigates risk and information exposures, manages records, and prepares content for intelligent migration Integrates and operates in Microsoft environments Unique compound term processing Advanced taxonomy tools Concept Searching
24 Benefits Reduces the cost of content ownership Identifies and remediates threats of noncompliance Applies and enforces governance policies, in real time Delivers a platform for defensible deletion Improves search and ediscovery Reduces risk with searchable, findable, and organized content Increases accuracy of metadata by eliminating end user tagging, improving productivity, and enabling concept-based searching Unique concept identification enables the creation of organizationallydefined taxonomies Reduces taxonomy development time by 80 percent compared with competitive products Tagging and auto-classification of content aligned to business goals Concept Searching
25 Next Webinar in Metadata-Driven World Series Why You Need Metadata-Driven Records Management Wednesday, October 17, 2018 Register Microsoft is continually adding new features to Office 365, and it is easy to get lost in information. This is particularly true when you need to deploy new functionality in your own organization. Join us as we explore records management in Office 365 and SharePoint. What is useful, what could be improved, and what are potential drawbacks? Understand the importance of metadata in driving records, the synergy with classification labels in the Office 365 Security and Compliance Center, and how it is part of effective records management. Read more and register in the Upcoming Webinars area of our website. Concept Searching
26 Thank You Steve Mann VP Sales Concept Searching Robert Piddocke VP Channel and Business Development Concept Searching Concept Searching
October 28, 2017 WELCOME SHAREPOINT SATURDAY OTTAWA. Going Meta How to use metadata in SharePoint
October 28, 2017 WELCOME SHAREPOINT SATURDAY OTTAWA Going Meta How to use metadata in SharePoint Agenda What is metadata and why should we use it? Types of metadata Metadata in SharePoint Metadata and
More informationWhy Information Architecture is Vital for Effective Information Management. J. Kevin Parker, CIP, INFO CEO & Principal Architect at Kwestix
Why Information Architecture is Vital for Effective Information Management J. Kevin Parker, CIP, INFO CEO & Principal Architect at Kwestix J. Kevin Parker, CIP, INFO CEO & Principal Architect, Kwestix
More informationPowering Knowledge Discovery. Insights from big data with Linguamatics I2E
Powering Knowledge Discovery Insights from big data with Linguamatics I2E Gain actionable insights from unstructured data The world now generates an overwhelming amount of data, most of it written in natural
More informationEnhancing applications with Cognitive APIs IBM Corporation
Enhancing applications with Cognitive APIs After you complete this section, you should understand: The Watson Developer Cloud offerings and APIs The benefits of commonly used Cognitive services 2 Watson
More informationAn Oracle White Paper October Oracle Social Cloud Platform Text Analytics
An Oracle White Paper October 2012 Oracle Social Cloud Platform Text Analytics Executive Overview Oracle s social cloud text analytics platform is able to process unstructured text-based conversations
More informationIntroduction to Text Mining. Hongning Wang
Introduction to Text Mining Hongning Wang CS@UVa Who Am I? Hongning Wang Assistant professor in CS@UVa since August 2014 Research areas Information retrieval Data mining Machine learning CS@UVa CS6501:
More informationThis tutorial will help computer science graduates to understand the basic-to-advanced concepts related to data warehousing.
About the Tutorial A data warehouse is constructed by integrating data from multiple heterogeneous sources. It supports analytical reporting, structured and/or ad hoc queries and decision making. This
More informationACCELERATE YOUR SHAREPOINT ADOPTION AND ROI WITH CONTENT INTELLIGENCE
June 30, 2012 San Diego Convention Center ACCELERATE YOUR SHAREPOINT ADOPTION AND ROI WITH CONTENT INTELLIGENCE Stuart Laurie, Senior Consultant #SPSSAN Agenda 1. Challenges 2. What comes out of the box
More informationAZURE CLOUD SECURITY GUIDE: 6 BEST PRACTICES. To Secure Azure and Hybrid Cloud Environments
AZURE CLOUD SECURITY GUIDE: 6 BEST PRACTICES To Secure Azure and Hybrid Cloud Environments Introduction Cloud is at the core of every successful digital transformation initiative. With cloud comes new
More informationCA ERwin Data Profiler
PRODUCT BRIEF: CA ERWIN DATA PROFILER CA ERwin Data Profiler CA ERWIN DATA PROFILER HELPS ORGANIZATIONS LOWER THE COSTS AND RISK ASSOCIATED WITH DATA INTEGRATION BY PROVIDING REUSABLE, AUTOMATED, CROSS-DATA-SOURCE
More informationContent Enrichment. An essential strategic capability for every publisher. Enriched content. Delivered.
