Soumettre la recherche
Mettre en ligne
Applying Data Science to Your Business Problem
•
1 j'aime
•
1,710 vues
CA Technologies
Suivre
Applying Data Science to Your Business Problem
Lire moins
Lire la suite
Technologie
Signaler
Partager
Signaler
Partager
1 sur 37
Télécharger maintenant
Télécharger pour lire hors ligne
Recommandé
Robust ai
Robust ai
Shyam Keshavmurthy
Introduction To Machine Learning | Edureka
Introduction To Machine Learning | Edureka
Edureka!
Data science presentation
Data science presentation
MSDEVMTL
Decision tree for Predictive Modeling
Decision tree for Predictive Modeling
Edureka!
Data Science Training | Data Science For Beginners | Data Science With Python...
Data Science Training | Data Science For Beginners | Data Science With Python...
Simplilearn
Logistic Regression in R | Machine Learning Algorithms | Data Science Trainin...
Logistic Regression in R | Machine Learning Algorithms | Data Science Trainin...
Edureka!
Web 3.0
Web 3.0
Rajashree Rao
Anomaly Detection Technique
Anomaly Detection Technique
Chakrit Phain
Recommandé
Robust ai
Robust ai
Shyam Keshavmurthy
Introduction To Machine Learning | Edureka
Introduction To Machine Learning | Edureka
Edureka!
Data science presentation
Data science presentation
MSDEVMTL
Decision tree for Predictive Modeling
Decision tree for Predictive Modeling
Edureka!
Data Science Training | Data Science For Beginners | Data Science With Python...
Data Science Training | Data Science For Beginners | Data Science With Python...
Simplilearn
Logistic Regression in R | Machine Learning Algorithms | Data Science Trainin...
Logistic Regression in R | Machine Learning Algorithms | Data Science Trainin...
Edureka!
Web 3.0
Web 3.0
Rajashree Rao
Anomaly Detection Technique
Anomaly Detection Technique
Chakrit Phain
Anomaly Detection - Real World Scenarios, Approaches and Live Implementation
Anomaly Detection - Real World Scenarios, Approaches and Live Implementation
Impetus Technologies
Virginia Dignum – Responsible artificial intelligence
Virginia Dignum – Responsible artificial intelligence
NEXTConference
Introduction to Machine Learning
Introduction to Machine Learning
Rahul Jain
Machine Learning in Cyber Security Domain
Machine Learning in Cyber Security Domain
BGA Cyber Security
Reinforcement Learning Q-Learning
Reinforcement Learning Q-Learning
Melaku Eneayehu
Security and Privacy of Machine Learning
Security and Privacy of Machine Learning
Priyanka Aash
Introduction to machine learning
Introduction to machine learning
Koundinya Desiraju
Decision Trees for Classification: A Machine Learning Algorithm
Decision Trees for Classification: A Machine Learning Algorithm
Palin analytics
AI Lecture 7 (uncertainty)
AI Lecture 7 (uncertainty)
Tajim Md. Niamat Ullah Akhund
Data Science.pptx
Data Science.pptx
CarolineRebeccaD
The Next Big Thing in AI - Causality
The Next Big Thing in AI - Causality
Vaticle
Machine Learning in 10 Minutes | What is Machine Learning? | Edureka
Machine Learning in 10 Minutes | What is Machine Learning? | Edureka
Edureka!
Data Science Tutorial | Introduction To Data Science | Data Science Training ...
Data Science Tutorial | Introduction To Data Science | Data Science Training ...
Edureka!
Naive bayes
Naive bayes
Ashraf Uddin
What Is Data Science? Data Science Course - Data Science Tutorial For Beginne...
What Is Data Science? Data Science Course - Data Science Tutorial For Beginne...
Edureka!
Data science
Data science
Ranjit Nambisan
Loan Approval Prediction Using Machine Learning
Loan Approval Prediction Using Machine Learning
Souma Maiti
Machine Learning for dummies!
Machine Learning for dummies!
ZOLLHOF - Tech Incubator
Fraud detection with Machine Learning
Fraud detection with Machine Learning
Scaleway
Fairness in Machine Learning and AI
Fairness in Machine Learning and AI
Seth Grimes
Smart Data Slides: Data Science and Business Analysis - A Look at Best Practi...
