SlideShare une entreprise Scribd logo
1  sur  37
Télécharger pour lire hors ligne
1 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
World®
’16
Applying	Data	Science	to	
Your	Business	Problem
Paul	Dulany - VP	Data	Science	- CA	Technologies
SCX31S
SECURITY
2 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
©	2016	CA.	All	rights	reserved.	All	trademarks	referenced	herein	belong	to	their	respective	companies.
The	content	provided	in	this CA	World	2016	presentation	is	intended	for	informational	purposes	only	and	does	not	form	any	type	of	
warranty. The information	provided	by	a	CA	partner	and/or	CA	customer	has	not	been	reviewed	for	accuracy	by	CA.	
For	Informational	Purposes	Only	
Terms	of	this	Presentation
3 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Abstract
For	a	while	now,	a	number	of	industries	have	been	interested	in	data	science	and	
advanced	analytics.	But	it	isn’t	always	clear	how	best	to	use	these	within	the	
business	context.	In	this	session,	we’ll	discuss	how	to	turn	a	business	problem	into	
a	data-science	problem,	and	then	back.	We’ll	use	card-not-present	payment	fraud	
and	login	attempts	as	examples	of	how	to	identify	the	problem,	determine	if	data	
science	and	advanced	analytics	can	help	(and	if	the	situation	warrants	them),	and	
then	follow	through	on	developing	a	solution	to	the	problem.
Paul	Dulany,
PhD
CA	Technologies
VP	Data	Science
4 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Agenda
WHAT	IS	DATA	SCIENCE?
DETERMINING	A	PROBLEM	OF	INTEREST
UNDERSTAND	THE	PRODUCTION	ENVIRONMENT	AND	DEMANDS
MODEL	CREATION	AND	EVALUATION
Q	&	A
1
2
3
4
5
5 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Key	Points	for	Applying	Data	Science
§ Identify	a	high-value	Business	Problem	with	High	Quality	Data
§ Determine	the	class	of	the	problem	to	solve
§ Utilize	business-domain	knowledge
– Understand	the	"ecosystem"
– Define	appropriate	metrics
– Understand	the	data	in	full
§ Develop	features	and	models	/	Evaluate	/	Iterate
§ Always	keep	the	business	problem	in	mind!
6 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
What	is	Data	Science?
§ The	application	of	analytical	techniques	to	large	and	“big”	
data
– A	wide	field	encompassing	many	different	aspects	of	analytics,	
statistics,	and	data	mining
– Fundamentally	data	driven
– Based	upon	the	scientific	method
– The	goal	is	to	use	data	and	analytical	techniques	to	solve	problems
§ Requires	knowledge	in	multiple	domains
– Analytics
– Scientific	computations
– Data	formats
– Business	domain
– Statistics
7 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Steps	in	Applying	Data	Science
§ Identify	a	high-value	business	problem
– The	business	case	is	critical
§ Intelligent	Mainframe	Operations
– Need	early	detection	of	issues
§ Best	is	to	predict	and	avoid	issues
– Currently,	false	positives	(false	alarms)	are	too	prevalent
– Expert-maintained	systems	of	thresholds	are	hard	to	maintain
Business	Problem
8 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Steps	in	Applying	Data	Science
§ Payment	Security:
– Fraud	in	eCommerce	is	a	significant	problem
§ 3-D	Secure	was	developed	to	combat	this
– Issuers	incur	the	most	pain	from	the	current	state
§ Fraud	losses
§ Loss	of	income	from	interest	and	interchange	fees
§ Customer	experience	and	annoyance
§ Cost	of	inbound	calls
– Merchants	feel	pain	too…
Business	Problem
9 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Business	Impact	for	a	Client:	3	Year	Impact
Credit Debit
Fraud	savings	(above	current	vendor) £13,441,843 £15,174,365	
Interchange	fees	(above	current) £466,462 £3,441,882	
Interest income	(above	current) £3,674,803 N/A
Operational	savings	(not	calculated) - -
Total £17,583,108 £18,616,247
10 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Steps	in	Applying	Data	Science
§ Identify	data	related	to	the	business	problem
– The	more	data,	the	better!
– Is	it	categorical,	ordinal,	or	numerical?		What	cardinality?
– Is	there	a	unique	advantage	over	the	competition?
§ Payment	Security
– 3DS	data:	PAReq message,	device	information,	…
– Wide	mix	of	types	of	data
– Time	series	is	important
– SaaS	Deployment	allows	quality	data	to	be	gathered
Identify	Data	(Results	Proportional	to	Quality!)
11 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Steps	in	Applying	Data	Science
§ Intelligent	Mainframe	Operations
– Multiple	possible	data	sources
§ VSAM,	DB2,	IMS	DB,	IDMS,	DATACOM,	SMF,	Syslogs,	Vtape,	CICS,	…
– Utilize	CA	SYSVIEW’s	excellence
– Embed	analytics	to	detect	abnormal	patterns
Identify	Data	(Results	Proportional	to	Quality!)
12 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Steps	in	Applying	Data	Science
§ Determine	the	general	class	of	problem
