Browse Definitions :
Definition

Automated Insights

Contributor(s): Matthew Haughn

Automated Insights is a company that makes artificial intelligence (AI) applications that can understand statistical, numeric and graphed data and present it in an articulate and understandable written format.

In business, IT, news, and all manner of scientific fields, massive amounts of data are compiled from innumerable sources. These statistics may be presented in charts, graphs, dashboards and logs that allow those familiar with interpreting data to keep up. Unfortunately, they may not be understandable by a lay person and may take more time to read and analyze than text. Automated data retrieval and consolidation makes monitoring possible but only for those who can interpret the returned data.

Automated Insights’ Wordsmith platform uses AI and natural language generation (NLG) to take streams of data that would typically require a data scientist for analysis and present it in written format. When the issue is volume rather than complexity, more AI agents can be used more cost effectively than human employees with Wordsmith’s effective scaling. These abilities make it possible to present big data in a digestible format. Wordsmith integrates with MicroStrategy, Tableau, TIBCO, Spotfire and Qlik.

Media and news outlets use Wordsmith for robojournalism as a means to generate articles and reports based off of real-time data. For example, Yahoo! Sports uses Wordsmith and NLG to produce personalized recaps and reports for fantasy football players. For the news outlet Associated Press, Wordsmith creates publishable content by quickly recapping raw data from quarterly corporate earnings and turning it into readable stories. Other news outlets use the technology to report on urgent content based on real-time incoming data from a large number of sources.

Automated Insights was founded by Robbie Allen in 2007. The company is headquartered in Durham, North Carolina.

This was last updated in July 2018

Continue Reading About Automated Insights

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • certificate authority (CA)

    A certificate authority (CA) is a trusted entity that issues digital certificates, which are data files used to cryptographically...

  • hacktivism

    Hacktivism is the act of hacking, or breaking into a computer system, for a politically or socially motivated purpose.

  • advanced persistent threat (APT)

    An advanced persistent threat (APT) is a prolonged and targeted cyberattack in which an intruder gains access to a network and ...

SearchHealthIT

  • Cerner Corp.

    Cerner Corp. is a public company in North Kansas City, Mo., that provides various health information technologies, ranging from ...

  • clinical decision support system (CDSS)

    A clinical decision support system (CDSS) is an application that analyzes data to help healthcare providers make decisions and ...

  • Health IT (health information technology)

    Health IT (health information technology) is the area of IT involving the design, development, creation, use and maintenance of ...

SearchDisasterRecovery

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

  • ransomware recovery

    Ransomware recovery is the process of resuming options following a cyberattack that demands payment in exchange for unlocking ...

SearchStorage

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

  • cache (computing)

    A cache -- pronounced CASH -- is hardware or software that is used to store something, usually data, temporarily in a computing ...

  • mebibyte (MiB)

    A mebibyte (MiB) is a unit of measurement used in computer data storage.

Close