News

CA unbundles its artificial neural network tool

Antony Adshead
Computer Associates' launch of its development tool Neugents ii promises to make neural network agents available to a wider market, writes Antony Adshead.

The product started life as a part of the Jasmine integrated e-business platform for building, testing and deploying intelligent e-business solutions. CA has now unbundled the neural network element to allow developers to add self-learning intelligent agents to their products.

Agents can monitor any type of data on an IT system where they can detect patterns of behaviour. When unusual patterns are detected, such as performance problems on a server, the intelligent agent can alert the user. For example, on a Windows 2000 server agents could monitor the 750-800 performance metrics within the operating system so that any variations would raise an alert.

The company claims that the tool's ability to discover patterns and relationships can also be used in e-business applications to try to predict future buying behaviour.

IDC analyst Christina Steensboe was positive about CA's claims. "CA first used it for its Jasmine database technology and then found it useful for all sorts of other data mining tasks, especially for e-business.

"It can process data on customers and segment them according to categories of past purchases, predicting future behaviour at a general level."

Neural networks form the basis of several products available today, including CA's Unicenter TNG systems management software. Tivoli also markets an intelligent agent network management tool and Symantec's Norton Antivirus contains IBM's neural network technology.

Neugents will allow smaller companies to take advantage of neural network principles and expand the market for real-time predictive and proactive software.

For more on networks visit itnetwork.com

What are neural networks?

Neural network tools can be used to recognise patterns in monitored data and can identify any variations discovered. To do this accurately, they must be "trained" first with large amounts of data. For example, an intelligent agent being used for network management would have to be exposed to "normal" patterns of data for some time to enable it to recognise unusual activity.


Email Alerts

Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
 

COMMENTS powered by Disqus  //  Commenting policy