SlideShare ist ein Scribd-Unternehmen logo
1 von 37
Downloaden Sie, um offline zu lesen
1 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
World®
’16
Applying	Data	Science	to	
Your	Business	Problem
Paul	Dulany - VP	Data	Science	- CA	Technologies
SCX31S
SECURITY
2 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
©	2016	CA.	All	rights	reserved.	All	trademarks	referenced	herein	belong	to	their	respective	companies.
The	content	provided	in	this CA	World	2016	presentation	is	intended	for	informational	purposes	only	and	does	not	form	any	type	of	
warranty. The information	provided	by	a	CA	partner	and/or	CA	customer	has	not	been	reviewed	for	accuracy	by	CA.	
For	Informational	Purposes	Only	
Terms	of	this	Presentation
3 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Abstract
For	a	while	now,	a	number	of	industries	have	been	interested	in	data	science	and	
advanced	analytics.	But	it	isn’t	always	clear	how	best	to	use	these	within	the	
business	context.	In	this	session,	we’ll	discuss	how	to	turn	a	business	problem	into	
a	data-science	problem,	and	then	back.	We’ll	use	card-not-present	payment	fraud	
and	login	attempts	as	examples	of	how	to	identify	the	problem,	determine	if	data	
science	and	advanced	analytics	can	help	(and	if	the	situation	warrants	them),	and	
then	follow	through	on	developing	a	solution	to	the	problem.
Paul	Dulany,
PhD
CA	Technologies
VP	Data	Science
4 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Agenda
WHAT	IS	DATA	SCIENCE?
DETERMINING	A	PROBLEM	OF	INTEREST
UNDERSTAND	THE	PRODUCTION	ENVIRONMENT	AND	DEMANDS
MODEL	CREATION	AND	EVALUATION
Q	&	A
1
2
3
4
5
5 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Key	Points	for	Applying	Data	Science
§ Identify	a	high-value	Business	Problem	with	High	Quality	Data
§ Determine	the	class	of	the	problem	to	solve
§ Utilize	business-domain	knowledge
– Understand	the	"ecosystem"
– Define	appropriate	metrics
– Understand	the	data	in	full
§ Develop	features	and	models	/	Evaluate	/	Iterate
§ Always	keep	the	business	problem	in	mind!
6 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
What	is	Data	Science?
§ The	application	of	analytical	techniques	to	large	and	“big”	
data
– A	wide	field	encompassing	many	different	aspects	of	analytics,	
statistics,	and	data	mining
– Fundamentally	data	driven
– Based	upon	the	scientific	method
– The	goal	is	to	use	data	and	analytical	techniques	to	solve	problems
§ Requires	knowledge	in	multiple	domains
– Analytics
– Scientific	computations
– Data	formats
– Business	domain
– Statistics
7 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Steps	in	Applying	Data	Science
§ Identify	a	high-value	business	problem
– The	business	case	is	critical
§ Intelligent	Mainframe	Operations
– Need	early	detection	of	issues
§ Best	is	to	predict	and	avoid	issues
– Currently,	false	positives	(false	alarms)	are	too	prevalent
– Expert-maintained	systems	of	thresholds	are	hard	to	maintain
Business	Problem
8 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Steps	in	Applying	Data	Science
§ Payment	Security:
– Fraud	in	eCommerce	is	a	significant	problem
§ 3-D	Secure	was	developed	to	combat	this
– Issuers	incur	the	most	pain	from	the	current	state
§ Fraud	losses
§ Loss	of	income	from	interest	and	interchange	fees
§ Customer	experience	and	annoyance
§ Cost	of	inbound	calls
– Merchants	feel	pain	too…
Business	Problem
9 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Business	Impact	for	a	Client:	3	Year	Impact
Credit Debit
Fraud	savings	(above	current	vendor) £13,441,843 £15,174,365	
Interchange	fees	(above	current) £466,462 £3,441,882	
Interest income	(above	current) £3,674,803 N/A
Operational	savings	(not	calculated) - -
Total £17,583,108 £18,616,247
10 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Steps	in	Applying	Data	Science
§ Identify	data	related	to	the	business	problem
– The	more	data,	the	better!
– Is	it	categorical,	ordinal,	or	numerical?		What	cardinality?
– Is	there	a	unique	advantage	over	the	competition?
§ Payment	Security
– 3DS	data:	PAReq message,	device	information,	…
– Wide	mix	of	types	of	data
– Time	series	is	important
– SaaS	Deployment	allows	quality	data	to	be	gathered
Identify	Data	(Results	Proportional	to	Quality!)
11 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Steps	in	Applying	Data	Science
§ Intelligent	Mainframe	Operations
– Multiple	possible	data	sources
§ VSAM,	DB2,	IMS	DB,	IDMS,	DATACOM,	SMF,	Syslogs,	Vtape,	CICS,	…
– Utilize	CA	SYSVIEW’s	excellence
– Embed	analytics	to	detect	abnormal	patterns
Identify	Data	(Results	Proportional	to	Quality!)
12 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Steps	in	Applying	Data	Science
§ Determine	the	general	class	of	problem
