Virtual Personal Assistant
|
|
|
- Augustine Baker
- 10 years ago
- Views:
Transcription
1 Virtual Personal Assistant Peter Imire 1 and Peter Bednar 2 Abstract This report discusses ways in which new technology could be harnessed to create an intelligent Virtual Personal Assistant (VPA) with a focus on userbased data. It will look at examples of intelligent programs with natural language processing that are currently available, with different categories of support, and examine the potential usefulness of one specific piece of software as a VPA. This engages the ability to communicate socially through natural language processing, holding and analysing data within the context of the user. It is suggested that new technologies may soon make the idea of virtual personal assistants a reality. Experiments conducted on this system, combined with user testing, have provided evidence that a basic program with natural language processing algorithms in the form of a VPA, with basic natural language processing and the ability to function without the need for other type of human input (or programming) may already be viable. Background Recent events have focused much attention on personal data and the parlous nature of boundaries previously drawn between private and public systems. Many people now wonder who has access to data resulting from unwise posts to social media sites, or monitoring of supposedly private s and telephone conversations. As the focus of supporting systems is shifting towards holding more data within the Cloud, the privacy and security of this data has become a cause for concern. With this area of social concern in mind, the idea of a VPA becomes attractive as it changes the focus of the supporting system to the contextual sphere under private control of the user. We have devised a hypothesis that a chatbot with natural language algorithms and localised data could be trained to function as a VPA with user based data control. This will require the program to be able to create metadata by forming links between data it is given and provide contextual outputs during the interaction that the user finds useful. When looking at a number of currently available intelligent programs with natural language processing capabilities, many examples can be found in everyday life filling a variety of roles. The intelligent bot Siri can be found as standard on Apple mobile devices now and is considered a core component on these devices. Siri is a 1 Peter Imrie, [email protected] 2 University of Portsmouth, School of Computing, [email protected]
2 2 personal assistant that uses natural language processing to answer questions and outsource requests to web services that will then be carried out for the user [1]. Similarly to this, the chatbot HAL was created by Zabaware Inc to function as a virtual assistant for users on computers [10]. The bot also uses natural language processing algorithms to converse with the user and take notes from what the user is saying in an effort to organize the data given to it. While these two programs function as virtual assistants, this type of intelligent system can be found filling just about any role that requires interaction between a user and helper where the helper s speech could be scripted. Following in this idea Virgin Media briefly used a chatbot named Jenny to function as a call centre agent [9]. The role of this program was to provide customer support and answer any frequently asked questions that the program could match answers to. IBM has invested a large amount of resources into this field and has created Watson, a system developed to compete on the TV show Jeopardy! [7]. This system exhibits the current capabilities of intelligent systems with natural language recognition as it successfully beat the two most successful human contestants of the show. Both of these two programs use algorithms to take specific components out from sentence used as input and match the most suitable output to it [4]. In contrast to these roles is the chatbot Kari who functions as a virtual girlfriend [6]. This system communicates with the user and through using similar methods natural language recognition tries to provoke social conversation with the user. The software aims to give personal companionship and to replicate human interaction as accurately as possible with the assistance of algorithms designed to help the program learn from its inputs. Programs name Individual / organization focus Subject of support Ownership of personalization Emotional interaction Siri Individual User Type Corporate Logical Hal Individual Unique user Private / Local Logical Watson Organization Stakeholder Corporate Logical Kari Individual Unique user Private / Local Simulated Emotion Fig. 1. Table of attributes for 4 programs At face value the 5 programs mentioned all have a number of similarities that are core through this type of intelligent system. Each program is capable of taking apart an input that is communicated to it by the user and formulating a roleappropriate response using natural language processing. All of these systems remember the data within each input to be reused later to expand its conversation base and attempt to more accurately respond or to monitor the success of its
3 3 current outputs. When just superficially looking at the functionality like this, it could be argued that these programs are all incredibly similar with only a slight variation in capabilities. However, looking more closely at them, there are significant differences between each of these systems in the handling and storage of the data provided to them by users (fig 1). With the data both used by the systems and gained from the user handled differently with each program a completely different context of support is provided as a result (including different privacy implications). The idea of categorizing the context of support that a system provides has previously been proposed [3]. The categories used within this infrastructure (fig 2) provide an effective way of identifying the differences between what superficially may appear to be functionally similar intelligent programs with natural language algorithms. The categories define the differences between methods of support within the context of the storage of the data gathered by the system. User INSP Information Objects Metadata Mediation INformation Provider (INSP) User Content Content Providers