Our world is flooded with information but only a small quantity is relevant and frequently it is found in many different places. At the same time, the lines are blurring between information and data. Typically, organisations place heavy trust in their structured data, such as one might find in a database but forget that huge value remains locked up in unstructured information, such as one can be found in documents. Our approach is to treat both as equal citizens. Identifying critical pieces of information is vital to the success of our customers. This can only happen if their provenance is assured and their context is properly understood. This relies upon improving information flows and automatically extracting valuable metadata so that the information’s value is maximised.
Delivering the right information relies not just on its quality and accuracy, but also on ensuring that we know as much as possible about the person who needs it and how they will use it. This not only allows us to ensure that information is relevant to the person, but also assure and protect it.
The value of information tends to decrease over time, so it is critical that information is made available to decision makers as soon as possible. The problem is compounded when information needs to be distributed to remote locations with unreliable or disadvantaged networks.
The best decisions are made when as much relevant information as possible is available, but presented in a way that allows quick assimilation and assessment. To allow this to happen, information from multiple sources should be at users’ fingertips so that cumbersome manual processes are avoided.
We enable our customers to address these challenges: to deliver the right information, to the right people and at the right time so that they can make timely and informed decisions. At Helyx, we take an approach that addresses the “holy trinity” of:
- Information Assurance: protecting the integrity of information, ensuring it is available when needed, in a manner that can be trusted to be authentic whilst also ensuring its confidentiality
- Information Management: capturing information, managing it through its life, ensuring that it can be located when needed and destroyed when it is no longer required
- Information Exploitation: allowing relevant insights and understanding to be drawn from analysing, visualising, interrogating and reviewing of relevant information in a variety of different ways to suit the needs of different sets of end-users.
Our belief is that it is not possible to reliably solve any information problem by taking one or even two of these in isolation: it is only by addressing all in an holistic fashion that leads to successful outcomes.
We help our customers create solutions to their problems in an agile way by bringing together a number of “best of breed” components that do not tie them in to a particular product, vendor or technology. The ability to innovate is improved when organisations are liberated from large, unwieldy and stove-piped solutions where information is hidden from view. By re-using a common set of distributed services built upon common technology services, architects and customers are provided with the freedom to create new solutions and try out new ideas.
How we work with technology
Our approach is to use technology as an enabler, not the answer in itself. We start with understanding the needs of the business, its needs for information and then we understand how technology can help. We find that we achieve better outcomes than if we took a technology-first approach. We also find that there is never one size that fits all: every customer problem is different and requires a different solution; however, many of them will share common components.
At the same time, we pride ourselves on our adaptability and ability to keep pace with changes in technology and new ways of working. This is enabled by the Helyx ethos which encourages and fosters personal development with dedicate(d) time available for experimentation and learning.
Our team has skills and experience with in a wide variety of different techniques and technologies, which allows us to be adaptable to different customers’ needs. It means that we can use the right tool for the job in hand; this also allows us to be deployed in a variety of different postures, from high-tempo operational environments where the need is to get something done quickly, through to business critical systems in headquarters where the need is for high throughput and reliability. The range of skills and experience we can bring to bear includes:
- Micro services and their choreography
- Containerisation as well as orchestration of container deployment
- Design and implementation of workflows and pipelines to manage data ingest, processing and analysis
- Implementing Information Handling Models using attribute based and role based access control systems, integrated with Identity and Access Management (IdAM) solutions
- Data and information management, including archiving, document management and records management. Our team has experience in all of the leading content management systems and collaboration tools, including Microsoft SharePoint, OpenText and Jive.
- Back-end data and information storage, including relational databases, NoSQL databases including MarkLogic, graph databases as well as “big data” solutions such as Hadoop
- Application of Natural Language Processing, Machine Learning and other techniques to automate and improve labour intensive processes
- Deployment and configuration of data analytics and visualisation tools, including graphing and diagramming, network dashboards, interactive “semantic” explorer tools, as well as geospatial views of information. Our experience also extends to “big data” map-reduce batch analytics as well as online and streaming analytics.
Who uses IMIX solutions?
Every organisation consumes, processes and creates information and therefore all have a need for IMIX solutions to meet their business objectives. For example:
- Defence and Intelligence use IMIX for intelligence and military operations
- Insurance companies use IMIX technologies to understand patterns of fraud
- Governments use IMIX to manage their documentation and help assist with their business processes
- Utility companies use IMIX to track current usage trends and predict future usage for capacity planning
- Police Forces use IMIX to track crime, capture and manage intelligence and identify and track suspects
- Libraries, museums and universities use IMIX to help understand what information exists on different topics, allowing people to find relevant information.