IBM WATSON EXPLORER
Watson Explorer gives the business user the ability to search and explore diverse content repositories by creating an index of enterprise data. Watson Explorer is specifically suited for Big Data solutions since its indexing technology can handle massive volumes of information in a variety of forms. Watson Explorer 10.0 includes Foundational Components (formerly known as Data Explorer) and Analytical Components (formerly known as Watson Content Analytics).
Watson Explorer Includes The Following Features:
Position-based indexing technologyReal-time queries to non-indexed data sourcesConfigure custom query expansion and results relevancyApplication Builder for creating a 360˚ view of an entity
Field-level access control
Watson Content Analytics Miner allows users to explore structured and unstructured data for interesting trends and anomaliesWatson Content Analytics Studio for developing custom NLP pipelines using the Unstructured Information Management Architecture (UIMA)
Compatible with IBMs Advanced Care Insights for healthcare clients, which includes unstructured text annotators for clinical documents
Crawlers: extract text content and metadata from data sources Indexers: highly optimized index of parsed documents for analysis
Clustering: document subsets that are automatically classified based on the similarity of extracted words
Facets: different views (combinations of fields) of documents in a collection
Collaboration: tag, comment, organize and rate content to enhance navigation and discovery results
Access to enterprise applications such as content management systems, customer relationship management systems, supply chain management, e-mail systems, relational database management systems, web pages, and networked file systems
Access to non-indexed systems such as premium information services, supplier and partner portals and catalogs, and legacy applicationsResults from these non-indexed sources can be merged with results from the Watson Explorer Engine index or kept separate
Cross-domain and field-level security to ensure that users only see content they would be able to view if logged into the source applicationData encryption is used to encode the authentication data portion of all messages that are transmitted through the system and all user profiles and passwords that are stored by the system (in configuration files, the internal databases, and so on).
Clustering, categorization, entity and metadata extraction, faceted navigation, conceptual search, name matching and document de-duplication
Fault-tolerance, vertical and horizontal scalability, master-master replication and shared deployment

CONTACT IMT TODAY