SlideShare a Scribd company logo
From Insights to
Outcomes and Beyond
Nick Millman @MillmanNick
#AccentureDigiUK
Copyright © 2014 Accenture All rights reserved. 2
Driving exponential business benefits from analytics
Copyright © 2014 Accenture All rights reserved. 2
Copyright © 2014 Accenture All rights reserved. 3
Key technology
trends are enabling
the analytics
revolution
Copyright © 2014 Accenture All rights reserved. 3
Source: Accenture Technology Vision 2014
Copyright © 2014 Accenture All rights reserved. 4Copyright © 2014 Accenture All rights reserved. 4
Data Supply Chain
Copyright © 2014 Accenture All rights reserved. 5Copyright © 2014 Accenture All rights reserved. 5
Digital-Physical Blur
Copyright © 2014 Accenture All rights reserved. 6Copyright © 2014 Accenture All rights reserved. 6
Workforce to
Crowdsource
Copyright © 2014 Accenture All rights reserved. 7
Technology won’t be sufficient to drive ROI
Data ownership Analytical talent Decision making culture
Copyright © 2014 Accenture. All rights reserved. 8
Gang Members To Focus on
before they Commit a Violent Crime
Intervention (With Partners),
Disruption & Mediation
Prevent Violent
Crime
5 years intelligence data
and crime history from
police systems on each
known gang member
The Accenture and Metropolitan Police Service pilot
aims to identify a number of high risk gang members
Copyright © 2014 Accenture. All rights reserved. 9
The predictive analytics model generates a
list of high-risk individuals who are most
likely to commit a violent crime
Copyright © 2014 Accenture. All rights reserved. 10
We do this by creating a view of each gang member
over time and ‘isolating the signals from the noise’.
crime
prediction
window
The individuals most likely to
commit a violent crime will
come from this group of high
risk individuals
Intel suggests they
carry a knife
Suspected of ABHStopped & Searched
near stabbing area
Reported missing
Seen with gang
members
Stopped & Searched
for passing an item
Not cooperating with
Police investigation
High impact crime predictor Low impact crime predictor
Witness of a crime
Intel suggest
involved in drugs
March May JuneApril
Copyright © 2014 Accenture All rights reserved. 11Copyright © 2014 Accenture All rights reserved. 11
Join the conversation
@MillmanNick
#AccentureDigiUK

More Related Content

Similar to From insights to outcomes, and beyond - Nick Millman, Accenture

April 2015 Webinar: Cyber Hunting with Sqrrl
April 2015 Webinar: Cyber Hunting with SqrrlApril 2015 Webinar: Cyber Hunting with Sqrrl
April 2015 Webinar: Cyber Hunting with Sqrrl
Sqrrl
 
Crime
CrimeCrime
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
IJARIIT
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
accenture
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
Accenture Technology
 
Leveraging Threat Intelligence to Guide Your Hunts
Leveraging Threat Intelligence to Guide Your HuntsLeveraging Threat Intelligence to Guide Your Hunts
Leveraging Threat Intelligence to Guide Your Hunts
Sqrrl
 
Taking Big Data Visually
Taking Big Data VisuallyTaking Big Data Visually
Taking Big Data Visually
CharlesSayers.com
 
Webinar: CYREN WebSecurity for Healthcare
Webinar: CYREN WebSecurity for HealthcareWebinar: CYREN WebSecurity for Healthcare
Webinar: CYREN WebSecurity for Healthcare
Cyren, Inc
 
ICISS Newsletter April 14
ICISS Newsletter April 14ICISS Newsletter April 14
ICISS Newsletter April 14
Capt SB Tyagi, COAC'CC*,FISM,CSC,
 
Ashish sonal_mumbai
Ashish sonal_mumbaiAshish sonal_mumbai
Ashish sonal_mumbai
IPPAI
 
