Establishing a Scalable Knowledge Management Strategy and Solution Framework for a Leading Automotive Manufacturing Company: A Case Study

One of the top global leaders in automotive manufacturing faced significant challenges in managing and accessing critical knowledge across its diverse teams. The company engaged Enterprise Knowledge (EK) to conduct a Knowledge Management (KM) Strategy and solution implementation project plan after the failure of multiple KM initiatives. The engagement’s long-term goal is to establish a shared Knowledge Management System (KMS) to streamline access to crucial information, better leverage experts’ institutional knowledge and experience, and decrease new employees’ time to proficiency. Continue reading

Tesfaye and DeMay Speaking at Knowledge Summit Dublin 2025

Enterprise Knowledge’s Lulit Tesfaye, Partner and Vice President of Knowledge and Data Services, and Jess DeMay, Knowledge Management Consultant, will co-present a session titled “The Evolution of Knowledge Management & Organizational Roles: Integrating KM, Data Management, and Enterprise AI through … Continue reading

Enhancing Insurance Fraud Detection through Graph-Based Link Analysis

A national agency overseeing insurance claims engaged EK to advise on developing and implementing graph-based analytics to support fraud detection. EK applied key concepts such as knowledge graphs, graph-based link analysis for detecting potentially suspicious behavior, and the underlying technology architecture required to instantiate a fully functional solution at the agency to address client challenges. Continue reading

Semantic Layer Strategy for Linked Data Investigations

A government organization sought to more effectively exploit their breadth of data generated by investigation activity of criminal networks for comprehensive case building and threat trend analysis. EK engaged with the client to develop a strategy and product vision for their semantic solution, paired with foundational semantic data models for meaningful data categorization and linking, architecture designs and tool recommendations for integrating and leveraging graph data, and entitlements designs for adhering to complex security standards. Continue reading