Skip to main content

Help us improve the Digital Marketplace - send your feedback

DATASUMI LTD

Generative AI for Content Creation & Curation

Generative AI for Content Creation and Curation represents a groundbreaking service that transforms content production using Generative AI algorithms. Our state-of-the-art solution streamlines content creation processes, providing organisations with an effortless and effective method to generate and curate content.

Features

  • Generative AI algorithms automate content creation, saving time and resources.
  • The ability to create various types of content, including blogs.
  • Advanced curation capabilities ensuring the most relevant and high-quality content.
  • Seamless integration with existing systems, easy implementation and use.
  • Accessible to users with varying levels of technical expertise.
  • Real-time data analysis and insights, informing content creation decisions.
  • Customizable settings, allowing to tailor the service to client needs.
  • Scalability, enabling organizations to easily increase or decrease content production.
  • 24/7 access, allowing users to create and curate content.
  • Updates and improvements, keeping the service current with industry standards.

Benefits

  • Increased efficiency in content creation, leading to cost-savings and increased-productivity.
  • Improved quality of content through algorithms and real-time data analysis.
  • Enhanced brand consistency with centralized control over content production.
  • Greater reach and engagement by consistently producing relevant content.
  • The ability to produce a large volume of content quickly.
  • Increased customer satisfaction through personalized and relevant content.
  • Improved decision making with real-time data analysis and insights.
  • Reduced workload for marketing and content teams.
  • Flexibility in scaling content production up or down as needed.
  • Continuous improvement of the service through regular updates and improvements.

Pricing

£575 a unit a day

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at accounts@datasumi.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

5 9 5 7 1 1 0 0 2 2 8 2 0 4 6

Contact

DATASUMI LTD Datasumi Team
Telephone: +442045770319
Email: accounts@datasumi.com

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Our Generative AI for Content Creation and Curation service can be integrated with a wide range of software services, including marketing automation platforms, social media management tools, content management systems, and customer relationship management software. It is designed to enhance and streamline existing content creation and curation processes.
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints
Our Generative AI for Content Creation and Curation service does have some constraints that potential buyers should be aware of. Firstly, the service may not function optimally with certain types of content or formats, and it is important to verify compatibility before implementation. Secondly, support may be limited to specific hardware configurations and operating systems. Additionally, while we strive to provide continuous service, there may be occasional planned maintenance periods that could impact accessibility. We recommend consulting our technical documentation and speaking with a representative for more information on any specific constraints that may apply.
System requirements
  • AWS
  • Azure
  • GCP

User support

Email or online ticketing support
Yes, at extra cost
Support response times
The ChatBOT service typically responds to questions within 15 minutes on weekdays and within 60 minutes on weekends. Response times vary based on the day of the week, reflecting the service's availability and support levels.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
WCAG 2.1 AA or EN 301 549
Web chat accessibility testing
The service conducts web chat testing with assistive technology users by employing a range of common assistive technologies across browsers and operating systems. The testing approach focuses on user journeys and identifying barriers to accessibility.
Onsite support
Yes, at extra cost
Support levels
The service offers three support levels to cater to varying needs:

1. **Basic Support**: Standard support during business hours via email or ticketing system for general inquiries and basic troubleshooting.
2. **Premium Support**: Enhanced support with faster response times, extended coverage, phone support, dedicated account managers, and proactive monitoring.
3. **Enterprise Support**: Top-tier 24/7 support with technical account managers, customized solutions, on-site assistance, and proactive maintenance for complex environments.

Costs for these levels depend on the provider and organization's requirements, typically structured as subscription fees or usage-based metrics. Higher support tiers incur higher fees for increased services.