Content Enrichment An essential strategic capability for every publisher Enriched content. Delivered. An essential strategic capability for every publisher Overview Content is at the centre of everything
More informationRisk: Security s New Compliance. Torsten George VP Worldwide Marketing and Products, Agiliance Professional Strategies - S23
Risk: Security s New Compliance Torsten George VP Worldwide Marketing and Products, Agiliance Professional Strategies - S23 Agenda Market Dynamics Organizational Challenges Risk: Security s New Compliance
More informationInformation Retrieval
Multimedia Computing: Algorithms, Systems, and Applications: Information Retrieval and Search Engine By Dr. Yu Cao Department of Computer Science The University of Massachusetts Lowell Lowell, MA 01854,
More informationApplying Auto-Data Classification Techniques for Large Data Sets
SESSION ID: PDAC-W02 Applying Auto-Data Classification Techniques for Large Data Sets Anchit Arora Program Manager InfoSec, Cisco The proliferation of data and increase in complexity 1995 2006 2014 2020
More informationLIDER Survey. Overview. Number of participants: 24. Participant profile (organisation type, industry sector) Relevant use-cases
LIDER Survey Overview Participant profile (organisation type, industry sector) Relevant use-cases Discovering and extracting information Understanding opinion Content and data (Data Management) Monitoring
More informationData Management Glossary
Data Management Glossary A Access path: The route through a system by which data is found, accessed and retrieved Agile methodology: An approach to software development which takes incremental, iterative
More information2 The IBM Data Governance Unified Process
2 The IBM Data Governance Unified Process The benefits of a commitment to a comprehensive enterprise Data Governance initiative are many and varied, and so are the challenges to achieving strong Data Governance.
More informationKnowledge Retrieval. Franz J. Kurfess. Computer Science Department California Polytechnic State University San Luis Obispo, CA, U.S.A.
Knowledge Retrieval Franz J. Kurfess Computer Science Department California Polytechnic State University San Luis Obispo, CA, U.S.A. 1 Acknowledgements This lecture series has been sponsored by the European
More informationGo mobile. Stay in control.
Go mobile. Stay in control. Enterprise Mobility + Security Jeff Alexander Sr. Technical Evangelist http://about.me/jeffa36 Mobile-first, cloud-first reality 63% 80% 0.6% Data breaches Shadow IT IT Budget
More informationInformatica Enterprise Information Catalog
Data Sheet Informatica Enterprise Information Catalog Benefits Automatically catalog and classify all types of data across the enterprise using an AI-powered catalog Identify domains and entities with
More information7 Steps to Complete Privileged Account Management. September 5, 2017 Fabricio Simao Country Manager
7 Steps to Complete Privileged Account Management September 5, 2017 Fabricio Simao Country Manager AGENDA Implications of less mature privileged account management What does a more mature approach look
More informationAutomate Transform Analyze
Competitive Intelligence 2.0 Turning the Web s Big Data into Big Insights Automate Transform Analyze Introduction Today, the web continues to grow at a dizzying pace. There are more than 1 billion websites
More informationFull file at
Chapter 2 Data Warehousing True-False Questions 1. A real-time, enterprise-level data warehouse combined with a strategy for its use in decision support can leverage data to provide massive financial benefits
More informationRiskSense Attack Surface Validation for IoT Systems
RiskSense Attack Surface Validation for IoT Systems 2018 RiskSense, Inc. Surfacing Double Exposure Risks Changing Times and Assessment Focus Our view of security assessments has changed. There is diminishing
More informationUNIT-V WEB MINING. 3/18/2012 Prof. Asha Ambhaikar, RCET Bhilai.
