SlideShare une entreprise Scribd logo
1  sur  20
Télécharger pour lire hors ligne
FORGET!
Everything you thought you knew about
Internet
intelligence
seven!
questions!
consulting!
active|watch is an internet intelligence and evidence-based
electronic horizon scanning service provided by Seven
Questions Consulting Limited – a UK strategy consulting
practice. 

active|watch is powered by the AMI® Enterprise Intelligence
meaning-based meta search and analysis suite of software.
www.sevenquestions.co.uk
seven!
questions!
consulting!
 Factual, fast and actionable insights
 Competitive intelligence to inform key decisions
 24/7 feed into your inbox by email or RSS
 Powerful graphical analysis and charting
 Understand where you and your clients are going
www.sevenquestions.co.uk
trends!
Identify the trends and convergence of ideas over time.
Potential M&A?

Emerging risks and threats to your business?

What are the competition doing?

Where is the next market opportunity?
Area of circle
represents the volume
of mentions for given
point in time
The higher up the Y
Axis the circle is, the
more significant the
topic is(determined by
a software algorithm).
Convergence means the
two topics are being
mentioned together
This is a recent example tracked over some months
and annotated by dated events.
network analysis!
Are ideas, people, insights and organisations connected?
Interrogate the diagram – analyze the underlying documents

Zoom in on a few concepts of interest

Understand what’s really going on behind the results
Network: mentions of oil companies and African countries/cities!
Network: mentions of mining companies and African countries/cities!
data analysis!
How are two concepts related quantitatively?
Take any two concepts from the analysis 

What is the numerical relationship between them?

Interrogate each chart element to see data
Chart: mentions of Iranian Navy and key maritime areas!
Chart: oil companies & African countries/cities!
Chart: shipping companies and Iranian Oil!
Chart: mentions of oil companies and negative KPI indicators!
Chart: Al Shabaab attack methods!
Cartography & tracking ‘weak signals’!
What signals should you watch?
Track faint indicators of change

Be prepared to neutralise risks early

Anticipate opportunities before your competition
Software will analyse all relevant
documents and attempt to cluster
common concepts. Watching the
development of weak signals (bottom
left quadrant) is key to anticipating
future change
Clicking on the cluster from previous
slides brings up network of relationships.
Documents relating to any combination of
the network can be called up and
analysed further if required.
COMMENT: Note the absence
of any identified link between
RAFF and Frack Off at this
stage.
… and more!
What else can we offer you?
Social media monitoring and analysis 

Integration of Facebook and Twitter

Search and analysis your own internal databases

Ethical and timely open source intelligence

Pre-employment screening

Due diligence
Find out more!
Contact us to find out more about how we can work with
you to deliver timely intelligence to help you get, and stay,
ahead
active@sevenquestions.co.uk

Seven Questions Consulting Limited
Registered in England & Wales No. 7293559

147 St John Street, London, EC1V 4PW, United Kingdom

Contenu connexe

En vedette

Enhancing intelligence with the Internet of Things
Enhancing intelligence with the Internet of ThingsEnhancing intelligence with the Internet of Things
Enhancing intelligence with the Internet of ThingsThe Marketing Distillery
 
Inteligence Search System
Inteligence Search SystemInteligence Search System
Inteligence Search Systembkearns111
 
Artificial Intelligence for Internet of Things Insights from Patents
Artificial Intelligence for Internet of Things Insights from PatentsArtificial Intelligence for Internet of Things Insights from Patents
Artificial Intelligence for Internet of Things Insights from PatentsAlex G. Lee, Ph.D. Esq. CLP
 
The netcrowds and the forms of the collective intelligence on the Internet
The netcrowds and the forms of the collective intelligence on the InternetThe netcrowds and the forms of the collective intelligence on the Internet
The netcrowds and the forms of the collective intelligence on the InternetKari A. Hintikka
 

En vedette (6)

active|watch - revolution in internet intelligence
active|watch - revolution in internet intelligenceactive|watch - revolution in internet intelligence
active|watch - revolution in internet intelligence
 
Enhancing intelligence with the Internet of Things
Enhancing intelligence with the Internet of ThingsEnhancing intelligence with the Internet of Things
Enhancing intelligence with the Internet of Things
 