Certain support levels may include a technical account manager or cloud support engineer to offer personalized assistance, technical expertise, and proactive guidance. These roles provide direct points of contact for strategic planning, technical consultations, and tailored support to optimize service performance and address complex issues effectively. They ensure organizations receive dedicated support aligned with their specific needs and goals.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Users are supported in starting to use the service through various resources and methods:

1. **Remote Setup**: Users can initiate service remotely via phone and chat, with online assistance available for guidance.
2. **Service Documentation**: Detailed HTML documentation provides comprehensive information on service features and functionalities.
3. **Onboarding Support**: Assistance is offered for onboarding and offboarding processes to ensure a smooth transition for users.
4. **Customization Options**: Users can personalize chatbot interactions by adjusting settings like greetings, language, and product recommendations to match their brand and audience.
5. **Training Materials**: Online training resources and user documentation are accessible to guide users through setup and customization processes effectively.

These resources aim to streamline the onboarding experience, enabling users to quickly acclimate to the service and tailor it to their specific requirements and preferences.
Service documentation
Yes
Documentation formats
  • HTML
  • ODF
  • PDF
End-of-contract data extraction
At the conclusion of a contract, users can extract their data through a structured process:

1. **Data Identification**: Identify crucial data points based on industry, contract specifics, and business needs.
2. **Contract Examination**: Review the contract thoroughly to pinpoint the identified data elements.
3. **Data Recording**: Extract pertinent information like parties involved, contract dates, pricing details, deliverables, and termination clauses.
4. **Contract Management Software**: Utilize specialized software to organize extracted data for analysis and reporting purposes.
5. **Manual Extraction**: For simpler contracts, manual copying and pasting of data can be effective.
6. **Text Parsing Tools**: Employ tools like Python and Regular Expressions for contracts with standardized formats.
7. **Advanced Technologies**: Explore machine learning and natural language processing for intelligent extraction of specific entities within contracts.

By following these steps and leveraging appropriate tools, users can efficiently retrieve essential data from contracts to support informed decision-making, analysis, and strategic planning processes effectively.
End-of-contract process
Upon contract conclusion, key steps include data extraction, fulfilling obligations, providing notice, and ensuring legal compliance. Pricing structures vary, with the contract specifying included services and potential additional costs. Base price components are typically outlined in the contract terms, encompassing agreed-upon services. Any services or features beyond the defined scope may incur supplementary charges. Users should carefully review contract details to discern what is encompassed by the base price and what necessitates extra payment. Understanding these distinctions aids in managing end-of-contract processes effectively and mitigating any potential misunderstandings regarding pricing and service provisions.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
The chat/chatbot uses the full screen.
Service interface
No
User support accessibility
WCAG 2.1 AA or EN 301 549
API
No
Customisation available
Yes
Description of customisation
Users have the flexibility to customize the service by personalizing chatbot communication to suit individual preferences, such as adjusting the tone, style, and language used in interactions. This customization allows for a tailored user experience that enhances engagement and aligns with the brand's identity. Users can modify various aspects of the chatbot, including greetings, language settings, and product recommendations, to cater to specific audiences and business requirements. By adapting chatbot personalities, language nuances, and content based on customer characteristics and interests, users can create more personalized and engaging interactions. Leveraging generative AI technology enables businesses to generate unique content like text, images, and audio for more human-like conversations with users. Customization options encompass a range of elements such as color schemes, associated names, images, languages, and playbook templates. Users with access to the service can leverage these customization features to tailor chatbot interactions according to their unique needs and preferences, ultimately enhancing customer engagement and satisfaction.

Scaling

Independence of resources
In the datasumi ecosystem, chatbots function within a serverless cloud environment, empowering users to personalize service levels. This setup grants users the freedom to fine-tune service parameters to align with their distinct needs and preferences. Leveraging the serverless cloud infrastructure enables dynamic resource scaling, performance optimization, and customized service levels to efficiently address fluctuating demands. This configuration delivers agility, scalability, and operational control over chatbot services, empowering users to adjust and enhance their functions in response to evolving requirements and priorities within their individualized cloud environment.