UNIT-V WEB MINING 1 Mining the World-Wide Web 2 What is Web Mining? Discovering useful information from the World-Wide Web and its usage patterns. 3 Web search engines Index-based: search the Web, index
More informationAWS Machine Learning Transformation Day - Munich. 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Machine Learning Transformation Day - Munich ML at Amazon Search & Discovery Fulfilment & Logistics Existing Products New Initiatives Investments in ML for more than 20 years. Thousands of engineers
More informationODPi and Data Governance Free Your MetaData! October 10, 2018
ODPi and Data Governance Free Your MetaData! October 10, 2018 Today s reality @ODPiOrg Imagine An enterprise data catalogue that lists all of your data, where it is located, its origin (lineage), owner,
More informationVulnerability Assessments and Penetration Testing
CYBERSECURITY Vulnerability Assessments and Penetration Testing A guide to understanding vulnerability assessments and penetration tests. OVERVIEW When organizations begin developing a strategy to analyze
More informationAPPLYING THE POWER OF AI TO YOUR VIDEO PRODUCTION STORAGE
APPLYING THE POWER OF AI TO YOUR VIDEO PRODUCTION STORAGE FINDING WHAT YOU NEED IN YOUR IN-HOUSE VIDEO STORAGE SECTION 1 You need ways to generate metadata for stored videos without time-consuming manual
More informationNatural Language Processing with PoolParty
Natural Language Processing with PoolParty Table of Content Introduction to PoolParty 2 Resolving Language Problems 4 Key Features 5 Entity Extraction and Term Extraction 5 Shadow Concepts 6 Word Sense
More informationThe Modeling and Simulation Catalog for Discovery, Knowledge, and Reuse
The Modeling and Simulation Catalog for Discovery, Knowledge, and Reuse Stephen Hunt OSD CAPE Joint Data Support (SAIC) Stephen.Hunt.ctr@osd.mil The DoD Office of Security Review has cleared this report
More informationMicrosoft SharePoint Server 2013 Plan, Configure & Manage
Microsoft SharePoint Server 2013 Plan, Configure & Manage Course 20331-20332B 5 Days Instructor-led, Hands on Course Information This five day instructor-led course omits the overlap and redundancy that
More informationIBM Advantage: IBM Watson Compare and Comply Element Classification
IBM Advantage: IBM Watson Compare and Comply Element Classification Executive overview... 1 Introducing Watson Compare and Comply... 2 Definitions... 3 Element Classification insights... 4 Sample use cases...
More informationNetwrix Auditor. Know Your Data. Protect What Matters. Roy Lopez Solutions Engineer
Netwrix Auditor Know Your Data. Protect What Matters. Roy Lopez Solutions Engineer Agenda Company overview Briefly about Netwrix Auditor Netwrix Auditor Data Discovery and Classification Edition Product
More informationTransform Your Enterprise Search and ediscovery on the AWS Cloud.
Transform Your Enterprise Search and ediscovery on the AWS Cloud. Welcome Sheri Sullivan Senior Partner Marketing Manager Amazon Web Services Webinar Overview Submit Your Questions using the Q&A tool.
More informationGive Your DITA wings with taxonomy & modern web design. Joe Pairman
Give Your DITA wings with taxonomy & modern web design Joe Pairman What do we all want? What do we all want? ~ Free beer What do we all want? ~ Free beer ~ We want our content to be effective What do we
More informationEnterprise Knowledge Map: Toward Subject Centric Computing. March 21st, 2007 Dmitry Bogachev
Enterprise Knowledge Map: Toward Subject Centric Computing March 21st, 2007 Dmitry Bogachev Are we ready?...the idea of an application is an artificial one, convenient to the programmer but not to the
More informationPLUS. Checklist. 5 top tips. on content marketing. Marketing WHS HR Business Growth International Trade Legal
PLUS 5 top tips on content marketing Checklist Marketing WHS HR Business Growth International Trade Legal The ABCS SEO Checklist How are you performing with your SEO? Take our checklist and find out! Check
More informationMicro Focus Security Fortify Audit Assistant
White Paper Security Micro Focus Security Fortify Audit Assistant Table of Contents page Introduction... 1 Why Static Application Security Testing?............................................. 1 Confirmation
More informationA Survey Of Different Text Mining Techniques Varsha C. Pande 1 and Dr. A.S. Khandelwal 2
A Survey Of Different Text Mining Techniques Varsha C. Pande 1 and Dr. A.S. Khandelwal 2 1 Department of Electronics & Comp. Sc, RTMNU, Nagpur, India 2 Department of Computer Science, Hislop College, Nagpur,
