Social networks are everywhere. Realize value from publicly available social relationships and connections to understand customer preferences, behaviors and buying patterns. This webinar presentation explores key consumer analytics use-cases and the connection platform enabling real-time, relevant customer analytics data.
Apidays New York 2024 - The value of a flexible API Management solution for O...
Webinar 3/12/14: Using Social Media to Drive Value
1. Brian Clark
VP Product Management
Wednesday 03/12/2014 9:00am
Developing Enterprise Solutions to
Maximize ROI/Incorporating Social Media
into your Business Intelligence
2. Social Networks are Everywhere
• Social networks - used by everyone with an ISP.
• Traditional ways to communicate from voice (mobile), text, e-mail, Twitter,
Skype, etc.
• Social media:
– Facebook
– LinkedIn
– Plaxo
– Xing
• Websites and web applications are turning into social networks:
– Google Google Plus
– Youtube – networks, groups
– Blogs, Forums
– SalesForce - Chatter
– Microsoft - Yammer
5. SOCIAL NETWORKS – AN EXAMPLE
How adding social network information can add value to an existing graph, leading
to new insights for in-time decision making
13. SOCIAL NETWORKS – USE CASES
How adding social network information can add value to an existing graph, leading
to new insights for in-time decision making
28. InfiniteGraph …
• is perfect for social networks!!
• is scalable
• is a distributed data management system
• and handles relationships really well
• deploys anywhere
Once upon a time there were these 4 guys, Charlie the car-jacker, Ernie the explosives expert, Tony the tunneler, and Sam the safe cracker. Each had their own gang with a second lieutenant. Now these guys were planning a heist, but never communicated directly with each other over the phone.Al the agent has been suspicious of these guys for a while but had nothing to connect them together. He decided to get their telephone call detail records and analyze them. Looking at the records he couldn't see anything obvious so he wondered what would happen if he could see them all together. He did this and the only thing he saw was they all called Mountain Mike the pizza man. That didn't look very suspicious, Mountain Mike did the best pizzas in town.Al then wondered what would happen if he expanded his search to look at other communications, such as text messages, e-mails and other social media. He saw that the 2nd lieutenants were using other ways to communicate with each other and eventually saw a network of communications between the 4 gangs.Charlie's lieutenant would only use text messages, Tony's would only use e-mail and so on.Al decide to put tails on the gangs and got the tails to enter their notes into the computer system. What they discovered was that Mike would visit each gang regularly. Mike wasn't just the pizza guy, he was the money and mastermind of the operation.Now Al had the whole picture of the operation, all he had to do was wait for the day.....This shows the value of being able to discover hidden relationships in silos of data, telephone call records, e-mails, text messages, etc. and build a graph of connections.
Once upon a time there were these 4 guys, Charlie the car-jacker, Ernie the explosives expert, Tony the tunneler, and Sam the safe cracker. Each had their own gang with a second lieutenant. Now these guys were planning a heist, but never communicated directly with each other over the phone.Al the agent has been suspicious of these guys for a while but had nothing to connect them together. He decided to get their telephone call detail records and analyze them. Looking at the records he couldn't see anything obvious so he wondered what would happen if he could see them all together. He did this and the only thing he saw was they all called Mountain Mike the pizza man. That didn't look very suspicious, Mountain Mike did the best pizzas in town.Al then wondered what would happen if he expanded his search to look at other communications, such as text messages, e-mails and other social media. He saw that the 2nd lieutenants were using other ways to communicate with each other and eventually saw a network of communications between the 4 gangs.Charlie's lieutenant would only use text messages, Tony's would only use e-mail and so on.Al decide to put tails on the gangs and got the tails to enter their notes into the computer system. What they discovered was that Mike would visit each gang regularly. Mike wasn't just the pizza guy, he was the money and mastermind of the operation.Now Al had the whole picture of the operation, all he had to do was wait for the day.....This shows the value of being able to discover hidden relationships in silos of data, telephone call records, e-mails, text messages, etc. and build a graph of connections.
