Archive for the ‘Federal Government’ Category

Identity Resolution Daily Links 2010-03-29

Monday, March 29th, 2010

By the Infoglide Team

Forrester Blog: TIBCO jumps onto MDM M&A train with acquisition of data matching vendor Netrics

[Rob Karel] “Netrics seemed the most likely target for Oracle to replace Identity Systems with its small footprint and relatively low acquisition cost, but now with Netrics off the market, Oracle should consider other matching vendors such as S3 Matching Technologies, Syslore or identity resolution/matching vendor Infoglide Software.”

msnbc: What is TSA’s Secure Flight Program?

Secure Flight launched in August, is currently in a phase-in stage, and is intended to be fully in place by November 2010 for all flights leaving from and/or arriving in the U.S. Essentially, the airlines and booking engines will collect your full name, gender and birth date when you book your flight and send that info to the TSA, which will then compare the information against the no-fly list. The name you give when you book must synch up with your full name as shown on the government-issued ID you use when checking in for your flight.”

Michael Power: Can Governments Force Patient Data into EHRs?

“As a brief and somewhat simplistic aside, ‘electronic health record’ is a term often incorrectly used to describe both EHRs and EMRs. There is a distinction between the two and it is an important one. Hospitals and physicians use EMRs. EMRs, along with other databases, are expected to feed into a longitudinal ‘virtual’ patient record which is to be accessible across providers and institutions and which is properly referred to as the EHR.”

Security Management: Terror Threat Tracking System Shares Thousands of Tips from Locals, FBI Says

“The eGuardian system is one of the core technological elements of the Information Sharing Environment (ISE) established by congressional mandate in response to the intelligence failures that preceded the 9-11 attacks. In a typical scenario, a law enforcement agency will either generate its own SAR or field one from the public.”

Identity Resolution Daily Links 2010-03-19

Friday, March 19th, 2010

[Post from Infoglide] Recession Driving Insurance Fraud

“A recent post on McClatchy’s blog attributes growing insurance fraud to the recession: A recent survey of 37 state insurance-fraud bureaus by the Coalition Against Insurance Fraud found that the recession “appears to have had a significant impact on the incidence of fraud” last year. On average, the bureaus reported increases in case referrals and new investigations in all 15 categories of fraud the survey covers.”

Liliendahl on Data Quality: What is Data Quality anyway?

“If we look at what data quality tools today actually do, they in fact mostly support you with automation of data profiling and data matching, which is probably only some of the data quality challenges you have.”

Voice of America: Murder of US Consulate Workers in Mexico Signals New Phase in Violence

“Scott Stewart, vice president of tactical intelligence for Austin, Texas-based analysis firm Stratfor, says the killings might have been related to a recently announced U.S. plan to increase cooperation with Mexican law enforcement agencies. ‘We believe that it is likely related to a decision last month to start working more closely with the Mexican government by the Americans,” said Scott Stewart. “They were going to put some personnel into a joint fusion center in Juarez.’”

Coalition Against Insurance Fraud: False claims act for Maryland

“The Coalition issued a statement supporting the bill, saying it would serve as a deterrent and a powerful incentive for medical providers to have strong compliance programs and to “play by the rules.” False claims acts help detect fraudulent schemes that otherwise might not ever be known because they allow insiders to blow the whistle and initiate civil actions.”

Identity Resolution Daily Links 2010-03-13

Saturday, March 13th, 2010

[Post from Infoglide] Architectures for Entity Resolution-Part 2

“In the last post we examined how entity resolution (ER) systems are actually implemented, starting with the most basic merge/purge process and heterogeneous join systems. Both of these approaches focus on collecting equivalent references from among the sources provided, either as a large batch of references in a single file, or through queries against a federation of databases…”

The Foundry: Thwarting the Next Terrorist Attack: Are We More Prepared?