More informationIntroduction to Data Mining and Data Analytics
1/28/2016 MIST.7060 Data Analytics 1 Introduction to Data Mining and Data Analytics What Are Data Mining and Data Analytics? Data mining is the process of discovering hidden patterns in data, where Patterns
More informationOpenText Buys Guidance Software
OpenText Buys Guidance Software September 14, 2017 NASDAQ: OTEX TSX: OTEX Safe Harbor Statement Certain statements in this presentation, including statements regarding OpenText's plans, objectives, expectations
More informationAVOIDING SILOED DATA AND SILOED DATA MANAGEMENT
AVOIDING SILOED DATA AND SILOED DATA MANAGEMENT Dalton Cervo Author, Consultant, Data Management Expert March 2016 This presentation contains extracts from books that are: Copyright 2011 John Wiley & Sons,
More informationRealizing the Army Net-Centric Data Strategy (ANCDS) in a Service Oriented Architecture (SOA)
Realizing the Army Net-Centric Data Strategy (ANCDS) in a Service Oriented Architecture (SOA) A presentation to GMU/AFCEA symposium "Critical Issues in C4I" Michelle Dirner, James Blalock, Eric Yuan National
More informationTechnical Brief: Domain Risk Score Proactively uncover threats using DNS and data science
Technical Brief: Domain Risk Score Proactively uncover threats using DNS and data science 310 Million + Current Domain Names 11 Billion+ Historical Domain Profiles 5 Million+ New Domain Profiles Daily
More informationProtecting Your SaaS Investment: Monitoring Office 365 Performance
Protecting Your SaaS Investment: Monitoring Office 365 Performance Utilizing the ExtraHop platform to ensure high performance from your Office 365 applications Achieving Higher Productivity and Business
More informationPart I: Data Mining Foundations
Table of Contents 1. Introduction 1 1.1. What is the World Wide Web? 1 1.2. A Brief History of the Web and the Internet 2 1.3. Web Data Mining 4 1.3.1. What is Data Mining? 6 1.3.2. What is Web Mining?
More informationSymantec Document Retention and Discovery
IT POLICY COMPLIANCE Symantec Document Retention and Discovery A state-of-the-art solution that simplifies the discovery of email and other files, enhances litigation readiness, and helps ensure compliance
More informationIntroduction p. 1 What is the World Wide Web? p. 1 A Brief History of the Web and the Internet p. 2 Web Data Mining p. 4 What is Data Mining? p.
Introduction p. 1 What is the World Wide Web? p. 1 A Brief History of the Web and the Internet p. 2 Web Data Mining p. 4 What is Data Mining? p. 6 What is Web Mining? p. 6 Summary of Chapters p. 8 How
More informationMDM Partner Summit 2015 Oracle Enterprise Data Quality Overview & Roadmap
MDM Partner Summit 2015 Oracle Enterprise Data Quality Overview & Roadmap Steve Tuck Senior Director, Product Strategy Todd Blackmon Senior Director, Sales Consulting David Gengenbach Sales Consultant
More informationHPE ControlPoint. Bill Manago, CRM IG Lead Solutions Consultant HPE Software
HPE ControlPoint Bill Manago, CRM IG Lead Solutions Consultant HPE Software Today s BIG Unstructured Data Challenges How do I reduce cost associated with IT and information processes? Information footprint
More informationRHM Presentation. Maas 360 Mobile device management
RHM Presentation Maas 360 Mobile device management Strong adoption in the enterprise Manufacturing Financial Consumer Healthcare Public Others 2 Trusted by over 9,000 customers Recognized Industry Leadership
More informationOverview. Data-mining. Commercial & Scientific Applications. Ongoing Research Activities. From Research to Technology Transfer
Data Mining George Karypis Department of Computer Science Digital Technology Center University of Minnesota, Minneapolis, USA. http://www.cs.umn.edu/~karypis karypis@cs.umn.edu Overview Data-mining What
More informationConvergence and Collaboration: Transforming Business Process and Workflows
Convergence and Collaboration: Transforming Business Process and Workflows Steven Hagan, Vice President, Server Technologies 1 Copyright 2011, Oracle and/or its affiliates. All rights Convergence & Collaboration:
More informationPopular SIEM vs aisiem
Popular SIEM vs aisiem You cannot flip a page in any Cybersecurity magazine, or scroll through security blogging sites without a mention of Next Gen SIEM. You can understand why traditional SIEM vendors
