e- Discovery through Text Mining
|
|
- Silas Stokes
- 7 years ago
- Views:
Transcription
1 e- Discovery through Text Mining Fraud Detec+on example Sergei Ananyan, Ph.D. Megaputer Intelligence Inc.
2
3 What is e- Discovery? Electronic Discovery is the process when electronic data is sought, located, secured, and searched with the intent of using it as evidence in a legal case
4 Electronic evidence Documents are increasingly produced and stored electronically Corporate li+ga+ons involve the produc+on and analysis of electronic evidence Li+ga+ons might involve different par+es: Company vs. Company Government vs. Company Person vs. Company
5 Who uses e- Discovery systems? Document Analyst Opposing Legal Team Li+ga+on Support Manager E- Discovery System AIorney Court
6 Text Mining Analytics & Reporting
7 Old approach to text analysis Data analysts perform searches based on: Key words and phrases with proximity Date ranges Known relevant documents seeking similar documents
8 Typical example US federal agency is inves+ga+ng a mortgage fraud case against a major bank Subpoenas all documents matching words: Apprais* w/25: correct*, target, increas*, chang*, second, Pric* w/25: change*, increas*, rais*, Receives over 3,000,000 matching documents This agency division has 4 data analysts and 3 aiorneys to work on the case
9 Time for document analysis 3 million docs 3 min per document 20 docs per hour Text Mining 2 month one analyst Manual Analysis 40K docs per year DONE! 75 years to check 3M docs Text Mining delivers results 450 times faster!
10 Encountered challenges Overwhelming # of documents Primarily irrelevant documents Repe++ve documents Numerous typos Missing informa+on about communica+ng par+es
11 Where Text Mining can help? Data normaliza+on Parsing and aggrega+ng data from disparate formats Cleansing data Feature extrac+on Data analysis Deep linguis+c parsing (context based) Searching for paierns
12 Use text/data mining techniques Language detec+on Spell- checking / correc+on Deep linguis+c parsing Part of speech detec+on context based Chunker: detect noun phrases, verb phrases, etc. Seman+c dic+onaries Auto- categoriza+on (PaIern Detec+on Language) En+ty Extrac+on Clustering Latent Seman+c Analysis De- duplica+on Inverse frequency analysis Social Network Analysis
13 Possible Analysis Scenarios Let us consider different scenarios: 1. We can formulate paierns we are searching for 2. We have a collec+on of documents with relevant evidence 3. We have a list of relevant custodians 4. We know only the +me interval when the problem occurred 5. We don t know anything except the keywords documents should contain
14 If we know relevant paierns Write paierns in a special language - capture Proximity (terms, sentences and paragraphs) Part of speech informa+on Seman+c similari+es Nega+ons Density of terms
15 If we know relevant documents Need to search for similar documents Use Latent Seman+c Analysis or similar techniques Iden+fy custodians associated with relevant documents Find addi+onal features of poten+al interest associated with these custodians
16 Know only custodians & +me range Search for unique features of their communica+ons with others Train the system on all available data Reveal anomalous terms & phrases Example: fruit language Lemon kickback: For this property we received from XYZ a lemon worth over 3M. They gave us significant lemons on both these transacgons.
17 Know only the problem +me range Look for spikes in communica+ons for all people Sudden changes in topics discussed Spikes in unusual lexicon terms
18 Know only theme & keywords Clustering of topics Analysis of pairwise communica+ons Unusual clusters & lexicon Group pairs of people with similar lexicon Gather ideas for further inves+ga+on
19 Data prepara+on Remove definitely irrelevant documents Junk mail Mass broadcasts Magazine ar+cles (post- factum documents) Split chains into individual messages Eliminate full and near duplicates Reconstruct addresses Find and adap+vely correct misspells
20 Reconstruct & extract features Extract fields of interest: Date To, From, CC and BCC Subject Names of people, companies and organiza+ons Addresses Telephone numbers Custom en++es: SSN, drug names with dosage, frequency, applica+on mode, etc.