Inteligence Search System
Inteligence Search SystemInteligence Search System
Inteligence Search System
 
Internet Intelligence
Internet IntelligenceInternet Intelligence
Internet Intelligence
 
Artificial Intelligence for Internet of Things Insights from Patents
Artificial Intelligence for Internet of Things Insights from PatentsArtificial Intelligence for Internet of Things Insights from Patents
Artificial Intelligence for Internet of Things Insights from Patents
 
The netcrowds and the forms of the collective intelligence on the Internet
The netcrowds and the forms of the collective intelligence on the InternetThe netcrowds and the forms of the collective intelligence on the Internet
The netcrowds and the forms of the collective intelligence on the Internet
 

Similaire à Forget Internet Intelligence!

Auditing and fraud detection using Picalo
Auditing and fraud detection using PicaloAuditing and fraud detection using Picalo
Auditing and fraud detection using PicaloSii Quist
 
Audit,fraud detection Using Picalo
Audit,fraud detection Using PicaloAudit,fraud detection Using Picalo
Audit,fraud detection Using Picaloguest4ea866f
 
Analyst Relations Risk Management
Analyst Relations Risk ManagementAnalyst Relations Risk Management
Analyst Relations Risk ManagementDuncan Chapple
 
apidays New York 2023 - API Adventures in Embedded Finance, Jason Kobus, JPMo...
apidays New York 2023 - API Adventures in Embedded Finance, Jason Kobus, JPMo...apidays New York 2023 - API Adventures in Embedded Finance, Jason Kobus, JPMo...
apidays New York 2023 - API Adventures in Embedded Finance, Jason Kobus, JPMo...apidays
 
Intelligence Analysis & Deliverables
Intelligence Analysis & DeliverablesIntelligence Analysis & Deliverables
Intelligence Analysis & DeliverablesElijah Ezendu
 
Applications of Network Theory in Finance
Applications of Network Theory in FinanceApplications of Network Theory in Finance
Applications of Network Theory in FinanceKimmo Soramaki
 
Detecting eCommerce Fraud with Neo4j and Linkurious
Detecting eCommerce Fraud with Neo4j and LinkuriousDetecting eCommerce Fraud with Neo4j and Linkurious
Detecting eCommerce Fraud with Neo4j and LinkuriousNeo4j
 
A visual approach to fraud detection and investigation - Giuseppe Francavilla
A visual approach to fraud detection and investigation - Giuseppe FrancavillaA visual approach to fraud detection and investigation - Giuseppe Francavilla
A visual approach to fraud detection and investigation - Giuseppe FrancavillaData Driven Innovation
 
Dashboards- Take a closer look at your data
Dashboards- Take a closer look at your dataDashboards- Take a closer look at your data
Dashboards- Take a closer look at your dataNathan Watson
 
driving_business_value_from_real_time_streaming_analytics
driving_business_value_from_real_time_streaming_analyticsdriving_business_value_from_real_time_streaming_analytics
driving_business_value_from_real_time_streaming_analyticsJane Roberts
 
Assignment 2 Cybercrimes and Computer Security SystemsWith
Assignment 2 Cybercrimes and Computer Security SystemsWith Assignment 2 Cybercrimes and Computer Security SystemsWith
Assignment 2 Cybercrimes and Computer Security SystemsWith desteinbrook
 
Evolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY IndiaEvolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY Indiagauravmiishra701
 
Evolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY IndiaEvolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY Indiaaparnatikekar4
 
Evolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY IndiaEvolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY Indiasathish kriishnan
 
Evolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY IndiaEvolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY IndiaNishantSisodiya
 
Evolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY IndiaEvolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY IndiaNina Yadav
 
Evolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY IndiaEvolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY IndiaNishantSisodiya
 
Forensic Technology & Discovery Services: The Intelligent Connection - EY India
Forensic Technology & Discovery Services: The Intelligent Connection - EY IndiaForensic Technology & Discovery Services: The Intelligent Connection - EY India
Forensic Technology & Discovery Services: The Intelligent Connection - EY Indiasathish kriishnan
 
Assignment 4 The Future of Digital Crimes and Digital Terrorism.docx
Assignment 4 The Future of Digital Crimes and Digital Terrorism.docxAssignment 4 The Future of Digital Crimes and Digital Terrorism.docx
Assignment 4 The Future of Digital Crimes and Digital Terrorism.docxrock73
 