More informationTECHNOLOGY BRIEF: CA ERWIN DATA PROFILER. Combining Data Profiling and Data Modeling for Better Data Quality
TECHNOLOGY BRIEF: CA ERWIN DATA PROFILER Combining Data Profiling and Data Modeling for Better Data Quality Table of Contents Executive Summary SECTION 1: CHALLENGE 2 Reducing the Cost and Risk of Data
More informationCISM - Certified Information Security Manager. Course Outline. CISM - Certified Information Security Manager. 22 Mar
Course Outline CISM - Certified Information Security Manager 22 Mar 2019 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led
More informationMicrosoft FAST Search Server 2010 for SharePoint Evaluation Guide
Microsoft FAST Search Server 2010 for SharePoint Evaluation Guide 1 www.microsoft.com/sharepoint The information contained in this document represents the current view of Microsoft Corporation on the issues
More informationManagement Information Systems MANAGING THE DIGITAL FIRM, 12 TH EDITION FOUNDATIONS OF BUSINESS INTELLIGENCE: DATABASES AND INFORMATION MANAGEMENT
MANAGING THE DIGITAL FIRM, 12 TH EDITION Chapter 6 FOUNDATIONS OF BUSINESS INTELLIGENCE: DATABASES AND INFORMATION MANAGEMENT VIDEO CASES Case 1: Maruti Suzuki Business Intelligence and Enterprise Databases
More informationQ Information Security Market Landscape Study Learn how your peers plan for and purchase Information Security Technologies
Q1 2016 Information Security Market Landscape Study Learn how your peers plan for and purchase Information Security Technologies March 2016 About Ken Male Ken Male SVP and GM TechTarget Research Ken is
More informationBig Data Analytics: What is Big Data? Stony Brook University CSE545, Fall 2016 the inaugural edition
Big Data Analytics: What is Big Data? Stony Brook University CSE545, Fall 2016 the inaugural edition What s the BIG deal?! 2011 2011 2008 2010 2012 What s the BIG deal?! (Gartner Hype Cycle) What s the
More informationMaking a Business Case for Electronic Document or Records Management
Making a Business Case for Electronic Document or Records Management Building and maintaining an edms system is a significant investment in both tools and people. It requires on-going care and attention.
More informationSIEM: Five Requirements that Solve the Bigger Business Issues
SIEM: Five Requirements that Solve the Bigger Business Issues After more than a decade functioning in production environments, security information and event management (SIEM) solutions are now considered
More information10 STEPS TO BUILD UP A GOOD SEO
The SEO (search engine optimization) tools enable the company to improve their website s accessibility instantly and easily and to attain the top ranking in the search results. By typing any keyword, you
More informationManagement Information Systems Review Questions. Chapter 6 Foundations of Business Intelligence: Databases and Information Management
Management Information Systems Review Questions Chapter 6 Foundations of Business Intelligence: Databases and Information Management 1) The traditional file environment does not typically have a problem
More informationMaximizing the Value of STM Content through Semantic Enrichment. Frank Stumpf December 1, 2009
Maximizing the Value of STM Content through Semantic Enrichment Frank Stumpf December 1, 2009 What is Semantics and Semantic Processing? Content Knowledge Framework Technology Framework Search Text Images
More informationSensitive Data Loss is NOT Inevitable
Sensitive Data Loss is NOT Inevitable Dan Geer, CISO In-Q-Tel Featured Speaker Heidi Shey, Security Analyst, Forrester Research Agenda Introduction Time for a Change Dan Geer, In-Q-Tel How to Overcome
More informationArchiving Market Update
The Radicati Group, Inc. www.radicati.com Email Archiving Market Update A Radicati Group, Inc. Webconference The Radicati Group, Inc. Copyright September 2010, Reproduction Prohibited 9:30 am, PT September
More informationProject Management Learning & coaching User Adoption E-learning Governance Support
45 consultants Architecture Migrations Business Analysis Functional analysis Branding Development Project Management Learning & coaching User Adoption E-learning Governance Support POWER SharePoint Service
More informationMapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective
Mapping Your Requirements to the NIST Cybersecurity Framework Industry Perspective 1 Quest has the solutions and services to help your organization identify, protect, detect, respond and recover, better
More informationRun the business. Not the risks.