Ashish sonal
Ashish sonalAshish sonal
Ashish sonal
IPPAI
 
Modernizing Your SOC: A CISO-led Training
Modernizing Your SOC: A CISO-led TrainingModernizing Your SOC: A CISO-led Training
Modernizing Your SOC: A CISO-led Training
Sqrrl
 
Data Science and Smart Systems: Creating the Digital Brain
Data Science and Smart Systems: Creating the Digital Brain Data Science and Smart Systems: Creating the Digital Brain
Data Science and Smart Systems: Creating the Digital Brain
VMware Tanzu
 
Adjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New NormalAdjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New Normal
Priyanka Aash
 
Anatomy of the Compromised Insider
Anatomy of the Compromised InsiderAnatomy of the Compromised Insider
Anatomy of the Compromised Insider
Imperva
 
Online crime investigation
Online crime investigationOnline crime investigation
Online crime investigation
Data Source
 
Fast Data:The Rebirth of Streaming Analytics
Fast Data:The Rebirth of Streaming AnalyticsFast Data:The Rebirth of Streaming Analytics
Fast Data:The Rebirth of Streaming Analytics
Tony Baer
 
Introduction-to-Cybercrime-Investigation(1).pptx
Introduction-to-Cybercrime-Investigation(1).pptxIntroduction-to-Cybercrime-Investigation(1).pptx
Introduction-to-Cybercrime-Investigation(1).pptx
Olusegun Mosugu
 
Steven Greschner - About Me
Steven Greschner  - About MeSteven Greschner  - About Me
Steven Greschner - About Me
NextNet Partners
 
Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]
Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]
Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]
Interset
 

Similar to From insights to outcomes, and beyond - Nick Millman, Accenture (20)

April 2015 Webinar: Cyber Hunting with Sqrrl
April 2015 Webinar: Cyber Hunting with SqrrlApril 2015 Webinar: Cyber Hunting with Sqrrl
April 2015 Webinar: Cyber Hunting with Sqrrl
 
Crime
CrimeCrime
Crime
 
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
 
Leveraging Threat Intelligence to Guide Your Hunts
Leveraging Threat Intelligence to Guide Your HuntsLeveraging Threat Intelligence to Guide Your Hunts
Leveraging Threat Intelligence to Guide Your Hunts
 
Taking Big Data Visually
Taking Big Data VisuallyTaking Big Data Visually
Taking Big Data Visually
 
Webinar: CYREN WebSecurity for Healthcare
Webinar: CYREN WebSecurity for HealthcareWebinar: CYREN WebSecurity for Healthcare
Webinar: CYREN WebSecurity for Healthcare
 
ICISS Newsletter April 14
ICISS Newsletter April 14ICISS Newsletter April 14
ICISS Newsletter April 14
 
Ashish sonal_mumbai
Ashish sonal_mumbaiAshish sonal_mumbai
Ashish sonal_mumbai
 
Ashish sonal
Ashish sonalAshish sonal
Ashish sonal
 
Modernizing Your SOC: A CISO-led Training
Modernizing Your SOC: A CISO-led TrainingModernizing Your SOC: A CISO-led Training
Modernizing Your SOC: A CISO-led Training
 
Data Science and Smart Systems: Creating the Digital Brain
Data Science and Smart Systems: Creating the Digital Brain Data Science and Smart Systems: Creating the Digital Brain
Data Science and Smart Systems: Creating the Digital Brain
 
Adjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New NormalAdjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New Normal
 
Anatomy of the Compromised Insider
Anatomy of the Compromised InsiderAnatomy of the Compromised Insider
Anatomy of the Compromised Insider
 
Online crime investigation
Online crime investigationOnline crime investigation
Online crime investigation
 
Fast Data:The Rebirth of Streaming Analytics
Fast Data:The Rebirth of Streaming AnalyticsFast Data:The Rebirth of Streaming Analytics
Fast Data:The Rebirth of Streaming Analytics
 