Smart Data Slides: Data Science and Business Analysis - A Look at Best Practi...
DATAVERSITY
How big data tranform your business? Data Science Thailand Meet up #6
How big data tranform your business? Data Science Thailand Meet up #6
Data Science Thailand
Contenu connexe
Tendances
Anomaly Detection - Real World Scenarios, Approaches and Live Implementation
Anomaly Detection - Real World Scenarios, Approaches and Live Implementation
Impetus Technologies
Virginia Dignum – Responsible artificial intelligence
Virginia Dignum – Responsible artificial intelligence
NEXTConference
Introduction to Machine Learning
Introduction to Machine Learning
Rahul Jain
Machine Learning in Cyber Security Domain
Machine Learning in Cyber Security Domain
BGA Cyber Security
Reinforcement Learning Q-Learning
Reinforcement Learning Q-Learning
Melaku Eneayehu
Security and Privacy of Machine Learning
Security and Privacy of Machine Learning
Priyanka Aash
Introduction to machine learning
Introduction to machine learning
Koundinya Desiraju
Decision Trees for Classification: A Machine Learning Algorithm
Decision Trees for Classification: A Machine Learning Algorithm
Palin analytics
AI Lecture 7 (uncertainty)
AI Lecture 7 (uncertainty)
Tajim Md. Niamat Ullah Akhund
Data Science.pptx
Data Science.pptx
CarolineRebeccaD
The Next Big Thing in AI - Causality
The Next Big Thing in AI - Causality
Vaticle
Machine Learning in 10 Minutes | What is Machine Learning? | Edureka
Machine Learning in 10 Minutes | What is Machine Learning? | Edureka
Edureka!
Data Science Tutorial | Introduction To Data Science | Data Science Training ...
Data Science Tutorial | Introduction To Data Science | Data Science Training ...
Edureka!
Naive bayes
Naive bayes
Ashraf Uddin
What Is Data Science? Data Science Course - Data Science Tutorial For Beginne...
What Is Data Science? Data Science Course - Data Science Tutorial For Beginne...
Edureka!
Data science
Data science
Ranjit Nambisan
Loan Approval Prediction Using Machine Learning
Loan Approval Prediction Using Machine Learning
Souma Maiti
Machine Learning for dummies!
Machine Learning for dummies!
ZOLLHOF - Tech Incubator
Fraud detection with Machine Learning
Fraud detection with Machine Learning
Scaleway
Fairness in Machine Learning and AI
Fairness in Machine Learning and AI
Seth Grimes
Tendances
(20)
Anomaly Detection - Real World Scenarios, Approaches and Live Implementation
Anomaly Detection - Real World Scenarios, Approaches and Live Implementation
Virginia Dignum – Responsible artificial intelligence
Virginia Dignum – Responsible artificial intelligence
Introduction to Machine Learning
Introduction to Machine Learning
Machine Learning in Cyber Security Domain
Machine Learning in Cyber Security Domain
Reinforcement Learning Q-Learning
Reinforcement Learning Q-Learning
Security and Privacy of Machine Learning
Security and Privacy of Machine Learning
Introduction to machine learning
Introduction to machine learning
Decision Trees for Classification: A Machine Learning Algorithm
Decision Trees for Classification: A Machine Learning Algorithm
AI Lecture 7 (uncertainty)
AI Lecture 7 (uncertainty)
Data Science.pptx
Data Science.pptx
The Next Big Thing in AI - Causality
The Next Big Thing in AI - Causality
Machine Learning in 10 Minutes | What is Machine Learning? | Edureka
Machine Learning in 10 Minutes | What is Machine Learning? | Edureka
Data Science Tutorial | Introduction To Data Science | Data Science Training ...
Data Science Tutorial | Introduction To Data Science | Data Science Training ...
Naive bayes
Naive bayes
What Is Data Science? Data Science Course - Data Science Tutorial For Beginne...
What Is Data Science? Data Science Course - Data Science Tutorial For Beginne...
Data science
Data science
Loan Approval Prediction Using Machine Learning
Loan Approval Prediction Using Machine Learning
Machine Learning for dummies!