– Classification,	regression,	anomaly	detection,	etc.
– “Supervised”	(teaching	your	children	to	read,	teaching	them	manners)
– “Unsupervised”	(university)
– “Semi-supervised”	(school	lunch	room)
13 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Steps	in	Applying	Data	Science
§ Payment	Security
– Supervised	classification
– Fraud	information	for	losses	is	likely	in	good	shape
– Complexities	happen	once	you	have	a	system	in	place
§ Censored	problem,	both	in	marking	and	in	changing	fraudster	behavior
§ Intelligent	Mainframe	Operations
– Unsupervised	to	begin
– Need	to	develop	baselines	of	normal	behavior
§ But	must	provide	results	from	day	0
– Possibility	of	semi-supervised	in	the	future
Determine	the	general	class	of	problem
14 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Steps	in	Applying	Data	Science
§ Understand	the	ecosystem
– What	actions	can	be	taken?
– Is	getting	the	result	time	sensitive?
§ Intelligent	Mainframe	Operations
– Predictive	analytics	needed
– Multiple	possible	actions,	key	is	to	inform	the	operator’s	actions
– Different	time-scales	for	problems
– Reaction-time	is	critical	– real-time
15 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Steps	in	applying	Data	Science
§ Payment	Security
– Predictive	and	prescriptive	analytics	needed
– Multiple	possible	actions,	at	the	transaction	and	the	card	level
– Timing	is	critical	– real-time,	i.e.,	<	50ms	for	vast	majority
§ We	must	be	able	to	take	action	now
Understand	the	Ecosystem
16 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Steps	in	Applying	Data	Science
§ Determine	the	appropriate	metrics
– How	do	we	measure	success?
§ Well	defined	measures	are	critical
§ Intelligent	Mainframe	Operations
– High	Availability
– Problem	avoidance
– Reduced	MTTR
– Reduce	SME	dependence	for	issue	detection
17 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Steps	in	Applying	Data	Science
§ Payment	Security
– A	number	of	possibilities,	based	upon	customer’s	objectives
– Consider	them	all
§ Detection	rates
§ “Outsort”	rates
§ False-positive	ratios
§ False-positive	rates
§ Value-based	/	transaction	based	/	card	based
Metrics
TOR 𝑆 =	
∑ 𝐹 𝑠*
+ 𝑁 𝑠*
./0.
∑ 𝐹 𝑠* + 𝑁 𝑠*
122	.*
TDR 𝑆 =	
∑ 𝐹 𝑠*
./0.
∑ 𝐹 𝑠*
122	.*
18 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
What’s	Next?
§ Now	we	have	a	well	defined	problem
§ So	we	spend	a	lot	of	time	with	the	data!
– “Browse”	the	data
– Run	some	descriptive	statistics
– See	if	you	can	surprise	yourself
– If	supervised,	view	the	tagging	data	and	the	
production	data	separately,	and	then	
together.
19 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Review	the	Tagged	Data
§ Browse	the	data	again
§ Run	many	statistical	test
– Beware	of	“Target	Leaks”!!
– Begin	getting	a	feel	for	the	variations,	correlations,	idiosyncrasies
§ You	never	want	perfectly	clean	data
– You	want	data	that	simulates	production!
§ Beware	of	any	changes	to	the	data,	especially	non-causal	changes
§ Model	training	is	a	numerical	simulation	of	production
20 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Data	Partitioning:	Beware	What	You	Partition	and	How!
§ Partitioning
– Often	need	to	use	stratified	
sampling
– When	using	multiple	entities	
for	tracking	behavior,	
interactions	are	tricky!
§ Look	for	irreducibility
§ Go	to	out-of-time	if	needed
Historical	Data
Training
Fraud
Non-Fraud
Validate
Fraud
Non-
Fraud
Holdout
Fraud
Non-
Fraud
21 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Feature	Development
§ “Features”	pull	the	distinguishing	
characteristics	from	the	data
– Time	series	analysis	techniques
– Digital	Signal	Processing	techniques
– Statistical	measures	of	differences
– Bayesian	approaches
– Linear	discriminants
– Non-linear	transformations
– …
22 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Feature	Development:	Simple	Example
§ Determine	a	peer	group	from	the	historical	data
– All	transactions	where	there	were	four	previous	transactions	in	the	last	
week,	at	least	two	of	which	were	on	the	same	device,	but	in	different	
countries
§ Determine	the	distributions	of	classes	for	a	continuous	
variable
– Let’s	say,	the	amount
– Use	a	discriminant	calculation	to	
determine	likelihood	of	belonging	to	either	class.
23 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Feature	Development:	More	Complexity
§ At	the	other	end	of	the	scale	are	online-learning	models	to	
determine	behaviors
– Autocorrelation	models,	exponential	weighting,	KDE,	etc.
– Many	techniques	–
§ but	must	keep	in	mind	the	CPU	constraints,	I/O	constraints,	etc.
§ Conversion	of	high-cardinality	
categorical	data	into	numerical
inputs
𝑥"(𝑡 𝑛 , 𝑡 𝑛−1, 𝑡0) = 𝛼(𝑡 𝑛 , 𝑡0)𝑥 𝑛 + 𝛽(𝑡 𝑛 , 𝑡 𝑛−1, 𝑡0)𝑥" 𝑛−1	
𝛼(𝑡 𝑛 , 𝑡0) =
1 − 𝛾
1 − 𝛾(𝑡 𝑛 −𝑡0)
	
