People-search engine powered by IBM Bluemix verifies identities

Share this post:

Who is Mike Johnson? If you perform a Google search for the name, you’ll get 10 pages of results. Is it Mike Johnson the congressman, the animator, the guitarist, the singer, or the hockey player? Or any one of the other Mike Johnsons on the remaining nine pages of search results.

PIPL (pronounced “people”) can help you figure it out.

A people-search engine

PIPL is a people search company that has online and offline data about more than 3 billion people in the world. You can search for information about a person using an email, a name, a social profile or a phone number and get back any kind of public information about them, including contact, social, demographic and professional information.

people-search engine PIPL

Powered by the IBM Cloud

PIPL’s solutions are hosted on the IBM Bluemix cloud platform. The company headed in the direction of cloud to keep the company as lean as possible. The cloud is convenient for system administration, and IBM has so many data centers worldwide makes it easy to balance workloads.

Initially, PIPL used all bare metal servers to achieve the performance needed for data analytics and deliver the information customers search for in a timely manner. Now they have begun to incorporate virtual servers for other workloads and have begun to look at Bluemix container services for additional flexibility and speed.

Helping verify identities

Individuals use the search engine to find old friends, get in touch with long-lost family members and re-connect with loved ones.

For businesses, PIPL offers a standalone search offering as well as an API that integrates invisibly with other software, such as CRM systems, making them more robust.

PIPL is used by all of the top 10 e-commerce sites in the US, nine of the top 10 banks and eight of the top 10 insurance companies. They are using it for everything from identity verification, investigations, recruiting and data enrichment.

An e-commerce company would use the professional version of the PIPL search engine to verify orders where there’s suspicion of credit card theft. The company could check the information submitted in the order and see if it matches up with the real cardholder. Banks and insurance companies use the search engine to verify identity and ensure that claims are legitimate.

PIPL returns the specific information needed rather than requiring the user to wade through pages and pages of search results to try to figure out if Mike Johnson is who he says he is. See for yourself.

Read the case study for more details.

Add Comment
No Comments

Leave a Reply

Your email address will not be published.Required fields are marked *

More Infrastructure Stories

Why managed services are key to driving cloud results

Many cloud hosting vendors have invested heavily in large-scale distributed data centers for cloud infrastructure as part of their business model. Over the last few years, the cloud model has become very efficient, being self-driven through websites for cloud provisioning. A lot of features and functionality are added regularly. Numerous companies offer infrastructure as a […]

Continue reading

What’s stopping your cloud adoption?

As an IBM Cloud Adoption Leader, I spend a lot of time with clients who are implementing projects in the IBM Cloud. Typically, but not always, I get involved when there’s something blocking the project or otherwise hindering progress. These tend to fall into a small number of common categories: 1. The tools are not […]

Continue reading

Choosing a managed cloud provider: Why software vendor relationships matter

In pursuit of recurring revenue, an increasing number of IT providers, including value-added resellers, systems integrators and equipment vendors, are hanging out shingles proclaiming themselves as managed services providers (MSPs). Many are specifically targeting SAP and Oracle workloads, which are challenging to deploy in the cloud. Some providers are obtaining certifications or joining vendors’ partner […]

Continue reading