Archive | Methods RSS feed for this archive

Data Science for Cyber Risk Management (PRMIA)

June 6, 2017

0 Comments

Cyber threat actors exploit increasingly interconnected networks to infiltrate infrastructure and compromise digital assets. While prolific networks and digitization drive interactivity, thereby opening new opportunities for collaboration, open channels also increase the scope and scale of potential cyber risks. Beyond compromised intellectual property and regulatory strictures, reputational damage can result in customer and partner attrition, […]

Continue reading...

Data Science – Tools and Methods: Practitioner Perspectives

April 20, 2017

0 Comments

Data Science – Tools and Methods: Practitioner Perspectives Erasmus University Rotterdam lecture to Masters of Business and Information Management (BIM) students for Big Data and Business Analytics class. Wednesday, April 12th, 2017.  

Continue reading...

Getting Data Right

March 23, 2017

0 Comments

Brief coverage of and link to O’Reilly ebook ‘Getting Data Right’

Continue reading...

Data Science for Cyber Security? Challenges and Opportunities from FloCon 2017

January 10, 2017

0 Comments

Blogging from FloCon cyber security conference in San Diego #FloCon17 Although not a morning person by nature, the early 7 am kick-off session was quite painless as I am still jet lagged on Amsterdam time (+9 hours, making this an easy 4pm session!). While I was aware of a range of Linux-based open source tools for […]

Continue reading...

Data Science Q&A on Quora

January 2, 2017

0 Comments

Starting off with a bang in 2017, this past year I started using Quora, an online question and answer platform. There are a number of questions and answers related to data science/data analytics.  A few of these might be of interest to you as we ring-in 2017: What areas of data science or machine learning […]

Continue reading...

Reblog: Machine learning overview with SAS software

July 13, 2015

0 Comments

Machine learning overview with SAS software. From a SAS colleague, Longhow Lam http://5.100.228.219/#portfolio

Continue reading...

Much ado about a dress: how perception skews interpretation

March 1, 2015

0 Comments

This week generated a meme which nearly melted the internet: the case of the gold or blue dress. A picture of dress worn at a wedding was seen by some people as being gold and white and others as blue and black. A riotous global argument that cast friends and lovers against one another ensued. While […]

Continue reading...

Fighting Fraud and Cyber Threats with the power of Network Analytics

February 6, 2015

0 Comments

New blog post published for Deloitte – view original post: Both fraudsters and cyber attackers take advantage of an increasingly interconnected world to infiltrate and assault financial and virtual infrastructures. Especially sophisticated electronic interactions bind people together in complex, global networks. While such networks have created new opportunities for interaction and commerce, they have also […]

Continue reading...

Reblog: How to use phone calls and network analysis to identify criminals

January 13, 2015

0 Comments

An excellent, hands-on demonstration of the power of social network analysis (SNA) via graph analytics to detect criminality from colleagues at Linkurious and a U.S.-based police detective: http://linkurio.us/how-to-use-phone-calls-and-network-analysis-to-identify-criminals/ SNA at times can seem too theoretical to stakeholders – this is an excellent example of a hands-on, engineering focused application with real practical value.  Applies Neo4J graph […]

Continue reading...

The Janus Imperative: Bridging Business Silos via Analytics

December 17, 2014

1 Comment

Analytics professionals should keep a persistent eye open for opportunities to create cross-functional insights from data. Insights can frequently be leveraged across multiple business domains. However, business silos can restrict ‘forest for the trees’ visibility. To the degree analytics has cross-functional exposure in the organization, for instance via a C-level champion and an Analytics Center […]

Continue reading...