“Knowing what we know now, would the U.S. be able to stop another attack like that of Christmas Day 2009? This is certainly the question on the minds of many Americans today.  It is also one that Jamie McIntyre, veteran journalist and blogger for Military.com, had the opportunity to ask of Rand Beers, Under Secretary for National Protection and Programs Directorate from DHS, at a Heritage Foundation National Security Bloggers Luncheon.”

Perceptive Information Strategies: Informatica and the Identity Opportunity

“In the middle of all of this are software providers, primarily IBM InfoSphere Identity Insight Solutions, Infoglide (which is providing software for the DHS) and Informatica… Identity recognition and resolution systems enable organizations to use data matches to gain a better understanding of identity across multiple systems. This could include not just individual identities but also networks and relationships: that is, who people know and how they are connected.”

Managing Automation: The MDM Supplier Market Gets a Little Smaller

“It’s been a heady couple of months in the IT infrastructure market, as any independent company that wasn’t tied down seemed to be swept up in a whirlwind of M&A activity. Independent data integration specialist Informatica, a 4,000-customer company in business since 1993, announced in January that it had acquired Siperian for $130 million.”

Identity Resolution Daily Links 2010-03-06

Saturday, March 6th, 2010

[Post from Infoglide] Is MDM Dead?

“Andrew White of Gartner recently posed a question about whether master data management (MDM) is dead. He didn’t actually suggest that the demise of master data management is imminent. He was challenging whether our current terminology adequately clarifies the current reality about MDM and associated product areas.”

Inside the Biz: The Good News about MDM Market Consolidation

[Jill Dyche] “Last year, Informatica’s MDM story verged on the schizophrenic as the company simultaneously advocated a “roll your own” approach to MDM using various software components while at the same time making investments in both Siperian and rival Initiate Systems. Siperian fills in some significant voids in Informatica’s MDM capabilities, most notably hierarchy management and transaction integration—updating the golden record in real time.”

porter: FAQ Secure Flight

“What is Secure Flight and what does it do? Secure Flight is a behind the scenes program that streamlines the watch list matching process. It will improve the travel experience for all passengers, including those who have been misidentified in the past.”

Computerworld: Meeting an Olympic-size security challenge

“First is the classic ‘entity resolution‘ challenge. Information about any individual is likely going to be scattered across a range of databases. While one database may contain a red-flag item — a pending drug charge or a secondary connection to a known terrorist — another database may not. The challenge is bringing this information together to create a single record — a ’single version of the truth’ — about an individual or entity.”

Actionable Identity Intelligence from Identity Resolution

Friday, January 8th, 2010

By Brian Calvert, Infoglide Senior Software Architect

The recent “Christmas Bomber” incident incited many posts about applying technology to address the gaps that allowed it to happen. For example, David Loshin wrote about a piece for BeyeNETWORK about a “master terrorist system” while Lawrence Dubov suggested improving the watch list process using entity resolution. While technology is a critical component of any solution, some specific issues about the technology are important to understand.

In an address this week, President Obama outlined the shortcomings in people, processes, and technologies that gave the now infamous Christmas Bomber the opportunity to take down a Detroit-bound flight.

President Obama identified three major problem areas:

It’s now clear that shortcomings occurred in three broad and compounding ways. First, although our intelligence community had learned a great deal about the al Qaeda affiliate in Yemen called al Qaeda in the Arabian Peninsula — that we knew that they sought to strike the United States, and that they were recruiting operatives to do so — the intelligence community did not aggressively follow up on and prioritize particular streams of intelligence related to a possible attack against the homeland.

Second, this contributed to a larger failure of analysis — a failure to connect the dots of intelligence that existed across our intelligence community, and which together could have revealed that Abdulmutallab was planning an attack.

Third, this in turn fed into shortcomings in the watch-listing system which resulted in this person not being placed on the no-fly list; thereby allowing him to board that plane in Amsterdam for Detroit.

