IBM Watson Analytics delivers a unified analytics experience on the cloud and helps you focus on the drivers that matter most in your business
IBM United States Software Announcement 214-475December 16, 2014
Table of contents | ||||||||||||||||||||
|
|
At a glance |
The key capabilities of Watson Analytics include:
- An engaging user experience
- Data access and refinement
- Data discovery
- Guided analytic discovery
- Interactive dashboards
- Natural language interface
- Cloud-based agility
- Ready for mobile
|
Overview |
IBM Watson Analytics delivers a unified analytics experience on the cloud and helps you focus on the drivers that matter most in your business. By automating the steps of data access and refinement, predictive analysis, and visual storytelling, Watson Analytics immediately identifies and explains hidden patterns and relationships to accelerate your understanding of why things happened and what is likely to happen.
Watson Analytics lets you ask the right questions and get results in the familiar terms of your business. Just as the first spreadsheet program made financial calculations easier for anyone with a PC, Watson Analytics opens up the world of advanced analytics to all business users on the cloud.
|
Key prerequisites |
Watson Analytics requires a supported browser.
|
Planned availability date |
December 16, 2014
|
Description |
Watson Analytics key capabilities:
- Engaging user experience: Watson Analytics adapts to every user's dynamic approach for thinking and understanding, in order to customize which results and how results are shown. Whether they are starting from a question, testing a hypothesis, or beginning from a story suggested by Watson Analytics, business users have the freedom to dig as deeply as they want and move seamlessly between discovering insights, predicting outcomes, understanding results, and sharing dashboards or infographics.
- Data access and refinement: Watson Analytics accesses data and uniquely scores the readiness of your data for analysis, highlighting potential data issues that could compromise results.
- Data discovery: Watson Analytics lets you visually explore and interact with your data to find the obvious patterns and derive useful insights.
- Guided analytic discovery: With embedded predictive analytics that automatically performs statistical correlations, prediction, and key driver analysis, Watson Analytics directs business users to what matters most and ensures they are drawing the correct conclusions based not only on what has happened but on what is likely to happen next.
- Interactive dashboards: Watson Analytics takes the guesswork out of how to best show what is important in your data and automatically recommends the most effective visualization to convey the results you are looking for. With a few clicks, users can further alter chart types and data to fully customize the interactive visualizations to meet the needs of the business.
- Natural language interface: Simply type in what you would like to see and Watson Analytics produces comprehensive results that explain why things happened and what is likely to happen, all in the familiar terms of your business. As you interact with the results, you can continually fine-tune your questions to get to the heart of the matter.
- Cloud-based agility: Watson Analytics is available anytime, anywhere on the cloud.
- Ready for mobile: Use your tablet for analysis on the go.
|
Program number |
Program Program number name 5725-R69 IBM Watson Analytics
|
Offering Information |
Product information is available via the Offering Information website
Also, visit the IBM® Cloud Marketplace website
|
Publications |
No publications are shipped with this product.
|
Technical information |
Specified operating environment
Hardware requirements
None
Software requirements
Supported browsers:
- Chrome 28, or higher
- Internet Explorer 11
- Firefox 32 and Firefox 31 ESR
- Safari 6 and 7
Security, auditability, and control
IBM maintains privacy and security policies that are communicated to IBM employees. IBM requires privacy and security education training to individuals worldwide who support IBM data centers. Access to client data is allowed only by authorized IBM support representatives. All connections are encrypted channels when accessing client data. All access to client data and transfer of data into or out of the hosting environment is logged. Termination and employment change procedures are in place and include return of assets and access right removal.
IBM data center resources are monitored 24x7 by IBM staff. Internal and external vulnerability scanning is regularly conducted by authorized administrators to help detect and resolve potential system security exposures. IBM's data center services support a variety of information delivery protocols for transmission of data over public networks. Examples include HTTPS, SFTP, FTPS, S/MIME, and site-to-site VPN. Backup data intended for off-site storage is encrypted prior to transport.
IBM maintains physical security standards designed to restrict unauthorized physical access to data center resources. Only limited access points exist into the IBM data centers, which are controlled by two factor authentication and monitored by surveillance cameras. Access is allowed only to authorized staff who have approved access. Operations staff verifies the approval and issues an access badge granting the necessary access.
IBM's team reviews security and privacy-related activities for compliance with IBM's business activities. Workforce security education and awareness training is completed by IBM's employees and vendor employees on an annual basis. The customer is responsible for evaluation, selection, and implementation of security features, administrative procedures, and appropriate controls in application systems and communication facilities.
|
Ordering information |
Charge metric
Authorized User
Authorized User is a unit of measure by which the program can be licensed. An Authorized User is a unique person who is given access to the program. The program may be installed on any number of computers or servers and each Authorized User may have simultaneous access to any number of instances of the program at one time. Licensee must obtain separate, dedicated entitlements for each Authorized User given access to the program in any manner directly or indirectly (for example, via a multiplexing program, device, or application server) through any means. An entitlement for an Authorized User is unique to that Authorized User and may not be shared, nor may it be reassigned other than for the permanent transfer of the Authorized User entitlement to another person.
Note: Some programs may be licensed where devices are considered users. In that case, the following applies. Any computing device that requests the execution of or receives for execution a set of commands, procedures, or applications from the program or that is otherwise managed by the program is considered a separate user of the program and requires an entitlement as if that device were a person.
|
Terms and conditions |
The information provided in this announcement letter is for reference and convenience purposes only. The terms and conditions that govern any transaction with IBM are contained in the applicable contract documents such as the Cloud Services Agreement and associated Service Descriptions.
Subscription
The IBM Cloud Services Agreement (CSA) and the Service Description govern your use of this offering.
Technical support
Technical support is provided for IBM SaaS and enabling software, as applicable, during the subscription period. Any enhancements, updates, and other materials provided by IBM as part of any such technical support are considered to be part of IBM SaaS or enabling software, as applicable, and therefore governed by the Cloud Service Agreement and associated Service Description. Technical support is included with IBM SaaS and is not available as a separate offering.
Terms of use
The program's CSA Service Description is available on the IBM Software as a Service Agreements website
Limited warranty
If warranted, refer to the warranty as stated in the Cloud Services Agreement for this offering.
Money-back guarantee
No
Other terms
Volume orders (IVO)
No
IBM International Passport Advantage® Agreement
Passport Advantage applies
No
Software Subscription and Support applies
No
System i® Software Maintenance applies
No
Variable charges apply
No
Educational allowance available
Not applicable
|
Statement of good security practices |
IT system security involves protecting systems and information through prevention, detection, and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, or misappropriated or can result in misuse of your systems to attack others. Without a comprehensive approach to security, no IT system or product should be considered completely secure and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to be part of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products, or services to be most effective. IBM does not warrant that systems and products are immune from the malicious or illegal conduct of any party.
|
Prices |
For all local charges, contact your IBM representative.
Trademarks
Watson and IBM Watson are trademarks of IBM Corporation in the United States, other countries, or both.
IBM, Passport Advantage and System i are registered trademarks of IBM Corporation in the United States, other countries, or both.
Other company, product, and service names may be trademarks or service marks of others.
Terms of use
IBM products and services which are announced and available in your country can be ordered under the applicable standard agreements, terms, conditions, and prices in effect at the time. IBM reserves the right to modify or withdraw this announcement at any time without notice. This announcement is provided for your information only. Additional terms of use are located at
For the most current information regarding IBM products, consult your IBM representative or reseller, or visit the IBM worldwide contacts page