Once upon a time there were these 4 guys, Charlie the car-jacker, Ernie the explosives expert, Tony the tunneler, and Sam the safe cracker. Each had their own gang with a second lieutenant. Now these guys were planning a heist, but never communicated directly with each other over the phone.Al the agent has been suspicious of these guys for a while but had nothing to connect them together. He decided to get their telephone call detail records and analyze them. Looking at the records he couldn't see anything obvious so he wondered what would happen if he could see them all together. He did this and the only thing he saw was they all called Mountain Mike the pizza man. That didn't look very suspicious, Mountain Mike did the best pizzas in town.Al then wondered what would happen if he expanded his search to look at other communications, such as text messages, e-mails and other social media. He saw that the 2nd lieutenants were using other ways to communicate with each other and eventually saw a network of communications between the 4 gangs.Charlie's lieutenant would only use text messages, Tony's would only use e-mail and so on.Al decide to put tails on the gangs and got the tails to enter their notes into the computer system. What they discovered was that Mike would visit each gang regularly. Mike wasn't just the pizza guy, he was the money and mastermind of the operation.Now Al had the whole picture of the operation, all he had to do was wait for the day.....This shows the value of being able to discover hidden relationships in silos of data, telephone call records, e-mails, text messages, etc. and build a graph of connections.
Once upon a time there were these 4 guys, Charlie the car-jacker, Ernie the explosives expert, Tony the tunneler, and Sam the safe cracker. Each had their own gang with a second lieutenant. Now these guys were planning a heist, but never communicated directly with each other over the phone.Al the agent has been suspicious of these guys for a while but had nothing to connect them together. He decided to get their telephone call detail records and analyze them. Looking at the records he couldn't see anything obvious so he wondered what would happen if he could see them all together. He did this and the only thing he saw was they all called Mountain Mike the pizza man. That didn't look very suspicious, Mountain Mike did the best pizzas in town.Al then wondered what would happen if he expanded his search to look at other communications, such as text messages, e-mails and other social media. He saw that the 2nd lieutenants were using other ways to communicate with each other and eventually saw a network of communications between the 4 gangs.Charlie's lieutenant would only use text messages, Tony's would only use e-mail and so on.Al decide to put tails on the gangs and got the tails to enter their notes into the computer system. What they discovered was that Mike would visit each gang regularly. Mike wasn't just the pizza guy, he was the money and mastermind of the operation.Now Al had the whole picture of the operation, all he had to do was wait for the day.....This shows the value of being able to discover hidden relationships in silos of data, telephone call records, e-mails, text messages, etc. and build a graph of connections.
Once upon a time there were these 4 guys, Charlie the car-jacker, Ernie the explosives expert, Tony the tunneler, and Sam the safe cracker. Each had their own gang with a second lieutenant. Now these guys were planning a heist, but never communicated directly with each other over the phone.Al the agent has been suspicious of these guys for a while but had nothing to connect them together. He decided to get their telephone call detail records and analyze them. Looking at the records he couldn't see anything obvious so he wondered what would happen if he could see them all together. He did this and the only thing he saw was they all called Mountain Mike the pizza man. That didn't look very suspicious, Mountain Mike did the best pizzas in town.Al then wondered what would happen if he expanded his search to look at other communications, such as text messages, e-mails and other social media. He saw that the 2nd lieutenants were using other ways to communicate with each other and eventually saw a network of communications between the 4 gangs.Charlie's lieutenant would only use text messages, Tony's would only use e-mail and so on.Al decide to put tails on the gangs and got the tails to enter their notes into the computer system. What they discovered was that Mike would visit each gang regularly. Mike wasn't just the pizza guy, he was the money and mastermind of the operation.Now Al had the whole picture of the operation, all he had to do was wait for the day.....This shows the value of being able to discover hidden relationships in silos of data, telephone call records, e-mails, text messages, etc. and build a graph of connections.