Information Objects Repositories Content User Client User contexts Intermediate device User Third party Source Source contexts User User User owned services Content User Fig. 2. Categories of support infrastructure. [3] The differences between how each of the examples examined handle personal data is enough to clearly categorize the apparently similar programs into different sections depending on where the data actually remains. Information service providers: defines systems that support the user by carrying out requests but also provide support for the organization behind the system. An example of this is Siri. Siri uses each instance of the program to gather data to be transmitted to Apple s cloud of data and depends on this cloud for its natural language processing, not a localised library. This means that Siri is becoming more aware of how to deal with the general public as a whole, but is not focusing on each individual user. Alongside this, Siri uses this link with Apple s cloud to transmit large volumes of
4 4 data from the user s device to the organizations network to be used by Apple [8]. The data generated by the analysis of user activities is owned and controlled by Apple. Content providers: is used to identify systems that provide the content to be used by other systems. With relation to systems with natural language algorithms, the content providers can be the holders of large data libraries for a program to access. For example, Watson is capable of interacting with content providers to gather more data and expand on its own data libraries. Watson can analyze data from existing databases and create its own metadata. Mediation service: contains systems that function as an intermediate system between the user and other services. Mediation services can act as a way for multiple users to access one support system allowing for a broader user base. An example of this would be the proposed hospital interface to Watson [2].The idea is that stakeholder dependant interface systems will be used to send requests to a centralized Watson who will be supporting each individual simultaneously. The mediation service is neither working for the user nor the service provider but acts as a method of connecting the two and allows for multiple access into Watson (for example based on subscription services). The analysis of stakeholder use and characteristics is both owned and controlled by the mediation service provider. Third party service: contains services that can be applied to a system for its own improvement. The services from this category do not act to provide services to the user but provide support to the systems the user is using. An example of this is the developers behind Kari or Hal. Once the program has been sold to a user it is out of the third party s hands and remains within the user s context, but any further updates produced by the third party can be applied to the system in the future. It is also possible to see Kari as a potential agent acting on behalf of a user as an intermediary for other support systems (e.g. in principle Kari could use Siri). User owned services: holds systems that work for the user personally, allowing for private interactions and data to be kept between the user and the system. This category would define the support provided by the chat bots Kari and Hal. The systems in this category have no dependency on any of the other categories to work as a supporting system for the user making them personalised systems. The support system does not only have local data and libraries, it also develops metadata and contextual data as a result of use analysis and history of interaction with user. All of contextually developed content in the data library is owned and under the control of the end user. The Virtual Personal Assistant The chatbot Kari has shown promise in addressing the issue of user based support within an intelligent program with natural language processing. The discussion of a virtual assistant can use this program as a reference point to explore functionality, capability and potential. To enhance our understanding of the
5 5 potential of such software, regardless of its original purpose, a number of experiments have been conducted. The functions and capabilities specifically tested are ability to retain data, to adapt retained data into conversations with the user and to provoke and maintain continuous conversation. This covers analysis of an input, method of creating an output and failsafe strategy for when a straightforward response is not available. All of the data discussed with the bot remained locally with the software and therefore the program itself will develop to act differently to any other instance of the Kari program. Alongside this, there is no method of data extraction for the program to focus on. This in turn means that Kari s main focus is to support the user through conversation using and continuously redeveloping its now unique library of data and metadata. To confirm that Kari was capable of a minimum level of capability of using natural language to process inputs and create outputs we started our testing with a sample behaviour period. The minimum level of capability is defined as evidence that the program is able to deconstruct inputs, store any new data, create metadata by linking the input to other data already in its library and use this to construct an appropriate output (e.g. something experienced as useful to the user). Within this period, conversations with the program were conducted up to a set number of responses. The conversations were completely driven by the systems preset library and without any form of initial data editing these conversations were focused on trying to replicate a realistic human conversation. It was quickly obvious how Kari chose to respond. The bot would examine key words within an input and match it to an output that either used the key words or words linked to them. Further sessions were structured around clearly presenting keywords in a phrase to help Kari better understand the input. After Kari was tested to be capable to a basic level of competency in the areas of learning from inputs and constructing relevant outputs, more focused tests were implemented in phases. Initially conversations were constructed with the program to attempt to pass on as much data on a subject as possible. To explore the method the program used to disassemble each