𝛽(𝑡 𝑛 , 𝑡 𝑛−1, 𝑡0) =
𝛾(𝑡 𝑛 −𝑡 𝑛−1)
11 − 𝛾(𝑡 𝑛−1−𝑡0)
2
1 − 𝛾(𝑡 𝑛 −𝑡0)
24 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Example:	Unsupervised	Anomaly	Detection
§ Utilize	Historical	data	to	define	bands	of	different	probabilities
– Map	real	time	metric	streams	against	system	defined	normal	
– Multi-point	alerts	generated	using	industry-standard	Western-Electric	
rules
– Make	static	thresholds	optional!
Unlikely
Most	Likely
Metric
Time
Less	Likely
25 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Example:	Supervised	Model
§ Always	remember	Occam's	Razor!
– Among	competing	hypotheses,	the	one	with	the	fewest	assumptions	
should	be	selected.
– Avoid	needless	complexity
§ Start	with	simple	models,	and	grow	more	complex	as	needed
– Linear	regression
– Logistic	regression
– Decision	trees
– Neural	Networks
– SVM	…
26 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Example:	Supervised	Model
Neural	Network
27 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Example:	Supervised	Model
§ There	are	many	aspects	of	training	a	neural	network
– different	activation	and	error	functions
– different	training	algorithms,	
– variations	of	seeds,	learning	rate,	momentum,	
– self-regulation,
– number	of	hidden	layers,	
– number	of	nodes,	
– boosting/bagging,	
– preventing	overfitting,
– etc.
Train	the	Model(s)
28 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Review
§ Review	the	results	of	your	training,	and	start	all	over	again!
– Consider	segmentation
– Try	leaving	out	the	variables	with	the	highest	sensitivity
– Subdivide	the	data	to	see	if	there	are	regions	of	instability
– Iterate	as	needed
§ Finally,	select	your	model(s)!
§ But	we’re	not	done…
– Now	worry	about	calibration,	upgrade/downgrade,	priming	time,	
packaging,	integration,	model	report,	…
29 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Model	Performance	Chart
30 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Intelligent	Mainframe	Operations
Typical	
Volatility
Anomaly
Tasks	ready	to	be	dispatched
31 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Key	Points	for	Applying	Data	Science
§ Identify	a	high-value	Business	Problem	with	High	Quality	Data
§ Determine	the	class	of	the	problem	to	solve
§ Utilize	business-domain	knowledge
– Understand	the	"ecosystem"
– Define	appropriate	metrics
– Understand	the	data	in	full
§ Develop	features	and	models	/	Evaluate	/	Iterate
§ Always	keep	the	business	problem	in	mind!
32 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Recommended	Sessions
SESSION	# TITLE DATE/TIME
SCX50S
Convenience	and	Security	for	banking	customers	with	CA	
Advanced	Authentication
11/17/2016	at	3:00	pm
SCX34S
Securing	Mobile	Payments:	Applying	Lessons	Learned	in	
the	Real	World
11/17/2016	at	3:45	pm
SCT05T Threat	Analytics	for	Privileged	Access	Management 11/17/2016	at	4:30	pm
33 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Don’t	Miss	Our	INTERACTIVE
Security	Demo	Experience!
SNEAK
PEEK!
33 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
34 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
We	Want	to	Hear	From	You!
§ IT	Central	is	a	leading	technology	review	site.		CA	has	them	to	
help	generate	product	reviews	for	our	Security	products.
§ ITCS	staff	may	be	at	this	session	now!	(look	for	their	shirts).	If	
you	would	like	to		offer	a	product	review,	please	ask	them	
after	the	class,	or	go	by	their	booth.
Note:
§ Only	takes	5-7	mins
§ You	have	total	control	over	the	review
§ It	can	be	anonymous,	if	required
35 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Questions?
36 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Stay	connected	at	communities.ca.com
Thank	you.
37 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Security
For	more	information	on	Security,	please	visit:	
http://cainc.to/EtfYyw