21 Networks of related custodians Reveal & graphically present networks of people exchanging relevant documents Social Network Analysis performed on communica+ons
22 Present selected documents Obtain a small collec+on of highly relevant documents Summarize key findings in easy to comprehend interac+ve web reports Provide drill- down to original documents Have important paierns in text highlighted in the drill- down documents Export collec+ons of marked- up relevant documents
23 Case Descrip+on Data: 3,000,000 documents from a mortgage company, primarily notes ObjecDves: Detect signatures of poten+al fraud and abuse Iden+fy and visualize involved individuals
24 E- Discovery Methodology Step 1. Prepare and normalize data Step 2. Cleanse data Step 3. Extract en++es of interest: $ amounts, loan #s, postal addresses, etc. Step 4. PaIern Analysis: search for text paierns represen+ng fraud and abuse Step 5. Who is involved? Visualize networks of communica+ons of iden+fied suspects
25 Data analysis scenario
26 Step 1. Data Prepara+on and Normaliza+on
27 Data Prepara+on Objec+ves Remove non- documents Reconstruct addresses Convert chains of responses found in one leier into collec+ons of individual leiers Parse documents into structured fields: From, To, CC, BCC Subject Date body
28 Parsing Original Documents 1 Todd.Baur@homesite.com Dorothy.Shaw@homesite.com Lisa.KiPredge@homesite.com 2 Dorothy.Shaw@homesite.com Lisa.KiPredge@homesite.com Todd.Baur@homesite.com 3+
29 Reconstruc+ng and Parsing
30 3M Chains Parsed into 5.6M s
31 Step 2. Data Cleansing
32 Data Cleansing Objec+ves Iden+fy and correct misspells Iden+fy duplicates and near duplicates Remove magazine ar+cles and discussions of Jumbo loans
33 Auto- SpellChecker misspelled words Automa+cally iden+fied & corrected over 600,000 misspells
34 Detect Duplicates and Near- duplicates Automa+cally eliminated over 1,000,000 duplicates
35 Remove Magazine Ar+cles
36 Step 3. Extract En++es: Mul+ple Valua+on Homes?
37 En+ty Extrac+on Objec+ves Extract standard and custom en++es of poten+al interest Names of People and Companies Postal Addresses and Phones Currency amounts and Loan numbers, etc. Find documents discussing different values of the same home Remove discussions of revenue and salaries
38 Extract Names of People & Companies Automa+cally extract standard en++es
39 Extract $ Amounts and Loan #s Extract standard and custom en++es
40 Extract Notes w/mul+ple Home Prices
41 Remove Discussions of Revenue & Salary
42 Different Valua+ons for the Same Home
43 Step 4. Discover Signatures of Fraud and Abuse
44 Taxonomy: Distribu+on of Topics
45 Taxonomy- based Categoriza+on
46 Taxonomy Results: Value Opinions
47 Step 5. Who is involved? Social Network Analysis
48 People Discussing Mul+ple Values of Homes
49 Benefits of Text Mining Drama+c savings in +me and resources Smaller teams of inves+gators can complete large projects Elimina+on of tedious manual work BeIer precision: focus only on relevant documents Increased recall: find unexpected paierns of terms Convincing and consistent presenta+on of results Stronger case / defense posi+on Preventa+ve measures become possible
50
51 Ques+ons? Call (812) or W Bloomfield Rd, Suite E Bloomington, IN USA
UNIFIED, END- TO- END EDISCOVERY
ac.onable informa.on governance Partners Providing Excellence in: UNIFIED, END- TO- END EDISCOVERY 2011 IBM Corpora.on Meet the Presenters Amir Jaibaji Vice President, Product Management StoredIQ Kevin
More informationEmployee Survey Analysis
Employee Survey Analysis Josh Froelich, Megaputer Intelligence Sergei Ananyan, Megaputer Intelligence www.megaputer.com Megaputer Intelligence, Inc. 120 West Seventh Street, Suite 310 Bloomington, IN 47404
More informationTim Blevins Execu;ve Director Labor and Revenue Solu;ons. FTA Technology Conference August 4th, 2015
Tim Blevins Execu;ve Director Labor and Revenue Solu;ons FTA Technology Conference August 4th, 2015 Governance and Organiza;onal Strategy PaIerns of Fraud and Abuse in Government What tools can we use
More information1 Actuate Corpora-on 2013. Big Data Business Analy/cs
1 Big Data Business Analy/cs Introducing BIRT Analy3cs Provides analysts and business users with advanced visual data discovery and predictive analytics to make better, more timely decisions in the age
More informationLanguage Resources, Language Technology, Text Mining, the Seman8c Web: How interoperability of machines can help humans in the mul8lingual web
Language Resources, Language Technology, Text Mining, the Seman8c Web: How interoperability of machines can help humans in the mul8lingual web Felix Sasaki DFKI / University of Appl. Sciences Potsdam W3C
More informationOpportuni)es and Challenges of Textual Big Data for the Humani)es
Opportuni)es and Challenges of Textual Big Data for the Humani)es Dr. Adam Wyner, Department of Compu)ng Prof. Barbara Fennell, Department of Linguis)cs THiNK Network Knowledge Exchange in the Humani)es