Machine Learning for dummies!
Fraud detection with Machine Learning
Fraud detection with Machine Learning
Fairness in Machine Learning and AI
Fairness in Machine Learning and AI
En vedette
Smart Data Slides: Data Science and Business Analysis - A Look at Best Practi...
Smart Data Slides: Data Science and Business Analysis - A Look at Best Practi...
DATAVERSITY
How big data tranform your business? Data Science Thailand Meet up #6
How big data tranform your business? Data Science Thailand Meet up #6
Data Science Thailand
Analytics Trends 2016: The next evolution
Analytics Trends 2016: The next evolution
Deloitte United States
Data science project presentation
Data science project presentation
Kevin Bluer
My First Data Science Project (Data Science Thailand Meetup #1)
My First Data Science Project (Data Science Thailand Meetup #1)
Data Science Thailand
3seven9 - About Us
3seven9 - About Us
3seven9
Big data-science-oanyc
Big data-science-oanyc
Open Analytics
Data Science for Business Managers by TektosData
Data Science for Business Managers by TektosData
Maurício Garcia
How can Data Science benefit your business?
How can Data Science benefit your business?
Peadar Coyle
Business model canvas
Business model canvas
Hamza Jounaidi
BEE Solving Problems Web
BEE Solving Problems Web
ebarrows
Moving From The Art To The Science
Moving From The Art To The Science
Capgemini
Creating Big Data Success with the Collaboration of Business and IT
Creating Big Data Success with the Collaboration of Business and IT
Edward Chenard
Data Science & Data Products at Neue Zürcher Zeitung
Data Science & Data Products at Neue Zürcher Zeitung
René Pfitzner
Data Science for Smart Manufacturing
Data Science for Smart Manufacturing
Carlo Torniai
Preface to a Strategic Plan for Data Science at the NIH
Preface to a Strategic Plan for Data Science at the NIH
Philip Bourne
From Data Science to Business Value - Analytics Applied
From Data Science to Business Value - Analytics Applied
Teradata Aster
Ford Motors SCQ Analysis
Ford Motors SCQ Analysis
sunilngupta
20160419 CCASA
20160419 CCASA
Dean Malmgren
Building a Data-Driven Culture
Building a Data-Driven Culture
Lucas Neo
En vedette
(20)
Smart Data Slides: Data Science and Business Analysis - A Look at Best Practi...
Smart Data Slides: Data Science and Business Analysis - A Look at Best Practi...
How big data tranform your business? Data Science Thailand Meet up #6
How big data tranform your business? Data Science Thailand Meet up #6
Analytics Trends 2016: The next evolution
Analytics Trends 2016: The next evolution
Data science project presentation
Data science project presentation
My First Data Science Project (Data Science Thailand Meetup #1)
My First Data Science Project (Data Science Thailand Meetup #1)
3seven9 - About Us
3seven9 - About Us
Big data-science-oanyc
Big data-science-oanyc
Data Science for Business Managers by TektosData
Data Science for Business Managers by TektosData
How can Data Science benefit your business?
How can Data Science benefit your business?
Business model canvas
Business model canvas
BEE Solving Problems Web
BEE Solving Problems Web
Moving From The Art To The Science
Moving From The Art To The Science
Creating Big Data Success with the Collaboration of Business and IT
Creating Big Data Success with the Collaboration of Business and IT
Data Science & Data Products at Neue Zürcher Zeitung
Data Science & Data Products at Neue Zürcher Zeitung
Data Science for Smart Manufacturing
Data Science for Smart Manufacturing
Preface to a Strategic Plan for Data Science at the NIH
Preface to a Strategic Plan for Data Science at the NIH
From Data Science to Business Value - Analytics Applied
From Data Science to Business Value - Analytics Applied
Ford Motors SCQ Analysis
Ford Motors SCQ Analysis
20160419 CCASA
20160419 CCASA
Building a Data-Driven Culture
Building a Data-Driven Culture
Similaire à Applying Data Science to Your Business Problem
Enabling a Hybrid Enterprise Application Launch Pad
Enabling a Hybrid Enterprise Application Launch Pad
CA Technologies
Tech Talk: Analytics at CA – What’s Cooking? Project Jarvis
Tech Talk: Analytics at CA – What’s Cooking? Project Jarvis
CA Technologies
Technology Primer: Learn How Analytics Can Sort the Wheat From the Chaff and ...
