SlideShare a Scribd company logo
BlueImpact 
SMS 
SMS 
All trademarks, service marks, trade names, trade dress, product names and logos appearing in this presentation are the property 
of their respective owners.
What is BlueImpact? 
Citizens can use Social Media for Impact on Better 
Governance to report issues immediately. 
The idea behind: 
Most social or public issues go 
unreported because : 
• People don’t know how to report it. 
• People think its time consuming 
to report it and follow up. 
Consider this: 
• What if there was a simple and quick way to report issues? 
• What if we could harness social media like twitter and mobile solutions 
like SMS/call to address issues in the society?. 
• What if we could use people to help drive government programs?.
How does it work? 
Twitter. 
• Listens to twitter for registered hashtags. 
• Sends reply tweets and direct messages 
seeking additional info. 
SMS & Call 
• Receives SMS sent to a registered 
number. 
• Calls back the sender seeking more 
info. 
• Sends SMS replies seeking more info. 
Bluemix Cloud 
• Once required info is gathered, it is 
stored on the cloud. 
Curam 
• Creates intake cases in Curam 
Twitter 
SMS 
Call 
Blue Impact
Use case – Child Welfare 
Department 
REPORT CHILD ABUSE IMMEDIATELY 
TWEET TO: 
#BLUEIMPACT 
SMS TO: 
+15155124474
John & his wife are shopping in the mall. 
REPORT CHILD ABUSE 
TWEET TO: 
#BLUEIMPACT 
SMS TO: 
+15155124474 
They spot a girl with bruises on the face. 
John remembers seeing the poster and decides to tweet to the child welfare department.
John tweets to #blueimpact . John receives a reply requesting for more info. 
John sends a direct message with the requested additional info.
Blueimpact receives this information and registers a new intake case in 
Curam. All the tweet data is captured in the intake.
The intake details are sent to John in a twitter direct message to let him know 
that a case is registered and a case worker will look into the case.
Technical specifications
Use case 2– Child Welfare 
Department 
REPORT CHILD ABUSE IMMEDIATELY 
TWEET TO: 
#BLUEIMPACT 
SMS TO: 
+15155124474
John is not too familiar with twitter. So he decides to send an SMS to the number in the poster. 
John recieves a sms reply from the department with call ore reply options John decides to reply with call. 
John immediately recieves a call with a reset number of questions.
An intake case is registered in Curam with a link to the call recording. A case worker can listen to this recording and note 
down details about the abuse and work on the case
This intake case detail is then sent to John as a sms. John can follow up with the 
department using this case id
Technical specifications
Curam Integration 
A caseworker logs into the Curam application and find these intake cases created from BlueImpact. All the intake cases that are pending the case worker’s 
attention can be found easily on this dashboard. The caseworker picks up one of the intake. He can find all the details in the narrative text. Who sent this/ Where 
did it occur etc. The regular Curam case worker workflow continues.
Future enhancements 
• Send sms/twitter notifications to the curam 
caseworkers every time a new case is reported 
• Capture the location details. Run an analysis of 
where most of these abuse cases are reported. 
• Have targeted marketing of social welfare 
programs in those localities.
Other Use Cases that can be built 
• Bescom exposes a twitter handle 
#bescom and a mobile number to sms 
• Citizens can tweet to #bescom or send a 
sms when they are facing power 
outages. 
• Blueimpact listens to these tweets/sms. 
• Blueimpact can then send a sms/email 
notification to bescom officials to look into 
these issues. 
• The data captured by blueimpact can be 
used to run analysis reports.
Team BlueImpact 
Dinesh 
Kavitha 
Darshan 
Praveen 
Raghu
Thank you! 
We would like to hear from you. Please do write to us with your 
suggestions/questions/feedback. We can also provide a demo. 
Write to us at: kavitha.s@in.ibm.com/sivaraj.s@in.ibm.com

More Related Content

Similar to Blue impact

M2 works
M2 worksM2 works
M2 works
jeritage32
 
NYPD Twitter Strategy
NYPD Twitter StrategyNYPD Twitter Strategy
NYPD Twitter Strategy
Allan V. Braverman
 
Crisis communications and Social Media
Crisis communications and Social MediaCrisis communications and Social Media
Crisis communications and Social Media
Andrada Morar
 
Cybersecurity for IAEM Region 4
Cybersecurity for IAEM Region 4Cybersecurity for IAEM Region 4
Cybersecurity for IAEM Region 4
Sarah K Miller
 
Srishti
SrishtiSrishti
Project Overview Text
Project Overview TextProject Overview Text
Project Overview Text
Blaylock
 