CNN highlighted one additional failing that’s relevant to the topic of Identity Resolution (my emphasis):

A timeline provided by the State Department officials, who spoke on condition of anonymity, showed that an initial check of the suspect based on his father’s information failed to disclose he had a multiple-entry U.S. visa. The reason was that AbdulMutallab’s name was misspelled. “That search did not come back positive,” said one official, who called it a quick search without using multiple variants of spelling.

What are the specific technology issues?

While the details of the technologies used by the State Department are not identified, the story is typically the same for government and industry. Simple equivalency lookups are not enough. “John Kennedy” will not match “Jhon Kennedy” with standard database lookups. Furthermore, some technologies rely on strategies that actually destroy the forensic integrity of the data. They force it into pre-existing molds in a variety of ways to perform similarity matching. We’ve addressed the many challenges to matching names in this blog in the past, especially in “Playing the Name Game with Terrorist Watch Lists and Shoplifter Databases”.

Indexing is one approach that can fail. It tries to turn common names and known variations and nicknames into identical easily matched tokens. So John, Jack, and Johnny might all translate to “F12391″, facilitating a quick match. But what happens when John’s name — like AbdulMutallab’s — is misspelled? “Jhon” will fail to be matched to the common code and, thus, the match will quickly fail. Encoding is another common example that we addressed. Algorithms like “soundex” attempt to translate words into a fuzzy phonetic equivalent. But the promise of these algorithms falls short, especially when they encounter misspellings, nicknames, and cultural variations.

So while merging all information into a common view or improving watchlist management might be part of the solution, they will still fail if the technology used to merge or search is not up to the task.

Not all identity resolution technologies are the same. Ours can be configured using a number of strategies to fit particular customer performance requirements, sensitivity to false positives or false negatives, and Similarity Search behaviors, including specialized name algorithms that catch misspellings, nicknames, and ordering variations.

Although the consequences are grimmer in homeland security situations, the challenges are the same for financial, healthcare, gaming, state and local government, and marketing applications. While it remains to be seen what improvements the US government will apply to the people, processes, and technology used to secure the country, it’s easy to see that simple misspellings need not break the system or, for that matter, any other system.

Identity Resolution Daily Links 2009-01-05

Tuesday, January 5th, 2010

By the Infoglide Team

Center for Advanced Public Safety: SHARE & PUSH

“While SHARE is strictly for communications between law enforcement and the state’s Fusion Center, a companion portal, called the Portal to Uphold a Secure Homeland (PUSH), was also developed as part of the USDHS ITEP project to support private sector security personnel who oversee critical infrastructure.”

HealthNewsDigest.com: Medical/Healthcare Privacy and Fraud Outlook for 2010

“You may not be aware of this, but medical-related fraud and identity theft are growing problems in America. With the exploding cost of healthcare, increasing bureaucratic administrative healthcare systems, and a large, aging Baby Boomer population requiring increased medical care, it would seem that we are entering into a kind of ‘perfect storm’ for medical fraud.”

Aerospace News & Views: Business Travel Association Calls for Greater Attention to Aviation Security

NBTA has long supported risk-management programs that enhance aviation security. TSA’s Secure Flight helps to enhance domestic and international travel through the use of improved watch list matching, while the US-VISIT program collects biometric information from international travelers, both of which help to protect travelers and our nation. These programs should be used as readily available tools to improve the system that protects our global aviation security.”

[Wes Richel] Gartner: Simple Interop: Why We Don’t Seek a Top Level Domain Name

“Should anyone need a demonstration of the difficulties that delay reaching global agreements, consider that the term “EHR” has an idiosyncratic definition in the U.S. when compared to most of the world. In the U.S. the term refers to the record of patient information that is kept by an individual care delivery organization (CDO), with the proviso that there be some degree of interoperability. In most other countries that use the term it refers to some specific sharing of information that may be sourced from many places including but not limited to the electronic patient records of individual CDOs.”

