Mehrshad Setayesh, CIO, @collectual reviews the social media maturity curve, enterprise monitoring requirements and applying insights to business efforts to create a social business.
Social Intelligence will be a part of all consumer and commercial interactions. This presentation looks at the evolution of the Swipp social intelligence platform, shows how social intelligence will be included in industries going forward and provides a checklist of what brands can do to begin tapping into social intelligence today.
Swipp is a Social Intelligence Platform upon which we’ve built a new class of “socially intelligent” consumer and commercial applications. Swipp launched January 23, 2013.
Developing a Product Behaviour Framework: Mobile Insights lead to Product Use...Merlien Institute
Presented by Isaac Rogers, CIO, 20/20 Research & MC Lai, Head of Qualitative, Ipsos
at Market Research in the Mobile World Asia-Pacific
30-31 January 2013, Kuala Lumpur, Malaysia
This event is proudly organised by Merlien Institute
Check out our upcoming events by visiting http://www.mrmw.net
In this presentation, we describe how a text analytics command center can help you create a strategy for analyzing & integrating both social & private data.
Your Social Customer's Conversation is Driving Your BusinessCollective Intellect
Collective Intellect uses semantic analysis to process, in real-time, large volumes of social media conversations. The resulting intelligence provides insights into the social customer: what they're buying, viewing, having problems with, including demographic or life stage data.
What are the steps for achieving ROI in social media? As your organization evolves along the social media maturity curve, integrate social media analytics across the enterprise. Social ROI is really business ROI.
Social Intelligence will be a part of all consumer and commercial interactions. This presentation looks at the evolution of the Swipp social intelligence platform, shows how social intelligence will be included in industries going forward and provides a checklist of what brands can do to begin tapping into social intelligence today.
Swipp is a Social Intelligence Platform upon which we’ve built a new class of “socially intelligent” consumer and commercial applications. Swipp launched January 23, 2013.
Developing a Product Behaviour Framework: Mobile Insights lead to Product Use...Merlien Institute
Presented by Isaac Rogers, CIO, 20/20 Research & MC Lai, Head of Qualitative, Ipsos
at Market Research in the Mobile World Asia-Pacific
30-31 January 2013, Kuala Lumpur, Malaysia
This event is proudly organised by Merlien Institute
Check out our upcoming events by visiting http://www.mrmw.net
In this presentation, we describe how a text analytics command center can help you create a strategy for analyzing & integrating both social & private data.
Your Social Customer's Conversation is Driving Your BusinessCollective Intellect
Collective Intellect uses semantic analysis to process, in real-time, large volumes of social media conversations. The resulting intelligence provides insights into the social customer: what they're buying, viewing, having problems with, including demographic or life stage data.
What are the steps for achieving ROI in social media? As your organization evolves along the social media maturity curve, integrate social media analytics across the enterprise. Social ROI is really business ROI.
Using Text Analytics to Transform Big Data into Business InsightsCollective Intellect
The importance of big data isn't entirely around volume it's also the variety and velocity that needs to be managed. Unifying social and enterprise data analytics is critical for business to better understand their social consumer.
Are you listening? Real Time Measurement and MonitoringKlaxon
Presentation delivered by Andrew Walker at Making Social Part of Your DNA, a conference held during Social Media Week 2012 in London.
For more information visit http://www.socialmediadna.co.uk
Are You Listening? Real time data and social mediaAndrew Walker
This presentation was given during social media week london 2012 by Andrew Walker (@killdozer) Co-founder of Tweetminster the network intelligence news feed company.
It talks about practical measures and tools to get real time insight data into your social media presence to get better ROI, ROE and strategic insights into better social media marketing.
Omllion is a neoteric social media management firm offering astute monitoring, protecting, listening, measuring, analysing and engaging solutions.
http://www.omllion.com
DataSift's Rob Bailey at The Social Media Strategies Summit DataSift
Social monitoring has gone from a fancy nice-to-have, to an essential strategic tool for all organizations. DataSift provides insights into customers, the market and trending topics.
DataSift attended the Social Media Strategies Summit in San Francisco, where Rob Bailey, our CEO, discussed the seven measurable actions that further your company’s marketing and social media efforts. In addition to providing a framework for moving your company’s efforts from beginner to pro, Rob highlighted companies who are thinking strategically about social media, such as Taco Bell, Burberry and KFC.
If you want to understand the true value of your content, develop a definitive strategy to maximize its value and understand the processes required to deliver back a significant return, you have found the right resource.
International Customer Experience World PresentationChantel Botha
Design tips for brands who want to be loved in social media
In this mobilized, socialized world it becomes more and more important for brands to understand the consumer’s always changing expectations. I now expect my grocer to tweet back in 10 minutes because my bank does it and I expect my favourite neighbourhood coffee shop to give me discounts when I check in on Foursquare because Starbucks does it.