More informationApplication of Supply Chain Concepts to the Analysis Process
Application of Supply Chain Concepts to the Analysis Process Rob Handfield, PhD Bank of America University Distinguished Professor of Supply Chain Management Executive Director, Supply Chain Resource Cooperative
More informationDTCC Data Quality Survey Industry Report
DTCC Data Quality Survey Industry Report November 2013 element 22 unlocking the power of your data Contents 1. Introduction 3 2. Approach and participants 4 3. Summary findings 5 4. Findings by topic 6
More informationBackground Checks and the Fair Credit Reporting Act. Cole Cummins, ARM-P APEI
Background Checks and the Fair Credit Reporting Act Cole Cummins, ARM-P APEI Today s Topics n Why do background checks n FCRA n EEOC n Best Prac:ces Why Do Background Checks n To keep the workplace safe
More informationSeven Steps to Client Success Understanding the Flow of ediscovery
Seven Steps to Client Success Understanding the Flow of ediscovery Seven Steps to Client Success An Overview of Electronic Discovery Understanding Electronic Discovery Defini&ons and Descrip&ons Understanding
More informationMSc Data Science at the University of Sheffield. Started in September 2014
MSc Data Science at the University of Sheffield Started in September 2014 Gianluca Demar?ni Lecturer in Data Science at the Informa?on School since 2014 Ph.D. in Computer Science at U. Hannover, Germany
More informationMedia Monitoring Credentials
Media Monitoring Credentials Importance of Monitoring Most companies, government agencies, not- for- profit organiza5ons (e.g. hospitals, universi5es, associa5ons, etc.) and individuals such as authors
More informationSBML SBGN SBML Just my 2 cents. Alice C. Villéger COMBINE 2010
SBML SBGN SBML Just my 2 cents Alice C. Villéger COMBINE 2010 Disclaimer Fuzzy talk work in progress last minute slides Someone else has been working on very similar stuff and should really have been talking
More informationExtrac'ng People s Hobby and Interest Informa'on from Social Media Content
Extrac'ng People s Hobby and Interest Informa'on from Social Media Content Thomas Forss, Shuhua Liu and Kaj- Mikael Björk Dept of Business Administra?on and Analy?cs Arcada University of Applied Sciences
More informationHome Selling Marke/ng Proposal
Home Selling Marke/ng Proposal Presented by: Nate Harimoto & Shane Haas Aviara Real Estate 2555 Townsgate Road, Suite 200 Westlake Village, CA 91361 www.aviararealestate.net Nate Office & Fax: (805) 418-2675
More informationCrime Pattern Analysis
Crime Pattern Analysis Megaputer Case Study in Text Mining Vijay Kollepara Sergei Ananyan www.megaputer.com Megaputer Intelligence 120 West Seventh Street, Suite 310 Bloomington, IN 47404 USA +1 812-330-01
More informationXML, Seman9c Web and Content Analy9cs
XML, Seman9c Web and Content Analy9cs XML Prague Pre- conference 2014 Felix Sasaki DFKI / W3C Fellow 1 What do you need to follow this session? Ideal: a computer with internet access, to be able to provide
More informationSocial Network Mining
SSIIM - Seminários de Sistemas Inteligentes, Interacção e Mul8média, MIEIC Social Network Mining Eduarda Mendes Rodrigues Assistant Professor DEI- FEUP, Universidade do Porto hhp://www.fe.up.pt/~eduarda
More informationExpanding Assessment of Analy3cal Skills among Biology Majors: From Introductory labs to Upper Division Elec3ves
Expanding Assessment of Analy3cal Skills among Biology Majors: From Introductory labs to Upper Division Elec3ves Presented by Kathleen McAuley PI: Serena Moseman- Val3erra, Ph.D. Department of Biological
More informationThe Data Reservoir. 10 th September 2014. Mandy Chessell FREng CEng FBCS Dis4nguished Engineer, Master Inventor Chief Architect, Informa4on Solu4ons
Mandy Chessell FREng CEng FBCS Dis4nguished Engineer, Master Inventor Chief Architect, Solu4ons The Reservoir 10 th September 2014 A growing demand Business Teams want Open access to more informa4on More
More informationHow To Use A Webmail On A Pc Or Macodeo.Com
Big data workloads and real-world data sets Gang Lu Institute of Computing Technology, Chinese Academy of Sciences BigDataBench Tutorial MICRO 2014 Cambridge, UK INSTITUTE OF COMPUTING TECHNOLOGY 1 Five
More informationStream Deployments in the Real World: Enhance Opera?onal Intelligence Across Applica?on Delivery, IT Ops, Security, and More
Copyright 2015 Splunk Inc. Stream Deployments in the Real World: Enhance Opera?onal Intelligence Across Applica?on Delivery, IT Ops, Security, and More Stela Udovicic Sr. Product Marke?ng Manager Clayton
More informationExchange of experience from a SuccessFactors LMS Implementa9on
Exchange of experience from a SuccessFactors LMS Implementa9on Seen from a user perspective Hanne Vasshus Ask Competency Management Cau9onary Statement The following presenta9on includes forward- looking
More informationLet s Get Nerdy: Inside Tips on Florida s Workers Compensa:on with a Dose of PEOs. Meet Your Presenter. Going Beyond the Basics.