Analytics

Service usage metrics
Yes
Metrics types
The service offers a range of metrics to gauge performance and customer satisfaction levels. These include Customer Satisfaction Score (CSAT) to measure post-interaction sentiment, Resolution Rate to assess goal achievement, and Customer Effort Score (CES) to identify barriers to satisfaction. Additionally, metrics like FAQs Handling evaluate common queries, Goal Completion Rate measures objective achievement, and Bounce Rate indicates user dissatisfaction. Interaction Volume reflects chatbot popularity and effectiveness. Together, these metrics provide a holistic view of service performance, user satisfaction, and areas for improvement within the service.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
No
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least every 6 months
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
Other
Other data at rest protection approach
Data at rest can be safeguarded through robust measures such as data encryption using advanced algorithms like AES or RSA to prevent unauthorized access. Employing encryption at multiple levels on databases and physical storage enhances data security. Regular updates of encryption keys and secure key management practices further fortify data protection. Additionally, tokenization can replace sensitive data with tokens, reducing computational resources required for processing and storage in databases, thereby bolstering security measures for data at rest.
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Users can export their data from the service using various methods such as a safe data export pattern, Collibra Data Intelligence Cloud tools like Core REST API and Reporting Insights API, Blackbaud Knowledgebase modules, and Oracle InForm Data Export Utility. Data is exported in the user's preferred format and in full compliance with GDPR regulations. Additionally, users may have the option to load data directly into electronic forms when needed. These diverse export options cater to different user requirements, ensuring efficient extraction and management of data while adhering to regulatory standards.
Data export formats
  • CSV
  • ODF
  • Other
Data import formats
  • CSV
  • ODF
  • Other
Other data import formats
  • XML
  • JSON

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
No guaranteed SLA.
Approach to resilience
The service is designed with resilience in mind to ensure high availability and data protection. Our datacenter setup incorporates robust measures to enhance resilience, safeguarding against potential disruptions. For detailed information on our resilient design and datacenter setup, please request this information directly. Cloud service providers like AWS, GCP, and Azure adhere to state-of-the-art resilience practices, aligning with government cloud security principles such as 'Asset protection and resilience.' These providers implement advanced technologies and strategies to fortify infrastructure, mitigate risks, and maintain operational continuity in the face of various threats or challenges.
Outage reporting
Users can report outages through various channels provided by the service:

1. **Private Dashboard**: Accessible to all users, a Private dashboard displays real-time power cut information and outage tracking for specific regions, offering transparency and visibility into service status.
2. **API Access**: Users may utilize an API to programmatically retrieve outage data or integrate outage information into their systems, enabling seamless monitoring and management of service disruptions.
3. **Email Alerts**: The service offers email alerts to notify users promptly of reported outages or service interruptions, ensuring timely communication and awareness of potential issues.
4. **Live Chat Support**: Some services provide live chat functionality for users to report outages or seek assistance during disruptions, facilitating immediate communication and support for problem resolution.

By leveraging these reporting channels, users can effectively communicate outage incidents to the service provider, enabling swift response and resolution to minimize downtime and enhance overall service reliability.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels
Access restrictions in management interfaces and support channels are enforced through the cloud provider using authentication methods like Microsoft account IDs, GCP, and AWS IAM. Admin users must authenticate before accessing management interfaces, reporting faults, or requesting changes to the service. These measures ensure secure user management and prevent unauthorized access to resources, applications, and data. Users utilize authenticated channels to report incidents securely. Incident reports, including root cause analysis and preventive measures, are generated by the cloud provider or service to communicate incident details effectively. This approach guarantees controlled access and secure management of services and support channels.
Access restriction testing frequency
Never
Management access authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
Less than 1 month
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
Yes
Any other security certifications
  • AWS cloud platform PCI Certification
  • Azure cloud platform PCI Certification