The experience designer is faced with challenges that the always on-net and social consumer creates through their reasonable and sometimes unreasonable expectations. Word of mouth has turned into word of the ever mighty thumb and in his mobile world, all I have to do is tweet a brand about how angry they make me and instantly I can influence the purchasing behaviour or my and their followers.
This presentation will share insights of how to design experiences for the traditional and now social channels with the aim to be transparent, consistent, authentic and true to the brand’s essence.
Learn more about Automotive Digital Marketing at the most popular professional network for car dealers and interactive marketers working in the auto industry at http://www.automotivedigitalmarketing.com/
Where social media is today. Where it's headed. What is HOLDING brands/biz back. Includes a social media maturity framework for digital strategists.
If you download - please add a comment.
Laurie Dillon-Schalk's keynote for IBM's Retail Fall Showcase on Nov. 2nd, 2011
Social Media March Book Club Featuring Get Bold by Sandy CarterSocial Media Club
Sandy Carter, Author of Get Bold: Using Social Media to Create a New Type of Social Business joined Social Media Book Club in March 2012 to offer a deeper dive into Get Bold and her 6-step AGENDA method. Sandy serves as VP of Social Business Evangelism at IBM.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
More Related Content
Similar to What is the Framework for Activating Your Social Business?
Using Text Analytics to Transform Big Data into Business InsightsCollective Intellect
The importance of big data isn't entirely around volume it's also the variety and velocity that needs to be managed. Unifying social and enterprise data analytics is critical for business to better understand their social consumer.
Are you listening? Real Time Measurement and MonitoringKlaxon
Presentation delivered by Andrew Walker at Making Social Part of Your DNA, a conference held during Social Media Week 2012 in London.
For more information visit http://www.socialmediadna.co.uk
Are You Listening? Real time data and social mediaAndrew Walker
This presentation was given during social media week london 2012 by Andrew Walker (@killdozer) Co-founder of Tweetminster the network intelligence news feed company.
It talks about practical measures and tools to get real time insight data into your social media presence to get better ROI, ROE and strategic insights into better social media marketing.
Omllion is a neoteric social media management firm offering astute monitoring, protecting, listening, measuring, analysing and engaging solutions.
http://www.omllion.com
DataSift's Rob Bailey at The Social Media Strategies Summit DataSift
Social monitoring has gone from a fancy nice-to-have, to an essential strategic tool for all organizations. DataSift provides insights into customers, the market and trending topics.
DataSift attended the Social Media Strategies Summit in San Francisco, where Rob Bailey, our CEO, discussed the seven measurable actions that further your company’s marketing and social media efforts. In addition to providing a framework for moving your company’s efforts from beginner to pro, Rob highlighted companies who are thinking strategically about social media, such as Taco Bell, Burberry and KFC.
If you want to understand the true value of your content, develop a definitive strategy to maximize its value and understand the processes required to deliver back a significant return, you have found the right resource.
International Customer Experience World PresentationChantel Botha
Design tips for brands who want to be loved in social media
In this mobilized, socialized world it becomes more and more important for brands to understand the consumer’s always changing expectations. I now expect my grocer to tweet back in 10 minutes because my bank does it and I expect my favourite neighbourhood coffee shop to give me discounts when I check in on Foursquare because Starbucks does it.
The experience designer is faced with challenges that the always on-net and social consumer creates through their reasonable and sometimes unreasonable expectations. Word of mouth has turned into word of the ever mighty thumb and in his mobile world, all I have to do is tweet a brand about how angry they make me and instantly I can influence the purchasing behaviour or my and their followers.
This presentation will share insights of how to design experiences for the traditional and now social channels with the aim to be transparent, consistent, authentic and true to the brand’s essence.
Learn more about Automotive Digital Marketing at the most popular professional network for car dealers and interactive marketers working in the auto industry at http://www.automotivedigitalmarketing.com/
Where social media is today. Where it's headed. What is HOLDING brands/biz back. Includes a social media maturity framework for digital strategists.
If you download - please add a comment.
Laurie Dillon-Schalk's keynote for IBM's Retail Fall Showcase on Nov. 2nd, 2011
Social Media March Book Club Featuring Get Bold by Sandy CarterSocial Media Club
Sandy Carter, Author of Get Bold: Using Social Media to Create a New Type of Social Business joined Social Media Book Club in March 2012 to offer a deeper dive into Get Bold and her 6-step AGENDA method. Sandy serves as VP of Social Business Evangelism at IBM.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
The Metaverse and AI: how can decision-makers harness the Metaverse for their...Jen Stirrup
The Metaverse is popularized in science fiction, and now it is becoming closer to being a part of our daily lives through the use of social media and shopping companies. How can businesses survive in a world where Artificial Intelligence is becoming the present as well as the future of technology, and how does the Metaverse fit into business strategy when futurist ideas are developing into reality at accelerated rates? How do we do this when our data isn't up to scratch? How can we move towards success with our data so we are set up for the Metaverse when it arrives?