Let s Get Nerdy: Inside Tips on Florida s Workers Compensa:on with a Dose of PEOs Going Beyond the Basics Meet Your Presenter Frank Pennachio Co-founder Partner Oceanus Partners Author, Speaker and Sales
More informationIT Change Management Process Training
IT Change Management Process Training Before you begin: This course was prepared for all IT professionals with the goal of promo9ng awareness of the process. Those taking this course will have varied knowledge
More informationMegaputer Intelligence
Megaputer Intelligence Company Profile www.megaputer.com 2012 Megaputer Intelligence Inc. Megaputer Intelligence Knowledge discovery tools for business users Easy-to-understand actionable results Data
More informationProject Management Introduc1on
Project Management Introduc1on Session 1 Part I Introduc1on By Amal Le Collen, PMP Dr. Lauren1u Neamtu, PMP Session outline 1. PART I: Introduc1on 1. The Purpose of the PMBOK Guide 2. What is a project?
More informationMedical Fraud Detection Through Data Mining Megaputer Case Study www.megaputer.com Megaputer Intelligence, Inc. 120 West Seventh Street, Suite 310 Bloomington, IN 47404, USA +1 812-330-0110 Medical Fraud
More informationBest Prac*ces in Online Tutoring in STEM with the Deaf STEM Community Alliance Virtual Academic Community (VAC)
Best Prac*ces in Online Tutoring in STEM with the Deaf STEM Community Alliance Virtual Academic Community (VAC) Lisa B. Elliot, Aus*n U. Gehret, Stacey Davis, Raja Kushalnagar, & Warren Goldmann Rochester
More informationWhat is Assessment? Assessment is a process of collec3ng data for the purpose of making decisions about individuals and groups
Informal Assessment What is Assessment? Assessment is a process of collec3ng data for the purpose of making decisions about individuals and groups (Salvia & Ysseldyke, 2007) Conduc3ng Assessments Collect
More informationPu?ng B2B Research to the Legal Test
With the global leader in sampling and data services Pu?ng B2B Research to the Legal Test Ashlin Quirk, SSI General Counsel 2014 Survey Sampling Interna6onal 1 2014 Survey Sampling Interna6onal Se?ng the
More informationA Brief Overview of the Mobile App Ecosystem. September 13, 2012
A Brief Overview of the Mobile App Ecosystem September 13, 2012 Presenters Pam Dixon, Execu9ve Director, World Privacy Forum Jules Polonetsky, Director and Co- Chair, Future of Privacy Forum Nathan Good,
More informationDiscovering Computers Fundamentals, 2010 Edition. Living in a Digital World
Discovering Computers Fundamentals, 2010 Edition Living in a Digital World Objec&ves Overview Discuss the importance of project management, feasibility assessment, documenta8on, and data and informa8on
More informationCS 4604: Introduc0on to Database Management Systems. B. Aditya Prakash Lecture #5: En-ty/Rela-onal Models- - - Part 1
CS 4604: Introduc0on to Database Management Systems B. Aditya Prakash Lecture #5: En-ty/Rela-onal Models- - - Part 1 Announcements- - - Project Goal: design a database system applica-on with a web front-
More informationTheo JD Bothma Department of Informa1on Science theo.bothma@up.ac.za
Theo JD Bothma Department of Informa1on Science theo.bothma@up.ac.za Reflec1ons on the role of corpora and big data in e- lexicography in rela1on to end user informa1on needs CILC 2015 7th Interna1onal
More informationBig Data in medical image processing
Big Data in medical image processing Konstan3n Bychenkov, CEO Aligned Research Group LLC bychenkov@alignedresearch.com Big data in medicine Genomic Research Popula3on Health Images M- Health hips://cloud.google.com/genomics/v1beta2/reference/
More informationResearch Overview. Lori L. Pollock, Professor! Computer and Information Sciences! University of Delaware!
Research Overview Lori L. Pollock, Professor! Computer and Information Sciences! University of Delaware! My Journey Program Analysis, Software Development & Maintenance Tools, Optimizing Compilers 81 B.S.