Technology Primer: Learn How Analytics Can Sort the Wheat From the Chaff and ...
CA Technologies
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
CA Technologies
Critical Path Forecasting with CA Workload Automation iDash
Critical Path Forecasting with CA Workload Automation iDash
CA Technologies
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
CA Technologies
Introduction to Identity-as-a-Service and Secure Access to SaaS
Introduction to Identity-as-a-Service and Secure Access to SaaS
CA Technologies
Securely Enabling the Digital Age
Securely Enabling the Digital Age
CA Technologies
Technology Primer: Monitor a Website in Minutes Using Shortcuts for Customer ...
Technology Primer: Monitor a Website in Minutes Using Shortcuts for Customer ...
CA Technologies
Digital transformation in financial services through trusted digital relation...
Digital transformation in financial services through trusted digital relation...
CA Technologies
Tech Talk: CA Live API Creator MythBuster: Low Code is a Toy, not Enterprise ...
Tech Talk: CA Live API Creator MythBuster: Low Code is a Toy, not Enterprise ...
CA Technologies
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
CA Technologies
Tech Tak: Threat Analytics for Privileged Access Management
Tech Tak: Threat Analytics for Privileged Access Management
CA Technologies
Identity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and Solutions
CA Technologies
Pre-Con Ed: Operational Intelligence – Monitoring the Past to Better Understa...
Pre-Con Ed: Operational Intelligence – Monitoring the Past to Better Understa...
CA Technologies
Tech Talk: Federate to an SAML-Enabled App in Minutes
Tech Talk: Federate to an SAML-Enabled App in Minutes
CA Technologies
Hands-On Lab: Get the Most Out of Your Network Performance Metrics With Innov...
Hands-On Lab: Get the Most Out of Your Network Performance Metrics With Innov...
CA Technologies
Analytics strategy
Analytics strategy
Sushant Kumar
Tech Talk: Agile 101: Why It's Important to Work Transparently
Tech Talk: Agile 101: Why It's Important to Work Transparently
CA Technologies
API Risk: Taking Your API Security to the Next Level
API Risk: Taking Your API Security to the Next Level
CA Technologies
Similaire à Applying Data Science to Your Business Problem
(20)
Enabling a Hybrid Enterprise Application Launch Pad
Enabling a Hybrid Enterprise Application Launch Pad
Tech Talk: Analytics at CA – What’s Cooking? Project Jarvis
Tech Talk: Analytics at CA – What’s Cooking? Project Jarvis
Technology Primer: Learn How Analytics Can Sort the Wheat From the Chaff and ...
Technology Primer: Learn How Analytics Can Sort the Wheat From the Chaff and ...
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
Critical Path Forecasting with CA Workload Automation iDash
Critical Path Forecasting with CA Workload Automation iDash
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
Introduction to Identity-as-a-Service and Secure Access to SaaS
Introduction to Identity-as-a-Service and Secure Access to SaaS
Securely Enabling the Digital Age
Securely Enabling the Digital Age
Technology Primer: Monitor a Website in Minutes Using Shortcuts for Customer ...
Technology Primer: Monitor a Website in Minutes Using Shortcuts for Customer ...
Digital transformation in financial services through trusted digital relation...
Digital transformation in financial services through trusted digital relation...
Tech Talk: CA Live API Creator MythBuster: Low Code is a Toy, not Enterprise ...
Tech Talk: CA Live API Creator MythBuster: Low Code is a Toy, not Enterprise ...
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
Tech Tak: Threat Analytics for Privileged Access Management
Tech Tak: Threat Analytics for Privileged Access Management
Identity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and Solutions
Pre-Con Ed: Operational Intelligence – Monitoring the Past to Better Understa...
Pre-Con Ed: Operational Intelligence – Monitoring the Past to Better Understa...