Once upon a time there were these 4 guys, Charlie the car-jacker, Ernie the explosives expert, Tony the tunneler, and Sam the safe cracker. Each had their own gang with a second lieutenant. Now these guys were planning a heist, but never communicated directly with each other over the phone.Al the agent has been suspicious of these guys for a while but had nothing to connect them together. He decided to get their telephone call detail records and analyze them. Looking at the records he couldn't see anything obvious so he wondered what would happen if he could see them all together. He did this and the only thing he saw was they all called Mountain Mike the pizza man. That didn't look very suspicious, Mountain Mike did the best pizzas in town.Al then wondered what would happen if he expanded his search to look at other communications, such as text messages, e-mails and other social media. He saw that the 2nd lieutenants were using other ways to communicate with each other and eventually saw a network of communications between the 4 gangs.Charlie's lieutenant would only use text messages, Tony's would only use e-mail and so on.Al decide to put tails on the gangs and got the tails to enter their notes into the computer system. What they discovered was that Mike would visit each gang regularly. Mike wasn't just the pizza guy, he was the money and mastermind of the operation.Now Al had the whole picture of the operation, all he had to do was wait for the day.....This shows the value of being able to discover hidden relationships in silos of data, telephone call records, e-mails, text messages, etc. and build a graph of connections.
Once upon a time there were these 4 guys, Charlie the car-jacker, Ernie the explosives expert, Tony the tunneler, and Sam the safe cracker. Each had their own gang with a second lieutenant. Now these guys were planning a heist, but never communicated directly with each other over the phone.Al the agent has been suspicious of these guys for a while but had nothing to connect them together. He decided to get their telephone call detail records and analyze them. Looking at the records he couldn't see anything obvious so he wondered what would happen if he could see them all together. He did this and the only thing he saw was they all called Mountain Mike the pizza man. That didn't look very suspicious, Mountain Mike did the best pizzas in town.Al then wondered what would happen if he expanded his search to look at other communications, such as text messages, e-mails and other social media. He saw that the 2nd lieutenants were using other ways to communicate with each other and eventually saw a network of communications between the 4 gangs.Charlie's lieutenant would only use text messages, Tony's would only use e-mail and so on.Al decide to put tails on the gangs and got the tails to enter their notes into the computer system. What they discovered was that Mike would visit each gang regularly. Mike wasn't just the pizza guy, he was the money and mastermind of the operation.Now Al had the whole picture of the operation, all he had to do was wait for the day.....This shows the value of being able to discover hidden relationships in silos of data, telephone call records, e-mails, text messages, etc. and build a graph of connections.
SOACustomer: Vodafone / SafariCom – Mobile Money Analytics for MPESALack of insight into any real time analytics of any kind really. Expecting that they will eventually be getting regulated and need to act more like a financial institution. Retailers referred to as dealers / agents
CPx Interactive –
Customer Vodafone xoneInfiniteGraph Solution - An insightful churn system, powered by InfiniteGraph, proactively identifies high risk subscribers who are likely to churnInfiniteGraph enables carriers to store, discover, and search connections and relationships within vast amounts of subscriber data (mobile phone logs, etc.) in real-timeInfiniteGraph enables carriers to find potential churn subscribers who are about to defect to another carrier, and persuade them to stayInfiniteGraph enables carriers to find close friends and contacts of subscribers about to churn The carriers have the knowledge to offer incentives to prevent a subscriber from churningCarriers maximize retention rate and minimize subscriber churn rate by proactively identifying high risk subscribers
Network of workstations – connecting data from hundreds of distributed credit union databasesCuna Mutual
Cloud deploymentCustomer – Student Circle Network – Bringing educational resources to Nigeria. Founder Gossy Ukwanoke, is also in the process of building Beni American University – an accredited university in Nigeria – expected completion of June 2015
CUNA mutual – social CRM application to help sell financial products