input, each proposition was consequently given in the form of variants of sentences in English. This included different ways of saying the same thing, to examine how well the program linked data together. To ensure that each part of the subject matter was covered we split the subject into subsections with specific focus. A session would then cover a conversation that would discuss each data in its simplest form, with separate sessions that include more complex statements. The simple sessions followed the formula of Alan Turing is X where X is a relevant piece of data. The more complex inputs followed a formula of Alan Turing was X at Y on Z where X, Y and Z are relevant data. These sessions consisted of over 60 conversations with each one resulting in roughly 5 pages (approx 2000 words) of dialogue with the program. This segment of testing also included the data that would be used to question the program about in further experiments so Kari s success in this section was necessary before further tests could be conducted. An example of this experiment is the parents of Alan Turing. This data was given to the program repeatedly in different ways, including different working of the data
6 6 such as Alan Turing s father was Julius Turing and Alan Turing s parents were Julius Turing and Ethel Sara. This variation of input was designed to examine the programs ability to make connections between the words father and parent. This was combined in more complex inputs to relate new data to what the program had already received. Additional data included Alan Turing s date of birth and location of birth. Variation of each input (including complex inputs with more data) included data about his parents in some form in an attempt to assert that the program retained the data and related it to the other inputs. To test what the program had retained a set of questions around the inputs was constructed. The inputs the questions were variations of the core request for data on Alan Turing s parents and were combined with questions that included requests for related data. An example of such question would be Who were Alan Turing s parents and where was he born? This was focused on seeing if the program had made the connections between Alan Turing, his parents and his birth. This test was run with lots of different data all related to the life of Alan Turing to give the chat bot multiple pieces of data that are all related, allowing for patterns between the data to be formed. The system at this point was made available to a number of end users to attempt to learn as much about Alan Turing as they could through conversations over a short period of time. The end user group consisted of 20 students at degree level of education who were all given 10 minutes of contact time with the trained instance of Kari. The data the user was advised to question the chat bot about was data contained within previous experiments run against the program. Following this a questionnaire was given to the user to examine how much data the bot had output and how easy the process was. Chat logs between the user and the chat bot were also recorded to see the relation between what was asked and what data was made available. One user managed to get appropriate results for the majority of the questions regarding Alan Turing s life. Another user struggled to gain any relevant data regarding the life of Alan Turing at all. The end user tests showed that the majority of the responses given by Kari were appropriate. Over multiple sessions the program displayed the capability to learn from a users input and simulate a conversation on the relevant subject. This gives supporting evidence to the idea that a chatbot based virtual assistant is a feasible system when focusing on supporting individuals. This however seemed mainly to be down to factors such as user spelling mistakes and user inputs based on data provided in previous user inputs. This unlimited variation of potential use of natural language makes it harder for the chatbot to gather data from the newest contextual input and to create and formulate an appropriate output. The system results benefited greatly from the personal aspects when only one user interacted with the system. The system developed patterns within the context of the specific user making the system more successful and useful over time. This resulted in the conversations with the chatbots trainer producing more appropriate and personal outputs than the conversations with the users testing the system that had no previous interaction with it.
7 7 Conclusion The results gathered from the tests with Kari have given evidence to support our hypothesis. This was achieved by Kari showing the capability to meet the requirements discussed to support our initial hypothesis. Throughout the conversations with Kari during tests outputs given were appropriate and contextual to the input. This contextual awareness allowed the program to expand on the appropriate answer with data that is related to the subject by the now unique metadata. The end result of this is an expanded response which in turn goes beyond appropriate and becomes useful in a meaningful way to the user. It is this expansion that allows the trained instance of Kari to function as a useful VPA whiles its personalization and contextual awareness give the user control of its unique library of data and metadata. Throughout the analysis and testing of the program, a number of potential improvements for the ideal virtual assistant have been identified. The ideal virtual assistant will be a program with the natural language recognition already present in current chat bots. This should be paired with a learning algorithm and natural language processing capabilities, including imitation of emotional engagement similar to that of Kari s, where key words are used to identify patterns between data. The bot should hold a small preset library containing basic conversations (small talk, greetings) and provocations to continue the conversation (questions, curiosity). It is the questions and curiosity of the program that creates the demand for attention that provokes the user into actively using the supporting system for any scenario. The extent of the potential to use this type of technology doesn t end there however. The idea of an artificially intelligent personal system that supports the user specifically instead of working as