More informationHow To Use Splunk For Android (Windows) With A Mobile App On A Microsoft Tablet (Windows 8) For Free (Windows 7) For A Limited Time (Windows 10) For $99.99) For Two Years (Windows 9
Copyright 2014 Splunk Inc. Splunk for Mobile Intelligence Bill Emme< Director, Solu?ons Marke?ng Panos Papadopoulos Director, Product Management Disclaimer During the course of this presenta?on, we may
More informationCleaned Data. Recommendations
Call Center Data Analysis Megaputer Case Study in Text Mining Merete Hvalshagen www.megaputer.com Megaputer Intelligence, Inc. 120 West Seventh Street, Suite 10 Bloomington, IN 47404, USA +1 812-0-0110
More informationFounda'onal IT Governance A Founda'onal Framework for Governing Enterprise IT Adapted from the ISACA COBIT 5 Framework
Founda'onal IT Governance A Founda'onal Framework for Governing Enterprise IT Adapted from the ISACA COBIT 5 Framework Steven Hunt Enterprise IT Governance Strategist NASA Ames Research Center Michael
More informationProtec'ng Communica'on Networks, Devices, and their Users: Technology and Psychology
Protec'ng Communica'on Networks, Devices, and their Users: Technology and Psychology Alexey Kirichenko, F- Secure Corpora7on ICT SHOK, Future Internet program 30.5.2012 Outline 1. Security WP (WP6) overview
More informationThe DATA Difference Targe.ng for Stronger ROI!
The DATA Difference Targe.ng for Stronger ROI! Presented by: Dr. John Leininger Department of Graphic Communica
More informationIndia s Integrated Taxpayer Data Management System (ITDMS) - A data mining tool for non-intrusive anti-tax evasion work
India s Integrated Taxpayer Data Management System (ITDMS) - A data mining tool for non-intrusive anti-tax evasion work Winner of Prime Minister Award For Excellence In Public Administration April 2010
More informationSocial Media Analy.cs (SMA)
Social Media Analy.cs (SMA) Emanuele Della Valle DEIB - Politecnico di Milano emanuele.dellavalle@polimi.it hap://emanueledellavalle.org What's social media? haps://www.youtube.com/watch?v=sgniiud_oqg
More informationFixed Scope Offering (FSO) for Oracle SRM
Fixed Scope Offering (FSO) for Oracle SRM Agenda iapps Introduc.on Execu.ve Summary Business Objec.ves Solu.on Proposal Scope - Business Process Scope Applica.on Implementa.on Methodology Time Frames Team,
More informationHow to write a Bachelor s Thesis in Cogni4ve and Decision Sciences? Gilles Du4lh
How to write a Bachelor s Thesis in Cogni4ve and Decision Sciences? Gilles Du4lh Who I Am Gilles Du4lh, 32 Psychology at University of Amsterdam Master Psychological Methods Got my PhD in mathema4cal psychology
More informationSecurity Leadership: Preven4ng and Responding to Future Cyber A<acks. Mark Seward, Sr. Director, Security and Compliance
Security Leadership: Preven4ng and Responding to Future Cyber A
More informationBig Data. The Big Picture. Our flexible and efficient Big Data solu9ons open the door to new opportuni9es and new business areas
Big Data The Big Picture Our flexible and efficient Big Data solu9ons open the door to new opportuni9es and new business areas What is Big Data? Big Data gets its name because that s what it is data that
More informationEthical Dilemmas Facing Family Law Prac55oners. Hot Tips CLE October 1, 2010 Nathan M. Crystal Dis5nguished Visi5ng Professor Charleston Law School
Ethical Dilemmas Facing Family Law Prac55oners Hot Tips CLE October 1, 2010 Nathan M. Crystal Dis5nguished Visi5ng Professor Charleston Law School 1 Summaries of Ethics Opinions I have prepared summaries
More informationCase Study. The SACM Journey at the Ontario Government
Case Study The SACM Journey at the Ontario Government Agenda Today s Objec=ves The Need for SACM Our SACM Journey Scope and Governance Process Ac=vi=es Key Process Roles Training and Measurement Lessons
More informationFrom Big Data to Value