Irm 10-social engineering
Irm 10-social engineeringIrm 10-social engineering
Irm 10-social engineering
Kasper de Waard
 
Abrupt notifier
Abrupt notifierAbrupt notifier
Abrupt notifier
mistygaming
 
Cases - the backbone of e-swaraj
Cases - the backbone of e-swarajCases - the backbone of e-swaraj
Cases - the backbone of e-swaraj
smalltown_boy
 
Emergency notification at your phone
Emergency notification at your phoneEmergency notification at your phone
Emergency notification at your phone
Syeful Islam
 
jaishriRAAM.pptx
jaishriRAAM.pptxjaishriRAAM.pptx
jaishriRAAM.pptx
Kartikey Saxena
 
Telecom Case studies
Telecom Case studiesTelecom Case studies
Telecom Case studies
Shreya De
 
Fireman Thank You.Pdf - Google Drive Fire Safety
Fireman Thank You.Pdf - Google Drive Fire SafetyFireman Thank You.Pdf - Google Drive Fire Safety
Fireman Thank You.Pdf - Google Drive Fire Safety
Holly Vega
 
Final Documentation
Final DocumentationFinal Documentation
Final Documentation
Daniel Andarge
 
About secQ.me service
About secQ.me serviceAbout secQ.me service
About secQ.me service
Khoo Shiang
 
Applications of computers in law enforcement and government
Applications of computers in law enforcement and governmentApplications of computers in law enforcement and government
Applications of computers in law enforcement and government
Reina Niña Camano
 
^^ Linkedin & facebook web sites registrations ^^
^^ Linkedin  & facebook web sites registrations ^^^^ Linkedin  & facebook web sites registrations ^^
^^ Linkedin & facebook web sites registrations ^^
Som-Deepak Kumar-Sawant
 
IPA (Inst Public Admin) Annual General Meeting 2010
IPA (Inst Public Admin) Annual General Meeting 2010IPA (Inst Public Admin) Annual General Meeting 2010
IPA (Inst Public Admin) Annual General Meeting 2010
Larry Taylor Ph.D.
 
Improvement of Maternal Health through Media’s Innovative Tools -- Women’s Me...
Improvement of Maternal Health through Media’s Innovative Tools -- Women’s Me...Improvement of Maternal Health through Media’s Innovative Tools -- Women’s Me...
Improvement of Maternal Health through Media’s Innovative Tools -- Women’s Me...
InSTEDD iLab Southeast Asia
 
Savdhaan (Women Security App)
Savdhaan (Women Security App)Savdhaan (Women Security App)
Savdhaan (Women Security App)
Poojaagrawal130
 

Similar to Blue impact (20)

M2 works
M2 worksM2 works
M2 works
 
NYPD Twitter Strategy
NYPD Twitter StrategyNYPD Twitter Strategy
NYPD Twitter Strategy
 
Crisis communications and Social Media
Crisis communications and Social MediaCrisis communications and Social Media
Crisis communications and Social Media
 
Cybersecurity for IAEM Region 4
Cybersecurity for IAEM Region 4Cybersecurity for IAEM Region 4
Cybersecurity for IAEM Region 4
 
Srishti
SrishtiSrishti
Srishti
 
Project Overview Text
Project Overview TextProject Overview Text
Project Overview Text
 
Irm 10-social engineering
Irm 10-social engineeringIrm 10-social engineering
Irm 10-social engineering
 
Abrupt notifier
Abrupt notifierAbrupt notifier
Abrupt notifier
 
Cases - the backbone of e-swaraj
Cases - the backbone of e-swarajCases - the backbone of e-swaraj
Cases - the backbone of e-swaraj
 
Emergency notification at your phone
Emergency notification at your phoneEmergency notification at your phone
Emergency notification at your phone
 
jaishriRAAM.pptx
jaishriRAAM.pptxjaishriRAAM.pptx
jaishriRAAM.pptx
 
Telecom Case studies
Telecom Case studiesTelecom Case studies
Telecom Case studies
 
Fireman Thank You.Pdf - Google Drive Fire Safety
Fireman Thank You.Pdf - Google Drive Fire SafetyFireman Thank You.Pdf - Google Drive Fire Safety
Fireman Thank You.Pdf - Google Drive Fire Safety
 
Final Documentation
Final DocumentationFinal Documentation
Final Documentation
 
About secQ.me service
About secQ.me serviceAbout secQ.me service
About secQ.me service
 
Applications of computers in law enforcement and government
Applications of computers in law enforcement and governmentApplications of computers in law enforcement and government
Applications of computers in law enforcement and government
 