an data service provider is a subject area that is constantly expanding and crying out for attention. A capable program could be used as an effective tool for anything ranging from work use to personal use while remaining a user-based system. In this paper we have looked at examples of programs that showcase the various technologies and functions that, when combined, have the capacity to form an effective virtual assistant. This is using technologies that are already present and applied throughout the world today with a huge scope for expansion in the future. The social aspects of these programs have shown logical and emotional engagement and development of their controlled knowledge base. These social aspects play a big role in motivating a user to actively engage with the system and simulated emotion is being developed by IBM to integrate into Watson [5]. This emotional engagement will further build upon the already capable pattern recognition to allow for the better understanding of logical inconsistencies in data. The patterns formed between data helps each program to react differently to different inputs. When this is combined with the local storage of data libraries it becomes a personalisation of the program. The programs function will be uniquely different as it understands the data in relation to the user. If the technology that is present is integrated with the ideas of personal ownership of support system
8 8 (including ongoing metadata creation and analysis) as discussed in this paper a new form of virtual assistant could be created. This virtual and personal assistant, which is capable of emulating both logical and emotional interest in the interaction with its user, is a missing link in business support as it falls within the category of user support, supporting the end user in their needs and efforts. Bringing these ideas and technologies together would lead the way for a truly useful virtual personal assistant. Logical aspects make the system usable, however the combination of logical with emotional aspects make such a system worthwhile, and so ultimately useful for the user. References 1. Apple. (n.d.). Siri. Your wish is it's command.. Available: Last accessed 15th April BBC News. (2012). IBM's Watson supercomputer goes to medical school. Available: Last accessed 22nd April Bednar, P M, Welch, C and Graziano, A (2007) Learning Objects and their implications on Learning: a case of developing the foundation for a new Knowledge Infrastructure, Chapter 6 in Learning Objects: Applications, Implications & Future Directions. Harman, K and Koohang, A, eds., Informing Science Press, NY, pp , 4. Ferrucci, D et al. (2010). Building Watson: An Overview of the DeepQA Project. Available: Last accessed 11th Nov IBM. (n.d.). Neurosynaptic chips. Available: Last accessed 1st Sept Lhandslide Studios. (2012). Advanced Virtual Girl with Artificial Intelligence. Available: Last accessed 22nd April Markoff, J. (2009). Computer Program to Take On Jeopardy!.Available: x= pos7/s6cj4ryr8fof95/ea. Last accessed 11th Nov Ozer, N. (2012). Note to Self: Siri Not Just Working for Me, Working Full-Time for Apple, Too. Available: Last accessed 22nd April Reed, M. (2012). Ask Jenny Lends a Hand on Virgin Media s Website. Available: website/. Last accessed 22nd April Zabaware Inc. (n.d.). Ultra Hal can hold conversations with you. Available: Last accessed 2nd march 2013.
Service Overview. KANA Express. Introduction. Good experiences. On brand. On budget.
KANA Express Service Overview Introduction KANA Express provides a complete suite of integrated multi channel contact and knowledge management capabilities, proven to enable significant improvements in
Agile Software Development Methodologies and Its Quality Assurance
Agile Software Development Methodologies and Its Quality Assurance Aslin Jenila.P.S Assistant Professor, Hindustan University, Chennai Abstract: Agility, with regard to software development, can be expressed
Business Intelligence, Big Data, and HR
QUEEN S UNIVERSITY IRC 2015 Queen s University IRC. This paper may not be copied, republished, distributed, transmitted or converted, in any form or by any means, electronic or otherwise, without the prior
Web Analytics. Using emetrics to Guide Marketing Strategies on the Web
Web Analytics Using emetrics to Guide Marketing Strategies on the Web Web analytics is the practice of measuring, collecting, analyzing and reporting on Internet data for the purposes of understanding
Get to Grips with SEO. Find out what really matters, what to do yourself and where you need professional help
Get to Grips with SEO Find out what really matters, what to do yourself and where you need professional help 1. Introduction SEO can be daunting. This set of guidelines is intended to provide you with
CHAPTER 15: IS ARTIFICIAL INTELLIGENCE REAL?
CHAPTER 15: IS ARTIFICIAL INTELLIGENCE REAL? Multiple Choice: 1. During Word World II, used Colossus, an electronic digital computer to crack German military codes. A. Alan Kay B. Grace Murray Hopper C.
Preproduction in the Game Development Process
Preproduction in the Game Development Process From Proposal to Prototype Instructor Sara R. Farr Preproduction At this point, you already have an approved game proposal outlining your game. Preproduction
Outline. 1 Denitions. 2 Principles. 4 Implementation and Evaluation. 5 Debugging. 6 References
Outline Computer Science 331 Introduction to Testing of Programs Mike Jacobson Department of Computer Science University of Calgary Lecture #3-4 1 Denitions 2 3 4 Implementation and Evaluation 5 Debugging
How to Plan a Successful Load Testing Programme for today s websites
How to Plan a Successful Load Testing Programme for today s websites This guide introduces best practise for load testing to overcome the complexities of today s rich, dynamic websites. It includes 10
Nine Common Types of Data Mining Techniques Used in Predictive Analytics
1 Nine Common Types of Data Mining Techniques Used in Predictive Analytics By Laura Patterson, President, VisionEdge Marketing Predictive analytics enable you to develop mathematical models to help better
BUSINESS INTELLIGENCE AS SUPPORT TO KNOWLEDGE MANAGEMENT
ISSN 1804-0519 (Print), ISSN 1804-0527 (Online) www.academicpublishingplatforms.com BUSINESS INTELLIGENCE AS SUPPORT TO KNOWLEDGE MANAGEMENT JELICA TRNINIĆ, JOVICA ĐURKOVIĆ, LAZAR RAKOVIĆ Faculty of Economics
What is Artificial Intelligence?