Introduction-to-Cybercrime-Investigation(1).pptx
Introduction-to-Cybercrime-Investigation(1).pptxIntroduction-to-Cybercrime-Investigation(1).pptx
Introduction-to-Cybercrime-Investigation(1).pptx
 
Steven Greschner - About Me
Steven Greschner  - About MeSteven Greschner  - About Me
Steven Greschner - About Me
 
Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]
Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]
Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]
 

More from Internet World

IBM's big data seminar programme -moving beyond Hadoop - Ian Radmore, IBM
IBM's big data seminar programme -moving beyond Hadoop - Ian Radmore, IBMIBM's big data seminar programme -moving beyond Hadoop - Ian Radmore, IBM
IBM's big data seminar programme -moving beyond Hadoop - Ian Radmore, IBM
Internet World
 
IBM's big data seminar programme- the case for big data & analytics - Gareth ...
IBM's big data seminar programme- the case for big data & analytics - Gareth ...IBM's big data seminar programme- the case for big data & analytics - Gareth ...
IBM's big data seminar programme- the case for big data & analytics - Gareth ...
Internet World
 
Elastic Search Meetup Special - Yann Cluchey, Cogenta
Elastic Search Meetup Special - Yann Cluchey, Cogenta Elastic Search Meetup Special - Yann Cluchey, Cogenta
Elastic Search Meetup Special - Yann Cluchey, Cogenta
Internet World
 
How to raise venture capital & the First Tuesday Award 2014
How to raise venture capital & the First Tuesday Award 2014How to raise venture capital & the First Tuesday Award 2014
How to raise venture capital & the First Tuesday Award 2014
Internet World
 
Unreasonable learning - Shane Hill, Skoolbo
Unreasonable learning - Shane Hill, SkoolboUnreasonable learning - Shane Hill, Skoolbo
Unreasonable learning - Shane Hill, Skoolbo
Internet World
 
London's tech scene's at a critical point - Alex Wood, Tech City News
London's tech scene's at a critical point - Alex Wood, Tech City NewsLondon's tech scene's at a critical point - Alex Wood, Tech City News
London's tech scene's at a critical point - Alex Wood, Tech City News
Internet World
 
Free:Formers CODE:OFF
Free:Formers CODE:OFF Free:Formers CODE:OFF
Free:Formers CODE:OFF
Internet World
 
What the Internet of Things means for the mobile enterprise - Ian Evans, AirW...
What the Internet of Things means for the mobile enterprise - Ian Evans, AirW...What the Internet of Things means for the mobile enterprise - Ian Evans, AirW...
What the Internet of Things means for the mobile enterprise - Ian Evans, AirW...
Internet World
 
Have your cake and eat it too: adopting technologies without sacrificing - Pa...
Have your cake and eat it too: adopting technologies without sacrificing - Pa...Have your cake and eat it too: adopting technologies without sacrificing - Pa...
Have your cake and eat it too: adopting technologies without sacrificing - Pa...
Internet World
 
Business Networking Hacks in Today’s Connected World - Marian Gazdik, Startup...
Business Networking Hacks in Today’s Connected World - Marian Gazdik, Startup...Business Networking Hacks in Today’s Connected World - Marian Gazdik, Startup...
Business Networking Hacks in Today’s Connected World - Marian Gazdik, Startup...
Internet World
 
What IT capacity planning can learn from manufacturing's just-in-time models ...
What IT capacity planning can learn from manufacturing's just-in-time models ...What IT capacity planning can learn from manufacturing's just-in-time models ...
What IT capacity planning can learn from manufacturing's just-in-time models ...
Internet World
 
How personal data has changed and what this means for businesses looking forw...
How personal data has changed and what this means for businesses looking forw...How personal data has changed and what this means for businesses looking forw...
How personal data has changed and what this means for businesses looking forw...
Internet World
 