Contenu connexe

Tendances

Fairness in AI (DDSW 2019)
Fairness in AI (DDSW 2019)Fairness in AI (DDSW 2019)
Fairness in AI (DDSW 2019)GoDataDriven
 
Fairness in Machine Learning and AI
Fairness in Machine Learning and AIFairness in Machine Learning and AI
Fairness in Machine Learning and AISeth Grimes
 
Tutorial on People Recommendations in Social Networks - ACM RecSys 2013,Hong...
Tutorial on People Recommendations in Social Networks -  ACM RecSys 2013,Hong...Tutorial on People Recommendations in Social Networks -  ACM RecSys 2013,Hong...
Tutorial on People Recommendations in Social Networks - ACM RecSys 2013,Hong...Anmol Bhasin
 
Responsible AI in Industry (Tutorials at AAAI 2021, FAccT 2021, and WWW 2021)
Responsible AI in Industry (Tutorials at AAAI 2021, FAccT 2021, and WWW 2021)Responsible AI in Industry (Tutorials at AAAI 2021, FAccT 2021, and WWW 2021)
Responsible AI in Industry (Tutorials at AAAI 2021, FAccT 2021, and WWW 2021)Krishnaram Kenthapadi
 
An introduction to the ethics of AI in education
An introduction to the ethics of AI in educationAn introduction to the ethics of AI in education
An introduction to the ethics of AI in educationJisc
 
churn prediction in telecom
churn prediction in telecom churn prediction in telecom
churn prediction in telecom Hong Bui Van
 
From Insights to Action, How to build and maintain a Data Driven Organization...
From Insights to Action, How to build and maintain a Data Driven Organization...From Insights to Action, How to build and maintain a Data Driven Organization...
From Insights to Action, How to build and maintain a Data Driven Organization...Amazon Web Services Korea
 
Responsible Data Use in AI - core tech pillars
Responsible Data Use in AI - core tech pillarsResponsible Data Use in AI - core tech pillars
Responsible Data Use in AI - core tech pillarsSofus Macskássy
 
Seminar on Artificial Intelligence in Healthcare.pptx
Seminar on Artificial Intelligence in Healthcare.pptxSeminar on Artificial Intelligence in Healthcare.pptx
Seminar on Artificial Intelligence in Healthcare.pptxIsaacLalrawngbawla1
 
Algorithmic Bias : What is it? Why should we care? What can we do about it?
Algorithmic Bias : What is it? Why should we care? What can we do about it?Algorithmic Bias : What is it? Why should we care? What can we do about it?
Algorithmic Bias : What is it? Why should we care? What can we do about it?University of Minnesota, Duluth
 
Introduction To Artificial Intelligence Powerpoint Presentation Slides
Introduction To Artificial Intelligence Powerpoint Presentation SlidesIntroduction To Artificial Intelligence Powerpoint Presentation Slides
Introduction To Artificial Intelligence Powerpoint Presentation SlidesSlideTeam
 
DIABETES PREDICTION SYSTEM .pptx
DIABETES PREDICTION SYSTEM .pptxDIABETES PREDICTION SYSTEM .pptx
DIABETES PREDICTION SYSTEM .pptxHome
 
Analytics Overview #Predictive Analytics
Analytics Overview #Predictive AnalyticsAnalytics Overview #Predictive Analytics
Analytics Overview #Predictive AnalyticsDurga Palakurthy
 
AI In Cybersecurity – Challenges and Solutions
AI In Cybersecurity – Challenges and SolutionsAI In Cybersecurity – Challenges and Solutions
AI In Cybersecurity – Challenges and SolutionsZoneFox
 
Ethical Dimensions of Artificial Intelligence (AI) by Rinshad Choorappara
Ethical Dimensions of Artificial Intelligence (AI) by Rinshad ChoorapparaEthical Dimensions of Artificial Intelligence (AI) by Rinshad Choorappara
Ethical Dimensions of Artificial Intelligence (AI) by Rinshad ChoorapparaRinshad Choorappara
 
Artificial Intelligence in E-learning (AI-Ed): Current and future applications
Artificial Intelligence in E-learning (AI-Ed): Current and future applicationsArtificial Intelligence in E-learning (AI-Ed): Current and future applications
Artificial Intelligence in E-learning (AI-Ed): Current and future applicationsRoy Clariana
 

Tendances (20)

AI and Future Jobs
AI and Future JobsAI and Future Jobs
AI and Future Jobs
 
Fairness in AI (DDSW 2019)
Fairness in AI (DDSW 2019)Fairness in AI (DDSW 2019)
Fairness in AI (DDSW 2019)
 
Fairness in Machine Learning and AI
Fairness in Machine Learning and AIFairness in Machine Learning and AI
Fairness in Machine Learning and AI
 
Tutorial on People Recommendations in Social Networks - ACM RecSys 2013,Hong...
Tutorial on People Recommendations in Social Networks -  ACM RecSys 2013,Hong...Tutorial on People Recommendations in Social Networks -  ACM RecSys 2013,Hong...
Tutorial on People Recommendations in Social Networks - ACM RecSys 2013,Hong...
 