CSE 3401: Intro to Artificial Intelligence & Logic Programming Introduction Required Readings: Russell & Norvig Chapters 1 & 2. Lecture slides adapted from those of Fahiem Bacchus. 1 What is AI? What is
Watson. An analytical computing system that specializes in natural human language and provides specific answers to complex questions at rapid speeds
Watson An analytical computing system that specializes in natural human language and provides specific answers to complex questions at rapid speeds I.B.M. OHJ-2556 Artificial Intelligence Guest lecturing
t Tests in Excel The Excel Statistical Master By Mark Harmon Copyright 2011 Mark Harmon
t-tests in Excel By Mark Harmon Copyright 2011 Mark Harmon No part of this publication may be reproduced or distributed without the express permission of the author. [email protected] www.excelmasterseries.com
I N T E L L I G E N T S O L U T I O N S, I N C. DATA MINING IMPLEMENTING THE PARADIGM SHIFT IN ANALYSIS & MODELING OF THE OILFIELD
I N T E L L I G E N T S O L U T I O N S, I N C. OILFIELD DATA MINING IMPLEMENTING THE PARADIGM SHIFT IN ANALYSIS & MODELING OF THE OILFIELD 5 5 T A R A P L A C E M O R G A N T O W N, W V 2 6 0 5 0 USA
72. Ontology Driven Knowledge Discovery Process: a proposal to integrate Ontology Engineering and KDD
72. Ontology Driven Knowledge Discovery Process: a proposal to integrate Ontology Engineering and KDD Paulo Gottgtroy Auckland University of Technology [email protected] Abstract This paper is
Benefits Realization from IS & IT, and Change Management of roles and the working practices of individuals and teams.
: Delivering Value from IS & IT Investments John Ward and Elizabeth Daniel John Wiley & Son Ltd ISBN: 9780470094631, 399 pages Theme of the Book This book explores a process and practical tools and frameworks
What is Prospect Analytics?
What is Prospect Analytics? Everything you need to know about this new sphere of sales and marketing technology and how it can improve your business Table of Contents Executive Summary... 2 The Power of
MAN VS. MACHINE. How IBM Built a Jeopardy! Champion. 15.071x The Analytics Edge
MAN VS. MACHINE How IBM Built a Jeopardy! Champion 15.071x The Analytics Edge A Grand Challenge In 2004, IBM Vice President Charles Lickel and coworkers were having dinner at a restaurant All of a sudden,
Healthcare Measurement Analysis Using Data mining Techniques
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 03 Issue 07 July, 2014 Page No. 7058-7064 Healthcare Measurement Analysis Using Data mining Techniques 1 Dr.A.Shaik
Digital Asset Manager, Digital Curator. Cultural Informatics, Cultural/ Art ICT Manager
Role title Digital Cultural Asset Manager Also known as Relevant professions Summary statement Mission Digital Asset Manager, Digital Curator Cultural Informatics, Cultural/ Art ICT Manager Deals with
Desktop Virtualization Technologies and Implementation
ISSN : 2250-3021 Desktop Virtualization Technologies and Implementation Pranit Patil 1, Shakti Shekar 2 1 ( Mumbai, India) 2 (Mumbai, India) ABSTRACT Desktop virtualization is new desktop delivery method
Insight Guide. E-Learning Compliance. www.kineo.com
Insight Guide E-Learning Compliance LAST MENU BACK NEXT Insight Guide Overview The challenges of compliance training Questions to ask before you begin your design 20 minutes A new generation of design
SCALABILITY OF CONTEXTUAL GENERALIZATION PROCESSING USING PARTITIONING AND PARALLELIZATION. Marc-Olivier Briat, Jean-Luc Monnot, Edith M.
