RiskView ® Architecture: Data Model September 2012 Robert Cruickshank CEO & CTO, (703) 568-8379.

Slides:



Advertisements
Similar presentations
DIGIDOC A web based tool to Manage Documents. System Overview DigiDoc is a web-based customizable, integrated solution for Business Process Management.
Advertisements

Chapter 10: Designing Databases
HR Specialty Products & Services Catalogue Executive Summary A No Frills Distillation of Vendor’s Marketing Collateral Thomas A Ference President & CEO.
© 2010 Orchid Technical Consultancy (P) Ltd. Problems facing businesses today Non-availability of information on time –Delayed or improper decision making.
Dashboards Slide by ana’s presentation. Tired of these challenges? No centralized view of executive information from multiple functional areas and systems;
Database Management3-1 L3 Database Management Santa R. Susarapu Ph.D. Student Virginia Commonwealth University.
Decision Analysis Tools in Excel
HP Quality Center Overview.
Recognize and Prevent Medication Diversion
RiskView® Tutorial: Selling Assurance “Quad-Play”
Chapter 6: Pivot Tables Spreadsheet-Based Decision Support Systems Prof. Name Position (123) University Name.
Exploring Microsoft Excel 2002 Chapter 7 Chapter 7 List and Data Management: Converting Data to Information By Robert T. Grauer Maryann Barber Exploring.
Chapter 3 Database Management
Introduction to Access. What is Access? Database tool Creates a database Good data query (lookup and analysis) ability Good entry forms Good reports Multi-user.
.NET Mobile Application Development Introduction to Mobile and Distributed Applications.
The Solution xxxxxxxx.
Chapter 6: Pivot Tables Spreadsheet-Based Decision Support Systems Prof. Name Position (123) University Name.
Page 1 ISMT E-120 Introduction to Microsoft Access & Relational Databases The Influence of Software and Hardware Technologies on Business Productivity.
8/21/2015J-PARC1 Data Management Machine / Application State Data.
Feedback from Assurance customers… Market timing is right for Assurance “Quad-Play” RiskView + WorkAssure + ServAssure + EventAssure More complexity in.
Developing Effective Reports
Overview of SQL Server Alka Arora.
Working with Tables Lesson 5 of Introduction to ArcGIS for Emergency Managers.
Rodney Holman Mandip Kaur Information Builders  Company Name: Information Builders  CEO and Founder: Gerald D. Cohen  Address: Two Penn Plaza, New.
Cable MSO Update: RiskView® Cost-Savings Case Study Outage Risk Analytics Robert Cruickshank CEO & CTO (703)
CIS 9002 Kannan Mohan Department of CIS Zicklin School of Business, Baruch College.
 A databases is a collection of data organized to make it easy to search and easy to retrieve in a useful, usable form.
The McGraw-Hill Companies, Inc Information Technology & Management Thompson Cats-Baril Chapter 3 Content Management.
PO320: Reporting with the EPM Solution Keshav Puttaswamy Program Manager Lead Project Business Unit Microsoft Corporation.
Ch 5. The Evolution of Analytic Processes
WJEC Applied ICT Spreadsheet Skills 1.Introduction to Financial Modelling Definition A model is a program which has been developed to copy the way.
Deploying RiskView ® Outage Risk Analytics ™ Date Name Title phone.
Chapter 7: Database Systems Succeeding with Technology: Second Edition.
ODBC  Topics  MDS ODBC Account  Now have ability to create and manipulate your own reports, with your data, using various reporting tools.  Access.
Chapter © 2006 The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/ Irwin Chapter 7 IT INFRASTRUCTURES Business-Driven Technologies 7.
ACL Connections Chicago June 2, General Purpose Demonstrate ACL as part of a solution Demonstrate ACL as part of a solution Encourage other uses.
Best Practice: Alarming for Wonderware System Platform
OLAP & DSS SUPPORT IN DATA WAREHOUSE By - Pooja Sinha Kaushalya Bakde.
Project Agenda Project BI in the New Project Project New “Excel-like” out of the box report templates Charts, tables, shapes and images to compose.
Introduction – Addressing Business Challenges Microsoft® Business Intelligence Solutions.
DATABASE MANAGEMENT SYSTEMS CMAM301. Introduction to database management systems  What is Database?  What is Database Systems?  Types of Database.
XP. Objectives Sort data and filter data Summarize an Excel table Insert subtotals into a range of data Outline buttons to show or hide details Create.
Building Dashboards SharePoint and Business Intelligence.
Talentlink Reporting This should be the first page of your presentation.
1 Database Basics: Filemaker 7 Introduction Center for Faculty Development, SJSU Steve Sloan
Improving your Audit Process Through Technology Christopher McDonald Director of Field Loss Prevention, Babies R’ Us Inc.
Objectives Understand Corrective, Perfective and Preventive maintenance Discuss the general concepts of software configuration management.
Types of Information Systems Basic Computer Concepts Types of Information Systems  Knowledge-based system  uses knowledge-based techniques that supports.
Quick and flexible access to Stanford 10 results.
Fundamentals of Information Systems, Sixth Edition Chapter 3 Database Systems, Data Centers, and Business Intelligence.
Chapter 4 Crystal Report Presenter: PEN PHIROM (MscIT) Phone:
Analytics Plus Product Overview. Introduction Analytics Plus is a self-service Business Intelligence and advanced analytics software. On-premise reporting.
Foundations of information systems : BIS 1202 Lecture 4: Database Systems and Business Intelligence.
Systems Analysis and Design in a Changing World, Fifth Edition
Product Overview.
Introducing SmartView
Decision Support Systems
Exploring Excel Chapter 5 List and Data Management: Converting Data to
CEO strategic simulator
Data Exchange.
Software Product Lines
Complete Management of your Entire Backflow Program
IVend Retail 6.5 Dashboard Designer.
Data Base System Lecture : Database Environment
Analytics Plus Product Overview 1.
QGIS, the data model, use and storage
Introduction to Admissions
Palestinian Central Bureau of Statistics
Presentation transcript:

RiskView ® Architecture: Data Model September 2012 Robert Cruickshank CEO & CTO, (703)

RiskView Data Model Introduction RiskView provides a mechanism to: Collect data from a variety of sources Normalize and store them in a coherent fashion Present the data in advanced visualization formats Manipulate the visualization in order to model various scenarios Conduct analytics on the data set The underlying data model that supports this is described in this presentation. It includes the following 6 steps: 1.Identifying the Data Sources 2.Correlating the Data Sources 3.Configuring the Data Model 4.Importing Data Using Adapters 5.Setting Up the Visualization 6.Analytics Confidential 2

DATA SOURCES - CONNECTIVITY CALLS - WORKASSURE® TRANSACTIONS - MAINTENANCE TRANSACTIONS - SERVASSURE® SUMMARIES RiskView Architecture Highly extensible platform for fact-based, scalable, repeatable risk management decisions. ANALYTICS - INCIDENT PRIORITIZATION ACCORDING TO MATERIALITY - CHRONIC & INTERMITTENT DEVICE FAILURES - LOSS OF FACILITIES - CUSTOMER, COMPETITOR & MARKET RISK - OPERATIONS ISSUES - PROCESS GAPS & CHANGES - ETC. RISKVIEW ADAPTERS COLLECTION & ABSTRACTION Quantifiable business justification, demonstrable & immediate ROI Confidential 3

Step 1: Identifying the Data Sources A typical deployment involves congregating diverse data sets in order to glean insights that otherwise would not be apparent. For example, in a typical Multiple System Operator (MSO) deployment, the data sets are sourced from: 1.Call Center ‘Connectivity Call’ records 2.Field Service Activity from WorkAssure 2.Field Service Activity from WorkAssure® or other system including: ‘Trouble Call’ Service Truck Rolls Service Department Escalation to Maintenance Department Voluntary Disconnects Planned and Demand Maintenance 3.Summaries of Failed Telemetry data from ServAssure® or other NMS Each Data source provides Issue, Resolution and often Cause Confidential 4

Once the data sources are identified, it becomes necessary to form a basis to build correlation across the data sets. In the use case presented above, the following correlations readily come up: By Hub/Node By Street/Geography This provides the ability to group by various criteria including: DOCSIS Serving Groups Geographic Management Areas Find & Fix More Issues, Reduce Calls, TCs, Disconnects Field Activity Failed Telemetry Connectivity Calls Step 2: Correlating the Data Sources Confidential 5

Step 3: Configuring the Data Model Each of the data sources provide a variety of fields that need to be located in the RiskView database. RiskView uses the concept of a vulnerability record to map these fields into a larger abstract that can then be used for analysis. RiskView provides the following data field types: Integer Text Date Vectors Percentage Boolean Date Range Integer Range Confidential 6

Step 4: Importing Data Using Adapters Setting up the data model in RiskView makes it possible to import data. RiskView uses Adapters to accomplish this. Adapters… Are highly flexible Perl-script based Can run in real time or batch mode Platform independent Adapters also provide the ability to normalize data, if needed. Confidential 7

Step 5: Setting Up Visualization RiskView provides an easy-to-read “Radar Chart” based set of views that directly present the most material aspects of the data. The Radar Chart has the ability to drill into items of interest to look at the data detail driving a particular score. In both levels of presentation, filters provide the ability to rapidly visualize specific areas of interest. Additional analytical tools include Histogram analysis and the ability to export data via the build in web-service to feed into external mechanisms. Confidential 8

Step 5: Continued... The outliers represent the most material risk. Confidential 9

Step 6: Analytics RiskView provides the ability to manipulate data using formulas. These formulas are used to calculate the scores that rank the data in the “Views” and in the “Detailed Table” View. When a View is invoked, the data is ranked and presented in real time. The process of conducting an analysis revolves around: Identifying outliers of interest Using filters to make incidents and issues easy to identify Drilling into the specific areas of interest Grouping and Sorting the data detail to formalize conclusions leading to next steps. Filters also provide an excellent mechanism to conduct What-If analysis. This is valuable in “What to fix, in what order” scenarios. Confidential 10

RiskView Data Model: Details Confidential 11