The database of you - Andy Caddy, Virgin Active Health Clubs
The database of you - Andy Caddy, Virgin Active Health ClubsThe database of you - Andy Caddy, Virgin Active Health Clubs
The database of you - Andy Caddy, Virgin Active Health Clubs
Internet World
 
Using big data to find out what women want - John Lervik, Cxense
Using big data to find out what women want - John Lervik, CxenseUsing big data to find out what women want - John Lervik, Cxense
Using big data to find out what women want - John Lervik, Cxense
Internet World
 
Relevance = Revenue - PK Vaish, Copernica
Relevance = Revenue - PK Vaish, CopernicaRelevance = Revenue - PK Vaish, Copernica
Relevance = Revenue - PK Vaish, Copernica
Internet World
 
How to drive e-commerce sales with content marketing - David Bowen, EPiServer
How to drive e-commerce sales with content marketing - David Bowen, EPiServerHow to drive e-commerce sales with content marketing - David Bowen, EPiServer
How to drive e-commerce sales with content marketing - David Bowen, EPiServer
Internet World
 
Innovation at Tesco - Angela Maurer, Tesco
Innovation at Tesco - Angela Maurer, TescoInnovation at Tesco - Angela Maurer, Tesco
Innovation at Tesco - Angela Maurer, Tesco
Internet World
 
Responsive Web Design: Advantages & Best Practice - Darrin Adams, Cantarus
Responsive Web Design: Advantages & Best Practice - Darrin Adams, CantarusResponsive Web Design: Advantages & Best Practice - Darrin Adams, Cantarus
Responsive Web Design: Advantages & Best Practice - Darrin Adams, Cantarus
Internet World
 
Offline Direct Marketing for Mobile Marketeers - Sam Heaton, Stannp
Offline Direct Marketing for Mobile Marketeers - Sam Heaton, StannpOffline Direct Marketing for Mobile Marketeers - Sam Heaton, Stannp
Offline Direct Marketing for Mobile Marketeers - Sam Heaton, Stannp
Internet World
 
How to drive mobile traffic to your local stores? - Bruno Berthezene, Solocal...
How to drive mobile traffic to your local stores? - Bruno Berthezene, Solocal...How to drive mobile traffic to your local stores? - Bruno Berthezene, Solocal...
How to drive mobile traffic to your local stores? - Bruno Berthezene, Solocal...
Internet World
 

More from Internet World (20)

IBM's big data seminar programme -moving beyond Hadoop - Ian Radmore, IBM
IBM's big data seminar programme -moving beyond Hadoop - Ian Radmore, IBMIBM's big data seminar programme -moving beyond Hadoop - Ian Radmore, IBM
IBM's big data seminar programme -moving beyond Hadoop - Ian Radmore, IBM
 
IBM's big data seminar programme- the case for big data & analytics - Gareth ...
IBM's big data seminar programme- the case for big data & analytics - Gareth ...IBM's big data seminar programme- the case for big data & analytics - Gareth ...
IBM's big data seminar programme- the case for big data & analytics - Gareth ...
 
Elastic Search Meetup Special - Yann Cluchey, Cogenta
Elastic Search Meetup Special - Yann Cluchey, Cogenta Elastic Search Meetup Special - Yann Cluchey, Cogenta
Elastic Search Meetup Special - Yann Cluchey, Cogenta
 
How to raise venture capital & the First Tuesday Award 2014
How to raise venture capital & the First Tuesday Award 2014How to raise venture capital & the First Tuesday Award 2014
How to raise venture capital & the First Tuesday Award 2014
 
Unreasonable learning - Shane Hill, Skoolbo
Unreasonable learning - Shane Hill, SkoolboUnreasonable learning - Shane Hill, Skoolbo
Unreasonable learning - Shane Hill, Skoolbo
 
London's tech scene's at a critical point - Alex Wood, Tech City News
London's tech scene's at a critical point - Alex Wood, Tech City NewsLondon's tech scene's at a critical point - Alex Wood, Tech City News
London's tech scene's at a critical point - Alex Wood, Tech City News
 
Free:Formers CODE:OFF
Free:Formers CODE:OFF Free:Formers CODE:OFF
Free:Formers CODE:OFF
 
What the Internet of Things means for the mobile enterprise - Ian Evans, AirW...
What the Internet of Things means for the mobile enterprise - Ian Evans, AirW...What the Internet of Things means for the mobile enterprise - Ian Evans, AirW...
What the Internet of Things means for the mobile enterprise - Ian Evans, AirW...
 