Run the business. Not the risks. RISK-RESILIENCE FOR THE DIGITAL BUSINESS Cyber-attacks are a known risk to business. Today, with enterprises becoming pervasively digital, these risks have grown multifold.
More informationSearch Engines. Charles Severance
Search Engines Charles Severance Google Architecture Web Crawling Index Building Searching http://infolab.stanford.edu/~backrub/google.html Google Search Google I/O '08 Keynote by Marissa Mayer Usablity
More informationProduct Overview Archive2Azure TM. Compliance Storage Solution Based on Microsoft Azure. From Archive360
Product Overview Compliance Storage Solution Based on Microsoft Azure From Archive360 1 Introduction The cloud has quickly become the preferred option for companies to help reverse the growing issues associated
More informationThings to consider when using Semantics in your Information Management strategy. Toby Conrad Smartlogic
Things to consider when using Semantics in your Information Management strategy Toby Conrad Smartlogic toby.conrad@smartlogic.com +1 773 251 0824 Some of Smartlogic s 250+ Customers Awards Trend Setting
More informationEmerging Technologies in Knowledge Management By Ramana Rao, CTO of Inxight Software, Inc.
Emerging Technologies in Knowledge Management By Ramana Rao, CTO of Inxight Software, Inc. This paper provides an overview of a presentation at the Internet Librarian International conference in London
More informationSecurity Compliance and Data Governance: Dual problems, single solution CON8015
Security Compliance and Data Governance: Dual problems, single solution CON8015 David Wolf Director of Product Management Oracle Development, Enterprise Manager Steve Ries Senior Systems Architect Technology
More informationHybrid IT for SMBs. HPE addressing SMB and channel partner Hybrid IT demands ANALYST ANURAG AGRAWAL REPORT : HPE. October 2018
V REPORT : HPE Hybrid IT for SMBs HPE addressing SMB and channel partner Hybrid IT demands October 2018 ANALYST ANURAG AGRAWAL Data You Can Rely On Analysis You Can Act Upon HPE addressing SMB and partner
More informationTaxonomy Tools: Collaboration, Creation & Integration. Dow Jones & Company
Taxonomy Tools: Collaboration, Creation & Integration Dave Clarke Global Taxonomy Director dave.clarke@dowjones.com Dow Jones & Company Introduction Software Tools for Taxonomy 1. Collaboration 2. Creation
More informationGain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services
Solution Overview Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services OPTIMIZE YOUR CLOUD SERVICES TO DRIVE BETTER BUSINESS OUTCOMES Reduce Cloud Business Risks and Costs
More informationMicrosoft SharePoint Online for Administrators
1800 ULEARN (853 276) www.ddls.com.au Microsoft 55238 - SharePoint Online for Administrators Length 3 days Price $2750.00 (inc GST) Version A Overview This course will introduce the audience to SharePoint
More informationEnabling Data Governance Leveraging Critical Data Elements
Adaptive Presentation at DAMA-NYC October 19 th, 2017 Enabling Data Governance Leveraging Critical Data Elements Jeff Goins, President, Jeff.goins@adaptive.com James Cerrato, Chief, Product Evangelist,
More informationGLOBAL PKI TRENDS STUDY
2018 GLOBAL PKI TRENDS STUDY Sponsored by Thales esecurity Independently conducted by Ponemon Institute LLC SEPTEMBER 2018 EXECUTIVE SUMMARY #2018GlobalPKI Mi Ponemon Institute is pleased to present the
More informationCISM - Certified Information Security Manager. Course Outline. CISM - Certified Information Security Manager.