From Big Data to Value The Power of Master Data Management 2.0 Sergio Juarez SVP Elemica EMEA & LATAM Reveal Oct 2014 Agenda Master Data Management Why Now? What To Do? How To Do It? What s Next? Today
More informationAtlanta Care Transitions Initiative. Atlanta Regional Commission Area Agency on Aging
Atlanta Care Transitions Initiative Atlanta Regional Commission Area Agency on Aging Atlanta Regional Commission Atlanta Region Area Agency on Aging Regional Planning Commission 1 of 12 AAAs in Georgia
More informationGyrus: A Framework for User- Intent Monitoring of Text- Based Networked ApplicaAons
Gyrus: A Framework for User- Intent Monitoring of Text- Based Networked ApplicaAons Yeongjin Jang*, Simon P. Chung*, Bryan D. Payne, and Wenke Lee* *Georgia Ins=tute of Technology Nebula, Inc 1 Tradi=onal
More informationMember Municipality Security Awareness Training. End- User Informa/on Security Awareness Training
End- User Informa/on Security Awareness Training 1 Why Awareness Training? NCLM sanc:oned mul:ple Security Risk Assessments for a broad spectrum of member municipali:es The assessments iden:fied areas
More informationSeman&c Web: Benefits For Clinical Decision Support At The Bedside. Emory Fry, MD SemTechBiz 2013
Seman&c Web: Benefits For Clinical Decision Support At The Bedside Emory Fry, MD SemTechBiz 2013 Clinical Decision Support (CDS) A system providing knowledge and person specific or popula8on informa8on
More informationData Warehousing. Yeow Wei Choong Anne Laurent
Data Warehousing Yeow Wei Choong Anne Laurent Databases Databases are developed on the IDEA that DATA is one of the cri>cal materials of the Informa>on Age Informa>on, which is created by data, becomes
More informationHIPAA Basics. Health Insurance Portability and Accountability Act of 1996
HIPAA Basics Health Insurance Portability and Accountability Act of 1996 HIPAA: What Is HIPAA? Protects the privacy of healthcare informa@on for all Americans, including the individuals you support Protects
More informationProvider Communica/on Interven/on at a Federally Qualified Health Center- based Farmers' Market: Implica/ons for Implementa/on Science
Provider Communica/on Interven/on at a Federally Qualified Health Center- based Farmers' Market: Implica/ons for Implementa/on Science Daniela B. Friedman, MSc, PhD Associate Professor, Department of Health
More informationDirect Mail & Managing Data Achieving Growth by Adding New Services Masterclass Seminar. 27 th March 2014 At 1230
Direct Mail & Managing Data Achieving Growth by Adding New Services Masterclass Seminar 27 th March 2014 At 1230 Stuart Sutherland Business Development Manager Nova Direct Having built up a 2 year trading
More informationCS 5150 So(ware Engineering Evalua4on and User Tes4ng
Cornell University Compu1ng and Informa1on Science CS 5150 So(ware Engineering Evalua4on and User Tes4ng William Y. Arms Usability: The Analyze/Design/Build/Evaluate Loop Analyze requirements Design User
More informationIBM Enterprise Content Management Solu5ons Informa(on Lifecycle Governance
IBM Enterprise Content Management Solu5ons Informa(on Lifecycle Governance Mohan Natraj Content Collec(on & Archiving Informa(on Lifecycle Governance Enterprise Content Management 2011 IBM Corporation
More informationLegacy Archiving How many lights do you leave on? September 14 th, 2015
Legacy Archiving How many lights do you leave on? September 14 th, 2015 1 Introductions Wendy Laposata, Himforma(cs Tom Chase, Cone Health 2 About Cone Health More than 100 loca=ons 6 hospitals, 3 ambulatory
More informationGyrus: A Framework for User- Intent Monitoring of Text- Based Networked ApplicaAons
Gyrus: A Framework for User- Intent Monitoring of Text- Based Networked ApplicaAons Yeongjin Jang*, Simon P. Chung*, Bryan D. Payne, and Wenke Lee* *Georgia Ins=tute of Technology Nebula, Inc 1 Tradi=onal
More informationProgram Model: Muskingum University offers a unique graduate program integra6ng BUSINESS and TECHNOLOGY to develop the 21 st century professional.