Identity Resolution Daily Links 2009-11-13

Friday, November 13th, 2009

[Post from Infoglide] The Big Story: Evolution

“Technology writer Chris Calnan’s story opened with a comment about Infoglide that nicely sums up the evolution of the broader market for identity resolution and entity analytics: ‘The market may have finally caught up with Infoglide Software Corp.’s technology.’”

OCDQ Blog: Beyond a “Single Version of the Truth”

“However, in his excellent book Data Driven: Profiting from Your Most Important Business Asset, Thomas Redman explains: ‘A fiendishly attractive concept is… ‘a single version of the truth’…the logic is compelling…unfortunately, there is no single version of the truth. For all important data, there are…too many uses, too many viewpoints, and too much nuance for a single version to have any hope of success. This does not imply malfeasance on anyone’s part; it is simply a fact of life. Getting everyone to work from a single version of the truth may be a noble goal, but it is better to call this the ‘one lie strategy’ than anything resembling truth.’”

RISK&INSURANCE: States of Disparity

“Risk & Insurance® looked at four factors that indicate how well a state’s workers’ comp system may be working. Those factors were adjusted by giving additional weight to the amount of premium charged to the employer, and the benefits paid to claimants. The states are ranked by their composite score.”

Security Management: DHS Official Outlines Federal Support to State-based Fusion Centers

“To better facilitate information sharing, Johnson promised DHS will deploy personnel to all fusion centers while giving fusion centers access to the Homeland Security Data Network by the end of fiscal year 2010. Currently, I&A has 44 field representatives based in fusion centers nationwide. I&A will also manage the newly created Joint Fusion Center-Program Management Office (JFC-PMO), which Napolitano tasked in October with coordinating how DHS’ various components and other federal agencies will support fusion centers.”

MedicExchange.com: EMR likely to boom throughout 2013

Health IT currently is growing at an 11 percent annual rate, and solid growth should continue at least through 2013, which would be the third year of the federal EMR stimulus program here in the States, the Scientia report forecasts. In that time frame, health IT will increase its market share by a quarter, to 5 percent of global healthcare products sales from the current 4 percent.”

Identity Resolution Daily Links 2009-11-02

Monday, November 2nd, 2009

By the Infoglide Team

Come by and see us at TDWI World in Orlando Nov. 3 & 4, Booth 405

The Emculturated World: Unmanage Master Data Management

MDM breaks down in the moment it becomes divorced from a practical, immediate attempt to capture just what is needed today. The moment it attempts to “bank” standard symbols ahead of their usage, the MDM process becomes speculative, and proscriptive.”

Governing: Can I Say No to an Electronic Health Record?

“In some instances, patients don’t even know their information is being shared. For example, if consumers turn over prescription drug records when applying for life insurance, the insurer will sometimes hand off the information to business partners who then hand it off to data miners. To keep a tighter grip on privacy, Deven McGraw, director of health privacy at the Center for Democracy and Technology, would like a set of rules that all organizations in the health IT world would have to follow.”

Related post: “Applying Identity Resolution to Patient Identification Integrity”

San Antonio Express-News: McManus recalls 9-11 at GEOINT summit

“Bart Johnson, acting undersecretary for intelligence and analysis with the Homeland Security Department, said cooperation is improving, although problems remain with security clearances and interdepartmental connectivity. ‘The federal government can only do so much in getting it down to the street level,’ Johnson said. Homeland security and Justice Department officials have formed 72 “fusion centers” — terrorism prevention and response centers where federal agencies work with the military, local law enforcement and private partners. Three are in Texas: Austin, Dallas and Collin County near Dallas.”

information management: From Search to Explore

“It’s no surprise that people are looking at more and more internal and external resources for informed decision-making. In the internal case, data integration is a foundation of master data management as well. But integration for BI to common visual tools is increasingly taking place in subsystems, relational databases and cubes, and the visualization layer itself.”

