Suche senden
Hochladen
Applying Data Science to Your Business Problem
•
1 gefällt mir
•
1,710 views
CA Technologies
Folgen
Applying Data Science to Your Business Problem
Weniger lesen
Mehr lesen
Technologie
Melden
Teilen
Melden
Teilen
1 von 37
Jetzt herunterladen
Downloaden Sie, um offline zu lesen
Empfohlen
Explainability for Natural Language Processing
Explainability for Natural Language Processing
Yunyao Li
Introduction to Data Science.pptx
Introduction to Data Science.pptx
Vrishit Saraswat
What Is Data Science? | Introduction to Data Science | Data Science For Begin...
What Is Data Science? | Introduction to Data Science | Data Science For Begin...
Simplilearn
Fairness-aware Machine Learning: Practical Challenges and Lessons Learned (WW...
Fairness-aware Machine Learning: Practical Challenges and Lessons Learned (WW...
Krishnaram Kenthapadi
Data scientist roadmap
Data scientist roadmap
Sonu Kumar
Data Science Tutorial | What is Data Science? | Data Science For Beginners | ...
Data Science Tutorial | What is Data Science? | Data Science For Beginners | ...
Edureka!
Data Science Training | Data Science For Beginners | Data Science With Python...
Data Science Training | Data Science For Beginners | Data Science With Python...
Simplilearn
Data science
Data science
Sreejith c
Empfohlen
Explainability for Natural Language Processing
Explainability for Natural Language Processing
Yunyao Li
Introduction to Data Science.pptx
Introduction to Data Science.pptx
Vrishit Saraswat
What Is Data Science? | Introduction to Data Science | Data Science For Begin...
What Is Data Science? | Introduction to Data Science | Data Science For Begin...
Simplilearn
Fairness-aware Machine Learning: Practical Challenges and Lessons Learned (WW...
Fairness-aware Machine Learning: Practical Challenges and Lessons Learned (WW...
Krishnaram Kenthapadi
Data scientist roadmap
Data scientist roadmap
Sonu Kumar
Data Science Tutorial | What is Data Science? | Data Science For Beginners | ...
Data Science Tutorial | What is Data Science? | Data Science For Beginners | ...
Edureka!
Data Science Training | Data Science For Beginners | Data Science With Python...
Data Science Training | Data Science For Beginners | Data Science With Python...
Simplilearn
Data science
Data science
Sreejith c
Applied Artificial Intelligence: How Machine Learning Transforms How We Live ...
Applied Artificial Intelligence: How Machine Learning Transforms How We Live ...
Adelyn Zhou
Introduction to Artificial Intelligence on AWS
Introduction to Artificial Intelligence on AWS
Amazon Web Services
Time Series Forecasting Project Presentation.
Time Series Forecasting Project Presentation.
Anupama Kate
Introduction to Data Science
Introduction to Data Science
Edureka!
Data science - An Introduction
Data science - An Introduction
Ravishankar Rajagopalan
Career in Data Science
Career in Data Science
ActonRoy
Orange Data Mining & Data Visualization Tool
Orange Data Mining & Data Visualization Tool
Mithileysh Sathiyanarayanan
Data science
Data science
Ranjit Nambisan
Introduction to data science club
Introduction to data science club
Data Science Club
Machine Learning Deep Learning AI and Data Science
Machine Learning Deep Learning AI and Data Science
Venkata Reddy Konasani
The Basics of Statistics for Data Science By Statisticians
The Basics of Statistics for Data Science By Statisticians
Stat Analytica
AI Data Acquisition and Governance: Considerations for Success
AI Data Acquisition and Governance: Considerations for Success
Databricks
Data Science vs Machine Learning – What’s The Difference? | Data Science Cour...
Data Science vs Machine Learning – What’s The Difference? | Data Science Cour...
Edureka!
Landscape of AI/ML in 2023
Landscape of AI/ML in 2023
HyunJoon Jung
Reservoir Computing Overview (with emphasis on Liquid State Machines)
Reservoir Computing Overview (with emphasis on Liquid State Machines)
Alex Klibisz
Feature Engineering
Feature Engineering
odsc
Data Analytics Training Course
Data Analytics Training Course
DINESHKUMARANAPPONIX
Business Analytics Overview
Business Analytics Overview
SAP Analytics
Introduction to Data Science
Introduction to Data Science
Srishti44
Who is a Data Scientist? | How to become a Data Scientist? | Data Science Cou...
Who is a Data Scientist? | How to become a Data Scientist? | Data Science Cou...
Edureka!
Smart Data Slides: Data Science and Business Analysis - A Look at Best Practi...
Smart Data Slides: Data Science and Business Analysis - A Look at Best Practi...
DATAVERSITY
How big data tranform your business? Data Science Thailand Meet up #6
How big data tranform your business? Data Science Thailand Meet up #6
Data Science Thailand
Weitere ähnliche Inhalte
Was ist angesagt?
Applied Artificial Intelligence: How Machine Learning Transforms How We Live ...
Applied Artificial Intelligence: How Machine Learning Transforms How We Live ...
Adelyn Zhou
Introduction to Artificial Intelligence on AWS
Introduction to Artificial Intelligence on AWS
Amazon Web Services
Time Series Forecasting Project Presentation.
Time Series Forecasting Project Presentation.
Anupama Kate
Introduction to Data Science
Introduction to Data Science
Edureka!
Data science - An Introduction
Data science - An Introduction
Ravishankar Rajagopalan
Career in Data Science
Career in Data Science
ActonRoy
Orange Data Mining & Data Visualization Tool
Orange Data Mining & Data Visualization Tool
Mithileysh Sathiyanarayanan
Data science
Data science
Ranjit Nambisan
Introduction to data science club
Introduction to data science club
Data Science Club
Machine Learning Deep Learning AI and Data Science
Machine Learning Deep Learning AI and Data Science
Venkata Reddy Konasani
The Basics of Statistics for Data Science By Statisticians
The Basics of Statistics for Data Science By Statisticians
Stat Analytica
AI Data Acquisition and Governance: Considerations for Success
AI Data Acquisition and Governance: Considerations for Success
Databricks
Data Science vs Machine Learning – What’s The Difference? | Data Science Cour...
Data Science vs Machine Learning – What’s The Difference? | Data Science Cour...
Edureka!
Landscape of AI/ML in 2023
Landscape of AI/ML in 2023
HyunJoon Jung
Reservoir Computing Overview (with emphasis on Liquid State Machines)
Reservoir Computing Overview (with emphasis on Liquid State Machines)
Alex Klibisz
Feature Engineering
Feature Engineering
odsc
Data Analytics Training Course
Data Analytics Training Course
DINESHKUMARANAPPONIX
Business Analytics Overview
Business Analytics Overview
SAP Analytics
Introduction to Data Science
Introduction to Data Science
Srishti44
Who is a Data Scientist? | How to become a Data Scientist? | Data Science Cou...
Who is a Data Scientist? | How to become a Data Scientist? | Data Science Cou...
Edureka!
Was ist angesagt?
(20)
Applied Artificial Intelligence: How Machine Learning Transforms How We Live ...
Applied Artificial Intelligence: How Machine Learning Transforms How We Live ...
Introduction to Artificial Intelligence on AWS
Introduction to Artificial Intelligence on AWS
Time Series Forecasting Project Presentation.
Time Series Forecasting Project Presentation.
Introduction to Data Science
Introduction to Data Science
Data science - An Introduction
Data science - An Introduction
Career in Data Science
Career in Data Science
Orange Data Mining & Data Visualization Tool
Orange Data Mining & Data Visualization Tool
Data science
Data science
Introduction to data science club
Introduction to data science club
Machine Learning Deep Learning AI and Data Science
Machine Learning Deep Learning AI and Data Science
The Basics of Statistics for Data Science By Statisticians
The Basics of Statistics for Data Science By Statisticians
AI Data Acquisition and Governance: Considerations for Success
AI Data Acquisition and Governance: Considerations for Success
Data Science vs Machine Learning – What’s The Difference? | Data Science Cour...
Data Science vs Machine Learning – What’s The Difference? | Data Science Cour...
Landscape of AI/ML in 2023
Landscape of AI/ML in 2023
Reservoir Computing Overview (with emphasis on Liquid State Machines)
Reservoir Computing Overview (with emphasis on Liquid State Machines)
Feature Engineering
Feature Engineering
Data Analytics Training Course
Data Analytics Training Course
Business Analytics Overview
Business Analytics Overview
Introduction to Data Science
Introduction to Data Science
Who is a Data Scientist? | How to become a Data Scientist? | Data Science Cou...
Who is a Data Scientist? | How to become a Data Scientist? | Data Science Cou...
Andere mochten auch
Smart Data Slides: Data Science and Business Analysis - A Look at Best Practi...
Smart Data Slides: Data Science and Business Analysis - A Look at Best Practi...
DATAVERSITY
How big data tranform your business? Data Science Thailand Meet up #6
How big data tranform your business? Data Science Thailand Meet up #6
Data Science Thailand
Analytics Trends 2016: The next evolution
Analytics Trends 2016: The next evolution
Deloitte United States
Data science project presentation
Data science project presentation
Kevin Bluer
My First Data Science Project (Data Science Thailand Meetup #1)
My First Data Science Project (Data Science Thailand Meetup #1)
Data Science Thailand
3seven9 - About Us
3seven9 - About Us
3seven9
Big data-science-oanyc
Big data-science-oanyc
Open Analytics
Data Science for Business Managers by TektosData
Data Science for Business Managers by TektosData
Maurício Garcia
How can Data Science benefit your business?
How can Data Science benefit your business?
Peadar Coyle
Business model canvas
Business model canvas
Hamza Jounaidi
BEE Solving Problems Web
BEE Solving Problems Web
ebarrows
Moving From The Art To The Science
Moving From The Art To The Science
Capgemini
Creating Big Data Success with the Collaboration of Business and IT
Creating Big Data Success with the Collaboration of Business and IT
Edward Chenard
Data Science & Data Products at Neue Zürcher Zeitung
Data Science & Data Products at Neue Zürcher Zeitung
René Pfitzner
Data Science for Smart Manufacturing
Data Science for Smart Manufacturing
Carlo Torniai
Preface to a Strategic Plan for Data Science at the NIH
Preface to a Strategic Plan for Data Science at the NIH
Philip Bourne
From Data Science to Business Value - Analytics Applied
From Data Science to Business Value - Analytics Applied
Teradata Aster
Ford Motors SCQ Analysis
Ford Motors SCQ Analysis
sunilngupta
20160419 CCASA
20160419 CCASA
Dean Malmgren
Building a Data-Driven Culture
Building a Data-Driven Culture
Lucas Neo
Andere mochten auch
(20)
Smart Data Slides: Data Science and Business Analysis - A Look at Best Practi...
Smart Data Slides: Data Science and Business Analysis - A Look at Best Practi...
How big data tranform your business? Data Science Thailand Meet up #6
How big data tranform your business? Data Science Thailand Meet up #6
Analytics Trends 2016: The next evolution
Analytics Trends 2016: The next evolution
Data science project presentation
Data science project presentation
My First Data Science Project (Data Science Thailand Meetup #1)
My First Data Science Project (Data Science Thailand Meetup #1)
3seven9 - About Us
3seven9 - About Us
Big data-science-oanyc
Big data-science-oanyc
Data Science for Business Managers by TektosData
Data Science for Business Managers by TektosData
How can Data Science benefit your business?
How can Data Science benefit your business?
Business model canvas
Business model canvas
BEE Solving Problems Web
BEE Solving Problems Web
Moving From The Art To The Science
Moving From The Art To The Science
Creating Big Data Success with the Collaboration of Business and IT
Creating Big Data Success with the Collaboration of Business and IT
Data Science & Data Products at Neue Zürcher Zeitung
Data Science & Data Products at Neue Zürcher Zeitung
Data Science for Smart Manufacturing
Data Science for Smart Manufacturing
Preface to a Strategic Plan for Data Science at the NIH
Preface to a Strategic Plan for Data Science at the NIH
From Data Science to Business Value - Analytics Applied
From Data Science to Business Value - Analytics Applied
Ford Motors SCQ Analysis
Ford Motors SCQ Analysis
20160419 CCASA
20160419 CCASA
Building a Data-Driven Culture
Building a Data-Driven Culture
Ähnlich wie Applying Data Science to Your Business Problem
Enabling a Hybrid Enterprise Application Launch Pad
Enabling a Hybrid Enterprise Application Launch Pad
CA Technologies
Tech Talk: Analytics at CA – What’s Cooking? Project Jarvis
Tech Talk: Analytics at CA – What’s Cooking? Project Jarvis
CA Technologies
Technology Primer: Learn How Analytics Can Sort the Wheat From the Chaff and ...
Technology Primer: Learn How Analytics Can Sort the Wheat From the Chaff and ...
CA Technologies
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
CA Technologies
Critical Path Forecasting with CA Workload Automation iDash
Critical Path Forecasting with CA Workload Automation iDash
CA Technologies
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
CA Technologies
Introduction to Identity-as-a-Service and Secure Access to SaaS
Introduction to Identity-as-a-Service and Secure Access to SaaS
CA Technologies
Securely Enabling the Digital Age
Securely Enabling the Digital Age
CA Technologies
Technology Primer: Monitor a Website in Minutes Using Shortcuts for Customer ...
Technology Primer: Monitor a Website in Minutes Using Shortcuts for Customer ...
CA Technologies
Digital transformation in financial services through trusted digital relation...
Digital transformation in financial services through trusted digital relation...
CA Technologies
Tech Talk: CA Live API Creator MythBuster: Low Code is a Toy, not Enterprise ...
Tech Talk: CA Live API Creator MythBuster: Low Code is a Toy, not Enterprise ...
CA Technologies
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
CA Technologies
Tech Tak: Threat Analytics for Privileged Access Management
Tech Tak: Threat Analytics for Privileged Access Management
CA Technologies
Identity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and Solutions
CA Technologies
Pre-Con Ed: Operational Intelligence – Monitoring the Past to Better Understa...
Pre-Con Ed: Operational Intelligence – Monitoring the Past to Better Understa...
CA Technologies
Tech Talk: Federate to an SAML-Enabled App in Minutes
Tech Talk: Federate to an SAML-Enabled App in Minutes
CA Technologies
Hands-On Lab: Get the Most Out of Your Network Performance Metrics With Innov...
Hands-On Lab: Get the Most Out of Your Network Performance Metrics With Innov...
CA Technologies
Analytics strategy
Analytics strategy
Sushant Kumar
Tech Talk: Agile 101: Why It's Important to Work Transparently
Tech Talk: Agile 101: Why It's Important to Work Transparently
CA Technologies
API Risk: Taking Your API Security to the Next Level
API Risk: Taking Your API Security to the Next Level
CA Technologies
Ähnlich wie Applying Data Science to Your Business Problem
(20)
Enabling a Hybrid Enterprise Application Launch Pad
Enabling a Hybrid Enterprise Application Launch Pad
Tech Talk: Analytics at CA – What’s Cooking? Project Jarvis
Tech Talk: Analytics at CA – What’s Cooking? Project Jarvis
Technology Primer: Learn How Analytics Can Sort the Wheat From the Chaff and ...
Technology Primer: Learn How Analytics Can Sort the Wheat From the Chaff and ...
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
Critical Path Forecasting with CA Workload Automation iDash
Critical Path Forecasting with CA Workload Automation iDash
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
Introduction to Identity-as-a-Service and Secure Access to SaaS
Introduction to Identity-as-a-Service and Secure Access to SaaS
Securely Enabling the Digital Age
Securely Enabling the Digital Age
Technology Primer: Monitor a Website in Minutes Using Shortcuts for Customer ...
Technology Primer: Monitor a Website in Minutes Using Shortcuts for Customer ...
Digital transformation in financial services through trusted digital relation...
Digital transformation in financial services through trusted digital relation...
Tech Talk: CA Live API Creator MythBuster: Low Code is a Toy, not Enterprise ...
Tech Talk: CA Live API Creator MythBuster: Low Code is a Toy, not Enterprise ...
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
Tech Tak: Threat Analytics for Privileged Access Management
Tech Tak: Threat Analytics for Privileged Access Management
Identity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and Solutions
Pre-Con Ed: Operational Intelligence – Monitoring the Past to Better Understa...
Pre-Con Ed: Operational Intelligence – Monitoring the Past to Better Understa...
Tech Talk: Federate to an SAML-Enabled App in Minutes
Tech Talk: Federate to an SAML-Enabled App in Minutes
Hands-On Lab: Get the Most Out of Your Network Performance Metrics With Innov...
Hands-On Lab: Get the Most Out of Your Network Performance Metrics With Innov...
Analytics strategy
Analytics strategy
Tech Talk: Agile 101: Why It's Important to Work Transparently
Tech Talk: Agile 101: Why It's Important to Work Transparently
API Risk: Taking Your API Security to the Next Level
API Risk: Taking Your API Security to the Next Level
Mehr von CA Technologies
CA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
CA Technologies
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
CA Technologies
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
CA Technologies
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
CA Technologies
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
CA Technologies
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
CA Technologies
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
CA Technologies
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
CA Technologies
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
CA Technologies
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
CA Technologies
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
CA Technologies
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
CA Technologies
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
CA Technologies
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
CA Technologies
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
CA Technologies
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
CA Technologies
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
CA Technologies
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
CA Technologies
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
CA Technologies
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
CA Technologies
Mehr von CA Technologies
(20)
CA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
Kürzlich hochgeladen
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
hans926745
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Rafal Los
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
soniya singh
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
Pixlogix Infotech
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
gurkirankumar98700
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
naman860154
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Delhi Call girls
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Delhi Call girls
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
Pooja Nehwal
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Gabriella Davis
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
HostedbyConfluent
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
Sinan KOZAK
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Puma Security, LLC
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
HampshireHUG
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
shyamraj55
Slack Application Development 101 Slides
Slack Application Development 101 Slides
praypatel2
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
Results
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
OnBoard
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Drew Madelung
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
Kürzlich hochgeladen
(20)
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Slack Application Development 101 Slides
Slack Application Development 101 Slides
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
Applying Data Science to Your Business Problem
1.
1 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD World® ’16 Applying Data Science to Your Business Problem Paul Dulany -
VP Data Science - CA Technologies SCX31S SECURITY
2.
2 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD © 2016 CA. All rights reserved. All trademarks referenced herein belong to their respective companies. The content provided in this CA World 2016 presentation is intended for informational purposes only and does not form any type of warranty.
The information provided by a CA partner and/or CA customer has not been reviewed for accuracy by CA. For Informational Purposes Only Terms of this Presentation
3.
3 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Abstract For a while now, a number of industries have been interested in data science and advanced analytics. But it isn’t always clear how best to use these within the business context. In this session, we’ll discuss how to turn a business problem into a data-science problem, and then back. We’ll use card-not-present payment fraud and login attempts as examples of how to identify the problem, determine if data science and advanced analytics can help (and if the situation warrants them), and then follow through on developing a solution to the problem. Paul Dulany, PhD CA Technologies VP Data Science
4.
4 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Agenda WHAT IS DATA SCIENCE? DETERMINING A PROBLEM OF INTEREST UNDERSTAND THE PRODUCTION ENVIRONMENT AND DEMANDS MODEL CREATION AND EVALUATION Q & A 1 2 3 4 5
5.
5 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Key Points for Applying Data Science § Identify a high-value Business Problem with High Quality Data §
Determine the class of the problem to solve § Utilize business-domain knowledge – Understand the "ecosystem" – Define appropriate metrics – Understand the data in full § Develop features and models / Evaluate / Iterate § Always keep the business problem in mind!
6.
6 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD What is Data Science? § The application of analytical techniques to large and “big” data –
A wide field encompassing many different aspects of analytics, statistics, and data mining – Fundamentally data driven – Based upon the scientific method – The goal is to use data and analytical techniques to solve problems § Requires knowledge in multiple domains – Analytics – Scientific computations – Data formats – Business domain – Statistics
7.
7 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Steps in Applying Data Science § Identify a high-value business problem –
The business case is critical § Intelligent Mainframe Operations – Need early detection of issues § Best is to predict and avoid issues – Currently, false positives (false alarms) are too prevalent – Expert-maintained systems of thresholds are hard to maintain Business Problem
8.
8 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Steps in Applying Data Science § Payment Security: –
Fraud in eCommerce is a significant problem § 3-D Secure was developed to combat this – Issuers incur the most pain from the current state § Fraud losses § Loss of income from interest and interchange fees § Customer experience and annoyance § Cost of inbound calls – Merchants feel pain too… Business Problem
9.
9 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Business Impact for a Client: 3 Year Impact Credit Debit Fraud savings (above current vendor)
£13,441,843 £15,174,365 Interchange fees (above current) £466,462 £3,441,882 Interest income (above current) £3,674,803 N/A Operational savings (not calculated) - - Total £17,583,108 £18,616,247
10.
10 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Steps in Applying Data Science § Identify data related to the business problem –
The more data, the better! – Is it categorical, ordinal, or numerical? What cardinality? – Is there a unique advantage over the competition? § Payment Security – 3DS data: PAReq message, device information, … – Wide mix of types of data – Time series is important – SaaS Deployment allows quality data to be gathered Identify Data (Results Proportional to Quality!)
11.
11 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Steps in Applying Data Science § Intelligent Mainframe Operations –
Multiple possible data sources § VSAM, DB2, IMS DB, IDMS, DATACOM, SMF, Syslogs, Vtape, CICS, … – Utilize CA SYSVIEW’s excellence – Embed analytics to detect abnormal patterns Identify Data (Results Proportional to Quality!)
12.
12 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Steps in Applying Data Science § Determine the general class of problem –
Classification, regression, anomaly detection, etc. – “Supervised” (teaching your children to read, teaching them manners) – “Unsupervised” (university) – “Semi-supervised” (school lunch room)
13.
13 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Steps in Applying Data Science § Payment Security –
Supervised classification – Fraud information for losses is likely in good shape – Complexities happen once you have a system in place § Censored problem, both in marking and in changing fraudster behavior § Intelligent Mainframe Operations – Unsupervised to begin – Need to develop baselines of normal behavior § But must provide results from day 0 – Possibility of semi-supervised in the future Determine the general class of problem
14.
14 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Steps in Applying Data Science § Understand the ecosystem –
What actions can be taken? – Is getting the result time sensitive? § Intelligent Mainframe Operations – Predictive analytics needed – Multiple possible actions, key is to inform the operator’s actions – Different time-scales for problems – Reaction-time is critical – real-time
15.
15 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Steps in applying Data Science § Payment Security –
Predictive and prescriptive analytics needed – Multiple possible actions, at the transaction and the card level – Timing is critical – real-time, i.e., < 50ms for vast majority § We must be able to take action now Understand the Ecosystem
16.
16 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Steps in Applying Data Science § Determine the appropriate metrics –
How do we measure success? § Well defined measures are critical § Intelligent Mainframe Operations – High Availability – Problem avoidance – Reduced MTTR – Reduce SME dependence for issue detection
17.
17 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Steps in Applying Data Science § Payment Security –
A number of possibilities, based upon customer’s objectives – Consider them all § Detection rates § “Outsort” rates § False-positive ratios § False-positive rates § Value-based / transaction based / card based Metrics TOR 𝑆 = ∑ 𝐹 𝑠* + 𝑁 𝑠* ./0. ∑ 𝐹 𝑠* + 𝑁 𝑠* 122 .* TDR 𝑆 = ∑ 𝐹 𝑠* ./0. ∑ 𝐹 𝑠* 122 .*
18.
18 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD What’s Next? § Now we have a well defined problem §
So we spend a lot of time with the data! – “Browse” the data – Run some descriptive statistics – See if you can surprise yourself – If supervised, view the tagging data and the production data separately, and then together.
19.
19 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Review the Tagged Data § Browse the data again §
Run many statistical test – Beware of “Target Leaks”!! – Begin getting a feel for the variations, correlations, idiosyncrasies § You never want perfectly clean data – You want data that simulates production! § Beware of any changes to the data, especially non-causal changes § Model training is a numerical simulation of production
20.
20 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Data Partitioning: Beware What You Partition and How! § Partitioning –
Often need to use stratified sampling – When using multiple entities for tracking behavior, interactions are tricky! § Look for irreducibility § Go to out-of-time if needed Historical Data Training Fraud Non-Fraud Validate Fraud Non- Fraud Holdout Fraud Non- Fraud
21.
21 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Feature Development § “Features” pull the distinguishing characteristics from the data –
Time series analysis techniques – Digital Signal Processing techniques – Statistical measures of differences – Bayesian approaches – Linear discriminants – Non-linear transformations – …
22.
22 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Feature Development: Simple Example § Determine a peer group from the historical data –
All transactions where there were four previous transactions in the last week, at least two of which were on the same device, but in different countries § Determine the distributions of classes for a continuous variable – Let’s say, the amount – Use a discriminant calculation to determine likelihood of belonging to either class.
23.
23 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Feature Development: More Complexity § At the other end of the scale are online-learning models to determine behaviors –
Autocorrelation models, exponential weighting, KDE, etc. – Many techniques – § but must keep in mind the CPU constraints, I/O constraints, etc. § Conversion of high-cardinality categorical data into numerical inputs 𝑥"(𝑡 𝑛 , 𝑡 𝑛−1, 𝑡0) = 𝛼(𝑡 𝑛 , 𝑡0)𝑥 𝑛 + 𝛽(𝑡 𝑛 , 𝑡 𝑛−1, 𝑡0)𝑥" 𝑛−1 𝛼(𝑡 𝑛 , 𝑡0) = 1 − 𝛾 1 − 𝛾(𝑡 𝑛 −𝑡0) 𝛽(𝑡 𝑛 , 𝑡 𝑛−1, 𝑡0) = 𝛾(𝑡 𝑛 −𝑡 𝑛−1) 11 − 𝛾(𝑡 𝑛−1−𝑡0) 2 1 − 𝛾(𝑡 𝑛 −𝑡0)
24.
24 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Example: Unsupervised Anomaly Detection § Utilize Historical data to define bands of different probabilities –
Map real time metric streams against system defined normal – Multi-point alerts generated using industry-standard Western-Electric rules – Make static thresholds optional! Unlikely Most Likely Metric Time Less Likely
25.
25 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Example: Supervised Model § Always remember Occam's Razor! –
Among competing hypotheses, the one with the fewest assumptions should be selected. – Avoid needless complexity § Start with simple models, and grow more complex as needed – Linear regression – Logistic regression – Decision trees – Neural Networks – SVM …
26.
26 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Example: Supervised Model Neural Network
27.
27 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Example: Supervised Model § There are many aspects of training a neural network –
different activation and error functions – different training algorithms, – variations of seeds, learning rate, momentum, – self-regulation, – number of hidden layers, – number of nodes, – boosting/bagging, – preventing overfitting, – etc. Train the Model(s)
28.
28 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Review § Review the results of your training, and start all over again! –
Consider segmentation – Try leaving out the variables with the highest sensitivity – Subdivide the data to see if there are regions of instability – Iterate as needed § Finally, select your model(s)! § But we’re not done… – Now worry about calibration, upgrade/downgrade, priming time, packaging, integration, model report, …
29.
29 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Model Performance Chart
30.
30 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Intelligent Mainframe Operations Typical Volatility Anomaly Tasks ready to be dispatched
31.
31 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Key Points for Applying Data Science § Identify a high-value Business Problem with High Quality Data §
Determine the class of the problem to solve § Utilize business-domain knowledge – Understand the "ecosystem" – Define appropriate metrics – Understand the data in full § Develop features and models / Evaluate / Iterate § Always keep the business problem in mind!
32.
32 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Recommended Sessions SESSION # TITLE
DATE/TIME SCX50S Convenience and Security for banking customers with CA Advanced Authentication 11/17/2016 at 3:00 pm SCX34S Securing Mobile Payments: Applying Lessons Learned in the Real World 11/17/2016 at 3:45 pm SCT05T Threat Analytics for Privileged Access Management 11/17/2016 at 4:30 pm
33.
33 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Don’t Miss Our INTERACTIVE Security Demo Experience! SNEAK PEEK! 33 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
34.
34 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD We Want to Hear From You! § IT Central is a leading technology review site. CA has them to help generate product reviews for our Security products. §
ITCS staff may be at this session now! (look for their shirts). If you would like to offer a product review, please ask them after the class, or go by their booth. Note: § Only takes 5-7 mins § You have total control over the review § It can be anonymous, if required
35.
35 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Questions?
36.
36 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Stay connected at communities.ca.com Thank you.
37.
37 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Security For more information on Security, please visit: http://cainc.to/EtfYyw
Jetzt herunterladen