Program Model: Muskingum University offers a unique graduate program integra6ng BUSINESS and TECHNOLOGY to develop the 21 st century professional. 163 Stormont Street New Concord, OH 43762 614-286-7895
More informationIntegrated Analytics. Simplified Case Administration
The Difference E-discovery s most complete document review and case management software. NR R Visual Review Ringtail combines powerful keyword search, concept clustering and e-discovery s best, and only,
More informationEPUB 3 Solu+ons Landscape. Bill McCoy Execu+ve Director, IDPF November 30, 2013
EPUB 3 Solu+ons Landscape Bill McCoy Execu+ve Director, IDPF November 30, 2013 Agenda Authoring tools Content produc+on tools Distribu+on services Open source developments Strategic Ques+ons How much to
More informationBPO. Accerela*ng Revenue Enhancements Through Sales Support Services
BPO Accerela*ng Revenue Enhancements Through Sales Support Services What is BPO? Business Process Outsorcing (BPO) is the process of outsourcing specific business func6ons to a third- party service provider
More informationCiviCRM Implementa/on Case Study
CiviCRM Implementa/on Case Study Leukaemia and Lymphoma Research www.leukaemialymphomaresearch.org.uk Parvez Saleh About the LLR Having gone through the socware/supplier selec/on process, the LLR decided
More informationInvestor Presenta,on Third Quarter 2014. 2014 ServiceNow All Rights Reserved 1
Investor Presenta,on Third Quarter 2014 2014 ServiceNow All Rights Reserved 1 FORWARD- LOOKING STATEMENTS, INDUSTRY AND MARKET DATA This presenta>on contains forward- looking statements that are based
More informationC o p yr i g ht 2015, S A S I nstitute Inc. A l l r i g hts r eser v ed. INTRODUCTION TO SAS TEXT MINER
INTRODUCTION TO SAS TEXT MINER TODAY S AGENDA INTRODUCTION TO SAS TEXT MINER Define data mining Overview of SAS Enterprise Miner Describe text analytics and define text data mining Text Mining Process
More informationEffec%ve use of Social Media. Reuben Trusler Crea%ve Director U%lity Crea%ve
Effec%ve use of Social Media Reuben Trusler Crea%ve Director U%lity Crea%ve Once upon a %me Come up with a plan, maintain a presence... and always listen. A bit about me Crea%ve Director at U%lity Crea%ve
More informationThe Not- So- Simple California LLC: New Laws Governing Fiduciary Du@es of LLC Members
The Not- So- Simple California LLC: New Laws Governing Fiduciary Du@es of LLC Members Ma# Mahoney, Esq. Founding Partner, Witham Mahoney & Abbo7 THIS IS YOUR CLIENT He sa1sfies the 3 R s of the Perfect
More informationMarch 10 th 2011, OSG All Hands Mee6ng, Network Performance Jason Zurawski Internet2 NDT
March 10 th 2011, OSG All Hands Mee6ng, Network Performance Jason Zurawski Internet2 NDT Agenda Tutorial Agenda: Network Performance Primer Why Should We Care? (15 Mins) GeNng the Tools (10 Mins) Use of
More informationHow To Use A Polyanalyst
Accident Data Analysis with PolyAnalyst Pavel Anashenko Sergei Ananyan www.megaputer.com Megaputer Intelligence, Inc. 120 West Seventh Street, Suite 310 Bloomington, IN 47404, USA +1 812-330-0110 Accident
More informationCustomer Analytics. Turn Big Data into Big Value
Turn Big Data into Big Value All Your Data Integrated in Just One Place BIRT Analytics lets you capture the value of Big Data that speeds right by most enterprises. It analyzes massive volumes of data
More informationREDCap Longitudinal Studies & Surveys
REDCap Longitudinal Studies & Surveys ITHS Biomedical Informa2cs Core iths_redcap_admin@uw.edu Bas de Veer MS Research Consultant REDCap version: 6.0.1 Last updated October 22, 2014 1 Goals & Agenda Goals
More informationTopic Extrac,on from Online Reviews for Classifica,on and Recommenda,on (2013) R. Dong, M. Schaal, M. P. O Mahony, B. Smyth
Topic Extrac,on from Online Reviews for Classifica,on and Recommenda,on (2013) R. Dong, M. Schaal, M. P. O Mahony, B. Smyth Lecture Algorithms to Analyze Big Data Speaker Hüseyin Dagaydin Heidelberg, 27
More information2013 Copyright ComFit Learning Prep
1 2 We at ComFit share with you a common objec=ve: to help your students be more successful in their academic lives and their personal lives. We seek to accomplish this objec=ve by helping you address
More informationPROJECT PORTFOLIO SUITE
ServiceNow So1ware Development manages Scrum or waterfall development efforts and defines the tasks required for developing and maintaining so[ware throughout the lifecycle, from incep4on to deployment.
More informationIndustry leading Education
Industry leading Education Please ask questions #CGwebinar Todays slides are available http://compliancy- group.com/slides023/ Past webinars and recordings http://compliancy- group.com/webinar/ 855.85HIPAA
More informationBoomer Technology Group, LLC.