Have your cake and eat it too: adopting technologies without sacrificing - Pa...
Have your cake and eat it too: adopting technologies without sacrificing - Pa...Have your cake and eat it too: adopting technologies without sacrificing - Pa...
Have your cake and eat it too: adopting technologies without sacrificing - Pa...
 
Business Networking Hacks in Today’s Connected World - Marian Gazdik, Startup...
Business Networking Hacks in Today’s Connected World - Marian Gazdik, Startup...Business Networking Hacks in Today’s Connected World - Marian Gazdik, Startup...
Business Networking Hacks in Today’s Connected World - Marian Gazdik, Startup...
 
What IT capacity planning can learn from manufacturing's just-in-time models ...
What IT capacity planning can learn from manufacturing's just-in-time models ...What IT capacity planning can learn from manufacturing's just-in-time models ...
What IT capacity planning can learn from manufacturing's just-in-time models ...
 
How personal data has changed and what this means for businesses looking forw...
How personal data has changed and what this means for businesses looking forw...How personal data has changed and what this means for businesses looking forw...
How personal data has changed and what this means for businesses looking forw...
 
The database of you - Andy Caddy, Virgin Active Health Clubs
The database of you - Andy Caddy, Virgin Active Health ClubsThe database of you - Andy Caddy, Virgin Active Health Clubs
The database of you - Andy Caddy, Virgin Active Health Clubs
 
Using big data to find out what women want - John Lervik, Cxense
Using big data to find out what women want - John Lervik, CxenseUsing big data to find out what women want - John Lervik, Cxense
Using big data to find out what women want - John Lervik, Cxense
 
Relevance = Revenue - PK Vaish, Copernica
Relevance = Revenue - PK Vaish, CopernicaRelevance = Revenue - PK Vaish, Copernica
Relevance = Revenue - PK Vaish, Copernica
 
How to drive e-commerce sales with content marketing - David Bowen, EPiServer
How to drive e-commerce sales with content marketing - David Bowen, EPiServerHow to drive e-commerce sales with content marketing - David Bowen, EPiServer
How to drive e-commerce sales with content marketing - David Bowen, EPiServer
 
Innovation at Tesco - Angela Maurer, Tesco
Innovation at Tesco - Angela Maurer, TescoInnovation at Tesco - Angela Maurer, Tesco
Innovation at Tesco - Angela Maurer, Tesco
 
Responsive Web Design: Advantages & Best Practice - Darrin Adams, Cantarus
Responsive Web Design: Advantages & Best Practice - Darrin Adams, CantarusResponsive Web Design: Advantages & Best Practice - Darrin Adams, Cantarus
Responsive Web Design: Advantages & Best Practice - Darrin Adams, Cantarus
 
Offline Direct Marketing for Mobile Marketeers - Sam Heaton, Stannp
Offline Direct Marketing for Mobile Marketeers - Sam Heaton, StannpOffline Direct Marketing for Mobile Marketeers - Sam Heaton, Stannp
Offline Direct Marketing for Mobile Marketeers - Sam Heaton, Stannp
 
How to drive mobile traffic to your local stores? - Bruno Berthezene, Solocal...
How to drive mobile traffic to your local stores? - Bruno Berthezene, Solocal...How to drive mobile traffic to your local stores? - Bruno Berthezene, Solocal...
How to drive mobile traffic to your local stores? - Bruno Berthezene, Solocal...
 