Similaire à Forget Internet Intelligence! (20)

Auditing and fraud detection using Picalo
Auditing and fraud detection using PicaloAuditing and fraud detection using Picalo
Auditing and fraud detection using Picalo
 
Audit,fraud detection Using Picalo
Audit,fraud detection Using PicaloAudit,fraud detection Using Picalo
Audit,fraud detection Using Picalo
 
Analyst Relations Risk Management
Analyst Relations Risk ManagementAnalyst Relations Risk Management
Analyst Relations Risk Management
 
apidays New York 2023 - API Adventures in Embedded Finance, Jason Kobus, JPMo...
apidays New York 2023 - API Adventures in Embedded Finance, Jason Kobus, JPMo...apidays New York 2023 - API Adventures in Embedded Finance, Jason Kobus, JPMo...
apidays New York 2023 - API Adventures in Embedded Finance, Jason Kobus, JPMo...
 
Analytical Tools Primer
Analytical Tools PrimerAnalytical Tools Primer
Analytical Tools Primer
 
Intelligence Analysis & Deliverables
Intelligence Analysis & DeliverablesIntelligence Analysis & Deliverables
Intelligence Analysis & Deliverables
 
Applications of Network Theory in Finance
Applications of Network Theory in FinanceApplications of Network Theory in Finance
Applications of Network Theory in Finance
 
Detecting eCommerce Fraud with Neo4j and Linkurious
Detecting eCommerce Fraud with Neo4j and LinkuriousDetecting eCommerce Fraud with Neo4j and Linkurious
Detecting eCommerce Fraud with Neo4j and Linkurious
 
A visual approach to fraud detection and investigation - Giuseppe Francavilla
A visual approach to fraud detection and investigation - Giuseppe FrancavillaA visual approach to fraud detection and investigation - Giuseppe Francavilla
A visual approach to fraud detection and investigation - Giuseppe Francavilla
 
Dashboards- Take a closer look at your data
Dashboards- Take a closer look at your dataDashboards- Take a closer look at your data
Dashboards- Take a closer look at your data
 
driving_business_value_from_real_time_streaming_analytics
driving_business_value_from_real_time_streaming_analyticsdriving_business_value_from_real_time_streaming_analytics
driving_business_value_from_real_time_streaming_analytics
 
Assignment 2 Cybercrimes and Computer Security SystemsWith
Assignment 2 Cybercrimes and Computer Security SystemsWith Assignment 2 Cybercrimes and Computer Security SystemsWith
Assignment 2 Cybercrimes and Computer Security SystemsWith
 
Evolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY IndiaEvolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY India
 
Evolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY IndiaEvolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY India
 
Evolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY IndiaEvolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY India
 
Evolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY IndiaEvolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY India
 
Evolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY IndiaEvolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY India
 
Evolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY IndiaEvolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY India
 
Forensic Technology & Discovery Services: The Intelligent Connection - EY India
Forensic Technology & Discovery Services: The Intelligent Connection - EY IndiaForensic Technology & Discovery Services: The Intelligent Connection - EY India
Forensic Technology & Discovery Services: The Intelligent Connection - EY India
 
Assignment 4 The Future of Digital Crimes and Digital Terrorism.docx
Assignment 4 The Future of Digital Crimes and Digital Terrorism.docxAssignment 4 The Future of Digital Crimes and Digital Terrorism.docx
Assignment 4 The Future of Digital Crimes and Digital Terrorism.docx
 

Plus de Seven Questions Consulting Limited (11)

Wargaming in Crisis Management and Counter Terrorism Planning
Wargaming in Crisis Management and Counter Terrorism PlanningWargaming in Crisis Management and Counter Terrorism Planning
Wargaming in Crisis Management and Counter Terrorism Planning
 
Wargaming #101
Wargaming #101Wargaming #101
Wargaming #101
 
7 Questions on Nuclear Security - where we are going wrong
7 Questions on Nuclear Security - where we are going wrong7 Questions on Nuclear Security - where we are going wrong
7 Questions on Nuclear Security - where we are going wrong
 