^^ Linkedin & facebook web sites registrations ^^
^^ Linkedin  & facebook web sites registrations ^^^^ Linkedin  & facebook web sites registrations ^^
^^ Linkedin & facebook web sites registrations ^^
 
IPA (Inst Public Admin) Annual General Meeting 2010
IPA (Inst Public Admin) Annual General Meeting 2010IPA (Inst Public Admin) Annual General Meeting 2010
IPA (Inst Public Admin) Annual General Meeting 2010
 
Improvement of Maternal Health through Media’s Innovative Tools -- Women’s Me...
Improvement of Maternal Health through Media’s Innovative Tools -- Women’s Me...Improvement of Maternal Health through Media’s Innovative Tools -- Women’s Me...
Improvement of Maternal Health through Media’s Innovative Tools -- Women’s Me...
 
Savdhaan (Women Security App)
Savdhaan (Women Security App)Savdhaan (Women Security App)
Savdhaan (Women Security App)
 

Recently uploaded

Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 

Recently uploaded (20)

Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 

Blue impact

  • 1. BlueImpact SMS SMS All trademarks, service marks, trade names, trade dress, product names and logos appearing in this presentation are the property of their respective owners.
  • 2. What is BlueImpact? Citizens can use Social Media for Impact on Better Governance to report issues immediately. The idea behind: Most social or public issues go unreported because : • People don’t know how to report it. • People think its time consuming to report it and follow up. Consider this: • What if there was a simple and quick way to report issues? • What if we could harness social media like twitter and mobile solutions like SMS/call to address issues in the society?. • What if we could use people to help drive government programs?.
  • 3. How does it work? Twitter. • Listens to twitter for registered hashtags. • Sends reply tweets and direct messages seeking additional info. SMS & Call • Receives SMS sent to a registered number. • Calls back the sender seeking more info. • Sends SMS replies seeking more info. Bluemix Cloud • Once required info is gathered, it is stored on the cloud. Curam • Creates intake cases in Curam Twitter SMS Call Blue Impact
  • 4. Use case – Child Welfare Department REPORT CHILD ABUSE IMMEDIATELY TWEET TO: #BLUEIMPACT SMS TO: +15155124474
  • 5. John & his wife are shopping in the mall. REPORT CHILD ABUSE TWEET TO: #BLUEIMPACT SMS TO: +15155124474 They spot a girl with bruises on the face. John remembers seeing the poster and decides to tweet to the child welfare department.
  • 6. John tweets to #blueimpact . John receives a reply requesting for more info. John sends a direct message with the requested additional info.
  • 7. Blueimpact receives this information and registers a new intake case in Curam. All the tweet data is captured in the intake.
  • 8. The intake details are sent to John in a twitter direct message to let him know that a case is registered and a case worker will look into the case.
  • 10. Use case 2– Child Welfare Department REPORT CHILD ABUSE IMMEDIATELY TWEET TO: #BLUEIMPACT SMS TO: +15155124474
  • 11. John is not too familiar with twitter. So he decides to send an SMS to the number in the poster. John recieves a sms reply from the department with call ore reply options John decides to reply with call. John immediately recieves a call with a reset number of questions.
  • 12. An intake case is registered in Curam with a link to the call recording. A case worker can listen to this recording and note down details about the abuse and work on the case
  • 13. This intake case detail is then sent to John as a sms. John can follow up with the department using this case id
  • 15. Curam Integration A caseworker logs into the Curam application and find these intake cases created from BlueImpact. All the intake cases that are pending the case worker’s attention can be found easily on this dashboard. The caseworker picks up one of the intake. He can find all the details in the narrative text. Who sent this/ Where did it occur etc. The regular Curam case worker workflow continues.
  • 16. Future enhancements • Send sms/twitter notifications to the curam caseworkers every time a new case is reported • Capture the location details. Run an analysis of where most of these abuse cases are reported. • Have targeted marketing of social welfare programs in those localities.
  • 17. Other Use Cases that can be built • Bescom exposes a twitter handle #bescom and a mobile number to sms • Citizens can tweet to #bescom or send a sms when they are facing power outages. • Blueimpact listens to these tweets/sms. • Blueimpact can then send a sms/email notification to bescom officials to look into these issues. • The data captured by blueimpact can be used to run analysis reports.
  • 18. Team BlueImpact Dinesh Kavitha Darshan Praveen Raghu
  • 19. Thank you! We would like to hear from you. Please do write to us with your suggestions/questions/feedback. We can also provide a demo. Write to us at: kavitha.s@in.ibm.com/sivaraj.s@in.ibm.com