Innovative Semantic Analysis.

A unique perspective on your processes, functions and data utilising semantic triple meta-analysis

Our methodology – conceived and formulated at the University of Oxford – can provide invaluable insights from complex data sets.

Improve e-commerce growth by over 57% in the first year

By speed and the recommendation engine optimization of your e-shop

Impact analysis with speeds of over 4million lines of code per hour

Perform impact/lineage analysis of even the nightly builds of extremely complex applications

Where We Excel

Data Lineage and Impact Analysis

Automated impact analysis

Helping you achieve your compliance objectives as well as minimise on-boarding, development and troubleshooting costs, offered in CM EvolveIT - a Graph database, web-based reporting repository

Custom Product Development

Building robust solutions

From concept to MVP to full-scale implementations we help you develop your ideas into unique solutions based on tried and tested platforms via Graph databases and Python-powered AI development

Behavioral Modeling

From e-shops to intranets

Maximise your understanding of your clients. Make sense of consumer behaviour in eshops, transaction assessment for AML, patterns of behaviour when accessing sensitive information, to the efficiency of campaigns in Social Media

What are people saying?

Our technology has its foundations in an effort to quantify transparency in many-to-many interactions.

Integrating a Verb-based Access Control Model with xAPI

This seems like a very cool integration.

I think you are correct in that you could use verbs as a taxonomy of "rights" in such a system.

I'd hope too that such a taxonomy could be used in an interoperable way across all such systems.

I feel that verbs and their ability to differentiate behaviors are the key to value in xAPI.

Andy Johnson

ADL xAPI Technical Coordinator, US Department of Defense

On Verb-based ACM and IBM's Ethical Framework for big data and analytics

I completely agree with your assertion that simple access rights are not sufficient and the context of the request is key.
This point is increasingly important as more data is brought together for multiple purposes (your many-to-many point). I would also say that the context of all requests is important too.
From a pure security/privacy point of view there are two fundamental requests to answer ‘who knew this fact’ and ‘what does this person know’. The model allows this.

Mandy Chessel

Distinguished Engineer, Master Inventor - Fellow of Royal Academy of Engineering/IBM Hursley Laboratory

Featured in:

Financial Times

Temporal Reasoning

Infusing the Semantic Triple with Temporal Reasoning via Graph-powered Machine Learning

Graph databases allow for the application of algorithms to infuse the Triple with temporal reasoning

Link Prediction

Common Neighbors
Preferential Attachment
Adamic Adar

Centrality

Pagerank
Closeness

Similarity

Jaccard
Cosine
Overlap

Community Detection

Louvain Modularity
Label Propagation
Strongly and Weakly Connected Components

Path Finding & Search

Breadth First Search
All Pair Shortest Path

Custom Algorithms

Proprietary algos designed for your needs implementing novel approaches to data translucency/transparency

Still confused?

we serve 3 markets

Choose yours

E-commerce

Optimal Speed and Product Recommendations with the eshop-optimizer

Impact Analysis and Data Lineage

Near-real time data lineage analysis for compliance as well as robust development of complex applications for the financial services sector

Custom Development

Tap on the power of AI with our Machine Learning algorithms in popular graph databases

Our data, our lineage

Since 2012 we provide consulting services to business in order to offer insights about their most valuable asset: their data; be it the data of the clients of an e-shop, the data presented in a trading platform or the data in the most complex Loan System applications!

Verb Based Access Control Model

2012

Application on Electoral Predictions

2014

Static Code Analysis with Graph Databases

2018

Maximizing the revenue of eshops

2022

Products Roadmap

Stay up to date with the team’s latest progress on product development.
With multiple open-source projects on our roadmap you are bound to find something that will benefit your endeavours.

News & Events

Latest articles from our blog

LANSA Static Code Analysis

Using our unique expertise in analysing complex relationships via the semantic triple, Oxford Metadata, has achieve a world first: To reverse engineer LANSA -...

Policy Analysis: A Primer

Policy Analysis evolved from Operations Research through Systems Analysis to policy analysis in problem-oriented work carried out at the RAND Corporation and other organizations. The ACM-related bibliography had a common theme: the absence of any explicit reference to fundamental policy analysis. It appears that the models were invented (and/or evaluated) by scientists focused on their specific field of interest, attempting to address narrow technical concerns. The endeavours to address security policy questions excluded policy analysis; a security policy that aspires to be adopted in the WBSN domain is (or can be) an instance of a [public] policy concerning -what is to many- a global public good. The need for formalising security policies via policy analysis, in a manner similar to the utilisation of Mathematics in formalising ACM, is apparent.

Example applications of Graph Network assessment algorithms in tackling money-laundering

Policy Analysis evolved from Operations Research through Systems Analysis to policy analysis in problem-oriented work carried out at the RAND Corporation and other organizations. The ACM-related bibliography had a common theme: the absence of any explicit reference to fundamental policy analysis. It appears that the models were invented (and/or evaluated) by scientists focused on their specific field of interest, attempting to address narrow technical concerns. The endeavours to address security policy questions excluded policy analysis; a security policy that aspires to be adopted in the WBSN domain is (or can be) an instance of a [public] policy concerning -what is to many- a global public good. The need for formalising security policies via policy analysis, in a manner similar to the utilisation of Mathematics in formalising ACM, is apparent.

LANSA Static Code Analysis

Using our unique expertise in analysing complex relationships via...