Security governance

Named board-level person responsible for service security
No
Security governance certified
No
Security governance approach
Security governance is approached by outsourcing to cloud providers, utilizing IAM sign-on for security via single sign-on. This aligns with the government's cloud security principle of 'Asset protection and resilience,' leveraging state-of-the-art resilience from providers like AWS, GCP, and Azure. Security decisions are entrusted to expert providers for robust protection and efficient security management. While detailed information on the governance approach is not publicly disclosed, users can request further insights to gain a comprehensive understanding of the service's security governance strategy.
Information security policies and processes
The service adheres to stringent information security policies and processes, drawing upon the comprehensive security policies and procedures provided by cloud providers. These encompass data handling protocols, accountability frameworks for cloud security, access control mechanisms, risk assessments, and incident response strategies. Clear roles and responsibilities are defined to ensure effective security actions and resource protection within the cloud environment. By aligning with government cloud security principles and industry standards, the service upholds compliance requirements and strengthens security measures. The reporting structure encompasses continuous oversight of authentication, access controls, vulnerability management, patching procedures, monitoring activities, incident response protocols, and adherence to security standards. For a detailed understanding of specific policies and processes, users can directly request additional information from the service provider.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
The service implements robust configuration and change management processes to ensure operational efficiency and security. Components of the service are meticulously tracked throughout their lifecycle using version control systems, configuration management databases, and change tracking tools. This enables accurate documentation of configurations, dependencies, and changes made to the service components over time. Changes undergo thorough assessment for potential security impacts through rigorous testing, risk analysis, and security reviews. Prior to implementation, changes are evaluated against security policies, best practices, and compliance requirements to mitigate any potential vulnerabilities or risks.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
The service's vulnerability risks are predominantly attributed to cloud providers, with common vulnerabilities including misconfigurations in services like AWS and GCP, insecure APIs, and challenges in maintaining visibility into cloud infrastructure. These risks highlight the importance of secure practices and monitoring tools to mitigate potential security breaches. Information on emerging threats is sourced from reputable entities such as MITRE Corporation, CVSS, NVD, and threat intelligence feeds. Leveraging insights from these sources helps the service stay informed about evolving threats and vulnerabilities that could impact its overall security resilience.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
The service's protective monitoring processes, primarily sourced to cloud providers, involve continuous detection of potential compromises through system logs, network traffic analysis, anomaly detection, and behavior analytics. Upon identifying a potential compromise, incident response procedures are activated, including system isolation, forensic analysis, and remediation actions to contain and mitigate the incident. Incidents are addressed promptly according to predefined response times outlined in incident response plans, ensuring swift action to minimize impact and restore normal operations efficiently. By leveraging cloud providers for protective monitoring, the service benefits from advanced tools and expertise to enhance threat detection capabilities and overall security resilience.
Incident management type
Supplier-defined controls
Incident management approach
The service's incident management processes, sourced to the cloud provider, include pre-defined procedures for common events to streamline incident response, categorize incidents by severity, and prioritize resolution efforts. Users report incidents through designated channels provided by the service or cloud provider, facilitating timely communication for swift resolution. Incident reports are generated by the cloud provider or service to detail incident specifics, including root cause analysis, impact assessment, remediation steps, and preventive measures. By relying on the cloud provider for incident management, the service benefits from standardized practices, expert guidance, and efficient incident resolution to uphold operational continuity and service reliability.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
Yes
Connected networks
Public Services Network (PSN)

Social Value

Social Value

Social Value

  • Fighting climate change
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

In combating climate change, Datasumi can elevate its G-Cloud service provision by embracing sustainability initiatives and bolstering environmental resilience. Taking cues from Google Cloud's ambitious targets of operating solely on renewable energy and aiming for 24/7 carbon-free energy by 2030, Datasumi can set similar benchmarks to curtail its carbon footprint and champion sustainable practices across its operations. By harnessing technology to bolster sustainability endeavors and democratizing earth-centric data for informed decision-making, Datasumi can empower organizations to make data-informed choices that bolster climate resilience. Moreover, aligning with social value themes centered on responsible consumption and production, as delineated in the Social Value Model, can underscore Datasumi's dedication to environmental stewardship and sustainability within its service offerings.