SCALABILITY OF CONTEXTUAL GENERALIZATION PROCESSING USING PARTITIONING AND PARALLELIZATION Abstract Marc-Olivier Briat, Jean-Luc Monnot, Edith M. Punt Esri, Redlands, California, USA [email protected], [email protected],
Coaching the team at Work
Coaching the team at Work Introduction While a great deal has been written about coaching individuals, there has been relatively little investigation of coaching teams at work. Yet in discussions with
Test management best practices
Test management best practices Introduction Purpose Few people can argue against the need for improved quality in software development. Users of technology that utilizes software have come to expect various
TAKEAWAYS CHALLENGES. The Evolution of Capture for Unstructured Forms and Documents STRATEGIC WHITE PAPER
STRATEGIC WHITE PAPER CHALLENGES Lost Productivity Business Inefficiency The Evolution of Capture for Unstructured Forms and Documents Inability to Capture and Classify Unstructured Forms and Documents
COMP 590: Artificial Intelligence
COMP 590: Artificial Intelligence Today Course overview What is AI? Examples of AI today Who is this course for? An introductory survey of AI techniques for students who have not previously had an exposure
Business Process Validation: What it is, how to do it, and how to automate it
Business Process Validation: What it is, how to do it, and how to automate it Automated business process validation is the best way to ensure that your company s business processes continue to work as
ARTIFICIALLY INTELLIGENT COLLEGE ORIENTED VIRTUAL ASSISTANT
ARTIFICIALLY INTELLIGENT COLLEGE ORIENTED VIRTUAL ASSISTANT Vishmita Yashwant Shetty, Nikhil Uday Polekar, Sandipan Utpal Das, Prof. Suvarna Pansambal Department of Computer Engineering, Atharva College
The Information Management Body of Knowledge
The Information Management Body of Knowledge 2 Allen Lee s simple model (see Fig. 1.2) was the foundation of the IMBOK, but it masks huge complexities in the territory where information technology, business
KEY POINTS TO CONSIDER WHEN IMPLEMENTING A STRUCTURED SETTLEMENT
KEY POINTS TO CONSIDER WHEN IMPLEMENTING A STRUCTURED SETTLEMENT Most experienced litigators are well aware of the benefits of structured settlements in personal injury claims. The win-win proposition
THE INFORMATION AUDIT AS A FIRST STEP TOWARDS EFFECTIVE KNOWLEDGE MANAGEMENT: AN OPPORTUNITY FOR THE SPECIAL LIBRARIAN * By Susan Henczel
INSPEL 34(2000)3/4, pp. 210-226 THE INFORMATION AUDIT AS A FIRST STEP TOWARDS EFFECTIVE KNOWLEDGE MANAGEMENT: AN OPPORTUNITY FOR THE SPECIAL LIBRARIAN * By Susan Henczel Introduction Knowledge is universally
A Future Without Secrets. A NetPay Whitepaper. www.netpay.co.uk www.netpay.ie. more for your money
A Future Without Secrets A NetPay Whitepaper A Future Without Secrets The new business buzz word is Big Data - everyone who is anyone in business is talking about it, but is this terminology just another
Knowledge Management. Clobridge Consulting. An 8-Point Primer. Linking people with information & knowledge www.clobridgeconsulting.com.
Knowledge Management An 8-Point Primer January 2014 Clobridge Consulting Linking people with information & knowledge www.clobridgeconsulting.com The Knowledge Management 8-Point Primer What is Knowledge
International Journal of Advanced Engineering Research and Science (IJAERS) Vol-2, Issue-11, Nov- 2015] ISSN: 2349-6495
International Journal of Advanced Engineering Research and Science (IJAERS) Vol-2, Issue-11, Nov- 2015] Survey on Automation Testing Tools for Mobile Applications Dr.S.Gunasekaran 1, V. Bargavi 2 1 Department
Early Childhood Community Network Pilots Model and Expected Results
Early Childhood Community Network Pilots Model and Expected Results Model for Community Network Pilots: Programs in network agree to high standards measured by common program and child assessments State
Improved Event Logging for Security and Forensics: developing audit management infrastructure requirements
Improved Event Logging for Security and Forensics: developing audit management infrastructure requirements Atif Ahmad & Anthonie Ruighaver University of Melbourne, Australia Abstract The design and implementation
A Better Statistical Method for A/B Testing in Marketing Campaigns
A Better Statistical Method for A/B Testing in Marketing Campaigns Scott Burk Marketers are always looking for an advantage, a way to win customers, improve market share, profitability and demonstrate
Predicting the Stock Market with News Articles
Predicting the Stock Market with News Articles Kari Lee and Ryan Timmons CS224N Final Project Introduction Stock market prediction is an area of extreme importance to an entire industry. Stock price is
Cross Media Attribution
Cross Media Attribution Building bridges across Paid, Owned and Earned Media to optimize media mix efficiencies and effectiveness May 2012 Lead Contributors Katrin Ribant Data Platforms Havas Media Group
