Search

1 to 10 of 15
Sort by

Blog Entry
Automatic Fraud Triangle Analytics made possible with Text-Mining and Content Analytics

The Fraud Triangle Analytics (FTA) supports corporate security officers and internal auditors with internal investigations on their Big Data collections to prevent and detect fraud as early as possible

Johannes Scholtes's profile image

Blog Entry
Text Analytics and Records Management

Records management and text analytics - a powerful marriage for ECM Thursday, March 21 10:00 Text analytics may be the best kept secret in our industry...So what is the relationship between text analytics and records management?

Bryant Duhon's profile image


Blog Entry
Moving Beyond Analytics: Putting Insights into Action, an AIIM 2014 Presentation

Billy Cripe presented Moving Beyond Analytics: Putting Insights into Action. The recent innovation explosion in text analytics, information management and big data have produced unparalleled information gathering and insight mining capabilities

Bryant Duhon's profile image


Blog Entry
Language is Not Just a Jumbled Bag of Words: Why Natural Language Processing Makes a Difference in Content Analytics

However, some text analytics products take a so-called “bag of word” (BOW) approach, in which all words (maybe with the exception of a list of high frequency noise words) are dumped into a mathematical model, without any additional knowledge or interpretation of linguistic patterns and properties such as word order (“a good book” versus “book a good”), synonyms, spelling and syntactical variations, co-references and pronouns resolution or negations

Johannes Scholtes's profile image

Blog Entry
Search is dead, long live search!

But most importantly, the application of content analytics and other search technology is now getting built-in to specific search applications for eDiscovery, compliance, auditing, and other real-world applications

Johannes Scholtes's profile image

Blog Entry
The Essential Role of Technology for Law Enforcement and Internal Investigations

In addition to requiring redeployed enterprise-search technology, large-scale investigations like these need flexible data identification, - capturing, - collection and - preservation tools, support for many different file formats and languages, data normalization and enrichment tools, content analytics, support for multi-media, open long-term data storage, privacy-, privileged-, health- and other data protection compliance, and flexible disclosure and production tools

Johannes Scholtes's profile image

Blog Entry
AIIM2015 - Quick Thoughts

Even one of the vendors I spoke to understood that their tools could do so much more if they were employed for insight and analytics, rather than for responding and defending against discovery and compliance issues