Responsible AI in Industry (Tutorials at AAAI 2021, FAccT 2021, and WWW 2021)
Responsible AI in Industry (Tutorials at AAAI 2021, FAccT 2021, and WWW 2021)Responsible AI in Industry (Tutorials at AAAI 2021, FAccT 2021, and WWW 2021)
Responsible AI in Industry (Tutorials at AAAI 2021, FAccT 2021, and WWW 2021)
 
Develop your competitive intelligence skills
Develop your competitive intelligence skillsDevelop your competitive intelligence skills
Develop your competitive intelligence skills
 
Predictive analytics
Predictive analyticsPredictive analytics
Predictive analytics
 
An introduction to the ethics of AI in education
An introduction to the ethics of AI in educationAn introduction to the ethics of AI in education
An introduction to the ethics of AI in education
 
churn prediction in telecom
churn prediction in telecom churn prediction in telecom
churn prediction in telecom
 
From Insights to Action, How to build and maintain a Data Driven Organization...
From Insights to Action, How to build and maintain a Data Driven Organization...From Insights to Action, How to build and maintain a Data Driven Organization...
From Insights to Action, How to build and maintain a Data Driven Organization...
 
Responsible Data Use in AI - core tech pillars
Responsible Data Use in AI - core tech pillarsResponsible Data Use in AI - core tech pillars
Responsible Data Use in AI - core tech pillars
 
Seminar on Artificial Intelligence in Healthcare.pptx
Seminar on Artificial Intelligence in Healthcare.pptxSeminar on Artificial Intelligence in Healthcare.pptx
Seminar on Artificial Intelligence in Healthcare.pptx
 
Algorithmic Bias : What is it? Why should we care? What can we do about it?
Algorithmic Bias : What is it? Why should we care? What can we do about it?Algorithmic Bias : What is it? Why should we care? What can we do about it?
Algorithmic Bias : What is it? Why should we care? What can we do about it?
 
Introduction To Artificial Intelligence Powerpoint Presentation Slides
Introduction To Artificial Intelligence Powerpoint Presentation SlidesIntroduction To Artificial Intelligence Powerpoint Presentation Slides
Introduction To Artificial Intelligence Powerpoint Presentation Slides
 
DIABETES PREDICTION SYSTEM .pptx
DIABETES PREDICTION SYSTEM .pptxDIABETES PREDICTION SYSTEM .pptx
DIABETES PREDICTION SYSTEM .pptx
 
Bias in AI
Bias in AIBias in AI
Bias in AI
 
Analytics Overview #Predictive Analytics
Analytics Overview #Predictive AnalyticsAnalytics Overview #Predictive Analytics
Analytics Overview #Predictive Analytics
 
AI In Cybersecurity – Challenges and Solutions
AI In Cybersecurity – Challenges and SolutionsAI In Cybersecurity – Challenges and Solutions
AI In Cybersecurity – Challenges and Solutions
 
Ethical Dimensions of Artificial Intelligence (AI) by Rinshad Choorappara
Ethical Dimensions of Artificial Intelligence (AI) by Rinshad ChoorapparaEthical Dimensions of Artificial Intelligence (AI) by Rinshad Choorappara
Ethical Dimensions of Artificial Intelligence (AI) by Rinshad Choorappara
 
Artificial Intelligence in E-learning (AI-Ed): Current and future applications
Artificial Intelligence in E-learning (AI-Ed): Current and future applicationsArtificial Intelligence in E-learning (AI-Ed): Current and future applications
Artificial Intelligence in E-learning (AI-Ed): Current and future applications
 

En vedette

Smart Data Slides: Data Science and Business Analysis - A Look at Best Practi...
Smart Data Slides: Data Science and Business Analysis - A Look at Best Practi...Smart Data Slides: Data Science and Business Analysis - A Look at Best Practi...
Smart Data Slides: Data Science and Business Analysis - A Look at Best Practi...DATAVERSITY
 
How big data tranform your business? Data Science Thailand Meet up #6
How big data tranform your business? Data Science Thailand Meet up #6How big data tranform your business? Data Science Thailand Meet up #6
How big data tranform your business? Data Science Thailand Meet up #6Data Science Thailand
 
Analytics Trends 2016: The next evolution
Analytics Trends 2016: The next evolutionAnalytics Trends 2016: The next evolution
Analytics Trends 2016: The next evolutionDeloitte United States
 
Data science project presentation
Data science project presentationData science project presentation
Data science project presentationKevin Bluer
 
My First Data Science Project (Data Science Thailand Meetup #1)
My First Data Science Project (Data Science Thailand Meetup #1)My First Data Science Project (Data Science Thailand Meetup #1)
My First Data Science Project (Data Science Thailand Meetup #1)Data Science Thailand
 
3seven9 - About Us
3seven9 - About Us3seven9 - About Us
3seven9 - About Us3seven9
 
Big data-science-oanyc
Big data-science-oanycBig data-science-oanyc
Big data-science-oanycOpen Analytics
 
Data Science for Business Managers by TektosData
Data Science for Business Managers by TektosDataData Science for Business Managers by TektosData
Data Science for Business Managers by TektosDataMaurício Garcia
 