Tech Talk: Federate to an SAML-Enabled App in Minutes
Tech Talk: Federate to an SAML-Enabled App in Minutes
Hands-On Lab: Get the Most Out of Your Network Performance Metrics With Innov...
Hands-On Lab: Get the Most Out of Your Network Performance Metrics With Innov...
Analytics strategy
Analytics strategy
Tech Talk: Agile 101: Why It's Important to Work Transparently
Tech Talk: Agile 101: Why It's Important to Work Transparently
API Risk: Taking Your API Security to the Next Level
API Risk: Taking Your API Security to the Next Level
Plus de CA Technologies
CA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
CA Technologies
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
CA Technologies
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
CA Technologies
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
CA Technologies
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
CA Technologies
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
CA Technologies
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
CA Technologies
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
CA Technologies
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
CA Technologies
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
CA Technologies
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
CA Technologies
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
CA Technologies
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
CA Technologies
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
CA Technologies
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
CA Technologies
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
CA Technologies
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
CA Technologies
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
CA Technologies
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
CA Technologies
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
CA Technologies
Plus de CA Technologies
(20)
CA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
Dernier
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
RTylerCroy
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Gabriella Davis
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
Radu Cotescu
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Igalia
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Puma Security, LLC
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Martijn de Jong
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Katpro Technologies
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Michael W. Hawkins
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Delhi Call girls
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Rafal Los
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
Malak Abu Hammad
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
gurkirankumar98700
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Neo4j
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Maria Levchenko
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
Results
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
apidays
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
The Digital Insurer
Dernier
(20)
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Applying Data Science to Your Business Problem
1.
1 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD World® ’16 Applying Data Science to Your Business Problem Paul Dulany -
VP Data Science - CA Technologies SCX31S SECURITY
2.
2 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD © 2016 CA. All rights reserved. All trademarks referenced herein belong to their respective companies. The content provided in this CA World 2016 presentation is intended for informational purposes only and does not form any type of warranty.
The information provided by a CA partner and/or CA customer has not been reviewed for accuracy by CA. For Informational Purposes Only Terms of this Presentation
3.
3 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Abstract For a while now, a number of industries have been interested in data science and advanced analytics. But it isn’t always clear how best to use these within the business context. In this session, we’ll discuss how to turn a business problem into a data-science problem, and then back. We’ll use card-not-present payment fraud and login attempts as examples of how to identify the problem, determine if data science and advanced analytics can help (and if the situation warrants them), and then follow through on developing a solution to the problem. Paul Dulany, PhD CA Technologies VP Data Science
4.
4 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Agenda WHAT IS DATA SCIENCE? DETERMINING A PROBLEM OF INTEREST UNDERSTAND THE PRODUCTION ENVIRONMENT AND DEMANDS MODEL CREATION AND EVALUATION Q & A 1 2 3 4 5
5.
5 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Key Points for Applying Data Science § Identify a high-value Business Problem with High Quality Data §
Determine the class of the problem to solve § Utilize business-domain knowledge – Understand the "ecosystem" – Define appropriate metrics – Understand the data in full § Develop features and models / Evaluate / Iterate § Always keep the business problem in mind!
6.
6 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD What is Data Science? § The application of analytical techniques to large and “big” data –
A wide field encompassing many different aspects of analytics, statistics, and data mining – Fundamentally data driven – Based upon the scientific method – The goal is to use data and analytical techniques to solve problems § Requires knowledge in multiple domains – Analytics – Scientific computations – Data formats – Business domain – Statistics
7.
7 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Steps in Applying Data Science § Identify a high-value business problem –
The business case is critical § Intelligent Mainframe Operations – Need early detection of issues § Best is to predict and avoid issues – Currently, false positives (false alarms) are too prevalent – Expert-maintained systems of thresholds are hard to maintain Business Problem
8.
8 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Steps in Applying Data Science § Payment Security: –
Fraud in eCommerce is a significant problem § 3-D Secure was developed to combat this – Issuers incur the most pain from the current state § Fraud losses § Loss of income from interest and interchange fees § Customer experience and annoyance § Cost of inbound calls – Merchants feel pain too… Business Problem
9.
