Plumb5 v6

A look into the V6 version of Plumb5 with built-in real-time decision models for state automation overlayed with NLP algorithms. It is capable of intelligent machine-driven automation by learning and firing next actions.

The highlight of this version is the NLP-driven data search, which enables users to get real-time metrics across any data combinations taking away the cost of time to create custom reports and to manage this pipeline.

Contact us to try a proof of concept over your existing data.

Overlay NLP Based Search over any data infrastructure

easy

 

The Plumb5 Data Search allows users to simply search for answers and reports by simply integrating it into the existing data environment.

The integration can be done in 3 easy steps

  1. Data Tagging: If the data is lying in silos and not unified, then we plug all data sources to tag relevant data entities using the tag manager. If data is unified, we can jump to the next step.
  2. Based on the relationship, we generate a structure and map it with the NLP keyword list, created by the data prep team.
  3. Set permissions for users allowing them to get answers within the permissible limit

The business can now allow any user to ask and find answers or reports over the connected data. This saves the humungous amount of time required for techies and analysts to create custom reports over multiple silos.

As data grows, all we need to do is to add the new data entities to the relationship structure and update the keyword list.

The Plumb5 Data relationship model is scalable. Click here to read about the data model and how it helps in real-time data synthesis.

 

Data Security and Governance

As the volume and proliferation of data—from cloud to mobile to social to machine—continues to grow, serious measures need to be taken to deliver safe harbor for sensitive data. Data security governs protection across data states throughout its lifecycle, whereas data privacy defines that access based on privacy policies and laws.

The focus of this article is to explain how Plumb5 users can easily govern their data by controlling data access to its unit parameter and be assured of protection across data states (in motion, at rest, creation and disposal)

Data Security: Businesses can address each of their security needs by data masking and data encryption techniques across the 4 data states. Be it data for customer service, analysis, learning or reporting or even to share it with outsourced vendors, sensitive data can be protected from any kind of attacks.

dataprotRobust network security will help protect data in transit. Firewalls and network access control will help secure the networks from attacks and intrusion.Dynamic data masking limits sensitive data exposure by masking it to non-privileged users.

Policies for systematically categorizing and classifying all company data, no matter where it resides, in order to ensure that the appropriate data protection measures are applied while data remains at rest and triggered when data classified as at-risk is accessed, used, or transferred.

By defining, analyzing, and protecting sensitive data at its source, Plumb5 helps in keeping your data secure before it proliferates throughout your organization.

Data Access and Permissions

The platform provides a flexible data sharing model that makes it easy to assign various data sets to different sets of users. This ensures you can balance security and convenience, minimizing the risk of stolen or misused data while making sure all users can easily access the data they need.

The platform includes simple-to-configure security controls that make it easy to specify which users can view, create, edit, or delete any record or field in the app. You can configure access at the level of the organization, objects, fields, or individual records.

create_user_perm

By combining security controls at different levels, you can provide just the right level of data access to thousands of users without having to specify permissions for each user individually.

Users can create a user group and map data columns individually with further permissions to read/write data.

With the unified data architecture, the business can improve privacy through individualization where privacy rules can be designed based on traits and preferences, which can help in individual compliance with data privacy.

 

Smarter and Effective Data Infrastructure for Businesses

A smart data infrastructure which enables self-service model, not only solves cost overheads but also ensures effective and timely data dissemination paving way for quicker business growth.

IT HyperConvergence just around the corner – Gartner

With Hyperconvergence happening in the Systems area, Silos will be completely eliminated.Secondly, “One throat to Choke” will be approach taken by all IT infra teams as it is easy to manage security with an converged IT,….in the near future,we are going to see 100s of end points, that does not mean 100s of systems & operations. This is leading to a growing demand in Integrated Systems. Hyperconverged operational & BI systems is the way forward

Continue reading →

Real-time Information Processing

Unified intelligence platform for business delivering real-time customer engagement, real-time operational intelligence and business predictions using inbuilt supervised learning techniques.

Plumb5’s data model is designed to learn and serve decisions across any touchpoint, irrespective of customers or business users. The platform allows the users to configure and supervise information processing workflows by managing weights and rules.

The platform will allow you to plug/sync data acquisition sources like CRM, ERP and other. Using the rules of the data model, the platform organizes the incoming data in real-time and using models, it will serialize and score to auto-classify states in real-time, where states act as the signals to initiate next-action triggers.

Past data or legacy data is subjected to a similar routine to organize the data as per the data model. Scoring algorithms run over this data to produce an aggregated score. When new related data is acquired, it stacks up for computation between the new data and the past aggregated score, arriving at the new aggregated score, which might lead them to a new state, based on the score range.

The automation engine works based on a set of rules configured by relevant users. For example. A marketing user might configure a drip cross-channel marketing campaign whenever their customer reaches a specific state (segment) or the operational user can set up a workflow for approvals whenever the product status or value reaches a particular state.

The platform uses the inbuilt 1:1 data model to deliver messages across any channel either by using proprietary scripts and SDKs for web, desktop or mobile applications and connectors for third-party service providers for Email/SMS/Click to Call services.

The platform comes with in-built models for real-time propensity scoring for behavioral insights, probabilistic attribution model for weight distribution and real-time association rule for recommendations. Data sequencing based on time inputs allows real-time extraction of patterns and allows possible path predictions to arrive at next best actions.

Evolution of Data Model in Plumb5

evol

 

From generating real-time insights from data inputs from a couple of touch-points to automating business processes over holistic business data, the Plumb5 data model has come a long way. What started as a customer-as-the primary-key design for data collected from marketing touch-points is now scaled to incorporate every data parameter of the business, with customer key still in the center.

The data model design now lends itself to real-time learning over unified 1:1 customer data, which allows the machine to automate next steps in a business process using synthesized intelligence.

Reference links to understand real-time AI capabilities of the platform

  1. Real-time Pattern Detection 
  2. Real-time Recommendations
  3. Real-time Recommendations using NLP
  4. How Autosegmentation work?
  5. How Behavior Scoring works?
  6. Automation routines