How can Data Science benefit your business?
How can Data Science benefit your business?How can Data Science benefit your business?
How can Data Science benefit your business?Peadar Coyle
 
BEE Solving Problems Web
BEE Solving Problems WebBEE Solving Problems Web
BEE Solving Problems Webebarrows
 
Moving From The Art To The Science
Moving From The Art To The ScienceMoving From The Art To The Science
Moving From The Art To The ScienceCapgemini
 
Creating Big Data Success with the Collaboration of Business and IT
Creating Big Data Success with the Collaboration of Business and ITCreating Big Data Success with the Collaboration of Business and IT
Creating Big Data Success with the Collaboration of Business and ITEdward Chenard
 
Data Science & Data Products at Neue Zürcher Zeitung
Data Science & Data Products at Neue Zürcher ZeitungData Science & Data Products at Neue Zürcher Zeitung
Data Science & Data Products at Neue Zürcher ZeitungRené Pfitzner
 
Data Science for Smart Manufacturing
Data Science for Smart ManufacturingData Science for Smart Manufacturing
Data Science for Smart ManufacturingCarlo Torniai
 
Preface to a Strategic Plan for Data Science at the NIH
Preface to a Strategic Plan for Data Science at the NIHPreface to a Strategic Plan for Data Science at the NIH
Preface to a Strategic Plan for Data Science at the NIHPhilip Bourne
 
From Data Science to Business Value - Analytics Applied
From Data Science to Business Value - Analytics AppliedFrom Data Science to Business Value - Analytics Applied
From Data Science to Business Value - Analytics AppliedTeradata Aster
 
Ford Motors SCQ Analysis
Ford Motors SCQ AnalysisFord Motors SCQ Analysis
Ford Motors SCQ Analysissunilngupta
 
Building a Data-Driven Culture
Building a Data-Driven CultureBuilding a Data-Driven Culture
Building a Data-Driven CultureLucas Neo
 

En vedette (20)

Smart Data Slides: Data Science and Business Analysis - A Look at Best Practi...
Smart Data Slides: Data Science and Business Analysis - A Look at Best Practi...Smart Data Slides: Data Science and Business Analysis - A Look at Best Practi...
Smart Data Slides: Data Science and Business Analysis - A Look at Best Practi...
 
How big data tranform your business? Data Science Thailand Meet up #6
How big data tranform your business? Data Science Thailand Meet up #6How big data tranform your business? Data Science Thailand Meet up #6
How big data tranform your business? Data Science Thailand Meet up #6
 
Analytics Trends 2016: The next evolution
Analytics Trends 2016: The next evolutionAnalytics Trends 2016: The next evolution
Analytics Trends 2016: The next evolution
 
Data science project presentation
Data science project presentationData science project presentation
Data science project presentation
 
My First Data Science Project (Data Science Thailand Meetup #1)
My First Data Science Project (Data Science Thailand Meetup #1)My First Data Science Project (Data Science Thailand Meetup #1)
My First Data Science Project (Data Science Thailand Meetup #1)
 
3seven9 - About Us
3seven9 - About Us3seven9 - About Us
3seven9 - About Us
 
Big data-science-oanyc
Big data-science-oanycBig data-science-oanyc
Big data-science-oanyc
 
Data Science for Business Managers by TektosData
Data Science for Business Managers by TektosDataData Science for Business Managers by TektosData
Data Science for Business Managers by TektosData
 
How can Data Science benefit your business?
How can Data Science benefit your business?How can Data Science benefit your business?
How can Data Science benefit your business?
 
Business model canvas
Business model canvasBusiness model canvas
Business model canvas
 
BEE Solving Problems Web
BEE Solving Problems WebBEE Solving Problems Web
BEE Solving Problems Web
 
Moving From The Art To The Science
Moving From The Art To The ScienceMoving From The Art To The Science
Moving From The Art To The Science
 
Creating Big Data Success with the Collaboration of Business and IT
Creating Big Data Success with the Collaboration of Business and ITCreating Big Data Success with the Collaboration of Business and IT
Creating Big Data Success with the Collaboration of Business and IT
 
Data Science & Data Products at Neue Zürcher Zeitung
Data Science & Data Products at Neue Zürcher ZeitungData Science & Data Products at Neue Zürcher Zeitung
Data Science & Data Products at Neue Zürcher Zeitung
 
Data Science for Smart Manufacturing
Data Science for Smart ManufacturingData Science for Smart Manufacturing
Data Science for Smart Manufacturing
 
Preface to a Strategic Plan for Data Science at the NIH
Preface to a Strategic Plan for Data Science at the NIHPreface to a Strategic Plan for Data Science at the NIH
Preface to a Strategic Plan for Data Science at the NIH
 
From Data Science to Business Value - Analytics Applied
From Data Science to Business Value - Analytics AppliedFrom Data Science to Business Value - Analytics Applied
From Data Science to Business Value - Analytics Applied
 
