December 12, the world's first large-scale conference to explore the industry Internet, 2014 CVW. The industry Internet conference was held in Beijing and was synchronized through the big screen of New York Times Square. The conference was made by the Asia Letter Group, the cloud base and the Chuang-Zhuang economic and Technological Development zone jointly hosted more than 5,000 global it and traditional industry leaders and elites who are concerned about the development of Internet and traditional industries, and explored the evolution of "Internet access to traditional industries", "traditional industry internet" and the technological model and business innovation of industrial Internet.
In the afternoon Telecom @ Internet sub-Forum, China Mobile Group Business Support System Planning Department director of information Management Tao brought "large data capacity Open" keynote speech, the focus on moving on large data on the open summary, and plans.
The following is the full text of his speech:
Tao:
Hello everyone, it is a great honor to have this opportunity to participate in our industry Internet conference to share with you some of the work of China Mobile in large data, some of our thinking.
To attend this meeting in the first question, they gave me some restrictions, what topics I have been thinking, also very disturbed, since we are an industrial Internet, now the internet to talk about the ecology, as a large data, just now our colleagues also talked about, it is as a mobile internet age, a core capability, Large data have large data ecology, in this ecological middle, there is demand side, the provision of data, as operators, how in the large data ecology in the middle of my own position, and then one, that is, we will speak large data or our own internal business analysis system to do analysis, in fact, we do a lot of exchanges, Basically, they share this content with the intrinsic value of the data, but, I come here, I think this thing, I said again good, may not have a real relationship with everyone, so think down the words I want to talk about such a topic: data, openness, value. Here, I would like to talk about what kind of data China Mobile has, we are open to large data, and would like to work together to create more value for the data, in fact, as a sales pipeline company.
I introduce myself, since I joined China Mobile, China Mobile has been doing the analysis system for more than 10 years, 12 years, my own summary, I think we can probably divided into such a few stages, the first stage is called by the phased, at this stage, we started from 2002 to do the system, From the data level, we mainly converge within the enterprise, within the business, including the division of our business, some customer basic information, some basic attributes, mainly these data. In terms of application, is mainly the application of internal management, we these years, in our enterprise has played a great role, such as we have 1 million channels, in China Mobile system there are some illegal channels, is illegal arbitrage mode, we through data analysis can also catch some arbitrage, In the interior still played some very big role. In the form of presentation or some report mainly, but we are changing, so say I think, now is the second stage, we are entering a large data platform, and we have started.
Specifically, first, we are in the integration of the internal system of the data, the previous China Mobile system analysis system has a lot of analysis system, data is one of the data, now we are in the integration of all the data inside the enterprise, hope to build an enterprise-class data center, in addition to enterprise internal data, We also get external data through some data interactions, which is the first job. The second area we are expanding marketing services and trying to do external data services, this piece has also been some attempts. I'll make a report for you in a moment. Third, formally speaking, I also try to contact with customers, China Mobile contact with customers have 800 million customers, we contact with customers is very very frequent, I today to do this speech, I also made a statistic, we each month with the frequency of contact with the user more than 20 billion times, We want to make full use of each customer's contact point for push, this is a try we do.
In fact, everyone is talking about data is a business's most valuable asset, well, I also think that telecom operators as a conduit, of course, we do not want to do pipeline, we want to do intelligent pipeline, as the pipeline our most important asset is undoubtedly the data, we use more mobile phones, all of the online browsing news, or All of them are on the mobile Internet, all on the phone, but these mobile apps, in this ad we have accumulated rich data, such as our location data, your mobile phone as long as the open, I can know where you are, so, Each person you track every day of your activity or the area of which people are distributed I can know where you are by location information. In addition, we have information on the Internet, we are doing through a lot of activities through the mobile phone, we are doing through the TPI technology can be analysis of the packet, we can know what users use the Internet, in particular, is to visit which Web pages, what content, through the content of the Internet can be analyzed. And our voice communication, can also find some, such as voice communication is very frequent, we through the circle of contacts we can know your family, friends, or your work circle, and then, for example, some people he likes to take a mobile phone to Ctrip to book tickets, reservations, or hotel rooms, We use the order number to combine our industry information, we can know what the user he is the demand, there is the need for accommodation, which can be judged.
In addition, we also have the customer's mobile phone terminal information, you are using the Android phone or iOS can be seen, a platform will know. And then we'll have consumer information about the user, user's billing can reflect the user's consumption level at a certain level, in addition, we can through its own business order, you can know the user's preferences in entertainment, such as our mobile phone users can know what kind of music users like, which singer, We all know what kind of songs you like. Including reading, which can be read through our mobile phones, including third-party applications, we can know some user preferences. With this information we can clearly understand that users of all behavioral preferences, to understand some of his characteristics, we are now through the customer tag, the way to label customers based on behavioral characteristics to make a label, we now have about 400 more than the whole network of labels, of course, we also with the Internet company and Tencent Exchange, Tencent said the specific data is not easy to say, but the number of labels has surpassed us, I believe that based on customer marketing services once done, once the demand is stimulated, I believe that the number of this tag will be a special subdivision, will certainly rise quickly.
Here I would like to introduce a few examples, because the previous meeting to exchange, basically with you to communicate is our internal example, today I would like to introduce the example of external services, of course, but I would like to very humble to share this case with you.
First of all, we want to analyze the demographic map through behavioral analysis. Just said location information, here is a yellow area is the most densely populated place, green is less than the place, through the distribution of this map, I can not only know which place is dense, but also to know what kind of attributes in this area. , he is high or low consumption, for example, clothing he is a preference for what 3C electronic products, so that we can by the data to our large and medium-sized enterprises, these enterprises if you want to do marketing activities, he specifically in what position to do what kind of marketing activities, this is our external value attribute. In addition, we can also conduct public security services, for example, this is an example, we have cooperated with the Ministry of Public Security, the police departments need to monitor some of the people, through his behavior analysis, we can know where there will be gathered, a migration of these customers we do statistical analysis, here is an example of our Shandong , we made an analysis through the people of Shandong, the deepest color here, is the most frequent places, such as the vicinity of Hebei, Henan and other places, and then, is the color of a deeper place, through this information, we can provide airlines with the route planning, such as we and mountain airlines cooperation, They have a part of the trip customers, they have the demand for a long trip to Lhasa, but before the mountain airlines did not go to Lhasa route, through this analysis, Mountain airlines are now applying for the route of Lhasa, now can be analyzed, which is my competitor's customers, such as Air China's customers, or Southern Airlines customers, hope to develop into my customers. In fact, Air China's data and our own data through the combination of the actual customer his behavior of his travel information to judge the accuracy will be greatly improved.
And finally, back to what I just said, I'm mainly thinking today, we have so much data to have so many channels that data only open can be of value, because many people speak of data in gold mines, but the value of data gold mines has not been played out so far, and we want to work with them to dig such a value, We have a comb here ourselves, we do a value of the excavation is multi-level, the lowest level we can do a large data mining, after the encryption to do an appropriate degree of openness, and secondly in the large data platform, we can analyze the analytical tool to do an external open, provided to our internal and external cooperation tenants, we can develop customers into tenants, from the customer label angle, can provide customer analysis of the label, based on this label to do some marketing ads, so, to open the data have such different levels of carding.
Finally, I would like to add a special emphasis, that is, as a telecommunications operator, although we have so many customer data, we open must be in line with the requirements to protect the privacy of customers, so the privacy of customers must be highly valued, customer privacy must be strict adherence to the bottom line. Thank you.
(Responsible editor: Mengyishan)