Consul'ng has its ups and downs. This presenta'on is meant to educate those interested in this career path. As well as re- enforce what seasoned consultants already know. This informa'on is presented on
More informationPATRIOT BANK CUSTOMERS. Corporate Account Takeover & Information Security Awareness
PATRIOT BANK CUSTOMERS Corporate Account Takeover & Information Security Awareness What will be covered! What is Corporate Account Takeover?! How does it work?! Sta9s9cs! Current Trend Examples! What can
More informationArgand Energy Monitoring Systems
Argand Energy Monitoring Solu,ons All your u/li/es & renewables Real- /me & web- enabled Supported by our experts Savings with confidence Our driving philosophy Everything we do is focused on helping clients
More informationMinority Cer+fica+on Program Office of Supplier Diversity
Minority Cer+fica+on Program Office of Supplier Diversity Florida Department Management Services 4050 Esplanade Way, Suite 360 Tallahassee, Florida 32399-0950 Telephone: (850) 487-0915 Fax: (850) 922-6852
More informationFrom ESI to EDRM. An Overview of Electronic Discovery
From ESI to EDRM An Overview of Electronic Discovery From ESI to EDRM An Overview of Electronic Discovery Understanding ESI Defini&ons, Descrip&ons, and Drivers Understanding Electronic Discovery Tasks,
More informationKeeping Pace with Big Data
- A Data Mining Perspec>ve Huan Liu, Tempe, AZ hep://www.public.asu.edu/~huanliu NSF Workshop on Big Data Analy6cs for Infrastructure and Building Resilience and Sustainability, Beijing, China Sept 19-20,
More informationIBM ediscovery Identification and Collection
IBM ediscovery Identification and Collection Turning unstructured data into relevant data for intelligent ediscovery Highlights Analyze data in-place with detailed data explorers to gain insight into data
More informationArchitec;ng Splunk for High Availability and Disaster Recovery
Copyright 2014 Splunk Inc. Architec;ng Splunk for High Availability and Disaster Recovery Dritan Bi;ncka BD Solu;on Architecture Disclaimer During the course of this presenta;on, we may make forward- looking
More informationThe Data Quality Planning Guide
The Data Quality Planning Guide A practical guide to selecting Data Quality Software You Are Here If you re here, you are somewhere on the road to dealing with your organiza7on s data uality challenges
More informationIntroduc)on to the IoT- A methodology
10/11/14 1 Introduc)on to the IoTA methodology Olivier SAVRY CEA LETI 10/11/14 2 IoTA Objec)ves Provide a reference model of architecture (ARM) based on Interoperability Scalability Security and Privacy
More informationResearch in Simulation: Research and Grant Writing 101
Research in Simulation: Research and Grant Writing 101 Amar Patel, MS, NREMT-P, CFC Director, Center for Innovative Learning WakeMed Health & Hospitals Geoff Miller Director Eastern Virginia Medical School
More informationWORKSHOP People Change Management Strategy
WORKSHOP People Change Management Strategy You will create the People Change Management Strategy document in this workshop to help you answer the ques;on: How much People Change Management is needed for
More informationTren%no ICT, innova%on and e- government. Sergio Be5o6 Autonomous Province of Trento Alpine Spring Fes-val, Bolzano 4 th 8 th March 2013
Tren%no ICT, innova%on and e- government Sergio Be5o6 Autonomous Province of Trento Alpine Spring Fes-val, Bolzano 4 th 8 th March 2013 The innova%on principles (1) Shared governance (involving the whole
More informationAddressing the Automa8on Gap in SOPdriven
Addressing the Automa8on Gap in SOPdriven Laboratories Jerry Lominac Public Sector Informa8cs Accounts 2009 PerkinElmer Challenges in the QA/QC Space Public and Private labs need to reduce costs without
More informationPower to the People: Analy0cs for All
Arijit Sengupta CEO, BeyondCore, Inc. Power to the People: Analy0cs for All " Ten patents related to Advanced Analytics, Privacy/Security and BPaaS. " Previously worked at Oracle, Microsoft, Yankee Group
More informationMega Modeling for Scien/fic Big Data Processing
Mega Modeling for Scien/fic Big Data Processing Stefano Ceri, Emanuele Della Valle (Politecnico di Milano) Dino Pedreschi, Roberto Trasar/ (ISTI- CNR and University of Pisa) 1 The context 2 Scenario BIG
More informationFTC Data Security Standard
FTC Data Security Standard The FTC takes the posi6on (Being tested now in li6ga6on) that Sec6on 5 of the FTC Act requires Reasonable Security under the circumstances: that companies have reasonable controls
More informationInforma*on Management
Informa*on Management Deepak Mohan SVP, Informa3on Management Group 1 Symantec Informa*on Management Strategy Protect Completely Dedupe Everywhere Delete Confidently Discover Efficiently Backup, archive
More informationInterac(ve Broker (UK) Limited Webinar: Proprietary Trading Groups
Interac(ve Broker (UK) Limited Webinar: Proprietary Trading Groups Presenter Gerald Perez Managing Director London, United Kingdom E- mail: gperez@interac=vebrokers.com Important Informa=on: The risk of
More information