Ford Motors SCQ Analysis
Ford Motors SCQ AnalysisFord Motors SCQ Analysis
Ford Motors SCQ Analysis
 
20160419 CCASA
20160419 CCASA20160419 CCASA
20160419 CCASA
 
Building a Data-Driven Culture
Building a Data-Driven CultureBuilding a Data-Driven Culture
Building a Data-Driven Culture
 

Similaire à Applying Data Science to Your Business Problem

Enabling a Hybrid Enterprise Application Launch Pad
Enabling a Hybrid Enterprise Application Launch PadEnabling a Hybrid Enterprise Application Launch Pad
Enabling a Hybrid Enterprise Application Launch PadCA Technologies
 
Tech Talk: Analytics at CA – What’s Cooking? Project Jarvis
Tech Talk: Analytics at CA – What’s Cooking? Project JarvisTech Talk: Analytics at CA – What’s Cooking? Project Jarvis
Tech Talk: Analytics at CA – What’s Cooking? Project JarvisCA Technologies
 
Technology Primer: Learn How Analytics Can Sort the Wheat From the Chaff and ...
Technology Primer: Learn How Analytics Can Sort the Wheat From the Chaff and ...Technology Primer: Learn How Analytics Can Sort the Wheat From the Chaff and ...
Technology Primer: Learn How Analytics Can Sort the Wheat From the Chaff and ...CA Technologies
 
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...CA Technologies
 
Critical Path Forecasting with CA Workload Automation iDash
Critical Path Forecasting with CA Workload Automation iDashCritical Path Forecasting with CA Workload Automation iDash
Critical Path Forecasting with CA Workload Automation iDashCA Technologies
 
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...CA Technologies
 
Introduction to Identity-as-a-Service and Secure Access to SaaS
Introduction to Identity-as-a-Service and Secure Access to SaaSIntroduction to Identity-as-a-Service and Secure Access to SaaS
Introduction to Identity-as-a-Service and Secure Access to SaaSCA Technologies
 
Securely Enabling the Digital Age
Securely Enabling the Digital AgeSecurely Enabling the Digital Age
Securely Enabling the Digital AgeCA Technologies
 
Technology Primer: Monitor a Website in Minutes Using Shortcuts for Customer ...
Technology Primer: Monitor a Website in Minutes Using Shortcuts for Customer ...Technology Primer: Monitor a Website in Minutes Using Shortcuts for Customer ...
Technology Primer: Monitor a Website in Minutes Using Shortcuts for Customer ...CA Technologies
 
Digital transformation in financial services through trusted digital relation...
Digital transformation in financial services through trusted digital relation...Digital transformation in financial services through trusted digital relation...
Digital transformation in financial services through trusted digital relation...CA Technologies
 
Tech Talk: CA Live API Creator MythBuster: Low Code is a Toy, not Enterprise ...
Tech Talk: CA Live API Creator MythBuster: Low Code is a Toy, not Enterprise ...Tech Talk: CA Live API Creator MythBuster: Low Code is a Toy, not Enterprise ...
Tech Talk: CA Live API Creator MythBuster: Low Code is a Toy, not Enterprise ...CA Technologies
 
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 EnvironmentPre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 EnvironmentCA Technologies
 
Tech Tak: Threat Analytics for Privileged Access Management
Tech Tak: Threat Analytics for Privileged Access ManagementTech Tak: Threat Analytics for Privileged Access Management
Tech Tak: Threat Analytics for Privileged Access ManagementCA Technologies
 
Identity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and SolutionsIdentity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and SolutionsCA Technologies
 
Pre-Con Ed: Operational Intelligence – Monitoring the Past to Better Understa...
Pre-Con Ed: Operational Intelligence – Monitoring the Past to Better Understa...Pre-Con Ed: Operational Intelligence – Monitoring the Past to Better Understa...
Pre-Con Ed: Operational Intelligence – Monitoring the Past to Better Understa...CA Technologies
 
Tech Talk: Federate to an SAML-Enabled App in Minutes
Tech Talk: Federate to an SAML-Enabled App in MinutesTech Talk: Federate to an SAML-Enabled App in Minutes
Tech Talk: Federate to an SAML-Enabled App in MinutesCA Technologies
 
Hands-On Lab: Get the Most Out of Your Network Performance Metrics With Innov...
Hands-On Lab: Get the Most Out of Your Network Performance Metrics With Innov...Hands-On Lab: Get the Most Out of Your Network Performance Metrics With Innov...
Hands-On Lab: Get the Most Out of Your Network Performance Metrics With Innov...CA Technologies
 
Tech Talk: Agile 101: Why It's Important to Work Transparently
Tech Talk: Agile 101: Why It's Important to Work TransparentlyTech Talk: Agile 101: Why It's Important to Work Transparently
Tech Talk: Agile 101: Why It's Important to Work TransparentlyCA Technologies
 
API Risk: Taking Your API Security to the Next Level
API Risk: Taking Your API Security to the Next LevelAPI Risk: Taking Your API Security to the Next Level
API Risk: Taking Your API Security to the Next LevelCA Technologies
 

