How to Enhance Existing Applications with Embedded Analytics

 
 
By Jim Falgout  |  Posted 2011-02-16 Email Print this article Print
 
 
 
 
 
 
 

A great deal of attention is being spent on analytics as an extension to commercial business intelligence or data warehouse systems. However, if you are responsible for building or deploying other types of enterprise applications, you may not see any benefit in the analytics movement. Here, Knowledge Center contributor Jim Falgout discusses a use case in order to convey the steps necessary to enhance existing applications with high-value, embedded analytics.

Enterprises are filled with custom applications such as claims processing or fraud detection that routinely analyze large and growing data sets. So, how do these enterprises benefit from recent advances in data-intensive analytics? The answer is embedded analytics.

Embedded analytics allow you to include in your existing software applications the same analytics capabilities that software giants such as SAS and SPSS deliver in their stand-alone analytics packages. For example, if your in-house system currently processes health insurance claims, you can improve your fraud detection by applying models derived from historical data to flag suspicious claims.

Fortunately, there are best practices for adding analytics to your software. Powerful tools are available that make it relatively easy and efficient, both at design time and runtime. I will illustrate this with a use case in order to convey the high-level steps necessary to enhance an existing application with high-value analytics.

A telecom use case

The use case involves a midsized telecommunications company. The operations team of the company receives log files continuously from switches within the company's networks. The logs from the switches contain call detail records (CDRs) that provide exacting details about each call serviced by a switch. In fact, many CDRs may be produced per call. The operations team also receives logs from many of their operational servers. In all, the large volume, fast velocity and variety of the data can overwhelm an already overworked operations team.

The operations team has done a great job of getting the needed information from the CDRs for required company operations such as billing. However, they suspect they may be losing money to fraud. They already have processes in place to scrub the logs for their required needs but they would like to extend that to add some level of fraud detection.

Here are five steps the operations team follows to move the fraud detection project from conceptual to production:




 
 
 
 
Jim Falgout has 20+ years of large-scale software development experience and is active in the Java development community. As Chief Technologist for Pervasive DataRush, Jim's responsible for setting innovative design principles that guide Pervasive's engineering teams as they develop new releases and products for partners and customers. Prior to Pervasive, Jim held senior positions with NexQL, Voyence Net Perceptions/KD1 Convex Computer, Sequel Systems and E-Systems. An officer with Toastmasters, Jim is an experienced public speaker. He has delivered presentations to user groups, client conferences and IEEE working groups. He is a popular analyst and go-to thought leader. Jim has a Bachelor's degree (cum laude) in Computer Science from Nicholls State University. He can be reached at jim.falgout@pervasive.com.
 
 
 
 
 
 
 

Submit a Comment

Loading Comments...
 
Manage your Newsletters: Login   Register My Newsletters























 
 
 
 
 
 
 
 
 
 
 
Rocket Fuel