How can you help your company evolve, adapt, and succeed using Artificial Intelligence and the Metaverse to stay ahead of the competition? What are the potential issues, complications, and benefits that these technologies could bring to us and our organizations? In this session, Jen Stirrup will explain how to start thinking about these technologies as an organisation.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
What is the Framework for Activating Your Social Business?
1. REAL TIME ENTERPRISE ANALTYICS
The
Social
Activation
Framework
Mehrshad Setayesh
Collective Intellect Inc.
CIO & VP of Product Management
Wordpress: mershsays.wordpress.com
Twitter: @mershsays
Proprietary and confidential. Not to be used or reproduced without the consent of Collective Intellect, Inc. 1
2. Social Media Statistics
One in every nine people on Earth is on Facebook
YouTube has 490 million unique users who visit every month
Twitter is adding nearly 500,000 users / day & 200+ tweets / day
Google+ was the fastest social network to reach 10 million users at 16
days (Twitter took 780 days and Facebook 852 days)
Proprietary and confidential. Not to be used or reproduced without the consent of Collective Intellect, Inc. 2
4. Latest Evolution Stage
A framework
to activate
Social Intelligence
in
Traditional Channels
Proprietary and confidential. Not to be used or distributed without the consent of Collective Intellect, Inc. 4
5. Traditional Channels
Offline panels
Customer feedback forms
Web data
Sales data
Customer records (CRM)
Proprietary and confidential. Not to be used or distributed without the consent of Collective Intellect, Inc. 5
6. Social Intelligence
Metrics & KPIs
based on captured
Interests & Intentions
from social channels
Proprietary and confidential. Not to be used or distributed without the consent of Collective Intellect, Inc. 6
7. Interests
price, quality, safety, loyalty, taste, …
Intentions
purchase, travel, view, stay, …
Proprietary and confidential. Not to be used or distributed without the consent of Collective Intellect, Inc. 7
8. Intentions Example
Brand Selected Social handle
Daypart Gender Location Subjective
Dimensions: Taste, Quality
Sentiment: Negative
Proprietary and confidential. Not to be used or reproduced without the consent of Collective Intellect, Inc. 8
10. The Required Solution
Advanced scalable system
satisfying
multiple expertise
Proprietary and confidential. Not to be used or distributed without the consent of Collective Intellect, Inc. 10
11. Social & Enterprise
Ability to consume both
enterprise
(chats, call records, surveys, emails)
&
social media data
(Twitter, FB, Google+, Blogs, MB, Video)
Proprietary and confidential. Not to be used or distributed without the consent of Collective Intellect, Inc. 11
12. Big Data
Ability to consume & analyze massive data
volume with exponential growth
(Twitter: 200+M per day)
Proprietary and confidential. Not to be used or distributed without the consent of Collective Intellect, Inc. 12
13. Social & Enterprise Data Volume Statistics
Social Data Enterprise Text Data
20 million unique authors
500 unique forums/boards
500,000 posts/day Survey/Focus Group Verbatim
50 million unique authors
2 million fan pages/user groups
1 million+ posts/day Private Community
Conversations
15 million unique blogs (External & Internal)
1 million+ posts/day Social:
10,000 new blogs/day 250M unique authors
300K new authors/day Call Center/Email/
90 million unique authors 13M posts/day Chat Transcripts
10 million tweets/day
100,000 new authors/day Enterprise:
Any text-based data
2.5 million authors Setup within hours Text-Translated Video
40,000 unique sites
200,000 posts/day
Private news, research,
600 thousand unique consumers feeds
60 thousand reviews/day
25 unique review sites
Proprietary and confidential. Not to be used or reproduced without the consent of Collective Intellect, Inc. 13
14. Advanced Text Processing
Pre-filter:
Narrows large data-sets for analysis with Keyword/Boolean
more sophisticated semantic processing
› Issues with ambiguity
› Difficult to provide granular filtering
LSA
Insight:
High Quality Similarity Measures
High Performance for Speed and Precision NLP
Easier Maintenance
Used for Highly Accurate Categorization
Spam identification
Speech analysis:
Parsing content to diagram context
› Slow on large, unstructured text
› Time consuming to adjust with changing
content
Proprietary and confidential. Not to be used or reproduced without the consent of Collective Intellect, Inc. 14
15. Latent Semantic Analysis Accuracy
Collective Intellect Semantic Categorization of Reuters-21578, Distribution 1.0
Test Collection (92% correctly categorized in top 2 rankings)
Proprietary and confidential. Not to be used or reproduced without the consent of Collective Intellect, Inc. 15
16. LSA Example (Galaxy themes)
Proprietary and confidential. Not to be used or reproduced without the consent of Collective Intellect, Inc. 16
