Feeds

IBM targets brand conscious with search

Takes pain out of reading blogs

High performance access to file storage

IBM has become the latest big name IT vendor to try and cash in on the "Web 2.0" hype, tapping companies' paranoia about the potential impact that a growing wall of online noise can have on their brand.

The Public Image Monitoring Solution from IBM sifts millions of blogs, consumer reviews and news wires from Factiva, compiling the results in graphical charts to summarize the "tone" of coverage, assess negativity, and identify hot topics of discussion.

The service delivers new insight into brand reputation and customer, competitor and public opinion and allows a company to act quickly on what it sees, IBM told The Register.

By channeling multiple feeds, IBM believes it can help the brand-conscious sift and analyze the explosion in information and publishing sparked by technologies like RSS, blogging, chat rooms and peer-to-peer sites.

Mark Andrews, IBM director of strategy and business development for unstructured information, said the impact public opinion can have, when expressed through collaboration forums, is starting to worry large companies in retail and manufacturing. He pointed to the fact retail giant Wal-Mart recently set up a "war room" to track what's being said about it.

Wal-Mart has slipped from retail wunderkind, with its RFID and supply chain management stories, to becoming buried under an avalanche of class action law suits over alleged discrimination and sustaining criticism over a claimed policy of hiring "healthy" staff while providing workers inadequate coverage, blocking staff unionization, and accusations it is killing local businesses and hurting the environment.

"People are more likely to spout an opinion on a blog than call a company and complain," Andrews said. "Organizations are starting to learn about what potential issues consumers are have having with their companies and services. That market is difficult for companies to actively monitor."

Of course, any PR or marketing department worth it's salt has been tracking and analyzing coverage for years. IBM's service, though, comes at a time of growing paranoia among PRs and marketing types about the potential impact blogs can have on campaigns, messaging and positioning.

IBM's offering seems ready to exploit further those niggling concerns.

Knowledge also comes at quite a price, charged in the "$100,000s" range, with no guarantee of absolute insight as customers will be required to fine tune the system using their own skills, or those of IBM's men in black over at consulting. "It's not going to be 100 per cent 'noise' free," Andrews said of the results.

"You make trade offs: do you want to get everything that's relevant or do you want to miss some things? The feedback I'm hearing from companies is, if you can get them 50 per cent or 80 percent there, that makes a huge impact," Andrews said.

Instead, Public Image Monitoring Solution should be used as a supplement to actually reading blogs, he observed.

IBM's offering follows Microsoft's launch of last week of "live software", which also capitalized on the growing taste among IT vendors for Web 2.0. Live software is a potpourri of concepts spanning blogging, social networking, collaboration and "software as a service".

The snappily named Public Image Monitoring Solution uses the IBM WebSphere Integrator OmniFind Edition, the first commercial deployment of IBM's Unstructured Information Management Architecture (UIMA), for a context-based approach to searching unstructured information held in different sources.

IBM released code from UIMA to the open source community in August to provide a ready-made framework and standard for third-parties' search tools to plug into.

The ability to recognize the context of blogs, news pieces or consumer reviews is provided with the addition of linguistics software from Nstein Technologies. Nstein can detect tone and identify key topics based on how a subject is referenced.®

High performance access to file storage

More from The Register

next story
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Windows 8.1, which you probably haven't upgraded to yet, ALREADY OBSOLETE
Pre-Update versions of new Windows version will no longer support patches
Batten down the hatches, Ubuntu 14.04 LTS due in TWO DAYS
Admins dab straining server brows in advance of Trusty Tahr's long-term support landing
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Windows XP still has 27 per cent market share on its deathbed
Windows 7 making some gains on XP Death Day
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
Microsoft TIER SMEAR changes app prices whether devs ask or not
Some go up, some go down, Redmond goes silent
Red Hat to ship RHEL 7 release candidate with a taste of container tech
Grab 'near-final' version of next Enterprise Linux next week
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.