Recently uploaded

Build applications with generative AI on Google Cloud
Build applications with generative AI on Google CloudBuild applications with generative AI on Google Cloud
Build applications with generative AI on Google Cloud
Márton Kodok
 
一比一原版南昆士兰大学毕业证如何办理
一比一原版南昆士兰大学毕业证如何办理一比一原版南昆士兰大学毕业证如何办理
一比一原版南昆士兰大学毕业证如何办理
ugydym
 
Template xxxxxxxx ssssssssssss Sertifikat.pptx
Template xxxxxxxx ssssssssssss Sertifikat.pptxTemplate xxxxxxxx ssssssssssss Sertifikat.pptx
Template xxxxxxxx ssssssssssss Sertifikat.pptx
TeukuEriSyahputra
 
一比一原版(UofT毕业证)多伦多大学毕业证如何办理
一比一原版(UofT毕业证)多伦多大学毕业证如何办理一比一原版(UofT毕业证)多伦多大学毕业证如何办理
一比一原版(UofT毕业证)多伦多大学毕业证如何办理
exukyp
 
一比一原版加拿大麦吉尔大学毕业证(mcgill毕业证书)如何办理
一比一原版加拿大麦吉尔大学毕业证(mcgill毕业证书)如何办理一比一原版加拿大麦吉尔大学毕业证(mcgill毕业证书)如何办理
一比一原版加拿大麦吉尔大学毕业证(mcgill毕业证书)如何办理
agdhot
 
[VCOSA] Monthly Report - Cotton & Yarn Statistics March 2024
[VCOSA] Monthly Report - Cotton & Yarn Statistics March 2024[VCOSA] Monthly Report - Cotton & Yarn Statistics March 2024
[VCOSA] Monthly Report - Cotton & Yarn Statistics March 2024
Vietnam Cotton & Spinning Association
 
一比一原版莱斯大学毕业证(rice毕业证)如何办理
一比一原版莱斯大学毕业证(rice毕业证)如何办理一比一原版莱斯大学毕业证(rice毕业证)如何办理
一比一原版莱斯大学毕业证(rice毕业证)如何办理
zsafxbf
 
Cell The Unit of Life for NEET Multiple Choice Questions.docx
Cell The Unit of Life for NEET Multiple Choice Questions.docxCell The Unit of Life for NEET Multiple Choice Questions.docx
Cell The Unit of Life for NEET Multiple Choice Questions.docx
vasanthatpuram
 
一比一原版(uob毕业证书)伯明翰大学毕业证如何办理
一比一原版(uob毕业证书)伯明翰大学毕业证如何办理一比一原版(uob毕业证书)伯明翰大学毕业证如何办理
一比一原版(uob毕业证书)伯明翰大学毕业证如何办理
9gr6pty
 
一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理
bmucuha
 
Open Source Contributions to Postgres: The Basics POSETTE 2024
Open Source Contributions to Postgres: The Basics POSETTE 2024Open Source Contributions to Postgres: The Basics POSETTE 2024
Open Source Contributions to Postgres: The Basics POSETTE 2024
ElizabethGarrettChri
 
一比一原版爱尔兰都柏林大学毕业证(本硕)ucd学位证书如何办理
一比一原版爱尔兰都柏林大学毕业证(本硕)ucd学位证书如何办理一比一原版爱尔兰都柏林大学毕业证(本硕)ucd学位证书如何办理
一比一原版爱尔兰都柏林大学毕业证(本硕)ucd学位证书如何办理
hqfek
 
A gentle exploration of Retrieval Augmented Generation
A gentle exploration of Retrieval Augmented GenerationA gentle exploration of Retrieval Augmented Generation
A gentle exploration of Retrieval Augmented Generation
dataschool1
 
Data Scientist Machine Learning Profiles .pdf
Data Scientist Machine Learning  Profiles .pdfData Scientist Machine Learning  Profiles .pdf
Data Scientist Machine Learning Profiles .pdf
Vineet
 