Course Outline CISM - Certified Information Security Manager 20 Nov 2017 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led
More informationSecurity Metrics Establishing unambiguous and logically defensible security metrics. Steven Piliero CSO The Center for Internet Security
Security Metrics Establishing unambiguous and logically defensible security metrics Steven Piliero CSO The Center for Internet Security The Center for Internet Security (CIS) Formed - October 2000 As a
More informationINTELLIGENCE DRIVEN GRC FOR SECURITY
INTELLIGENCE DRIVEN GRC FOR SECURITY OVERVIEW Organizations today strive to keep their business and technology infrastructure organized, controllable, and understandable, not only to have the ability to
More informationEnvision IT Office 365 Productivity Series Experience, Branding and Navigation. June 24, 2015
Envision IT Office 365 Productivity Series Experience, Branding and Navigation June 24, 2015 Peter Carson President, Envision IT SharePoint MVP Microsoft Canada Partner Seller peter@envisionit.com http://blog.petercarson.ca
More informationDATACENTER SERVICES DATACENTER
SERVICES SOLUTION SUMMARY ALL CHANGE React, grow and innovate faster with Computacenter s agile infrastructure services Customers expect an always-on, superfast response. Businesses need to release new
More informationSemantics, Metadata and Identifying Master Data
Semantics, Metadata and Identifying Master Data A DataFlux White Paper Prepared by: David Loshin, President, Knowledge Integrity, Inc. Once you have determined that your organization can achieve the benefits
More informationGoogle Analytics. powerful simplicity, practical insight
Google Analytics powerful simplicity, practical insight 1 Overview Google Analytics Improve your site and increase marketing ROI Free, hosted web analytics service View over 80+ reports online, for download,
More informationSEARCHMETRICS WHITEPAPER RANKING FACTORS Targeted Analysis for more Success on Google and in your Online Market
2018 SEARCHMETRICS WHITEPAPER RANKING FACTORS 2018 Targeted for more Success on Google and in your Online Market Table of Contents Introduction: Why ranking factors for niches?... 3 Methodology: Which
More informationAccelerate your Azure Hybrid Cloud Business with HPE. Ken Won, HPE Director, Cloud Product Marketing
Accelerate your Azure Hybrid Cloud Business with HPE Ken Won, HPE Director, Cloud Product Marketing Mega trend: Customers are increasingly buying cloud services from external service providers Speed of
More informationIt s not about technology it s about people!
It s not about technology it s about people! BCS Search Solutions 2012 Intranet Focus Ltd Martin White Managing Director, Intranet Focus Ltd. martin.white@intranetfocus.com @intranetfocus About me Chemist
More informationFoundations. The Golden Record is Not Enough: The Case For Data Orchestration. CPDAs Highly Recommend
Foundations Journal of the Professional Petroleum Data Management Association Print: ISSN 2368-7533 - Online: ISSN 2368-7541 Volume 2 Issue 3 4Q2015 The Golden Record is Not Enough: The Case For Data Orchestration
More informationSeven Decision Points When Considering Containers
Market Guide Seven Decision Points When Considering Containers A Continuum of Deployment Choices More than ever, developers and systems architects have a range of choices when it comes to deploying applications,
More informationNoam Ikar R&DVP. Complex Event Processing and Situational Awareness in the Digital Age
Noam Ikar R&DVP Complex Event Processing and Situational Awareness in the Digital Age We need to correlate events from inside and outside the organization by a smart layer Cyberint CEO, Dec 2017. Wikipedia
More informationNCHRP Project 20-97: Improving Findability and Relevance of Transportation Information. Part I: Project Overview Gordon Kennedy, Washington State DOT
NCHRP Project 20-97: Improving Findability and Relevance of Transportation Information Part I: Project Overview Gordon Kennedy, Washington State DOT November, 2017 NCHRP is a State-Driven Program Sponsored
More informationDATA MINING - 1DL105, 1DL111
1 DATA MINING - 1DL105, 1DL111 Fall 2007 An introductory class in data mining http://user.it.uu.se/~udbl/dut-ht2007/ alt. http://www.it.uu.se/edu/course/homepage/infoutv/ht07 Kjell Orsborn Uppsala Database
More informationSEPTEMBER 2018
www.prismlit.com SEPTEMBER 2018 Don t Stop Believin : The Staying Power of Search Term Optimization Since the first model T rolled off of Henry Ford s assembly line, all cars have been made with a steering
More informationMaster Data Management And Data Governance 2 E
We have made it easy for you to find a PDF Ebooks without any digging. And by having access to our ebooks online or by storing it on your computer, you have convenient answers with master data management
More informationClickLearn Studio. - A technical guide 9/18/2017
ClickLearn Studio - A technical guide 9/18/2017 All products and companies mentioned in this document are or may be registered trademarks of their respective companies or owners. ClickLearn ApS reserves
More information