Introduction 3. What is SEO? 3. Why Do You Need Organic SEO? 4. Keywords 5. Keyword Tips 5. On The Page SEO 7. Title Tags 7. Description Tags 8
Introduction 3 What is SEO? 3 Why Do You Need Organic SEO? 4 Keywords 5 Keyword Tips 5 On The Page SEO 7 Title Tags 7 Description Tags 8 Headline Tags 9 Keyword Density 9 Image ALT Attributes 10 Code Quality
Great Analytics start with a Great Question
Great Analytics start with a Great Question Analytics must deliver business outcomes - otherwise it s just reporting 1 In the last five years, many Australian companies have invested heavily in their analytics
Deposit Identification Utility and Visualization Tool
Deposit Identification Utility and Visualization Tool Colorado School of Mines Field Session Summer 2014 David Alexander Jeremy Kerr Luke McPherson Introduction Newmont Mining Corporation was founded in
(Refer Slide Time: 01:52)
Software Engineering Prof. N. L. Sarda Computer Science & Engineering Indian Institute of Technology, Bombay Lecture - 2 Introduction to Software Engineering Challenges, Process Models etc (Part 2) This
Application Lifecycle Management White Paper. Source Code Management Best Practice: Applying Economic Logic to Migration ALM
ALM Application Lifecycle Management White Paper Source Code Management Best Practice: Applying Economic Logic to Migration Summary: Is there a Business Case for Migration? Ultimately, what is the value
BUSINESS RULES AND GAP ANALYSIS
Leading the Evolution WHITE PAPER BUSINESS RULES AND GAP ANALYSIS Discovery and management of business rules avoids business disruptions WHITE PAPER BUSINESS RULES AND GAP ANALYSIS Business Situation More
Pasadena City College / ESL Program / Oral Skills Classes / Rubrics (1/10)
Pronunciation Classes Pasadena City College / ESL Program / Oral Skills Classes / Rubrics (1/10) ESL 246 SLO #1: Students will recognize and begin to produce correct American-English patterns in short
Computer-Based Text- and Data Analysis Technologies and Applications. Mark Cieliebak 9.6.2015
Computer-Based Text- and Data Analysis Technologies and Applications Mark Cieliebak 9.6.2015 Data Scientist analyze Data Library use 2 About Me Mark Cieliebak + Software Engineer & Data Scientist + PhD
Software Development and Testing: A System Dynamics Simulation and Modeling Approach
Software Development and Testing: A System Dynamics Simulation and Modeling Approach KUMAR SAURABH IBM India Pvt. Ltd. SA-2, Bannerghatta Road, Bangalore. Pin- 560078 INDIA. Email: [email protected],
Structured Content: the Key to Agile. Web Experience Management. Introduction
Structured Content: the Key to Agile CONTENTS Introduction....................... 1 Structured Content Defined...2 Structured Content is Intelligent...2 Structured Content and Customer Experience...3 Structured
Graphical Environment Tool for Development versus Non Graphical Development Tool
Section 4 Computing, Communications Engineering and Signal Processing & Interactive Intelligent Systems Graphical Environment Tool for Development versus Non Graphical Development Tool Abstract S.Daniel
Dr. Emdad Khan Intelligent Agent (IA)
Dr. Emdad Khan Internet Speech is a new start-up company based in Silicon Valley, California. Our technology, Voice Internet, provides the internet to everyone, and every one means all types of people
Measuring performance in credit management
Measuring performance in credit management Ludo Theunissen Prof. Ghent University Instituut voor Kredietmanagement e-mail: [email protected] Josef Busuttil MBA (Henley); DipM MCIM; FICM Director
Centralized vs. Federated:
Centralized vs. Federated: State Approaches to P-20W Data Systems Historically, efforts to create a P-20W 1 data repository resulted in the development and use of a single, centralized data system that
Data Virtualization A Potential Antidote for Big Data Growing Pains
perspective Data Virtualization A Potential Antidote for Big Data Growing Pains Atul Shrivastava Abstract Enterprises are already facing challenges around data consolidation, heterogeneity, quality, and
Identifying Information Assets and Business Requirements
Identifying Information Assets and Business Requirements This guidance relates to: Stage 1: Plan for action Stage 2: Define your digital continuity requirements Stage 3: Assess and manage risks to digital
Evaluating Survey Questions
Question Bank FACTSHEET 4 Evaluating Survey Questions Introduction: Our intention here at the Question Bank is to provide you, the user, with plenty of examples of survey questions in order to help you
Oracle Real Time Decisions
A Product Review James Taylor CEO CONTENTS Introducing Decision Management Systems Oracle Real Time Decisions Product Architecture Key Features Availability Conclusion Oracle Real Time Decisions (RTD)
One Cloud doesn t fit all:
One Cloud doesn t fit all: The emerging trends in multi-vendor cloud platforms To cloud or not to cloud is no longer the question. Organisations have moved beyond the deliberation stage, and with many
WIRED VIDEO STEP GUIDE TO COMMISSIONING VIDEO CONTENT.