Sample Devops SRE Product Companies .pdf
Sample Devops SRE  Product Companies .pdfSample Devops SRE  Product Companies .pdf
Sample Devops SRE Product Companies .pdf
Vineet
 
一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理
一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理
一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理
hyfjgavov
 
原版一比一多伦多大学毕业证(UofT毕业证书)如何办理
原版一比一多伦多大学毕业证(UofT毕业证书)如何办理原版一比一多伦多大学毕业证(UofT毕业证书)如何办理
原版一比一多伦多大学毕业证(UofT毕业证书)如何办理
mkkikqvo
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
uevausa
 
How To Control IO Usage using Resource Manager
How To Control IO Usage using Resource ManagerHow To Control IO Usage using Resource Manager
How To Control IO Usage using Resource Manager
Alireza Kamrani
 
DSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelinesDSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelines
Timothy Spann
 

Recently uploaded (20)

Build applications with generative AI on Google Cloud
Build applications with generative AI on Google CloudBuild applications with generative AI on Google Cloud
Build applications with generative AI on Google Cloud
 
一比一原版南昆士兰大学毕业证如何办理
一比一原版南昆士兰大学毕业证如何办理一比一原版南昆士兰大学毕业证如何办理
一比一原版南昆士兰大学毕业证如何办理
 
Template xxxxxxxx ssssssssssss Sertifikat.pptx
Template xxxxxxxx ssssssssssss Sertifikat.pptxTemplate xxxxxxxx ssssssssssss Sertifikat.pptx
Template xxxxxxxx ssssssssssss Sertifikat.pptx
 
一比一原版(UofT毕业证)多伦多大学毕业证如何办理
一比一原版(UofT毕业证)多伦多大学毕业证如何办理一比一原版(UofT毕业证)多伦多大学毕业证如何办理
一比一原版(UofT毕业证)多伦多大学毕业证如何办理
 
一比一原版加拿大麦吉尔大学毕业证(mcgill毕业证书)如何办理
一比一原版加拿大麦吉尔大学毕业证(mcgill毕业证书)如何办理一比一原版加拿大麦吉尔大学毕业证(mcgill毕业证书)如何办理
一比一原版加拿大麦吉尔大学毕业证(mcgill毕业证书)如何办理
 
[VCOSA] Monthly Report - Cotton & Yarn Statistics March 2024
[VCOSA] Monthly Report - Cotton & Yarn Statistics March 2024[VCOSA] Monthly Report - Cotton & Yarn Statistics March 2024
[VCOSA] Monthly Report - Cotton & Yarn Statistics March 2024
 
一比一原版莱斯大学毕业证(rice毕业证)如何办理
一比一原版莱斯大学毕业证(rice毕业证)如何办理一比一原版莱斯大学毕业证(rice毕业证)如何办理
一比一原版莱斯大学毕业证(rice毕业证)如何办理
 
Cell The Unit of Life for NEET Multiple Choice Questions.docx
Cell The Unit of Life for NEET Multiple Choice Questions.docxCell The Unit of Life for NEET Multiple Choice Questions.docx
Cell The Unit of Life for NEET Multiple Choice Questions.docx
 
一比一原版(uob毕业证书)伯明翰大学毕业证如何办理
一比一原版(uob毕业证书)伯明翰大学毕业证如何办理一比一原版(uob毕业证书)伯明翰大学毕业证如何办理
一比一原版(uob毕业证书)伯明翰大学毕业证如何办理
 
一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理
 
Open Source Contributions to Postgres: The Basics POSETTE 2024
Open Source Contributions to Postgres: The Basics POSETTE 2024Open Source Contributions to Postgres: The Basics POSETTE 2024
Open Source Contributions to Postgres: The Basics POSETTE 2024
 