17. NLP Example (Amex term analysis)
Proprietary and confidential. Not to be used or reproduced without the consent of Collective Intellect, Inc. 17
18. SaaS Based Architecture
Ability to scale across a large customer base
& various departments
(sales, marketing, support, MR, loyalty, PR)
Proprietary and confidential. Not to be used or distributed without the consent of Collective Intellect, Inc. 18
19. Real-time Scalable Pipeline
High throughput shared-nothing pipes able
to process, analyze, and deliver I&I metrics
in minutes
(using underlying queues and routers)
Proprietary and confidential. Not to be used or distributed without the consent of Collective Intellect, Inc. 19
20. API Access
Rapid access to processed text and analytics
for external integration
(CRM, BPM, DBMS, Workflow)
Proprietary and confidential. Not to be used or distributed without the consent of Collective Intellect, Inc. 20
21. Historical Data Access
Ability to go back in time for trend and
seasonal analysis
(scalable & searchable Big Data storage)
Proprietary and confidential. Not to be used or distributed without the consent of Collective Intellect, Inc. 21
22. Customizable Dashboards
Vertical based templates
Iterative deep dive analytics
Clustering & segmentation
Correlation of social & enterprise
Proprietary and confidential. Not to be used or distributed without the consent of Collective Intellect, Inc. 22
23. Media & Entertainment Vertical (v.1)
Proprietary and confidential. Not to be used or distributed without the consent of Collective Intellect, Inc. 23
24. Media & Entertainment Vertical (v.2)
Proprietary and confidential. Not to be used or distributed without the consent of Collective Intellect, Inc. 24
25. Consumer Packaged Goods Vertical
Proprietary and confidential. Not to be used or distributed without the consent of Collective Intellect, Inc. 25
27. Real-time Alerting
24/7 tracking of crucial Interest & Intention
metrics tracking based on automated
threshold monitoring
Proprietary and confidential. Not to be used or distributed without the consent of Collective Intellect, Inc. 27
28. Enterprise Social Media Enterprise Intelligence Monitoring
Data Data
& Analytics System
Collection
Collection
Engine
Collection
Engine
Engines Alerting
Module
Routers & Queues
Advanced Text The Console
Processing Services
Customizable
Historical
Historical
Historical Dashboards
Archive
Archive
Archive
High Middle
Frequency Tier
API Real
Time
Pipes
On Demand
Interests Analytic Services
&
Intentions View
Repository
Processed Advanced Text
Routers & Queues Data Processing Services
Repository
Proprietary and confidential. Not to be used or distributed without the consent of Collective Intellect, Inc. 28
29. So Far
Big data collection (social & Ent.)
Advanced text analytics
I & I metrics creation & tracking
Traditional channels integration
Proprietary and confidential. Not to be used or distributed without the consent of Collective Intellect, Inc. 29
30. Macro Integration
Offline panels
Customer feedback forms
Web data
Sales data
Micro Integration
Customer records (CRM)
Proprietary and confidential. Not to be used or distributed without the consent of Collective Intellect, Inc. 30
31. Offline Panels
Capture social insight
Verify its resonance in panel
Insert into marketing campaign
Proprietary and confidential. Not to be used or distributed without the consent of Collective Intellect, Inc. 31
32. Customer Feedback Forms
Gather reason for dissatisfaction
Verify if valid in social media
Compute / track spread
Proprietary and confidential. Not to be used or distributed without the consent of Collective Intellect, Inc. 32
33. Enterprise NLP Example (uncomfortable)
Proprietary and confidential. NotNotbe used or reproduced without the consent of Collective Intellect, Inc. Inc.
Proprietary and confidential. to to be used or distributed without the consent of Collective Intellect, 33
34. Web Data
Website traffic analytics data
Social campaign (Twitter, FB)
Combined scorecard
Proprietary and confidential. Not to be used or distributed without the consent of Collective Intellect, Inc. 34
35. Sales Data
POS & Social correlation
Geo location from public profiles
Localized conversation analysis
Proprietary and confidential. Not to be used or distributed without the consent of Collective Intellect, Inc. 35
36. Customer Records (CRM)
Capture customer’s social profile
Offline-online mapping
Profiling v. augmentation
Proprietary and confidential. Not to be used or distributed without the consent of Collective Intellect, Inc. 36
37. REAL TIME ENTERPRISE ANALTYICS
The
Social
Activation
Framework
Mehrshad Setayesh
Collective Intellect Inc.
CIO & VP of Product Management
Wordpress: mershsays.wordpress.com
Twitter: @mershsays
Proprietary and confidential. Not to be used or reproduced without the consent of Collective Intellect, Inc. 37