By integrating these strategies into its G-Cloud services, Datasumi not only actively contributes to the global battle against climate change but also fosters a more sustainable future. Through a concerted focus on renewable energy adoption, carbon footprint reduction, and promoting eco-conscious practices, Datasumi can position itself as a leader in environmentally responsible service provision. By aligning with sustainability goals and leveraging technology for positive environmental impact, Datasumi can play a pivotal role in advancing climate action and fostering a greener, more sustainable digital landscape.

Tackling economic inequality

In addressing economic inequality through its G-Cloud service provision, Datasumi can focus on initiatives that promote equal access to economic opportunities, support small and medium-sized enterprises (SMEs), and foster diversity within the supply chain. By aligning with social value themes that aim to reduce economic disparities, Datasumi can contribute to creating a more inclusive and equitable business environment. Drawing inspiration from the Social Value Model's emphasis on creating new businesses, jobs, and skills, Datasumi can implement programs that facilitate entrepreneurship, job creation, and skills development for underrepresented groups. Additionally, by supporting educational attainment relevant to contracts, providing training schemes to address skills gaps, and promoting sector-related skills growth, Datasumi can help bridge the economic divide and empower individuals from diverse backgrounds.

Furthermore, by structuring supply chain selection processes to ensure fairness and diversity, encouraging innovation and disruptive technologies, and promoting collaboration throughout the supply chain, Datasumi can actively contribute to reducing economic inequality. Embracing scalable methods for modernizing delivery, supporting apprenticeships and industry placements, and fostering a fair and responsible approach to working with supply chain partners can further enhance economic inclusivity within its service provision. By adopting these strategies and aligning with initiatives that prioritize economic equality, Datasumi can play a pivotal role in fostering a more level playing field for businesses of all sizes and backgrounds within the G-Cloud ecosystem.

Equal opportunity

In the context of equal opportunity, Datasumi enhances its G-Cloud service provision by focusing on promoting diversity, inclusion, and equitable access to opportunities. By aligning with social value themes that prioritize equal opportunities, Datasumi can contribute to fostering a more inclusive and fair society. Drawing inspiration from the Social Value Model's emphasis on supporting local communities in managing and recovering from the impact of COVID-19, Datasumi can implement initiatives that facilitate employment opportunities, re-training programs, and workforce diversity. Additionally, by actively engaging in activities that promote equal access to resources, education, and employment opportunities, Datasumi can demonstrate its commitment to social responsibility and equitable practices within its service provision. Through a concerted effort to prioritize equal opportunity initiatives, Datasumi can play a significant role in advancing social equity and inclusivity within the G-Cloud ecosystem.

Wellbeing

In addressing employee wellbeing, Datasumi can elevate its G-Cloud service provision by prioritizing initiatives that promote mental health, work-life balance, and overall employee wellness. By aligning with social value themes that emphasize wellbeing, Datasumi can contribute to creating a supportive and healthy work environment for its employees and clients. Drawing inspiration from leading companies that prioritize employee wellbeing, such as Microsoft's focus on mental health support and flexible work arrangements, Datasumi can implement similar programs to enhance the overall wellbeing of its workforce. By fostering a culture of mindfulness, resilience, and work-life balance, Datasumi can empower its employees to thrive both professionally and personally.

Furthermore, by incorporating features in its G-Cloud services that prioritize user experience, accessibility, and data privacy, Datasumi can contribute to the overall wellbeing of its clients. Ensuring that services are user-friendly, secure, and aligned with best practices in data protection can enhance the mental and emotional wellbeing of users who rely on these technologies for their daily operations. Additionally, by promoting digital wellness practices and providing resources for managing screen time and technology usage, Datasumi can support clients in maintaining a healthy relationship with technology.

By integrating these wellbeing-focused initiatives into its G-Cloud services and organizational culture, Datasumi can foster a holistic approach to wellbeing that benefits both its employees and clients. Prioritizing mental health support, work-life balance, user experience, and data privacy can create a positive impact on overall wellbeing within the workplace and the digital ecosystem at large.

Pricing

Price
£575 a unit a day
Discount for educational organisations
Yes
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at accounts@datasumi.com. Tell them what format you need. It will help if you say what assistive technology you use.