– Classification,	regression,	anomaly	detection,	etc.
– “Supervised”	(teaching	your	children	to	read,	teaching	them	manners)
– “Unsupervised”	(university)
– “Semi-supervised”	(school	lunch	room)
13 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Steps	in	Applying	Data	Science
§ Payment	Security
– Supervised	classification
– Fraud	information	for	losses	is	likely	in	good	shape
– Complexities	happen	once	you	have	a	system	in	place
§ Censored	problem,	both	in	marking	and	in	changing	fraudster	behavior
§ Intelligent	Mainframe	Operations
– Unsupervised	to	begin
– Need	to	develop	baselines	of	normal	behavior
§ But	must	provide	results	from	day	0
– Possibility	of	semi-supervised	in	the	future
Determine	the	general	class	of	problem
14 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Steps	in	Applying	Data	Science
§ Understand	the	ecosystem
– What	actions	can	be	taken?
– Is	getting	the	result	time	sensitive?
§ Intelligent	Mainframe	Operations
– Predictive	analytics	needed
– Multiple	possible	actions,	key	is	to	inform	the	operator’s	actions
– Different	time-scales	for	problems
– Reaction-time	is	critical	– real-time
15 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Steps	in	applying	Data	Science
§ Payment	Security
– Predictive	and	prescriptive	analytics	needed
– Multiple	possible	actions,	at	the	transaction	and	the	card	level
– Timing	is	critical	– real-time,	i.e.,	<	50ms	for	vast	majority
§ We	must	be	able	to	take	action	now
Understand	the	Ecosystem
16 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Steps	in	Applying	Data	Science
§ Determine	the	appropriate	metrics
– How	do	we	measure	success?
§ Well	defined	measures	are	critical
§ Intelligent	Mainframe	Operations
– High	Availability
– Problem	avoidance
– Reduced	MTTR
– Reduce	SME	dependence	for	issue	detection
17 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Steps	in	Applying	Data	Science
§ Payment	Security
– A	number	of	possibilities,	based	upon	customer’s	objectives
– Consider	them	all
§ Detection	rates
§ “Outsort”	rates
§ False-positive	ratios
§ False-positive	rates
§ Value-based	/	transaction	based	/	card	based
Metrics
TOR 𝑆 =	
∑ 𝐹 𝑠*
+ 𝑁 𝑠*
./0.
∑ 𝐹 𝑠* + 𝑁 𝑠*
122	.*
TDR 𝑆 =	
∑ 𝐹 𝑠*
./0.
∑ 𝐹 𝑠*
122	.*
18 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
What’s	Next?
§ Now	we	have	a	well	defined	problem
§ So	we	spend	a	lot	of	time	with	the	data!
– “Browse”	the	data
– Run	some	descriptive	statistics
– See	if	you	can	surprise	yourself
– If	supervised,	view	the	tagging	data	and	the	
production	data	separately,	and	then	
together.
19 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Review	the	Tagged	Data
§ Browse	the	data	again
§ Run	many	statistical	test
– Beware	of	“Target	Leaks”!!
– Begin	getting	a	feel	for	the	variations,	correlations,	idiosyncrasies
§ You	never	want	perfectly	clean	data
– You	want	data	that	simulates	production!
§ Beware	of	any	changes	to	the	data,	especially	non-causal	changes
§ Model	training	is	a	numerical	simulation	of	production
20 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Data	Partitioning:	Beware	What	You	Partition	and	How!
§ Partitioning
– Often	need	to	use	stratified	
sampling
– When	using	multiple	entities	
for	tracking	behavior,	
interactions	are	tricky!
§ Look	for	irreducibility
§ Go	to	out-of-time	if	needed
Historical	Data
Training
Fraud
Non-Fraud
Validate
Fraud
Non-
Fraud
Holdout
Fraud
Non-
Fraud
21 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Feature	Development
§ “Features”	pull	the	distinguishing	
characteristics	from	the	data
– Time	series	analysis	techniques
– Digital	Signal	Processing	techniques
– Statistical	measures	of	differences
– Bayesian	approaches
– Linear	discriminants
– Non-linear	transformations
– …
22 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Feature	Development:	Simple	Example
§ Determine	a	peer	group	from	the	historical	data
– All	transactions	where	there	were	four	previous	transactions	in	the	last	
week,	at	least	two	of	which	were	on	the	same	device,	but	in	different	
countries
§ Determine	the	distributions	of	classes	for	a	continuous	
variable
– Let’s	say,	the	amount
– Use	a	discriminant	calculation	to	
determine	likelihood	of	belonging	to	either	class.
23 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Feature	Development:	More	Complexity
§ At	the	other	end	of	the	scale	are	online-learning	models	to	
determine	behaviors
– Autocorrelation	models,	exponential	weighting,	KDE,	etc.
– Many	techniques	–
§ but	must	keep	in	mind	the	CPU	constraints,	I/O	constraints,	etc.
§ Conversion	of	high-cardinality	
categorical	data	into	numerical
inputs
𝑥"(𝑡 𝑛 , 𝑡 𝑛−1, 𝑡0) = 𝛼(𝑡 𝑛 , 𝑡0)𝑥 𝑛 + 𝛽(𝑡 𝑛 , 𝑡 𝑛−1, 𝑡0)𝑥" 𝑛−1	
𝛼(𝑡 𝑛 , 𝑡0) =
1 − 𝛾
1 − 𝛾(𝑡 𝑛 −𝑡0)
	
𝛽(𝑡 𝑛 , 𝑡 𝑛−1, 𝑡0) =
𝛾(𝑡 𝑛 −𝑡 𝑛−1)
11 − 𝛾(𝑡 𝑛−1−𝑡0)
2
1 − 𝛾(𝑡 𝑛 −𝑡0)
24 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Example:	Unsupervised	Anomaly	Detection
§ Utilize	Historical	data	to	define	bands	of	different	probabilities
– Map	real	time	metric	streams	against	system	defined	normal	
– Multi-point	alerts	generated	using	industry-standard	Western-Electric	
rules
– Make	static	thresholds	optional!
Unlikely
Most	Likely
Metric
Time
Less	Likely
25 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Example:	Supervised	Model
§ Always	remember	Occam's	Razor!
– Among	competing	hypotheses,	the	one	with	the	fewest	assumptions	
should	be	selected.
– Avoid	needless	complexity
§ Start	with	simple	models,	and	grow	more	complex	as	needed
– Linear	regression
– Logistic	regression
– Decision	trees
– Neural	Networks
– SVM	…
26 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Example:	Supervised	Model
Neural	Network
27 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Example:	Supervised	Model
§ There	are	many	aspects	of	training	a	neural	network
– different	activation	and	error	functions
– different	training	algorithms,	
– variations	of	seeds,	learning	rate,	momentum,	
– self-regulation,
– number	of	hidden	layers,	
– number	of	nodes,	
– boosting/bagging,	
– preventing	overfitting,
– etc.
Train	the	Model(s)
28 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Review
§ Review	the	results	of	your	training,	and	start	all	over	again!
– Consider	segmentation
– Try	leaving	out	the	variables	with	the	highest	sensitivity
– Subdivide	the	data	to	see	if	there	are	regions	of	instability
– Iterate	as	needed
§ Finally,	select	your	model(s)!
§ But	we’re	not	done…
– Now	worry	about	calibration,	upgrade/downgrade,	priming	time,	
packaging,	integration,	model	report,	…
29 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Model	Performance	Chart
30 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Intelligent	Mainframe	Operations
Typical	
Volatility
Anomaly
Tasks	ready	to	be	dispatched
31 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Key	Points	for	Applying	Data	Science
§ Identify	a	high-value	Business	Problem	with	High	Quality	Data
§ Determine	the	class	of	the	problem	to	solve
§ Utilize	business-domain	knowledge
– Understand	the	"ecosystem"
– Define	appropriate	metrics
– Understand	the	data	in	full
§ Develop	features	and	models	/	Evaluate	/	Iterate
§ Always	keep	the	business	problem	in	mind!
32 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Recommended	Sessions
SESSION	# TITLE DATE/TIME
SCX50S
Convenience	and	Security	for	banking	customers	with	CA	
Advanced	Authentication
11/17/2016	at	3:00	pm
SCX34S
Securing	Mobile	Payments:	Applying	Lessons	Learned	in	
the	Real	World
11/17/2016	at	3:45	pm
SCT05T Threat	Analytics	for	Privileged	Access	Management 11/17/2016	at	4:30	pm
33 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Don’t	Miss	Our	INTERACTIVE
Security	Demo	Experience!
SNEAK
PEEK!
33 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
34 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
We	Want	to	Hear	From	You!
§ IT	Central	is	a	leading	technology	review	site.		CA	has	them	to	
help	generate	product	reviews	for	our	Security	products.
§ ITCS	staff	may	be	at	this	session	now!	(look	for	their	shirts).	If	
you	would	like	to		offer	a	product	review,	please	ask	them	
after	the	class,	or	go	by	their	booth.
Note:
§ Only	takes	5-7	mins
§ You	have	total	control	over	the	review
§ It	can	be	anonymous,	if	required
35 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Questions?
36 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Stay	connected	at	communities.ca.com
Thank	you.
37 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Security
For	more	information	on	Security,	please	visit:	
http://cainc.to/EtfYyw

Weitere ähnliche Inhalte

Was ist angesagt?

Applied Artificial Intelligence: How Machine Learning Transforms How We Live ...
Applied Artificial Intelligence: How Machine Learning Transforms How We Live ...Applied Artificial Intelligence: How Machine Learning Transforms How We Live ...
Applied Artificial Intelligence: How Machine Learning Transforms How We Live ...Adelyn Zhou
 
Introduction to Artificial Intelligence on AWS
Introduction to Artificial Intelligence on AWSIntroduction to Artificial Intelligence on AWS
Introduction to Artificial Intelligence on AWSAmazon Web Services
 
Time Series Forecasting Project Presentation.
Time Series Forecasting Project  Presentation.Time Series Forecasting Project  Presentation.
Time Series Forecasting Project Presentation.Anupama Kate
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data ScienceEdureka!
 
Career in Data Science
Career in Data ScienceCareer in Data Science
Career in Data ScienceActonRoy
 
Introduction to data science club
Introduction to data science clubIntroduction to data science club
Introduction to data science clubData Science Club
 
Machine Learning Deep Learning AI and Data Science
Machine Learning Deep Learning AI and Data Science Machine Learning Deep Learning AI and Data Science
Machine Learning Deep Learning AI and Data Science Venkata Reddy Konasani
 
The Basics of Statistics for Data Science By Statisticians
The Basics of Statistics for Data Science By StatisticiansThe Basics of Statistics for Data Science By Statisticians
The Basics of Statistics for Data Science By StatisticiansStat Analytica
 
AI Data Acquisition and Governance: Considerations for Success
AI Data Acquisition and Governance: Considerations for SuccessAI Data Acquisition and Governance: Considerations for Success
AI Data Acquisition and Governance: Considerations for SuccessDatabricks
 
Data Science vs Machine Learning – What’s The Difference? | Data Science Cour...
Data Science vs Machine Learning – What’s The Difference? | Data Science Cour...Data Science vs Machine Learning – What’s The Difference? | Data Science Cour...
Data Science vs Machine Learning – What’s The Difference? | Data Science Cour...Edureka!
 
Landscape of AI/ML in 2023
Landscape of AI/ML in 2023Landscape of AI/ML in 2023
Landscape of AI/ML in 2023HyunJoon Jung
 
Reservoir Computing Overview (with emphasis on Liquid State Machines)
Reservoir Computing Overview (with emphasis on Liquid State Machines)Reservoir Computing Overview (with emphasis on Liquid State Machines)
Reservoir Computing Overview (with emphasis on Liquid State Machines)Alex Klibisz
 
Feature Engineering
Feature Engineering Feature Engineering
Feature Engineering odsc
 
Business Analytics Overview
Business Analytics OverviewBusiness Analytics Overview
Business Analytics OverviewSAP Analytics
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data ScienceSrishti44
 
Who is a Data Scientist? | How to become a Data Scientist? | Data Science Cou...
Who is a Data Scientist? | How to become a Data Scientist? | Data Science Cou...Who is a Data Scientist? | How to become a Data Scientist? | Data Science Cou...
Who is a Data Scientist? | How to become a Data Scientist? | Data Science Cou...Edureka!
 

Was ist angesagt? (20)

Applied Artificial Intelligence: How Machine Learning Transforms How We Live ...
Applied Artificial Intelligence: How Machine Learning Transforms How We Live ...Applied Artificial Intelligence: How Machine Learning Transforms How We Live ...
Applied Artificial Intelligence: How Machine Learning Transforms How We Live ...
 
Introduction to Artificial Intelligence on AWS
Introduction to Artificial Intelligence on AWSIntroduction to Artificial Intelligence on AWS
Introduction to Artificial Intelligence on AWS
 
Time Series Forecasting Project Presentation.
Time Series Forecasting Project  Presentation.Time Series Forecasting Project  Presentation.
Time Series Forecasting Project Presentation.
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Data science - An Introduction
Data science - An IntroductionData science - An Introduction
Data science - An Introduction
 
Career in Data Science
Career in Data ScienceCareer in Data Science
Career in Data Science
 
Orange Data Mining & Data Visualization Tool
Orange Data Mining & Data Visualization ToolOrange Data Mining & Data Visualization Tool
Orange Data Mining & Data Visualization Tool
 
Data science
Data scienceData science
Data science
 
Introduction to data science club
Introduction to data science clubIntroduction to data science club
Introduction to data science club
 
Machine Learning Deep Learning AI and Data Science
Machine Learning Deep Learning AI and Data Science Machine Learning Deep Learning AI and Data Science
Machine Learning Deep Learning AI and Data Science
 
The Basics of Statistics for Data Science By Statisticians
The Basics of Statistics for Data Science By StatisticiansThe Basics of Statistics for Data Science By Statisticians
The Basics of Statistics for Data Science By Statisticians
 
AI Data Acquisition and Governance: Considerations for Success
AI Data Acquisition and Governance: Considerations for SuccessAI Data Acquisition and Governance: Considerations for Success
AI Data Acquisition and Governance: Considerations for Success
 
Data Science vs Machine Learning – What’s The Difference? | Data Science Cour...
Data Science vs Machine Learning – What’s The Difference? | Data Science Cour...Data Science vs Machine Learning – What’s The Difference? | Data Science Cour...
Data Science vs Machine Learning – What’s The Difference? | Data Science Cour...
 
Landscape of AI/ML in 2023
Landscape of AI/ML in 2023Landscape of AI/ML in 2023
Landscape of AI/ML in 2023
 
Reservoir Computing Overview (with emphasis on Liquid State Machines)
Reservoir Computing Overview (with emphasis on Liquid State Machines)Reservoir Computing Overview (with emphasis on Liquid State Machines)
Reservoir Computing Overview (with emphasis on Liquid State Machines)
 
Feature Engineering
Feature Engineering Feature Engineering
Feature Engineering
 
Data Analytics Training Course
Data Analytics Training CourseData Analytics Training Course
Data Analytics Training Course
 
Business Analytics Overview
Business Analytics OverviewBusiness Analytics Overview
Business Analytics Overview
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Who is a Data Scientist? | How to become a Data Scientist? | Data Science Cou...
Who is a Data Scientist? | How to become a Data Scientist? | Data Science Cou...Who is a Data Scientist? | How to become a Data Scientist? | Data Science Cou...
Who is a Data Scientist? | How to become a Data Scientist? | Data Science Cou...
 

Andere mochten auch

Smart Data Slides: Data Science and Business Analysis - A Look at Best Practi...
Smart Data Slides: Data Science and Business Analysis - A Look at Best Practi...Smart Data Slides: Data Science and Business Analysis - A Look at Best Practi...
Smart Data Slides: Data Science and Business Analysis - A Look at Best Practi...DATAVERSITY
 
How big data tranform your business? Data Science Thailand Meet up #6
How big data tranform your business? Data Science Thailand Meet up #6How big data tranform your business? Data Science Thailand Meet up #6
How big data tranform your business? Data Science Thailand Meet up #6Data Science Thailand
 
Analytics Trends 2016: The next evolution
Analytics Trends 2016: The next evolutionAnalytics Trends 2016: The next evolution
Analytics Trends 2016: The next evolutionDeloitte United States
 
Data science project presentation
Data science project presentationData science project presentation
Data science project presentationKevin Bluer
 
My First Data Science Project (Data Science Thailand Meetup #1)
My First Data Science Project (Data Science Thailand Meetup #1)My First Data Science Project (Data Science Thailand Meetup #1)
My First Data Science Project (Data Science Thailand Meetup #1)Data Science Thailand
 
3seven9 - About Us
3seven9 - About Us3seven9 - About Us
3seven9 - About Us3seven9
 
Big data-science-oanyc
Big data-science-oanycBig data-science-oanyc
Big data-science-oanycOpen Analytics
 
Data Science for Business Managers by TektosData
Data Science for Business Managers by TektosDataData Science for Business Managers by TektosData
Data Science for Business Managers by TektosDataMaurício Garcia
 
How can Data Science benefit your business?
How can Data Science benefit your business?How can Data Science benefit your business?
How can Data Science benefit your business?Peadar Coyle
 
BEE Solving Problems Web
BEE Solving Problems WebBEE Solving Problems Web
BEE Solving Problems Webebarrows
 
Moving From The Art To The Science
Moving From The Art To The ScienceMoving From The Art To The Science
Moving From The Art To The ScienceCapgemini
 
Creating Big Data Success with the Collaboration of Business and IT
Creating Big Data Success with the Collaboration of Business and ITCreating Big Data Success with the Collaboration of Business and IT
Creating Big Data Success with the Collaboration of Business and ITEdward Chenard
 
Data Science & Data Products at Neue Zürcher Zeitung
Data Science & Data Products at Neue Zürcher ZeitungData Science & Data Products at Neue Zürcher Zeitung
Data Science & Data Products at Neue Zürcher ZeitungRené Pfitzner
 
Data Science for Smart Manufacturing
Data Science for Smart ManufacturingData Science for Smart Manufacturing
Data Science for Smart ManufacturingCarlo Torniai
 
Preface to a Strategic Plan for Data Science at the NIH
Preface to a Strategic Plan for Data Science at the NIHPreface to a Strategic Plan for Data Science at the NIH
Preface to a Strategic Plan for Data Science at the NIHPhilip Bourne
 
From Data Science to Business Value - Analytics Applied
From Data Science to Business Value - Analytics AppliedFrom Data Science to Business Value - Analytics Applied
From Data Science to Business Value - Analytics AppliedTeradata Aster
 
Ford Motors SCQ Analysis
Ford Motors SCQ AnalysisFord Motors SCQ Analysis
Ford Motors SCQ Analysissunilngupta
 
Building a Data-Driven Culture
Building a Data-Driven CultureBuilding a Data-Driven Culture
Building a Data-Driven CultureLucas Neo
 

Andere mochten auch (20)

Smart Data Slides: Data Science and Business Analysis - A Look at Best Practi...
Smart Data Slides: Data Science and Business Analysis - A Look at Best Practi...Smart Data Slides: Data Science and Business Analysis - A Look at Best Practi...
Smart Data Slides: Data Science and Business Analysis - A Look at Best Practi...
 
How big data tranform your business? Data Science Thailand Meet up #6
How big data tranform your business? Data Science Thailand Meet up #6How big data tranform your business? Data Science Thailand Meet up #6
How big data tranform your business? Data Science Thailand Meet up #6
 
Analytics Trends 2016: The next evolution
Analytics Trends 2016: The next evolutionAnalytics Trends 2016: The next evolution
Analytics Trends 2016: The next evolution
 
Data science project presentation
Data science project presentationData science project presentation
Data science project presentation
 
My First Data Science Project (Data Science Thailand Meetup #1)
My First Data Science Project (Data Science Thailand Meetup #1)My First Data Science Project (Data Science Thailand Meetup #1)
My First Data Science Project (Data Science Thailand Meetup #1)
 
3seven9 - About Us
3seven9 - About Us3seven9 - About Us
3seven9 - About Us
 
Big data-science-oanyc
Big data-science-oanycBig data-science-oanyc
Big data-science-oanyc
 
Data Science for Business Managers by TektosData
Data Science for Business Managers by TektosDataData Science for Business Managers by TektosData
Data Science for Business Managers by TektosData
 
How can Data Science benefit your business?
How can Data Science benefit your business?How can Data Science benefit your business?
How can Data Science benefit your business?
 
Business model canvas
Business model canvasBusiness model canvas
Business model canvas
 
BEE Solving Problems Web
BEE Solving Problems WebBEE Solving Problems Web
BEE Solving Problems Web
 
Moving From The Art To The Science
Moving From The Art To The ScienceMoving From The Art To The Science
Moving From The Art To The Science
 
Creating Big Data Success with the Collaboration of Business and IT
Creating Big Data Success with the Collaboration of Business and ITCreating Big Data Success with the Collaboration of Business and IT
Creating Big Data Success with the Collaboration of Business and IT
 
Data Science & Data Products at Neue Zürcher Zeitung
Data Science & Data Products at Neue Zürcher ZeitungData Science & Data Products at Neue Zürcher Zeitung
Data Science & Data Products at Neue Zürcher Zeitung
 
Data Science for Smart Manufacturing
Data Science for Smart ManufacturingData Science for Smart Manufacturing
Data Science for Smart Manufacturing
 
Preface to a Strategic Plan for Data Science at the NIH
Preface to a Strategic Plan for Data Science at the NIHPreface to a Strategic Plan for Data Science at the NIH
Preface to a Strategic Plan for Data Science at the NIH
 
From Data Science to Business Value - Analytics Applied
From Data Science to Business Value - Analytics AppliedFrom Data Science to Business Value - Analytics Applied
From Data Science to Business Value - Analytics Applied
 
Ford Motors SCQ Analysis
Ford Motors SCQ AnalysisFord Motors SCQ Analysis
Ford Motors SCQ Analysis
 
20160419 CCASA
20160419 CCASA20160419 CCASA
20160419 CCASA
 
Building a Data-Driven Culture
Building a Data-Driven CultureBuilding a Data-Driven Culture
Building a Data-Driven Culture
 

Ähnlich wie Applying Data Science to Your Business Problem

Enabling a Hybrid Enterprise Application Launch Pad
Enabling a Hybrid Enterprise Application Launch PadEnabling a Hybrid Enterprise Application Launch Pad
Enabling a Hybrid Enterprise Application Launch PadCA Technologies
 
Tech Talk: Analytics at CA – What’s Cooking? Project Jarvis
Tech Talk: Analytics at CA – What’s Cooking? Project JarvisTech Talk: Analytics at CA – What’s Cooking? Project Jarvis
Tech Talk: Analytics at CA – What’s Cooking? Project JarvisCA Technologies
 
Technology Primer: Learn How Analytics Can Sort the Wheat From the Chaff and ...
Technology Primer: Learn How Analytics Can Sort the Wheat From the Chaff and ...Technology Primer: Learn How Analytics Can Sort the Wheat From the Chaff and ...
Technology Primer: Learn How Analytics Can Sort the Wheat From the Chaff and ...CA Technologies
 
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...CA Technologies
 
Critical Path Forecasting with CA Workload Automation iDash
Critical Path Forecasting with CA Workload Automation iDashCritical Path Forecasting with CA Workload Automation iDash
Critical Path Forecasting with CA Workload Automation iDashCA Technologies
 
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...CA Technologies
 
Introduction to Identity-as-a-Service and Secure Access to SaaS
Introduction to Identity-as-a-Service and Secure Access to SaaSIntroduction to Identity-as-a-Service and Secure Access to SaaS
Introduction to Identity-as-a-Service and Secure Access to SaaSCA Technologies
 
Securely Enabling the Digital Age
Securely Enabling the Digital AgeSecurely Enabling the Digital Age
Securely Enabling the Digital AgeCA Technologies
 
Technology Primer: Monitor a Website in Minutes Using Shortcuts for Customer ...
Technology Primer: Monitor a Website in Minutes Using Shortcuts for Customer ...Technology Primer: Monitor a Website in Minutes Using Shortcuts for Customer ...
Technology Primer: Monitor a Website in Minutes Using Shortcuts for Customer ...CA Technologies
 
Digital transformation in financial services through trusted digital relation...
Digital transformation in financial services through trusted digital relation...Digital transformation in financial services through trusted digital relation...
Digital transformation in financial services through trusted digital relation...CA Technologies
 
Tech Talk: CA Live API Creator MythBuster: Low Code is a Toy, not Enterprise ...
Tech Talk: CA Live API Creator MythBuster: Low Code is a Toy, not Enterprise ...Tech Talk: CA Live API Creator MythBuster: Low Code is a Toy, not Enterprise ...
Tech Talk: CA Live API Creator MythBuster: Low Code is a Toy, not Enterprise ...CA Technologies
 
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 EnvironmentPre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 EnvironmentCA Technologies
 
Tech Tak: Threat Analytics for Privileged Access Management
Tech Tak: Threat Analytics for Privileged Access ManagementTech Tak: Threat Analytics for Privileged Access Management
Tech Tak: Threat Analytics for Privileged Access ManagementCA Technologies
 
Identity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and SolutionsIdentity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and SolutionsCA Technologies
 
Pre-Con Ed: Operational Intelligence – Monitoring the Past to Better Understa...
Pre-Con Ed: Operational Intelligence – Monitoring the Past to Better Understa...Pre-Con Ed: Operational Intelligence – Monitoring the Past to Better Understa...
Pre-Con Ed: Operational Intelligence – Monitoring the Past to Better Understa...CA Technologies
 
Tech Talk: Federate to an SAML-Enabled App in Minutes
Tech Talk: Federate to an SAML-Enabled App in MinutesTech Talk: Federate to an SAML-Enabled App in Minutes
Tech Talk: Federate to an SAML-Enabled App in MinutesCA Technologies
 
Hands-On Lab: Get the Most Out of Your Network Performance Metrics With Innov...
Hands-On Lab: Get the Most Out of Your Network Performance Metrics With Innov...Hands-On Lab: Get the Most Out of Your Network Performance Metrics With Innov...
Hands-On Lab: Get the Most Out of Your Network Performance Metrics With Innov...CA Technologies
 
Tech Talk: Agile 101: Why It's Important to Work Transparently
Tech Talk: Agile 101: Why It's Important to Work TransparentlyTech Talk: Agile 101: Why It's Important to Work Transparently
Tech Talk: Agile 101: Why It's Important to Work TransparentlyCA Technologies
 
API Risk: Taking Your API Security to the Next Level
API Risk: Taking Your API Security to the Next LevelAPI Risk: Taking Your API Security to the Next Level
API Risk: Taking Your API Security to the Next LevelCA Technologies
 

Ähnlich wie Applying Data Science to Your Business Problem (20)

Enabling a Hybrid Enterprise Application Launch Pad
Enabling a Hybrid Enterprise Application Launch PadEnabling a Hybrid Enterprise Application Launch Pad
Enabling a Hybrid Enterprise Application Launch Pad
 
Tech Talk: Analytics at CA – What’s Cooking? Project Jarvis
Tech Talk: Analytics at CA – What’s Cooking? Project JarvisTech Talk: Analytics at CA – What’s Cooking? Project Jarvis
Tech Talk: Analytics at CA – What’s Cooking? Project Jarvis
 
Technology Primer: Learn How Analytics Can Sort the Wheat From the Chaff and ...
Technology Primer: Learn How Analytics Can Sort the Wheat From the Chaff and ...Technology Primer: Learn How Analytics Can Sort the Wheat From the Chaff and ...
Technology Primer: Learn How Analytics Can Sort the Wheat From the Chaff and ...
 
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
 
Critical Path Forecasting with CA Workload Automation iDash
Critical Path Forecasting with CA Workload Automation iDashCritical Path Forecasting with CA Workload Automation iDash
Critical Path Forecasting with CA Workload Automation iDash
 
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
 
Introduction to Identity-as-a-Service and Secure Access to SaaS
Introduction to Identity-as-a-Service and Secure Access to SaaSIntroduction to Identity-as-a-Service and Secure Access to SaaS
Introduction to Identity-as-a-Service and Secure Access to SaaS
 
Securely Enabling the Digital Age
Securely Enabling the Digital AgeSecurely Enabling the Digital Age
Securely Enabling the Digital Age
 
Technology Primer: Monitor a Website in Minutes Using Shortcuts for Customer ...
Technology Primer: Monitor a Website in Minutes Using Shortcuts for Customer ...Technology Primer: Monitor a Website in Minutes Using Shortcuts for Customer ...
Technology Primer: Monitor a Website in Minutes Using Shortcuts for Customer ...
 
Digital transformation in financial services through trusted digital relation...
Digital transformation in financial services through trusted digital relation...Digital transformation in financial services through trusted digital relation...
Digital transformation in financial services through trusted digital relation...
 
Tech Talk: CA Live API Creator MythBuster: Low Code is a Toy, not Enterprise ...
Tech Talk: CA Live API Creator MythBuster: Low Code is a Toy, not Enterprise ...Tech Talk: CA Live API Creator MythBuster: Low Code is a Toy, not Enterprise ...
Tech Talk: CA Live API Creator MythBuster: Low Code is a Toy, not Enterprise ...
 
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 EnvironmentPre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
 
Tech Tak: Threat Analytics for Privileged Access Management
Tech Tak: Threat Analytics for Privileged Access ManagementTech Tak: Threat Analytics for Privileged Access Management
Tech Tak: Threat Analytics for Privileged Access Management
 
Identity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and SolutionsIdentity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and Solutions
 
Pre-Con Ed: Operational Intelligence – Monitoring the Past to Better Understa...
Pre-Con Ed: Operational Intelligence – Monitoring the Past to Better Understa...Pre-Con Ed: Operational Intelligence – Monitoring the Past to Better Understa...
Pre-Con Ed: Operational Intelligence – Monitoring the Past to Better Understa...
 
Tech Talk: Federate to an SAML-Enabled App in Minutes
Tech Talk: Federate to an SAML-Enabled App in MinutesTech Talk: Federate to an SAML-Enabled App in Minutes
Tech Talk: Federate to an SAML-Enabled App in Minutes
 
Hands-On Lab: Get the Most Out of Your Network Performance Metrics With Innov...
Hands-On Lab: Get the Most Out of Your Network Performance Metrics With Innov...Hands-On Lab: Get the Most Out of Your Network Performance Metrics With Innov...
Hands-On Lab: Get the Most Out of Your Network Performance Metrics With Innov...
 
Analytics strategy
Analytics strategyAnalytics strategy
Analytics strategy
 
Tech Talk: Agile 101: Why It's Important to Work Transparently
Tech Talk: Agile 101: Why It's Important to Work TransparentlyTech Talk: Agile 101: Why It's Important to Work Transparently
Tech Talk: Agile 101: Why It's Important to Work Transparently
 
API Risk: Taking Your API Security to the Next Level
API Risk: Taking Your API Security to the Next LevelAPI Risk: Taking Your API Security to the Next Level
API Risk: Taking Your API Security to the Next Level
 

Mehr von CA Technologies

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Technologies
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceCA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...CA Technologies
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCA Technologies
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...CA Technologies
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCA Technologies
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramCA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageCA Technologies
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementCA Technologies
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...CA Technologies
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...CA Technologies
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...CA Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentCA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
 

Mehr von CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 

Kürzlich hochgeladen

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 

Kürzlich hochgeladen (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

Applying Data Science to Your Business Problem