9 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Business Impact for a Client: 3 Year Impact Credit Debit Fraud savings (above current vendor)
£13,441,843 £15,174,365 Interchange fees (above current) £466,462 £3,441,882 Interest income (above current) £3,674,803 N/A Operational savings (not calculated) - - Total £17,583,108 £18,616,247
10.
10 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Steps in Applying Data Science § Identify data related to the business problem –
The more data, the better! – Is it categorical, ordinal, or numerical? What cardinality? – Is there a unique advantage over the competition? § Payment Security – 3DS data: PAReq message, device information, … – Wide mix of types of data – Time series is important – SaaS Deployment allows quality data to be gathered Identify Data (Results Proportional to Quality!)
11.
11 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Steps in Applying Data Science § Intelligent Mainframe Operations –
Multiple possible data sources § VSAM, DB2, IMS DB, IDMS, DATACOM, SMF, Syslogs, Vtape, CICS, … – Utilize CA SYSVIEW’s excellence – Embed analytics to detect abnormal patterns Identify Data (Results Proportional to Quality!)
12.
12 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Steps in Applying Data Science § Determine the general class of problem –
Classification, regression, anomaly detection, etc. – “Supervised” (teaching your children to read, teaching them manners) – “Unsupervised” (university) – “Semi-supervised” (school lunch room)
13.
13 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Steps in Applying Data Science § Payment Security –
Supervised classification – Fraud information for losses is likely in good shape – Complexities happen once you have a system in place § Censored problem, both in marking and in changing fraudster behavior § Intelligent Mainframe Operations – Unsupervised to begin – Need to develop baselines of normal behavior § But must provide results from day 0 – Possibility of semi-supervised in the future Determine the general class of problem
14.
14 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Steps in Applying Data Science § Understand the ecosystem –
What actions can be taken? – Is getting the result time sensitive? § Intelligent Mainframe Operations – Predictive analytics needed – Multiple possible actions, key is to inform the operator’s actions – Different time-scales for problems – Reaction-time is critical – real-time
15.
15 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Steps in applying Data Science § Payment Security –
Predictive and prescriptive analytics needed – Multiple possible actions, at the transaction and the card level – Timing is critical – real-time, i.e., < 50ms for vast majority § We must be able to take action now Understand the Ecosystem
16.
16 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Steps in Applying Data Science § Determine the appropriate metrics –
How do we measure success? § Well defined measures are critical § Intelligent Mainframe Operations – High Availability – Problem avoidance – Reduced MTTR – Reduce SME dependence for issue detection
17.
17 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Steps in Applying Data Science § Payment Security –
A number of possibilities, based upon customer’s objectives – Consider them all § Detection rates § “Outsort” rates § False-positive ratios § False-positive rates § Value-based / transaction based / card based Metrics TOR 𝑆 = ∑ 𝐹 𝑠* + 𝑁 𝑠* ./0. ∑ 𝐹 𝑠* + 𝑁 𝑠* 122 .* TDR 𝑆 = ∑ 𝐹 𝑠* ./0. ∑ 𝐹 𝑠* 122 .*
18.
18 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD What’s Next? § Now we have a well defined problem §
So we spend a lot of time with the data! – “Browse” the data – Run some descriptive statistics – See if you can surprise yourself – If supervised, view the tagging data and the production data separately, and then together.
19.
19 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Review the Tagged Data § Browse the data again §
Run many statistical test – Beware of “Target Leaks”!! – Begin getting a feel for the variations, correlations, idiosyncrasies § You never want perfectly clean data – You want data that simulates production! § Beware of any changes to the data, especially non-causal changes § Model training is a numerical simulation of production
20.
20 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Data Partitioning: Beware What You Partition and How! § Partitioning –
Often need to use stratified sampling – When using multiple entities for tracking behavior, interactions are tricky! § Look for irreducibility § Go to out-of-time if needed Historical Data Training Fraud Non-Fraud Validate Fraud Non- Fraud Holdout Fraud Non- Fraud
21.
21 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Feature Development § “Features” pull the distinguishing characteristics from the data –
Time series analysis techniques – Digital Signal Processing techniques – Statistical measures of differences – Bayesian approaches – Linear discriminants – Non-linear transformations – …
22.