REDFLAG - maritime & counter-piracy wargaming
REDFLAG - maritime & counter-piracy wargamingREDFLAG - maritime & counter-piracy wargaming
REDFLAG - maritime & counter-piracy wargaming
 
Mission verbs for effects based planning
Mission verbs for effects based planningMission verbs for effects based planning
Mission verbs for effects based planning
 
How to excel at effects based planning part 2
How to excel at effects based planning part 2How to excel at effects based planning part 2
How to excel at effects based planning part 2
 
How to excel at effects based planning part 1
How to excel at effects based planning part 1How to excel at effects based planning part 1
How to excel at effects based planning part 1
 
Open Source Analysis of the In Amenas, Algeria Terrorist Attack
Open Source Analysis of the In Amenas, Algeria Terrorist AttackOpen Source Analysis of the In Amenas, Algeria Terrorist Attack
Open Source Analysis of the In Amenas, Algeria Terrorist Attack
 
Nuclear Industry Resilience
Nuclear Industry ResilienceNuclear Industry Resilience
Nuclear Industry Resilience
 
Hanover Seminars
Hanover SeminarsHanover Seminars
Hanover Seminars
 
active|edge - corporate wargaming
active|edge - corporate wargamingactive|edge - corporate wargaming
active|edge - corporate wargaming
 

Dernier

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 

Dernier (20)

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 

Forget Internet Intelligence!

  • 1. FORGET! Everything you thought you knew about Internet intelligence
  • 2. seven! questions! consulting! active|watch is an internet intelligence and evidence-based electronic horizon scanning service provided by Seven Questions Consulting Limited – a UK strategy consulting practice. active|watch is powered by the AMI® Enterprise Intelligence meaning-based meta search and analysis suite of software. www.sevenquestions.co.uk
  • 3. seven! questions! consulting!  Factual, fast and actionable insights  Competitive intelligence to inform key decisions  24/7 feed into your inbox by email or RSS  Powerful graphical analysis and charting  Understand where you and your clients are going www.sevenquestions.co.uk
  • 4. trends! Identify the trends and convergence of ideas over time. Potential M&A? Emerging risks and threats to your business? What are the competition doing? Where is the next market opportunity?
  • 5. Area of circle represents the volume of mentions for given point in time The higher up the Y Axis the circle is, the more significant the topic is(determined by a software algorithm). Convergence means the two topics are being mentioned together
  • 6. This is a recent example tracked over some months and annotated by dated events.
  • 7. network analysis! Are ideas, people, insights and organisations connected? Interrogate the diagram – analyze the underlying documents Zoom in on a few concepts of interest Understand what’s really going on behind the results
  • 8. Network: mentions of oil companies and African countries/cities!
  • 9. Network: mentions of mining companies and African countries/cities!
  • 10. data analysis! How are two concepts related quantitatively? Take any two concepts from the analysis What is the numerical relationship between them? Interrogate each chart element to see data
  • 11. Chart: mentions of Iranian Navy and key maritime areas!
  • 12. Chart: oil companies & African countries/cities!
  • 13. Chart: shipping companies and Iranian Oil!
  • 14. Chart: mentions of oil companies and negative KPI indicators!
  • 15. Chart: Al Shabaab attack methods!
  • 16. Cartography & tracking ‘weak signals’! What signals should you watch? Track faint indicators of change Be prepared to neutralise risks early Anticipate opportunities before your competition
  • 17. Software will analyse all relevant documents and attempt to cluster common concepts. Watching the development of weak signals (bottom left quadrant) is key to anticipating future change
  • 18. Clicking on the cluster from previous slides brings up network of relationships. Documents relating to any combination of the network can be called up and analysed further if required. COMMENT: Note the absence of any identified link between RAFF and Frack Off at this stage.
  • 19. … and more! What else can we offer you? Social media monitoring and analysis Integration of Facebook and Twitter Search and analysis your own internal databases Ethical and timely open source intelligence Pre-employment screening Due diligence
  • 20. Find out more! Contact us to find out more about how we can work with you to deliver timely intelligence to help you get, and stay, ahead active@sevenquestions.co.uk Seven Questions Consulting Limited Registered in England & Wales No. 7293559 147 St John Street, London, EC1V 4PW, United Kingdom