Identity Resolution Daily Links 2009-10-16

Friday, October 16th, 2009

[Post from Infoglide] Avoiding False Positives: Analytics or Humans?

“The European Union recently started a five-year research program in conjunction with its expanding role in fighting crime and terrorism. The purpose of Project Indect is to develop advanced analytics that help monitor human activity for ‘automatic detection of threats and abnormal behaviour and violence.’ Naturally, the project has drawn suspicion and criticism, both from those who oppose the growing power of the EU and from watchdog groups concerned about encroachments into privacy and civil liberty…”

SDTimes: Old thinking does a disservice to new data hubs

“The enterprise needs to be able to understand the origin, the time and possibly the reason for a change. These audit needs must be supported by the data hub at the attribute level. MDM solutions that maintain the golden record dynamically address this need by supporting the history of changes in the source systems record content.”

Accision Health Blog: Surveys Show Importance of EHR

“A new Rand study is one of the first to link the use of electronic health records in community-based medical practices with higher quality of care.  Rand Corporation researchers found in a study of 305 groups of primary care physicians that the routine use of multifunctional EHRs was more likely to be linked to higher quality care than other common strategies, such as structural changes used for improving care.”

NYSIF: Central NY Contractor Hit with Workers Comp Fraud Charges

“Investigators said Mr. Decker previously had an insurance policy with NYSIF when he operated RD Builders in November 2005, a policy cancelled for non-payment a few months later. In 2008, he applied to NYSIF’s Syracuse office for workers’ compensation insurance doing business as Bull Rock Development, Inc.”

public intelligence: Office of Intelligence and Analysis (DHS)

“These entities are unified under local fusion centers, which provide state and local officials with intelligence products while simultaneously gathering information for federal sources.  As of July 2009, there were 72 designated fusion centers around the country with 36 field representatives deployed. The Department has provided more than $254 million from FY 2004-2007 to state and local governments to support the centers.”

Identity Resolution Daily Links 2009-10-09

Friday, October 9th, 2009

[Post from Infoglide] Privacy – A Dying Concept?

“An intriguing post by Nate Anderson on Ars Technica highlights a difficult reality about today’s easy availability of vast quantities of ‘anonymized’ data. Quoting from a recent paper by Paul Ohm at the University of Colorado Law School, Anderson writes that ‘as Ohm notes, this illustrates a central reality of data collection: data can either be useful or perfectly anonymous but never both.’”

ComputerworldUK: Data quality tools sub-par, says analyst

“A recent study on data quality by the Information Difference revealed that respondents view data quality as something that is not restricted to one area within the organisation. Instead, two-thirds of respondents said it is an issue spanning the entire organisation…Specifically, 81 per cent of respondents reported being focused on a broader scope than merely customer name and address data.”

BeyeNETWORK: Master Data Management and the Challenge of Reality

“One of the central problems of master data management, which is often poorly stated, is the need to determine if one individual thing is the same as another individual thing. But the only way we have to do this is by matching records, and a record is not the same as the thing it represents. Unlike The Matrix, we are more in danger of confounding two ‘realities’ rather than recognizing them as distinct.”

Information Management: Business Intelligence: A Blueprint to Success

“Fraud detection. Claims managers are using predictive analytics to help identify potentially fraudulent claims as early as the first notice of loss, and are analyzing claims costs to get a better handle on negative trends.”

Government Computer News: How entity resolution can help agencies connect the dots in investigations

“Imagine a law-enforcement scenario. A local police department has information on a crime suspect. Court systems, corrections facilities, the department of motor vehicles and even child-support enforcement may also have information on this person of interest, each specific to its own needs and applications. Implementation of an entity-centric environment would enable each of the organizations and systems to continue its operations while also providing the police a much more holistic view of the crime suspect along with potentially important pieces of information.”

Bad Behavior has blocked 1330 access attempts in the last 7 days.

E-mail It
Portfolio Strategy News The Direct Marketing Voice