IBM's Watson Analytics - New Data Discovery

Pushing forward in the race to get analytics tools into the hands of non-technical users, IBM is unveiling a new offerings in its Watson Analytics line: data-discovery models called Expert Storybooks, new connectors to a range of data sources and more secure connections to corporate data.

At a New York event showcasing partners and applications, IBM officials are set to make the case that cognitive computing-based Watson Analytics has momentum. More than 500,000 people have registered to use Watson Analytics tools in the 10 months that they have been generally available, IBM says.

Many of those 500,000 registered users are not paying, however, but rather checking out the free tools IBM is offering. The free offerings are meant to highlight how, by moving analytics to a self-service, cloud-based model, business users can streamline analysis projects without investing in expensive and complex tech infrastructure.
"It's all about the end users, it's all about the line of business users, the marketing pro, the sales pro, and giving them capabilities they've never had before in one common easy to use experience," said John Colthart, product design leader at IBM Watson Analytics.

New Analytics services include a variety of Expert Storybooks, created with help from business partners. The Storybooks are essentially data discovery models producing sophisticated visualizations to help users find relevant facts and discover patterns and relationships to make predictive decisions. 

With baseball statistics from AriBall, for example, Watson Analytics is offering an Expert Storybook to build predictions of player performance for users to get an edge against their fantasy baseball competitors. A Storybook built with The Weather Company is designed to help users incorporate weather data into revenue analysis; a Twitter Storybook helps analyze social data to, among other things, measure reputational risk.

Expert Storybooks also include OgilvyOne, for analyzing marketing campaign data; an American Marketing Association Storybook for identifying and analyzing trends in customer profitability; a Nucleus Research Storybook to measure ROI for projects; a MarketShare Storybook for analyzing market trends for investment strategy; and an Intangent Storybook, to help finance managers examine relationships among pay, performance and credit risk.

The free Storybooks have limits on file sizes and how much user data they can store, but users can consult with IBM or its partners to get expanded capabilities on a paid basis.

New data connectors are designed to give Watson Analytics users access to a wider range of sources, including Amazon Redshift, Apache Hive, Box, and Cloudera Impala. In addition, IBM has bolstered the Watson Analytics' ability to securely connect to corporate information with new functionality from the company's cloud-based data refinement and access service, DataWorks. The new features use Docker containers to transport automatically encrypted data through a secure connection.
The Storybooks, data connectors and secure connections will be in beta in the fourth quarter this year and generally available in the first quarter of 2016. In addition, IBM will be making a Social Media Analytics app generally available in the fourth quarter this year.

Watson cognitive computing services are embedded in Watson Analytics offerings, for example giving users the ability to ask natural language questions or proposing a series of new relevant areas for them to explore. "It's constantly giving you proposals, so it’s constantly, as you’re entering data or as you’re asking questions, it’s constantly learning what you’re looking for and trying to propose to you how to go and access that," Colthart said.

While acknowledging that there is strong competition to bring analytics to the masses, for example in the form of Microsoft's Power BI, Colthart maintains that Watson Analytics has an edge in predictive analytics and forecasting. And as more cognitive computing services are embedded in Watson Analytics offerings, those predictive analytics feature will only get stronger, Colthart said.

IBM first developed Watson as a research project to compete against humans on the game show "Jeopardy." Watson can come up with answers to questions using a range of sources in various formats. It was able to hone its answers by learning how to formulate the best responses in an iterative, trial and error process. Because this approach to problem solving emulates how humans think, it is known as cognitive computing.

IBM is on a continuous delivery model, such that cognitive computing services are added into Watson Analytics every month or even every two weeks, Colthart said.
"You’ll see us in the future try to ensure that the entire platform as the user experiences it is underpinned by the right services from the Watson Group to make that either more delightful in terms of finding interesting patterns or just to allow them to access a much higher degree of unstructured data, for example," Colthart said.
Computerworld: http://bit.ly/1kgLjqE

 

« Cyberattack: Millions Stolen From UK Bank Accounts
The Dark Web Uncovered »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

AVG Technologies

AVG Technologies

AVG is focused on providing home and business computer users with the most comprehensive and proactive protection against computer security threats.

Tukan IT

Tukan IT

Tukan IT provides a data classification and protection solution.

Akheros

Akheros

Akheros develops cybersecurity learning algorithms which anticipate, detect and prevent offensive and incongruous behaviors of M2M interactions.

Internet Storm Center (ISC)

Internet Storm Center (ISC)

ISC provides a free analysis and warning service to thousands of Internet users and organizations, and is actively working with ISPs to fight back against the most malicious attackers.

FixMeStick

FixMeStick

FixMeStick is a virus removal device, a USB key that removes malware conventional antivirus software often can’t detect.

Somansa

Somansa

Somansa is a global leader in Data Security and Compliance solutions designed to protect valuable company information from leakage and help meet regulatory compliance requirements.

Fraugster

Fraugster

Fraugster provides the most precise anti-fraud solution for e-commerce businesses.

CounterFind

CounterFind

CounterFind is turnkey technology that allows brands to find and remove counterfeit and infringing merchandise from online marketplaces and social media sites.

River Loop Security

River Loop Security

River Loop Security specialize in solving complex cybersecurity challenges in the IoT and embedded devices space.

Secura B.V.

Secura B.V.

Secura is an independent specialized cybersecurity expert, providing insights to protect valuable assets and data.

Information & Communications Technology Association of Jordan (int@j)

Information & Communications Technology Association of Jordan (int@j)

The Information & Communications Technology Association of Jordan is a membership based ICT and IT Enabled Services (ITES) industry advocacy, support and networking association.

IT Acceleration

IT Acceleration

IT Acceleration is a full-service IT management and support, IT compliance and Digital Forensics company.

Avancer Corporation

Avancer Corporation

Avancer Corporation is a multi-system integrator focusing on Identity and Access Management (IAM) Technology. Founded in 2004.

Mosaic Insurance

Mosaic Insurance

Mosaic is a next-generation global specialty insurer distinguished by an exceptional team, agile technology, and a structure that combines Lloyd’s of London strength with a global distribution network

NexusTek

NexusTek

NexusTek is a managed IT services provider with a comprehensive portfolio comprised of end-user services, cloud, infrastructure, cyber security, and IT consulting.

Offensive Security Manager (OSM)

Offensive Security Manager (OSM)

Offensive Security Manager is the ultimate AI software that will enforce offensive security automation, orchestration, coverage, ensure quality, and lets you manage whole process.