Similaire à Applying Data Science to Your Business Problem (20)

Enabling a Hybrid Enterprise Application Launch Pad
Enabling a Hybrid Enterprise Application Launch PadEnabling a Hybrid Enterprise Application Launch Pad
Enabling a Hybrid Enterprise Application Launch Pad
 
Tech Talk: Analytics at CA – What’s Cooking? Project Jarvis
Tech Talk: Analytics at CA – What’s Cooking? Project JarvisTech Talk: Analytics at CA – What’s Cooking? Project Jarvis
Tech Talk: Analytics at CA – What’s Cooking? Project Jarvis
 
Technology Primer: Learn How Analytics Can Sort the Wheat From the Chaff and ...
Technology Primer: Learn How Analytics Can Sort the Wheat From the Chaff and ...Technology Primer: Learn How Analytics Can Sort the Wheat From the Chaff and ...
Technology Primer: Learn How Analytics Can Sort the Wheat From the Chaff and ...
 
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
 
Critical Path Forecasting with CA Workload Automation iDash
Critical Path Forecasting with CA Workload Automation iDashCritical Path Forecasting with CA Workload Automation iDash
Critical Path Forecasting with CA Workload Automation iDash
 
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
 
Introduction to Identity-as-a-Service and Secure Access to SaaS
Introduction to Identity-as-a-Service and Secure Access to SaaSIntroduction to Identity-as-a-Service and Secure Access to SaaS
Introduction to Identity-as-a-Service and Secure Access to SaaS
 
Securely Enabling the Digital Age
Securely Enabling the Digital AgeSecurely Enabling the Digital Age
Securely Enabling the Digital Age
 
Technology Primer: Monitor a Website in Minutes Using Shortcuts for Customer ...
Technology Primer: Monitor a Website in Minutes Using Shortcuts for Customer ...Technology Primer: Monitor a Website in Minutes Using Shortcuts for Customer ...
Technology Primer: Monitor a Website in Minutes Using Shortcuts for Customer ...
 
Digital transformation in financial services through trusted digital relation...
Digital transformation in financial services through trusted digital relation...Digital transformation in financial services through trusted digital relation...
Digital transformation in financial services through trusted digital relation...
 
Tech Talk: CA Live API Creator MythBuster: Low Code is a Toy, not Enterprise ...
Tech Talk: CA Live API Creator MythBuster: Low Code is a Toy, not Enterprise ...Tech Talk: CA Live API Creator MythBuster: Low Code is a Toy, not Enterprise ...
Tech Talk: CA Live API Creator MythBuster: Low Code is a Toy, not Enterprise ...
 
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 EnvironmentPre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
 
Tech Tak: Threat Analytics for Privileged Access Management
Tech Tak: Threat Analytics for Privileged Access ManagementTech Tak: Threat Analytics for Privileged Access Management
Tech Tak: Threat Analytics for Privileged Access Management
 
Identity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and SolutionsIdentity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and Solutions
 
Pre-Con Ed: Operational Intelligence – Monitoring the Past to Better Understa...
Pre-Con Ed: Operational Intelligence – Monitoring the Past to Better Understa...Pre-Con Ed: Operational Intelligence – Monitoring the Past to Better Understa...
Pre-Con Ed: Operational Intelligence – Monitoring the Past to Better Understa...
 
Tech Talk: Federate to an SAML-Enabled App in Minutes
Tech Talk: Federate to an SAML-Enabled App in MinutesTech Talk: Federate to an SAML-Enabled App in Minutes
Tech Talk: Federate to an SAML-Enabled App in Minutes
 
Hands-On Lab: Get the Most Out of Your Network Performance Metrics With Innov...
Hands-On Lab: Get the Most Out of Your Network Performance Metrics With Innov...Hands-On Lab: Get the Most Out of Your Network Performance Metrics With Innov...
Hands-On Lab: Get the Most Out of Your Network Performance Metrics With Innov...
 
Analytics strategy
Analytics strategyAnalytics strategy
Analytics strategy
 
Tech Talk: Agile 101: Why It's Important to Work Transparently
Tech Talk: Agile 101: Why It's Important to Work TransparentlyTech Talk: Agile 101: Why It's Important to Work Transparently
Tech Talk: Agile 101: Why It's Important to Work Transparently
 
API Risk: Taking Your API Security to the Next Level
API Risk: Taking Your API Security to the Next LevelAPI Risk: Taking Your API Security to the Next Level
API Risk: Taking Your API Security to the Next Level
 

Plus de CA Technologies

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Technologies
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceCA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...CA Technologies
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCA Technologies
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...CA Technologies
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCA Technologies
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramCA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageCA Technologies
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementCA Technologies
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...CA Technologies
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...CA Technologies
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...CA Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentCA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
 

Plus de CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 

Dernier

Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 

Dernier (20)

Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 

Applying Data Science to Your Business Problem