Soumettre la recherche
Mettre en ligne
Applying Data Science to Your Business Problem
•
1 j'aime
•
1,710 vues
CA Technologies
Suivre
Applying Data Science to Your Business Problem
Lire moins
Lire la suite
Technologie
Signaler
Partager
Signaler
Partager
1 sur 37
Télécharger maintenant
Télécharger pour lire hors ligne
Recommandé
Panel: AI for Social Good - Fairness, Ethics, Accountability, and Transparency
Panel: AI for Social Good - Fairness, Ethics, Accountability, and Transparency
Amazon Web Services
Carrer in cse In Bangladesh
Carrer in cse In Bangladesh
Shomitro Kumar Ghosh
Machine Learning
Machine Learning
Shrey Malik
Predicting Employee Attrition
Predicting Employee Attrition
Shruti Mohan
Introduction to Machine Learning & AI
Introduction to Machine Learning & AI
Michael Eydman
Artificial Intelligence and Bias
Artificial Intelligence and Bias
Oleksandr Krakovetskyi
A/B testing
A/B testing
Kapil Saxena
Artificial Intelligence and Machine Learning for business
Artificial Intelligence and Machine Learning for business
Steven Finlay
Recommandé
Panel: AI for Social Good - Fairness, Ethics, Accountability, and Transparency
Panel: AI for Social Good - Fairness, Ethics, Accountability, and Transparency
Amazon Web Services
Carrer in cse In Bangladesh
Carrer in cse In Bangladesh
Shomitro Kumar Ghosh
Machine Learning
Machine Learning
Shrey Malik
Predicting Employee Attrition
Predicting Employee Attrition
Shruti Mohan
Introduction to Machine Learning & AI
Introduction to Machine Learning & AI
Michael Eydman
Artificial Intelligence and Bias
Artificial Intelligence and Bias
Oleksandr Krakovetskyi
A/B testing
A/B testing
Kapil Saxena
Artificial Intelligence and Machine Learning for business
Artificial Intelligence and Machine Learning for business
Steven Finlay
AI and Future Jobs
AI and Future Jobs
David Asirvatham
Fairness in AI (DDSW 2019)
Fairness in AI (DDSW 2019)
GoDataDriven
Fairness in Machine Learning and AI
Fairness in Machine Learning and AI
Seth Grimes
Tutorial on People Recommendations in Social Networks - ACM RecSys 2013,Hong...
Tutorial on People Recommendations in Social Networks - ACM RecSys 2013,Hong...
Anmol Bhasin
Responsible AI in Industry (Tutorials at AAAI 2021, FAccT 2021, and WWW 2021)
Responsible AI in Industry (Tutorials at AAAI 2021, FAccT 2021, and WWW 2021)
Krishnaram Kenthapadi
Develop your competitive intelligence skills
Develop your competitive intelligence skills
Business Intelligence Source
Predictive analytics
Predictive analytics
Sidharth Raj Agarwal
An introduction to the ethics of AI in education
An introduction to the ethics of AI in education
Jisc
churn prediction in telecom
churn prediction in telecom
Hong Bui Van
From Insights to Action, How to build and maintain a Data Driven Organization...
From Insights to Action, How to build and maintain a Data Driven Organization...
Amazon Web Services Korea
Responsible Data Use in AI - core tech pillars
Responsible Data Use in AI - core tech pillars
Sofus Macskássy
Seminar on Artificial Intelligence in Healthcare.pptx
Seminar on Artificial Intelligence in Healthcare.pptx
IsaacLalrawngbawla1
Algorithmic Bias : What is it? Why should we care? What can we do about it?
Algorithmic Bias : What is it? Why should we care? What can we do about it?
University of Minnesota, Duluth
Introduction To Artificial Intelligence Powerpoint Presentation Slides
Introduction To Artificial Intelligence Powerpoint Presentation Slides
SlideTeam
DIABETES PREDICTION SYSTEM .pptx
DIABETES PREDICTION SYSTEM .pptx
Home
Bias in AI
Bias in AI
Zeydy Ortiz, Ph. D.
Analytics Overview #Predictive Analytics
Analytics Overview #Predictive Analytics
Durga Palakurthy
AI In Cybersecurity – Challenges and Solutions
AI In Cybersecurity – Challenges and Solutions
ZoneFox
Ethical Dimensions of Artificial Intelligence (AI) by Rinshad Choorappara
Ethical Dimensions of Artificial Intelligence (AI) by Rinshad Choorappara
Rinshad Choorappara
Artificial Intelligence in E-learning (AI-Ed): Current and future applications
Artificial Intelligence in E-learning (AI-Ed): Current and future applications
Roy Clariana
Smart Data Slides: Data Science and Business Analysis - A Look at Best Practi...
Smart Data Slides: Data Science and Business Analysis - A Look at Best Practi...
DATAVERSITY
How big data tranform your business? Data Science Thailand Meet up #6
How big data tranform your business? Data Science Thailand Meet up #6
Data Science Thailand
Contenu connexe
Tendances
AI and Future Jobs
AI and Future Jobs
David Asirvatham
Fairness in AI (DDSW 2019)
Fairness in AI (DDSW 2019)
GoDataDriven
Fairness in Machine Learning and AI
Fairness in Machine Learning and AI
Seth Grimes
Tutorial on People Recommendations in Social Networks - ACM RecSys 2013,Hong...
Tutorial on People Recommendations in Social Networks - ACM RecSys 2013,Hong...
Anmol Bhasin
Responsible AI in Industry (Tutorials at AAAI 2021, FAccT 2021, and WWW 2021)
Responsible AI in Industry (Tutorials at AAAI 2021, FAccT 2021, and WWW 2021)
Krishnaram Kenthapadi
Develop your competitive intelligence skills
Develop your competitive intelligence skills
Business Intelligence Source
Predictive analytics
Predictive analytics
Sidharth Raj Agarwal
An introduction to the ethics of AI in education
An introduction to the ethics of AI in education
Jisc
churn prediction in telecom
churn prediction in telecom
Hong Bui Van
From Insights to Action, How to build and maintain a Data Driven Organization...
From Insights to Action, How to build and maintain a Data Driven Organization...
Amazon Web Services Korea
Responsible Data Use in AI - core tech pillars
Responsible Data Use in AI - core tech pillars
Sofus Macskássy
Seminar on Artificial Intelligence in Healthcare.pptx
Seminar on Artificial Intelligence in Healthcare.pptx
IsaacLalrawngbawla1
Algorithmic Bias : What is it? Why should we care? What can we do about it?
Algorithmic Bias : What is it? Why should we care? What can we do about it?
University of Minnesota, Duluth
Introduction To Artificial Intelligence Powerpoint Presentation Slides
Introduction To Artificial Intelligence Powerpoint Presentation Slides
SlideTeam
DIABETES PREDICTION SYSTEM .pptx
DIABETES PREDICTION SYSTEM .pptx
Home
Bias in AI
Bias in AI
Zeydy Ortiz, Ph. D.
Analytics Overview #Predictive Analytics
Analytics Overview #Predictive Analytics
Durga Palakurthy
AI In Cybersecurity – Challenges and Solutions
AI In Cybersecurity – Challenges and Solutions
ZoneFox
Ethical Dimensions of Artificial Intelligence (AI) by Rinshad Choorappara
Ethical Dimensions of Artificial Intelligence (AI) by Rinshad Choorappara
Rinshad Choorappara
Artificial Intelligence in E-learning (AI-Ed): Current and future applications
Artificial Intelligence in E-learning (AI-Ed): Current and future applications
Roy Clariana
Tendances
(20)
AI and Future Jobs
AI and Future Jobs
Fairness in AI (DDSW 2019)
Fairness in AI (DDSW 2019)
Fairness in Machine Learning and AI
Fairness in Machine Learning and AI
Tutorial on People Recommendations in Social Networks - ACM RecSys 2013,Hong...
Tutorial on People Recommendations in Social Networks - ACM RecSys 2013,Hong...
Responsible AI in Industry (Tutorials at AAAI 2021, FAccT 2021, and WWW 2021)
Responsible AI in Industry (Tutorials at AAAI 2021, FAccT 2021, and WWW 2021)
Develop your competitive intelligence skills
Develop your competitive intelligence skills
Predictive analytics
Predictive analytics
An introduction to the ethics of AI in education
An introduction to the ethics of AI in education
churn prediction in telecom
churn prediction in telecom
From Insights to Action, How to build and maintain a Data Driven Organization...
From Insights to Action, How to build and maintain a Data Driven Organization...
Responsible Data Use in AI - core tech pillars
Responsible Data Use in AI - core tech pillars
Seminar on Artificial Intelligence in Healthcare.pptx
Seminar on Artificial Intelligence in Healthcare.pptx
Algorithmic Bias : What is it? Why should we care? What can we do about it?
Algorithmic Bias : What is it? Why should we care? What can we do about it?
Introduction To Artificial Intelligence Powerpoint Presentation Slides
Introduction To Artificial Intelligence Powerpoint Presentation Slides
DIABETES PREDICTION SYSTEM .pptx
DIABETES PREDICTION SYSTEM .pptx
Bias in AI
Bias in AI
Analytics Overview #Predictive Analytics
Analytics Overview #Predictive Analytics
AI In Cybersecurity – Challenges and Solutions
AI In Cybersecurity – Challenges and Solutions
Ethical Dimensions of Artificial Intelligence (AI) by Rinshad Choorappara
Ethical Dimensions of Artificial Intelligence (AI) by Rinshad Choorappara
Artificial Intelligence in E-learning (AI-Ed): Current and future applications
Artificial Intelligence in E-learning (AI-Ed): Current and future applications
En vedette
Smart Data Slides: Data Science and Business Analysis - A Look at Best Practi...
Smart Data Slides: Data Science and Business Analysis - A Look at Best Practi...
DATAVERSITY
How big data tranform your business? Data Science Thailand Meet up #6
How big data tranform your business? Data Science Thailand Meet up #6
Data Science Thailand
Analytics Trends 2016: The next evolution
Analytics Trends 2016: The next evolution
Deloitte United States
Data science project presentation
Data science project presentation
Kevin Bluer
My First Data Science Project (Data Science Thailand Meetup #1)
My First Data Science Project (Data Science Thailand Meetup #1)
Data Science Thailand
3seven9 - About Us
3seven9 - About Us
3seven9
Big data-science-oanyc
Big data-science-oanyc
Open Analytics
Data Science for Business Managers by TektosData
Data Science for Business Managers by TektosData
Maurício Garcia
How can Data Science benefit your business?
How can Data Science benefit your business?
Peadar Coyle
Business model canvas
Business model canvas
Hamza Jounaidi
BEE Solving Problems Web
BEE Solving Problems Web
ebarrows
Moving From The Art To The Science
Moving From The Art To The Science
Capgemini
Creating Big Data Success with the Collaboration of Business and IT
Creating Big Data Success with the Collaboration of Business and IT
Edward Chenard
Data Science & Data Products at Neue Zürcher Zeitung
Data Science & Data Products at Neue Zürcher Zeitung
René Pfitzner
Data Science for Smart Manufacturing
Data Science for Smart Manufacturing
Carlo Torniai
Preface to a Strategic Plan for Data Science at the NIH
Preface to a Strategic Plan for Data Science at the NIH
Philip Bourne
From Data Science to Business Value - Analytics Applied
From Data Science to Business Value - Analytics Applied
Teradata Aster
Ford Motors SCQ Analysis
Ford Motors SCQ Analysis
sunilngupta
20160419 CCASA
20160419 CCASA
Dean Malmgren
Building a Data-Driven Culture
Building a Data-Driven Culture
Lucas Neo
En vedette
(20)
Smart Data Slides: Data Science and Business Analysis - A Look at Best Practi...
Smart Data Slides: Data Science and Business Analysis - A Look at Best Practi...
How big data tranform your business? Data Science Thailand Meet up #6
How big data tranform your business? Data Science Thailand Meet up #6
Analytics Trends 2016: The next evolution
Analytics Trends 2016: The next evolution
Data science project presentation
Data science project presentation
My First Data Science Project (Data Science Thailand Meetup #1)
My First Data Science Project (Data Science Thailand Meetup #1)
3seven9 - About Us
3seven9 - About Us
Big data-science-oanyc
Big data-science-oanyc
Data Science for Business Managers by TektosData
Data Science for Business Managers by TektosData
How can Data Science benefit your business?
How can Data Science benefit your business?
Business model canvas
Business model canvas
BEE Solving Problems Web
BEE Solving Problems Web
Moving From The Art To The Science
Moving From The Art To The Science
Creating Big Data Success with the Collaboration of Business and IT
Creating Big Data Success with the Collaboration of Business and IT
Data Science & Data Products at Neue Zürcher Zeitung
Data Science & Data Products at Neue Zürcher Zeitung
Data Science for Smart Manufacturing
Data Science for Smart Manufacturing
Preface to a Strategic Plan for Data Science at the NIH
Preface to a Strategic Plan for Data Science at the NIH
From Data Science to Business Value - Analytics Applied
From Data Science to Business Value - Analytics Applied
Ford Motors SCQ Analysis
Ford Motors SCQ Analysis
20160419 CCASA
20160419 CCASA
Building a Data-Driven Culture
Building a Data-Driven Culture
Similaire à Applying Data Science to Your Business Problem
Enabling a Hybrid Enterprise Application Launch Pad
Enabling a Hybrid Enterprise Application Launch Pad
CA Technologies
Tech Talk: Analytics at CA – What’s Cooking? Project Jarvis
Tech Talk: Analytics at CA – What’s Cooking? Project Jarvis
CA Technologies
Technology Primer: Learn How Analytics Can Sort the Wheat From the Chaff and ...
Technology Primer: Learn How Analytics Can Sort the Wheat From the Chaff and ...
CA Technologies
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
CA Technologies
Critical Path Forecasting with CA Workload Automation iDash
Critical Path Forecasting with CA Workload Automation iDash
CA Technologies
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
CA Technologies
Introduction to Identity-as-a-Service and Secure Access to SaaS
Introduction to Identity-as-a-Service and Secure Access to SaaS
CA Technologies
Securely Enabling the Digital Age
Securely Enabling the Digital Age
CA Technologies
Technology Primer: Monitor a Website in Minutes Using Shortcuts for Customer ...
Technology Primer: Monitor a Website in Minutes Using Shortcuts for Customer ...
CA Technologies
Digital transformation in financial services through trusted digital relation...
Digital transformation in financial services through trusted digital relation...
CA Technologies
Tech Talk: CA Live API Creator MythBuster: Low Code is a Toy, not Enterprise ...
Tech Talk: CA Live API Creator MythBuster: Low Code is a Toy, not Enterprise ...
CA Technologies
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
CA Technologies
Tech Tak: Threat Analytics for Privileged Access Management
Tech Tak: Threat Analytics for Privileged Access Management
CA Technologies
Identity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and Solutions
CA Technologies
Pre-Con Ed: Operational Intelligence – Monitoring the Past to Better Understa...
Pre-Con Ed: Operational Intelligence – Monitoring the Past to Better Understa...
CA Technologies
Tech Talk: Federate to an SAML-Enabled App in Minutes
Tech Talk: Federate to an SAML-Enabled App in Minutes
CA Technologies
Hands-On Lab: Get the Most Out of Your Network Performance Metrics With Innov...
Hands-On Lab: Get the Most Out of Your Network Performance Metrics With Innov...
CA Technologies
Analytics strategy
Analytics strategy
Sushant Kumar
Tech Talk: Agile 101: Why It's Important to Work Transparently
Tech Talk: Agile 101: Why It's Important to Work Transparently
CA Technologies
API Risk: Taking Your API Security to the Next Level
API Risk: Taking Your API Security to the Next Level
CA Technologies
Similaire à Applying Data Science to Your Business Problem
(20)
Enabling a Hybrid Enterprise Application Launch Pad
Enabling a Hybrid Enterprise Application Launch Pad
Tech Talk: Analytics at CA – What’s Cooking? Project Jarvis
Tech Talk: Analytics at CA – What’s Cooking? Project Jarvis
Technology Primer: Learn How Analytics Can Sort the Wheat From the Chaff and ...
Technology Primer: Learn How Analytics Can Sort the Wheat From the Chaff and ...
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
Critical Path Forecasting with CA Workload Automation iDash
Critical Path Forecasting with CA Workload Automation iDash
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
Introduction to Identity-as-a-Service and Secure Access to SaaS
Introduction to Identity-as-a-Service and Secure Access to SaaS
Securely Enabling the Digital Age
Securely Enabling the Digital Age
Technology Primer: Monitor a Website in Minutes Using Shortcuts for Customer ...
Technology Primer: Monitor a Website in Minutes Using Shortcuts for Customer ...
Digital transformation in financial services through trusted digital relation...
Digital transformation in financial services through trusted digital relation...
Tech Talk: CA Live API Creator MythBuster: Low Code is a Toy, not Enterprise ...
Tech Talk: CA Live API Creator MythBuster: Low Code is a Toy, not Enterprise ...
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
Tech Tak: Threat Analytics for Privileged Access Management
Tech Tak: Threat Analytics for Privileged Access Management
Identity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and Solutions
Pre-Con Ed: Operational Intelligence – Monitoring the Past to Better Understa...
Pre-Con Ed: Operational Intelligence – Monitoring the Past to Better Understa...
Tech Talk: Federate to an SAML-Enabled App in Minutes
Tech Talk: Federate to an SAML-Enabled App in Minutes
Hands-On Lab: Get the Most Out of Your Network Performance Metrics With Innov...
Hands-On Lab: Get the Most Out of Your Network Performance Metrics With Innov...
Analytics strategy
Analytics strategy
Tech Talk: Agile 101: Why It's Important to Work Transparently
Tech Talk: Agile 101: Why It's Important to Work Transparently
API Risk: Taking Your API Security to the Next Level
API Risk: Taking Your API Security to the Next Level
Plus de CA Technologies
CA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
CA Technologies
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
CA Technologies
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
CA Technologies
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
CA Technologies
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
CA Technologies
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
CA Technologies
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
CA Technologies
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
CA Technologies
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
CA Technologies
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
CA Technologies
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
CA Technologies
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
CA Technologies
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
CA Technologies
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
CA Technologies
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
CA Technologies
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
CA Technologies
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
CA Technologies
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
CA Technologies
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
CA Technologies
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
CA Technologies
Plus de CA Technologies
(20)
CA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
Dernier
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
charlottematthew16
Training state-of-the-art general text embedding
Training state-of-the-art general text embedding
Zilliz
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
Alex Barbosa Coqueiro
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
Fwdays
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
BookNet Canada
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
Sergiu Bodiu
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
Enterprise Knowledge
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Patryk Bandurski
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
charlottematthew16
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
Fwdays
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
UiPathCommunity
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
Mark Billinghurst
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
Zilliz
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
Stephanie Beckett
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
Fwdays
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
Ridwan Fadjar
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
The Digital Insurer
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
gvaughan
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
null - The Open Security Community
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
Rizwan Syed
Dernier
(20)
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
Training state-of-the-art general text embedding
Training state-of-the-art general text embedding
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
Applying Data Science to Your Business Problem
1.
1 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD World® ’16 Applying Data Science to Your Business Problem Paul Dulany -
VP Data Science - CA Technologies SCX31S SECURITY
2.
2 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD © 2016 CA. All rights reserved. All trademarks referenced herein belong to their respective companies. The content provided in this CA World 2016 presentation is intended for informational purposes only and does not form any type of warranty.
The information provided by a CA partner and/or CA customer has not been reviewed for accuracy by CA. For Informational Purposes Only Terms of this Presentation
3.
3 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Abstract For a while now, a number of industries have been interested in data science and advanced analytics. But it isn’t always clear how best to use these within the business context. In this session, we’ll discuss how to turn a business problem into a data-science problem, and then back. We’ll use card-not-present payment fraud and login attempts as examples of how to identify the problem, determine if data science and advanced analytics can help (and if the situation warrants them), and then follow through on developing a solution to the problem. Paul Dulany, PhD CA Technologies VP Data Science
4.
4 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Agenda WHAT IS DATA SCIENCE? DETERMINING A PROBLEM OF INTEREST UNDERSTAND THE PRODUCTION ENVIRONMENT AND DEMANDS MODEL CREATION AND EVALUATION Q & A 1 2 3 4 5
5.
5 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Key Points for Applying Data Science § Identify a high-value Business Problem with High Quality Data §
Determine the class of the problem to solve § Utilize business-domain knowledge – Understand the "ecosystem" – Define appropriate metrics – Understand the data in full § Develop features and models / Evaluate / Iterate § Always keep the business problem in mind!
6.
6 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD What is Data Science? § The application of analytical techniques to large and “big” data –
A wide field encompassing many different aspects of analytics, statistics, and data mining – Fundamentally data driven – Based upon the scientific method – The goal is to use data and analytical techniques to solve problems § Requires knowledge in multiple domains – Analytics – Scientific computations – Data formats – Business domain – Statistics
7.
7 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Steps in Applying Data Science § Identify a high-value business problem –
The business case is critical § Intelligent Mainframe Operations – Need early detection of issues § Best is to predict and avoid issues – Currently, false positives (false alarms) are too prevalent – Expert-maintained systems of thresholds are hard to maintain Business Problem
8.
8 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Steps in Applying Data Science § Payment Security: –
Fraud in eCommerce is a significant problem § 3-D Secure was developed to combat this – Issuers incur the most pain from the current state § Fraud losses § Loss of income from interest and interchange fees § Customer experience and annoyance § Cost of inbound calls – Merchants feel pain too… Business Problem
9.
9 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Business Impact for a Client: 3 Year Impact Credit Debit Fraud savings (above current vendor)
£13,441,843 £15,174,365 Interchange fees (above current) £466,462 £3,441,882 Interest income (above current) £3,674,803 N/A Operational savings (not calculated) - - Total £17,583,108 £18,616,247
10.
10 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Steps in Applying Data Science § Identify data related to the business problem –
The more data, the better! – Is it categorical, ordinal, or numerical? What cardinality? – Is there a unique advantage over the competition? § Payment Security – 3DS data: PAReq message, device information, … – Wide mix of types of data – Time series is important – SaaS Deployment allows quality data to be gathered Identify Data (Results Proportional to Quality!)
11.
11 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Steps in Applying Data Science § Intelligent Mainframe Operations –
Multiple possible data sources § VSAM, DB2, IMS DB, IDMS, DATACOM, SMF, Syslogs, Vtape, CICS, … – Utilize CA SYSVIEW’s excellence – Embed analytics to detect abnormal patterns Identify Data (Results Proportional to Quality!)
12.
12 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Steps in Applying Data Science § Determine the general class of problem –
Classification, regression, anomaly detection, etc. – “Supervised” (teaching your children to read, teaching them manners) – “Unsupervised” (university) – “Semi-supervised” (school lunch room)
13.
13 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Steps in Applying Data Science § Payment Security –
Supervised classification – Fraud information for losses is likely in good shape – Complexities happen once you have a system in place § Censored problem, both in marking and in changing fraudster behavior § Intelligent Mainframe Operations – Unsupervised to begin – Need to develop baselines of normal behavior § But must provide results from day 0 – Possibility of semi-supervised in the future Determine the general class of problem
14.
14 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Steps in Applying Data Science § Understand the ecosystem –
What actions can be taken? – Is getting the result time sensitive? § Intelligent Mainframe Operations – Predictive analytics needed – Multiple possible actions, key is to inform the operator’s actions – Different time-scales for problems – Reaction-time is critical – real-time
15.
15 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Steps in applying Data Science § Payment Security –
Predictive and prescriptive analytics needed – Multiple possible actions, at the transaction and the card level – Timing is critical – real-time, i.e., < 50ms for vast majority § We must be able to take action now Understand the Ecosystem
16.
16 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Steps in Applying Data Science § Determine the appropriate metrics –
How do we measure success? § Well defined measures are critical § Intelligent Mainframe Operations – High Availability – Problem avoidance – Reduced MTTR – Reduce SME dependence for issue detection
17.
17 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Steps in Applying Data Science § Payment Security –
A number of possibilities, based upon customer’s objectives – Consider them all § Detection rates § “Outsort” rates § False-positive ratios § False-positive rates § Value-based / transaction based / card based Metrics TOR 𝑆 = ∑ 𝐹 𝑠* + 𝑁 𝑠* ./0. ∑ 𝐹 𝑠* + 𝑁 𝑠* 122 .* TDR 𝑆 = ∑ 𝐹 𝑠* ./0. ∑ 𝐹 𝑠* 122 .*
18.
18 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD What’s Next? § Now we have a well defined problem §
So we spend a lot of time with the data! – “Browse” the data – Run some descriptive statistics – See if you can surprise yourself – If supervised, view the tagging data and the production data separately, and then together.
19.
19 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Review the Tagged Data § Browse the data again §
Run many statistical test – Beware of “Target Leaks”!! – Begin getting a feel for the variations, correlations, idiosyncrasies § You never want perfectly clean data – You want data that simulates production! § Beware of any changes to the data, especially non-causal changes § Model training is a numerical simulation of production
20.
20 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Data Partitioning: Beware What You Partition and How! § Partitioning –
Often need to use stratified sampling – When using multiple entities for tracking behavior, interactions are tricky! § Look for irreducibility § Go to out-of-time if needed Historical Data Training Fraud Non-Fraud Validate Fraud Non- Fraud Holdout Fraud Non- Fraud
21.
21 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Feature Development § “Features” pull the distinguishing characteristics from the data –
Time series analysis techniques – Digital Signal Processing techniques – Statistical measures of differences – Bayesian approaches – Linear discriminants – Non-linear transformations – …
22.
22 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Feature Development: Simple Example § Determine a peer group from the historical data –
All transactions where there were four previous transactions in the last week, at least two of which were on the same device, but in different countries § Determine the distributions of classes for a continuous variable – Let’s say, the amount – Use a discriminant calculation to determine likelihood of belonging to either class.
23.
23 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Feature Development: More Complexity § At the other end of the scale are online-learning models to determine behaviors –
Autocorrelation models, exponential weighting, KDE, etc. – Many techniques – § but must keep in mind the CPU constraints, I/O constraints, etc. § Conversion of high-cardinality categorical data into numerical inputs 𝑥"(𝑡 𝑛 , 𝑡 𝑛−1, 𝑡0) = 𝛼(𝑡 𝑛 , 𝑡0)𝑥 𝑛 + 𝛽(𝑡 𝑛 , 𝑡 𝑛−1, 𝑡0)𝑥" 𝑛−1 𝛼(𝑡 𝑛 , 𝑡0) = 1 − 𝛾 1 − 𝛾(𝑡 𝑛 −𝑡0) 𝛽(𝑡 𝑛 , 𝑡 𝑛−1, 𝑡0) = 𝛾(𝑡 𝑛 −𝑡 𝑛−1) 11 − 𝛾(𝑡 𝑛−1−𝑡0) 2 1 − 𝛾(𝑡 𝑛 −𝑡0)
24.
24 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Example: Unsupervised Anomaly Detection § Utilize Historical data to define bands of different probabilities –
Map real time metric streams against system defined normal – Multi-point alerts generated using industry-standard Western-Electric rules – Make static thresholds optional! Unlikely Most Likely Metric Time Less Likely
25.
25 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Example: Supervised Model § Always remember Occam's Razor! –
Among competing hypotheses, the one with the fewest assumptions should be selected. – Avoid needless complexity § Start with simple models, and grow more complex as needed – Linear regression – Logistic regression – Decision trees – Neural Networks – SVM …
26.
26 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Example: Supervised Model Neural Network
27.
27 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Example: Supervised Model § There are many aspects of training a neural network –
different activation and error functions – different training algorithms, – variations of seeds, learning rate, momentum, – self-regulation, – number of hidden layers, – number of nodes, – boosting/bagging, – preventing overfitting, – etc. Train the Model(s)
28.
28 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Review § Review the results of your training, and start all over again! –
Consider segmentation – Try leaving out the variables with the highest sensitivity – Subdivide the data to see if there are regions of instability – Iterate as needed § Finally, select your model(s)! § But we’re not done… – Now worry about calibration, upgrade/downgrade, priming time, packaging, integration, model report, …
29.
29 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Model Performance Chart
30.
30 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Intelligent Mainframe Operations Typical Volatility Anomaly Tasks ready to be dispatched
31.
31 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Key Points for Applying Data Science § Identify a high-value Business Problem with High Quality Data §
Determine the class of the problem to solve § Utilize business-domain knowledge – Understand the "ecosystem" – Define appropriate metrics – Understand the data in full § Develop features and models / Evaluate / Iterate § Always keep the business problem in mind!
32.
32 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Recommended Sessions SESSION # TITLE
DATE/TIME SCX50S Convenience and Security for banking customers with CA Advanced Authentication 11/17/2016 at 3:00 pm SCX34S Securing Mobile Payments: Applying Lessons Learned in the Real World 11/17/2016 at 3:45 pm SCT05T Threat Analytics for Privileged Access Management 11/17/2016 at 4:30 pm
33.
33 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Don’t Miss Our INTERACTIVE Security Demo Experience! SNEAK PEEK! 33 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
34.
34 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD We Want to Hear From You! § IT Central is a leading technology review site. CA has them to help generate product reviews for our Security products. §
ITCS staff may be at this session now! (look for their shirts). If you would like to offer a product review, please ask them after the class, or go by their booth. Note: § Only takes 5-7 mins § You have total control over the review § It can be anonymous, if required
35.
35 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Questions?
36.
36 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Stay connected at communities.ca.com Thank you.
37.
37 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Security For more information on Security, please visit: http://cainc.to/EtfYyw
Télécharger maintenant