一比一原版爱尔兰都柏林大学毕业证(本硕)ucd学位证书如何办理
一比一原版爱尔兰都柏林大学毕业证(本硕)ucd学位证书如何办理一比一原版爱尔兰都柏林大学毕业证(本硕)ucd学位证书如何办理
一比一原版爱尔兰都柏林大学毕业证(本硕)ucd学位证书如何办理
 
A gentle exploration of Retrieval Augmented Generation
A gentle exploration of Retrieval Augmented GenerationA gentle exploration of Retrieval Augmented Generation
A gentle exploration of Retrieval Augmented Generation
 
Data Scientist Machine Learning Profiles .pdf
Data Scientist Machine Learning  Profiles .pdfData Scientist Machine Learning  Profiles .pdf
Data Scientist Machine Learning Profiles .pdf
 
Sample Devops SRE Product Companies .pdf
Sample Devops SRE  Product Companies .pdfSample Devops SRE  Product Companies .pdf
Sample Devops SRE Product Companies .pdf
 
一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理
一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理
一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理
 
原版一比一多伦多大学毕业证(UofT毕业证书)如何办理
原版一比一多伦多大学毕业证(UofT毕业证书)如何办理原版一比一多伦多大学毕业证(UofT毕业证书)如何办理
原版一比一多伦多大学毕业证(UofT毕业证书)如何办理
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
 
How To Control IO Usage using Resource Manager
How To Control IO Usage using Resource ManagerHow To Control IO Usage using Resource Manager
How To Control IO Usage using Resource Manager
 
DSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelinesDSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelines
 

From insights to outcomes, and beyond - Nick Millman, Accenture

  • 1. From Insights to Outcomes and Beyond Nick Millman @MillmanNick #AccentureDigiUK
  • 2. Copyright © 2014 Accenture All rights reserved. 2 Driving exponential business benefits from analytics Copyright © 2014 Accenture All rights reserved. 2
  • 3. Copyright © 2014 Accenture All rights reserved. 3 Key technology trends are enabling the analytics revolution Copyright © 2014 Accenture All rights reserved. 3 Source: Accenture Technology Vision 2014
  • 4. Copyright © 2014 Accenture All rights reserved. 4Copyright © 2014 Accenture All rights reserved. 4 Data Supply Chain
  • 5. Copyright © 2014 Accenture All rights reserved. 5Copyright © 2014 Accenture All rights reserved. 5 Digital-Physical Blur
  • 6. Copyright © 2014 Accenture All rights reserved. 6Copyright © 2014 Accenture All rights reserved. 6 Workforce to Crowdsource
  • 7. Copyright © 2014 Accenture All rights reserved. 7 Technology won’t be sufficient to drive ROI Data ownership Analytical talent Decision making culture
  • 8. Copyright © 2014 Accenture. All rights reserved. 8 Gang Members To Focus on before they Commit a Violent Crime Intervention (With Partners), Disruption & Mediation Prevent Violent Crime 5 years intelligence data and crime history from police systems on each known gang member The Accenture and Metropolitan Police Service pilot aims to identify a number of high risk gang members
  • 9. Copyright © 2014 Accenture. All rights reserved. 9 The predictive analytics model generates a list of high-risk individuals who are most likely to commit a violent crime
  • 10. Copyright © 2014 Accenture. All rights reserved. 10 We do this by creating a view of each gang member over time and ‘isolating the signals from the noise’. crime prediction window The individuals most likely to commit a violent crime will come from this group of high risk individuals Intel suggests they carry a knife Suspected of ABHStopped & Searched near stabbing area Reported missing Seen with gang members Stopped & Searched for passing an item Not cooperating with Police investigation High impact crime predictor Low impact crime predictor Witness of a crime Intel suggest involved in drugs March May JuneApril
  • 11. Copyright © 2014 Accenture All rights reserved. 11Copyright © 2014 Accenture All rights reserved. 11 Join the conversation @MillmanNick #AccentureDigiUK