Does anyone really like searching for stuff? It conjures up images of looking through old boxes in the attic to find that one thing you can never seem to lay your hands on. Recently, I went looking for my junior high school yearbook when someone “friended” me on FaceBook and I couldn’t remember them. The experience was exasperating. I looked through at least 20 boxes of stuff, started sneezing from the dust, and never found the darn yearbook. As a result, I am still not sure I was actually in the same science class as this person. The experience reminded me of today’s enterprise search limitations. I blogged about this recently as part of my Top 10 Pet Peeves for 2010.
If you think about it … no one actually likes the searching part. It’s no fun nor is it intuitive. You have figure out a “query” or “search string” and hope for the best. Maybe you’ll get lucky and maybe not. It’s what I call the “search and hope” model and it can be even more frustrating then my attic experience (I feel a sneeze coming on).
In an AIIM Industry Watch Survey earlier this year, one of the key findings was 72% of the people surveyed say it’s harder, or much harder, to find information and documents held on their own internal systems compared to the Web. That makes you scratch your head for sure.
In the end, no one “wants” to search anyway … it’s the thing we seek that we care about, and not the searching process. All I wanted was an answer to my question, which was to see if I could remember this former classmate.
IBM has been working at systems to find answers since the 1950s when the first steps were taken with research on machine based learning. Over 50+ years (and many millions later), we have history being made. An IBM computing system (Watson) will play Jeopardy! live on television against Ken Jennings and Brad Rutter, the two all-time most successful contestants, in a series of battles to be aired February 14-16. The series will feature two matches to see if a machine can compete by interpreting real-language questions, in the Jeopardy! format, by using text analysis (natural language processing), automated classification and other technologies to find the correct answers. Here is a brief overview to Watson.
Watson must find the answers in the same timeframe as the two former champs by processing and understanding the question, researching the possible answers, determining the response and answering quicker than the two former champs … plus it has to be right. WOW!
Jeopardy! is the No. 1-rated quiz show in syndication, with more than 9 million daily viewers. Watson has already passed the test that Jeopardy! contestants take to make it on the show and been has warming up by competing against other former Jeopardy! players. The top prize for the contest is $1 million, $300,000 for second and $200,000 for third. Jennings and Rutter plan to donate half their winnings to charity. IBM will donate all winnings to charity.
I can’t wait to see this. I suspect my fascination has to do with my being involved with content analytics as part of my job at IBM. Or maybe it’s just about the coolest thing ever.
Either way, finding answers sure beats searching and hoping … and this ought to be very very interesting.
Here is a deeper explanation of the DeepQA techology behind Watson for those who are as fascinated by this as I am.
Earlier in my professional career, I used to hit the snooze button 4 or 5 times every morning when the alarm went off. I did this for years until I realized it was the root cause of being late to work and getting my wrists slapped far too often. It seems simple, but we all hit the snooze button even though we know the repercussions. Guess what … the repercussions are getting worse.
For years, the federal government has been hitting the snooze button on electronic records management. The GAO has been critical of the Federal Government’s ability to manage records and information saying there’s “little assurance that [federal] agencies are effectively managing records, including e-mail records, throughout their life cycle.” During the past few administrations, similar GAO reports and/or embarrassing public information mismanagement incidents have reminded us (and not in a good way) of the importance of good recordkeeping and document control. You may recall incidents over missing emails involving both the Bush and Clinton administrations. Now we have Wikileaks blabbing to the world with embarrassing disclosures of State Department and military documents. This is taking the impact of information mismanagement to a whole level of public embarrassment, exposure and risk. Although it should not be surprising to anyone that this is happening considering the previous incidents and GAO warnings it has still caused quite a stir and had a measurable impact. Corporations should see this as a cautionary tale and a sign of things to come … so start preparing now.
Start by asking yourself, what would happen if your sensitive business records were made publicly available and the entire world was talking, blogging and tweeting about it. For most organizations, this is a very scary thought. Fortunately, there are solutions and best practices available today to protect enterprises from these scenarios.
Implement Electronic Records Management: Update your document control policies to include the handling of sensitive information including official records. Do you even have an Information Lifecycle Governance strategy today? Start by getting the key stakeholders from Legal, Records and IT involved, at a minimum, and ensure you have top down executive support. Implement an electronic records program and system based on an ECM repository you can trust (see my two earlier blogs on trusting repositories). This will put the proper controls, security and policy enforcement in place to govern information over it’s lifespan including defensible disposition. Getting rid of things when you are supposed to dramatically reduces the risk of improper disclosure. Although implementing a records management system has many benefits, including reducing eDiscovery costs and risks, it is also the cornerstone of preventing information from falling into the wrong hands. Standards (DoD 5015.02-STD, ISO 15489), best practices (ARMA GARP) and communities (CGOC) exist to guide and accelerate the process. Records management can be complimented by Information Rights Management and/or Digital Loss Prevention (DLP) technology for enhanced security and control options.
Leverage Content Analytics: Use content analytics to understand employee sentiment and as well as detect any patterns of behavior that could lead to intentional disclosure of information. These technologies leverage text and content analytics to identify disgruntled employees before an incident occurs enabling proactive investigation and management of potentially troublesome situations. They can also serve as background for any investigation that may happen in the event of an incident. Enterprises should proactively monitor for these risks and situations … as an ounce of prevention is worth a pound of cure. Content analytics can also be extended with predictive analytics to evaluate the probably of an incident and the associated exposure.
Leverage Advanced Case Management: Investigating and remediating any risk or fraud scenario requires advanced case management. These case centric investigations are almost always ad-hoc processes with unpredictable twists and turns. You need the ad-hoc and collaborative nature of advanced case management to serve as a process backbone as the case proceeds and ultimately concludes. Having built-in audit trails, records management and governance ensures transparency into the process and minimizes the chance of any hanky-panky. Enterprises should consider advanced case management solutions that integrate with ECM repositories and records management for any content-centric investigation.
This adds up to one simple call to action … stop hitting the snooze button and take action. Any enterprise could be a target and ultimately a victim. The stakes are higher then ever before. Leverage solutions like records management, content analytics and advanced case management to improve your organizations ability to secure, control and retain documents while monitoring and remediating for potential risky disclosure situations.
Leave me your thoughts and ideas. I’ll read and respond later … after I am done hitting the snooze button a few times (kidding of course).
It’s that time of the year when all of the prognosticators, futurists and analysts break out the crystal balls and announce their predictions for the coming year. Not wanting to miss the fun, I am taking a whack at it myself but with a slightly more irreverent approach … with a Top 10 of my own. I hope this goes over as well as the last time I pontificated about the future with Crystal Ball Gazing … Enterprise Content Management 2020.
I don’t feel the need to cover all of the cool or obvious technology areas that my analyst friends would. A number of social media, mobile computing and cloud computing topics would be on any normal ECM predictions list for 2011. I do believe that social media, combined with mobile computing, delivered from the cloud will forever change the way we interact with content but this list is more of my own technology pet peeve list. I’ve decided to avoid this set of topics as there is plenty being written about all three topics already. I’ve also avoided all of the emerging fringe ECM technology topics such as video search, content recommendation engines, sentiment analysis and many more. There is plenty of time to write about those topics in the future. Getting this list to just 10 items wasn’t easy … I really wanted to write something more specific on how lousy most ECM meta data is but decided to keep the list to these 10 items. As such, ECM meta data quality is on the cutting room floor. So without further a do … Craig’s Top 10 Pet Peeve Predictions for 2011: