Feb 14, 19: #AnalyticsClub #Newsletter (Events, Tips, News & more..)

[  COVER OF THE WEEK ]

image
Correlation-Causation  Source

[ LOCAL EVENTS & SESSIONS]

More WEB events? Click Here

[ AnalyticsWeek BYTES]

>> The Future of Big Data [Infographics] by v1shal

>> Specificity is the Soul of Data Narrative by analyticsweek

>> @ChuckRehberg / @TrigentSoftware on Translating Technology to Solve Business Problems #FutureOfData by v1shal

Wanna write? Click Here

[ NEWS BYTES]

>>
 JMMMMC Recognized For Overall Excellence In Quality Among Rural Hospitals – Sand Hills Express Under  Health Analytics

>>
 Webinar: Cloud security – Five questions to help decide who to trust – The Lawyer Under  Cloud Security

>>
 Global Streaming Analytics Market 2018 Share, Trend, Segmentation and Forecast to 2023 – Finance Exchange Under  Streaming Analytics

More NEWS ? Click Here

[ FEATURED COURSE]

Statistical Thinking and Data Analysis

image

This course is an introduction to statistical data analysis. Topics are chosen from applied probability, sampling, estimation, hypothesis testing, linear regression, analysis of variance, categorical data analysis, and n… more

[ FEATURED READ]

Antifragile: Things That Gain from Disorder

image

Antifragile is a standalone book in Nassim Nicholas Taleb’s landmark Incerto series, an investigation of opacity, luck, uncertainty, probability, human error, risk, and decision-making in a world we don’t understand. The… more

[ TIPS & TRICKS OF THE WEEK]

Winter is coming, warm your Analytics Club
Yes and yes! As we are heading into winter what better way but to talk about our increasing dependence on data analytics to help with our decision making. Data and analytics driven decision making is rapidly sneaking its way into our core corporate DNA and we are not churning practice ground to test those models fast enough. Such snugly looking models have hidden nails which could induce unchartered pain if go unchecked. This is the right time to start thinking about putting Analytics Club[Data Analytics CoE] in your work place to help Lab out the best practices and provide test environment for those models.

[ DATA SCIENCE Q&A]

Q:Do you know / used data reduction techniques other than PCA? What do you think of step-wise regression? What kind of step-wise techniques are you familiar with?
A: data reduction techniques other than PCA?:
Partial least squares: like PCR (principal component regression) but chooses the principal components in a supervised way. Gives higher weights to variables that are most strongly related to the response

step-wise regression?
– the choice of predictive variables are carried out using a systematic procedure
– Usually, it takes the form of a sequence of F-tests, t-tests, adjusted R-squared, AIC, BIC
– at any given step, the model is fit using unconstrained least squares
– can get stuck in local optima
– Better: Lasso

step-wise techniques:
– Forward-selection: begin with no variables, adding them when they improve a chosen model comparison criterion
– Backward-selection: begin with all the variables, removing them when it improves a chosen model comparison criterion

Better than reduced data:
Example 1: If all the components have a high variance: which components to discard with a guarantee that there will be no significant loss of the information?
Example 2 (classification):
– One has 2 classes; the within class variance is very high as compared to between class variance
– PCA might discard the very information that separates the two classes

Better than a sample:
– When number of variables is high relative to the number of observations

Source

[ VIDEO OF THE WEEK]

@AnalyticsWeek: Big Data Health Informatics for the 21st Century: Gil Alterovitz

 @AnalyticsWeek: Big Data Health Informatics for the 21st Century: Gil Alterovitz

Subscribe to  Youtube

[ QUOTE OF THE WEEK]

Data is the new science. Big Data holds the answers. – Pat Gelsinger

[ PODCAST OF THE WEEK]

Andrea Gallego(@risenthink) / @BCG on Managing Analytics Practice #FutureOfData #Podcast

 Andrea Gallego(@risenthink) / @BCG on Managing Analytics Practice #FutureOfData #Podcast

Subscribe 

iTunes  GooglePlay

[ FACT OF THE WEEK]

571 new websites are created every minute of the day.

Sourced from: Analytics.CLUB #WEB Newsletter

Six Practices Critical to Creating Value from Data and Analytics [INFOGRAPHIC]

IBM Institute for Business Value surveyed 900 IT and business executives from 70 countries from June through August 2013. The 50+ survey questions were designed to help translate concepts relating to generating value from analytics into actions. They found that business leaders adopt specific strategies to create value from data and analytics. Leaders:

  1. are 166% more likely to make decisions based on data.
  2. are 2.2 times more likely to have a formal career path for analytics.
  3. cite growth as the key source of value.
  4. measure the impact of analytics investments.
  5. have predictive analytics capabilities.
  6. have some form of shared analytics resources.

Read my summary of IBM’s study here. Download the entire study here. And check out IBM’s infographic below.

IBM Institute for Business Value - 2013 Infographic

 

Source by bobehayes

6 things that you should know about vMwarevSphere 6.5

vSphere 6.5 offers a resilient, highly available, on-demand infrastructure that is the perfect groundwork for any cloud environment. It provides innovation that will assist digital transformation for the business and make the job of the IT administrator simpler. This means that most of their time will be freed up so that they can carry out more innovations instead of maintaining the status quo. Furthermore, vSpehere is the foundation of the hybrid cloud strategy of VMware and is necessary for cross-cloud architectures. Here are essential features of the new and updated vSphere.

vCenter Server appliance

vCenter is an essential backend tool that controls the virtual infrastructure of VMware. vCenter 6.5 has lots of innovative upgraded features. It has a migration tool that aids in shifting from vSphere 5.5 or 6.0 to vSphere 6.5. The vCenter Server appliance also includes the VMware Update Manager that eliminates the need for restarting external VM tasks or using pesky plugins.

vSphere client

In the past, the front-end client that was used for accessing the vCenter Server was quite old-fashioned and stocky. The vSphere has undergone necessary HTML5 alterations. Aside from the foreseeable performance upgrades, the change also makes this tool cross-browser compatible and more mobile-friendly.  The plugins are no longer needed and the UI has been switched for a more cutting-edge aesthetics founded on the VMware Clarity UI.

Backup and restore

The backup and restore capabilities of the VSpher 6.5 is an excellent functionality that enables clients to back up data on any Platform Services Controller appliances or the vCenter Server directly from the Application Programming Interface(API) or Virtual Appliance Management Interface (VAMI). In addition, it is able to back up both VUM and Auto Deploy implanted within the appliance. This backup mainly consists of files that need to be streamed into a preferred storage device through SCP, FTP(s), or HTTP(s) protocols.

Superior automation capabilities

With regards to automation, VMware vSphere 6.5 works perfectly because of the new upgrades. The new PowerCLI tweak has been an excellent addition to the VMware part because it is completely module-based and the APIs are at present in very high demand. This feature enables the IT administrators to entirely computerize tasks down to the virtual machine level.

 Secure boot

The secure boot element of vSphere comprises the -enabled virtual machines. This feature is available in both Linux and Windows VMs and it allows secure boot to be completed through the clicking of a simplified checkbox situated in the VM properties. After it is enabled, only the properly signed VMs can utilize the virtual environment for booting.

 Improved auditing

The Vsphere 6.5 offers clients improved audit-quality logging characteristics. This aids in accessing more forensic details about user actions. With this feature, it is easier to determine what was done, when, by whom, and if any investigations are essential with regards to anomalies and security threats.

VMware’s vSphere developed out of complexity and necessity of expanding the virtualization market. The earlier serve products were not robust enough to deal with the increasing demands of IT departments. As businesses invested in virtualization, they had to consolidate and simplify their physical server farms into virtualized ones and this triggered the need for virtual infrastructure. With these VSphere 6.5 features in mind, you can unleash its full potential and usage. Make the switch today to the new and innovative VMware VSphere 6.5.

 

Source: 6 things that you should know about vMwarevSphere 6.5 by thomassujain

Feb 07, 19: #AnalyticsClub #Newsletter (Events, Tips, News & more..)

[  COVER OF THE WEEK ]

image
Insights  Source

[ LOCAL EVENTS & SESSIONS]

More WEB events? Click Here

[ AnalyticsWeek BYTES]

>> Caterpillar digs in to data analytics—investing in hot startup Uptake by analyticsweekpick

>> Healthcare Dashboards: Examples of Visualizing Key Metrics & KPIs by analyticsweek

>> 8 ways IBM Watson Analytics is transforming business by analyticsweekpick

Wanna write? Click Here

[ NEWS BYTES]

>>
 Five Data Science Job Opportunities At Microsoft India That You Should Not Miss Out On – Analytics India Magazine Under  Data Science

>>
 Big Data Analytics in Banking Market Competition from Opponents, Constraints and Threat Growth Rate … – thebankingsector.com Under  Big Data Analytics

>>
 Survey: What’s Ahead for Martech in 2019? – Franchising.com Under  Marketing Analytics

More NEWS ? Click Here

[ FEATURED COURSE]

CS229 – Machine Learning

image

This course provides a broad introduction to machine learning and statistical pattern recognition. … more

[ FEATURED READ]

On Intelligence

image

Jeff Hawkins, the man who created the PalmPilot, Treo smart phone, and other handheld devices, has reshaped our relationship to computers. Now he stands ready to revolutionize both neuroscience and computing in one strok… more

[ TIPS & TRICKS OF THE WEEK]

Fix the Culture, spread awareness to get awareness
Adoption of analytics tools and capabilities has not yet caught up to industry standards. Talent has always been the bottleneck towards achieving the comparative enterprise adoption. One of the primal reason is lack of understanding and knowledge within the stakeholders. To facilitate wider adoption, data analytics leaders, users, and community members needs to step up to create awareness within the organization. An aware organization goes a long way in helping get quick buy-ins and better funding which ultimately leads to faster adoption. So be the voice that you want to hear from leadership.

[ DATA SCIENCE Q&A]

Q:Do you think 50 small decision trees are better than a large one? Why?
A: * Yes!
* More robust model (ensemble of weak learners that come and make a strong learner)
* Better to improve a model by taking many small steps than fewer large steps
* If one tree is erroneous, it can be auto-corrected by the following
* Less prone to overfitting

Source

[ VIDEO OF THE WEEK]

@chrisbishop on futurist's lens on #JobsOfFuture #FutureofWork #JobsOfFuture #Podcast

 @chrisbishop on futurist’s lens on #JobsOfFuture #FutureofWork #JobsOfFuture #Podcast

Subscribe to  Youtube

[ QUOTE OF THE WEEK]

The world is one big data problem. – Andrew McAfee

[ PODCAST OF THE WEEK]

@EdwardBoudrot / @Optum on #DesignThinking & #DataDriven Products #FutureOfData #Podcast

 @EdwardBoudrot / @Optum on #DesignThinking & #DataDriven Products #FutureOfData #Podcast

Subscribe 

iTunes  GooglePlay

[ FACT OF THE WEEK]

According to execs, the influx of data is putting a strain on IT infrastructure. 55 percent of respondents reporting a slowdown of IT systems and 47 percent citing data security problems, according to a global survey from Avanade.

Sourced from: Analytics.CLUB #WEB Newsletter

The pros of using facial recognition technology

In the present times, the implementation of FRT which is the abbreviated form of Facial Recognition Technology is widely used in workplaces and by company owners for eradicating the problems and occurrence of crime. The workplace is not the only area that has seen the inclusion of facial recognition as with time it has become a practical application that is part of human lives. The mobile phone that a person uses can also be enabled with a facial lock that will allow the user to maintain privacy with regard to his/her device.

The concept of facial recognition technology

The buzz about facial recognition and its implementation in various gadgets and spheres of human life can be well understood if the core concept or definition of this technology is known. Facial technology is software used in devices that are operated by artificial intelligence. The facial recognition technology makes use of biometric data which enables the mathematical mapping of the features of a human face. This is done so that it becomes easier to identify a person by his/her digital image. The software makes use of specific algorithms to compare the face of a person with the stored digital image which enables authenticity of the identification process. The other kinds of identifying technologies which are being used along with facial recognition include matching of fingerprints and recognition through voice.
The advantages of using facial recognition technology
When FRT is applied, then the identity of a person is confirmed by applying three methods. Firstly the fingerprints of the person being scanned, secondly the face detection tools are employed, and the third verification is done through comparison. In crowded places too the use of facial recognition is possible and will help in pointing out individuals. There are maniple advantages of using this technology, and some of these are discussed below:

• Automation of the process of identification and identity verification:

In any workplace or business center, numerous individuals are working in different areas at the same time. The presence of security guards at each and every checkpoint for entry and exit will require the employment of multiple security guards. The manual process of checking and identification will also require a considerable amount of time. However, if FRT is used, then the entire process becomes automatic and will save operational cost and time. The process of allowing people to enter the premises of the business organization becomes simplified with FRT installation. Hence extra surveillance for monitoring of cameras won’t be required once the identification process becomes automated.

• Provision of acquiring enhanced security:

Security is a huge factor in almost every place. In organizations breach in security can result in potential damage. Therefore investing in applications that will make the security foolproof is sensible. A biometric system will help a business owner to track anyone who enters the business organization. The system is designed in such a manner that if a person attempts to trespass then immediately an alert will be raised. Along with the alert, the picture of the person who has entered the premise without any permission will also be shown which will help in finding out the person quickly. For correct optimization of a business organization, a person can visit the site of redtailseo.com/las-vegas/.
The presence of security staff might not be able to observe such trespassers because usually people who are entering a premise illegally has some wrong intentions and will, therefore, know a way around to avoid the security guards. However, it is not that easy to avoid a facial recognition security system, and so trespassers will think twice before entering a protected building.

• Superior level of accuracy:

The technology of facial recognition has undergone many changes since its inception and are now equipped with infrared cameras and also enabled with 3D. This has undoubtedly increased the accuracy of the process of identification. It is true that there is a possibility to hoodwink a facial-recognition security system, but it is tough to do so. The level of accuracy also helps in cataloging all the individuals who have visited the facility and in case of any unpleasant situation, the recording done by the software throughout the day can be reviewed.

FRT system – The potential areas that can be worked upon

There is no doubt that facial recognition has changed the way of looking at security, but it also has some problem areas which can be worked upon. These problems are discussed below:

• The angle of the surveillance:

The angle by which the surveillance system is being placed often creates a lot of pressure for ensuring flawless identification. There are numerous angles which have to be used together for uploading a face into the storage system of the software. A frontal image of view is necessary for generating a face template that is clear and recognizable. The photos need to have high resolution, and the more than one angle has to be engaged for capturing the picture. If an intruder uses sunglasses, then it might be difficult for the software to pick up that individual.

• Processing of information and storage of data:

In the digital platform, the main thing that is indispensable is storage. A lot of information that is recorded has to be stored correctly so it can be reviewed later. In facial recognition system, each frame has to be processed, so a group of computers has to be used to minimize the time taken for processing information.

• The quality of the image stored:

Low-quality facial recognition will provide underwhelming results, and so advanced software system has to be used for operating the digital cameras that are responsible for image capturing. In the present system the image is captured from a particular video, and then it is compared with the stored photo, but such comparisons can be flawed as small size images do not provide correct results.

Therefore, it can be understood that there are some areas in case of facial recognition technology which can be improved but the introduction of this software has unquestionably revolutionized the security system.

Originally Posted at: The pros of using facial recognition technology

WPP to grow its data with Dunnhumby bid

Advertising company WPP is expected to buy a percentage of the data analytics firm.

Tesco’s data and analytics firm, Dunnhumby, has roused interest from advertising firm WPP who is reportedly set to make a bid for the data firm.

Plans to sell the firm behind Tesco‘s clubcard had been announced in January, with WPP now confirming that it will be bidding for the company.

big data

Sir Martin Sorrell confirmed the intention at the Deloitte Media and Telecoms conference. Sorrell said that it is important for manufacturers to have the best data on what their customers are doing.

WPP’s history suggests that it will not buy the company outright, as a number of deals for percentage stakes in companies appear to highlight the ad firms tactic to not own firms outright.

Sorrell said at WPP’s fourth quarter earnings call: “We are not big plonkers. We don’t plonk down large amounts of cash to 100% acquire particularly public companies with limitations on how earn-outs can be structured and of course, on people.”

“If you look at these technology companies, a very significant amount of the costs each year are share substitutes. Share-based compensation plays a very big important part, and paying 100% upfront for a company does leave you particularly vulnerable in the big tech area.”

Dunnhumby has been valued at £2bn.

To read the original article on Computer Business Review, click here.

Source: WPP to grow its data with Dunnhumby bid