WIRED VIDEO STEP GUIDE TO COMMISSIONING VIDEO CONTENT. IN THIS GUIDE Each film is unique, but the process of taking your messages and turning them into images and sounds which will fix them indelibly in
CHAPTER 5: PRODUCTIVITY APPLICATIONS
CHAPTER 5: PRODUCTIVITY APPLICATIONS Multiple Choice: 1. Entering and editing text can be done most efficiently using a: A. spreadsheet. B. desktop publishing program. C. typewriter. D. word processing
PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS.
PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS Project Project Title Area of Abstract No Specialization 1. Software
Anatomy of a Decision
[email protected] @BlueHillBoston 617.624.3600 Anatomy of a Decision BI Platform vs. Tool: Choosing Birst Over Tableau for Enterprise Business Intelligence Needs What You Need To Know The demand
Stock market simulation with ambient variables and multiple agents
Stock market simulation with ambient variables and multiple agents Paolo Giani Cei 0. General purposes The aim is representing a realistic scenario as a background of a complete and consistent stock market.
Best Practices for Data Loading into SAP ERP Systems
Best Practices for Data Loading into SAP ERP Systems Summary An organization s ability to act swiftly and make business decisions is based on having access to complete and accurate views of enterprise
Fundamentals of Cultural Transformation
Fundamentals of Cultural Transformation Implementing whole system change By Richard Barrett Abstract This paper explores the concept of whole system change. It identifies the four principles necessary
DETA 1 New Generation Project Planning Document
Teacher Name: School: Grade Level: 11 Subject Area(s): Project Overview: Essential Question: Big overarching idea Driving Questions: Specific team focus Julia Roblyer DETA 1 New Generation Project Planning
AN ANALYSIS OF CLOUD COMPUTING AND ITS ROLE IN ACCOUNTING INDUSTRY IN ALBANIA Rezarta Shkurti (Perri) 1 Enita Muça2
AN ANALYSIS OF CLOUD COMPUTING AND ITS ROLE IN ACCOUNTING INDUSTRY IN ALBANIA Rezarta Shkurti (Perri) 1 Enita Muça2 ABSTRACT Recent advances in information technology have significantly changed the accounting
Using the Cognitive Dimensions Framework to evaluate the usability of a class library
In M. Petre & D. Budgen (Eds) Proc. Joint Conf. EASE & PPIG 2003 Pages 359-366 Using the Cognitive Dimensions Framework to evaluate the usability of a class library Steven Clarke and Curtis Becker Microsoft
START YOUR OWN BUSINESS WORK BOOK 4 BUSINESS VIABILITY
START YOUR OWN BUSINESS WORK BOOK 4 BUSINESS VIABILITY BUSINESS VIABILITY What costs do I need to consider and what s the difference between startup, fixed and variable costs? How much do I need to sell
Big Data Collection Study for Providing Efficient Information
, pp. 41-50 http://dx.doi.org/10.14257/ijseia.2015.9.12.03 Big Data Collection Study for Providing Efficient Information Jun-soo Yun, Jin-tae Park, Hyun-seo Hwang and Il-young Moon Computer Science and
Analytics For Everyone - Even You
White Paper Analytics For Everyone - Even You Abstract Analytics have matured considerably in recent years, to the point that business intelligence tools are now widely accessible outside the boardroom
A Framework to Improve Communication and Reliability Between Cloud Consumer and Provider in the Cloud
A Framework to Improve Communication and Reliability Between Cloud Consumer and Provider in the Cloud Vivek Sridhar Rational Software Group (India Software Labs) IBM India Bangalore, India Abstract Cloud
The Ontology of Cyberspace: Law, Philosophy, and the Future of Intellectual Property by
The Ontology of Cyberspace: Law, Philosophy, and the Future of Intellectual Property by David R. Koepsell, Peru, Illinois: Open Court Publishing, 2000, ISBN 0-8126-9423-6, (Price $26.95); Paper: ISBN 0-8126-9537-2,
Integrating Field Research, Problem Solving, and Design with Education for Enhanced Realization
Integrating Field Research, Problem Solving, and Design with Education for Enhanced Realization Mohamed El-Sayed Kettering University Mechanical Engineering Flint, MI, 48504 USA and Jacqueline El-Sayed
Using XACML Policies as OAuth Scope
Using XACML Policies as OAuth Scope Hal Lockhart Oracle I have been exploring the possibility of expressing the Scope of an OAuth Access Token by using XACML policies. In this document I will first describe
Engage your customers
Business white paper Engage your customers HP Autonomy s Customer Experience Management market offering Table of contents 3 Introduction 3 The customer experience includes every interaction 3 Leveraging