22 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Feature Development: Simple Example § Determine a peer group from the historical data –
All transactions where there were four previous transactions in the last week, at least two of which were on the same device, but in different countries § Determine the distributions of classes for a continuous variable – Let’s say, the amount – Use a discriminant calculation to determine likelihood of belonging to either class.
23.
23 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Feature Development: More Complexity § At the other end of the scale are online-learning models to determine behaviors –
Autocorrelation models, exponential weighting, KDE, etc. – Many techniques – § but must keep in mind the CPU constraints, I/O constraints, etc. § Conversion of high-cardinality categorical data into numerical inputs 𝑥"(𝑡 𝑛 , 𝑡 𝑛−1, 𝑡0) = 𝛼(𝑡 𝑛 , 𝑡0)𝑥 𝑛 + 𝛽(𝑡 𝑛 , 𝑡 𝑛−1, 𝑡0)𝑥" 𝑛−1 𝛼(𝑡 𝑛 , 𝑡0) = 1 − 𝛾 1 − 𝛾(𝑡 𝑛 −𝑡0) 𝛽(𝑡 𝑛 , 𝑡 𝑛−1, 𝑡0) = 𝛾(𝑡 𝑛 −𝑡 𝑛−1) 11 − 𝛾(𝑡 𝑛−1−𝑡0) 2 1 − 𝛾(𝑡 𝑛 −𝑡0)
24.
24 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Example: Unsupervised Anomaly Detection § Utilize Historical data to define bands of different probabilities –
Map real time metric streams against system defined normal – Multi-point alerts generated using industry-standard Western-Electric rules – Make static thresholds optional! Unlikely Most Likely Metric Time Less Likely
25.
25 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Example: Supervised Model § Always remember Occam's Razor! –
Among competing hypotheses, the one with the fewest assumptions should be selected. – Avoid needless complexity § Start with simple models, and grow more complex as needed – Linear regression – Logistic regression – Decision trees – Neural Networks – SVM …
26.
26 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Example: Supervised Model Neural Network
27.
27 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Example: Supervised Model § There are many aspects of training a neural network –
different activation and error functions – different training algorithms, – variations of seeds, learning rate, momentum, – self-regulation, – number of hidden layers, – number of nodes, – boosting/bagging, – preventing overfitting, – etc. Train the Model(s)
28.
28 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Review § Review the results of your training, and start all over again! –
Consider segmentation – Try leaving out the variables with the highest sensitivity – Subdivide the data to see if there are regions of instability – Iterate as needed § Finally, select your model(s)! § But we’re not done… – Now worry about calibration, upgrade/downgrade, priming time, packaging, integration, model report, …
29.
29 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Model Performance Chart
30.
30 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Intelligent Mainframe Operations Typical Volatility Anomaly Tasks ready to be dispatched
31.
31 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Key Points for Applying Data Science § Identify a high-value Business Problem with High Quality Data §
Determine the class of the problem to solve § Utilize business-domain knowledge – Understand the "ecosystem" – Define appropriate metrics – Understand the data in full § Develop features and models / Evaluate / Iterate § Always keep the business problem in mind!
32.
32 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Recommended Sessions SESSION # TITLE
DATE/TIME SCX50S Convenience and Security for banking customers with CA Advanced Authentication 11/17/2016 at 3:00 pm SCX34S Securing Mobile Payments: Applying Lessons Learned in the Real World 11/17/2016 at 3:45 pm SCT05T Threat Analytics for Privileged Access Management 11/17/2016 at 4:30 pm
33.
33 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Don’t Miss Our INTERACTIVE Security Demo Experience! SNEAK PEEK! 33 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
34.
34 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD We Want to Hear From You! § IT Central is a leading technology review site. CA has them to help generate product reviews for our Security products. §
ITCS staff may be at this session now! (look for their shirts). If you would like to offer a product review, please ask them after the class, or go by their booth. Note: § Only takes 5-7 mins § You have total control over the review § It can be anonymous, if required
35.
35 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Questions?
36.
36 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Stay connected at communities.ca.com Thank you.
37.
37 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Security For more information on Security, please visit: http://cainc.to/EtfYyw
Télécharger maintenant