Big Data Appliance in Risk Management
|
|
- Clara Goodman
- 5 years ago
- Views:
Transcription
1 Big Data Appliance in Risk Management Erste Group Bank Jozef Zubricky Group Credit Risk Models and Methods
2 Digital data have predictive power...
3 Web Scenarios with highest predictive power Currency Conversion Information (1.3 % Defaults) Loan Consolidation Information (4.6% Defaults)
4 Simplest method is Naïve Bayes Text classification: SPAM filter messages Term-frequency matrix Class probabilities Message 3 Msg1 Msg2 Msg3 Msg1 Msg2 Msg3 Message 2 Client 3 Message 1 Your has won 2.5 million. Client 2 Client 1 sit Mozilla Consolida Macintosh your has won million Cli1 Cli2 Cli3 sit Mozilla Consolida Macintosh SPAM 90% 5% 10% HAM 10% 95% 90% The messages with high SPAM probability classified as SPAM. Text classification: Digital scoring Lists of strings Term-frequency matrix Class probabilities Cli1 Cli2 Cli3 High risk 10% 40% 90% Low risk 90% 60% 10% Probability of high risk used as an additional variable in the scorecard.
5 Not able to implement In our traditional system, due to computational speed and ever changing underlying websites
6 Big Data appliance is build for such tasks Input Column 1: IP Address Column 2: Timestamp of click Column 3: URL of Page Visited Column 4: Webpage Text Map() Key (IP Address) Value (Timestamp) Value (URL or Web Page visited) Value (Probability of Web Page being good or bad based on Webpage text and Naïve Bayes) Reduce() Shuffle and Sort Least Risky Pages Most Risky Pages Least Risky IP Addresses Most Risky IP Addresses Key(IP Address) Value (List of probabilities of all the websites visited by IP Address per user session defined by timestamps)
7 No business case... Nobody wants to finance this just for one problem like this
8 Problem: Come up data driven model. Natural experiment data
9 Why not champion challenger? It is costly Reputation Risk
10 We found 2 natural experiments In 2007 we granted for almost one month loans without considering current instalments Until 2010 we were granting foreign exchange loans in some countries Well we though we did found natural experiments...
11 We deleted data and scripts were not working For first experiment data for 2007 were no longer available For second experiment, scripts were not working across a corridor
12 We managed to... Retrieve data from old backups. Modelling itself was quite a success. We have found our relationships
13 So we set up a project called CRANE Central Place for Model Development, Monitoring and Validation Unlimited Data History, to Utilise Past Crisis Data for Model Development Automated Data Load and Post Rollout Check to Reduce Operational Problems
14 We needed cheap storage 4 Cost of Data Warehouse Appliance 3 2 Cost of Hadoop Appliance TB 20TB 30TB 40TB 50TB
15 Big Data Technology without Big Data
16 But this is how it got in Business case based on cheap storage
17 But... How to connect it to production legacy systems? What is regulatory environment?
18 Our Environment is diverse We expanded by buying banks Different legacy IT systems Central modelling team distributed across locations Not enough storage in enterprise data warehouse
19 EBA and ESMA published Regulation draft on Big Data Type: EBA ESMA big data into Google They seek comments until People who wrote it have good insight into industry
20 Main Takeaways of Risks Transparent Security Reputation Conformist Referring to other Cybersecurity and Wrong decisions, Conformist directives aimed at data protection of difficult to control, behaviour of people client ownership of Big Data solutions. exclusion of groups when they know how the data and Risk of outsourcing of clients form their data influence transparency of use services decision making etc.
21 Thank you for your attention What is your experience with Data-mart projects? Jozef Zubricky What is your experience with Big Data usage? Jozef Zubricky
Data Mining & Machine Learning F2.4DN1/F2.9DM1
Data Mining & Machine Learning F2.4DN1/F2.9DM1 Nick Taylor N.K.Taylor@hw.ac.uk Room EM1.62 Data Data Mining - Content Introduction to Data Mining What it is, Who does it and Why Data Warehousing Virtuous
More informationSOLUTION BRIEF RSA ARCHER BUSINESS RESILIENCY
RSA ARCHER BUSINESS RESILIENCY INTRODUCTION Organizations are becoming a complex tapestry of products and services, processes, technologies, third parties, employees and more. Each element adds another
More informationEvolving To The Big Data Warehouse
Evolving To The Big Data Warehouse Kevin Lancaster 1 Copyright Director, 2012, Oracle and/or its Engineered affiliates. All rights Insert Systems, Information Protection Policy Oracle Classification from
More informationNetezza The Analytics Appliance
Software 2011 Netezza The Analytics Appliance Michael Eden Information Management Brand Executive Central & Eastern Europe Vilnius 18 October 2011 Information Management 2011IBM Corporation Thought for
More informationCredit Union Cyber Crisis: Gaining Awareness and Combatting Cyber Threats Without Breaking the Bank
Credit Union Cyber Crisis: Gaining Awareness and Combatting Cyber Threats Without Breaking the Bank Introduction The 6,331 credit unions in the United States face a unique challenge when it comes to cybersecurity.
More informationCyber Security: Threat and Prevention
Expand Your Horizons Webinar Series Cyber Security: Threat and Prevention February 24, 2015 1:00 1:45pm The Webinar will begin shortly. You can ask a question in the box on the right hand side. We will
More informationImproving the ROI of Your Data Warehouse
Improving the ROI of Your Data Warehouse Many organizations are struggling with a straightforward but challenging problem: their data warehouse can t affordably house all of their data and simultaneously
More informationThis tutorial will help computer science graduates to understand the basic-to-advanced concepts related to data warehousing.
About the Tutorial A data warehouse is constructed by integrating data from multiple heterogeneous sources. It supports analytical reporting, structured and/or ad hoc queries and decision making. This
More informationMoving Digital Identity to the Cloud, a Fundamental Shift in rethinking the enterprise collaborative model.
TEG Progress Update Moving Digital Identity to the Cloud, a Fundamental Shift in rethinking the enterprise collaborative model. Fulup Ar Foll Master Architect Sun Microsystems Fulup@sun.com 1 What is the
More informationBUILD BETTER MICROSOFT SQL SERVER SOLUTIONS Sales Conversation Card
OVERVIEW SALES OPPORTUNITY Lenovo Database Solutions for Microsoft SQL Server bring together the right mix of hardware infrastructure, software, and services to optimize a wide range of data warehouse
More informationJAVASCRIPT CHARTING. Scaling for the Enterprise with Metric Insights Copyright Metric insights, Inc.
JAVASCRIPT CHARTING Scaling for the Enterprise with Metric Insights 2013 Copyright Metric insights, Inc. A REVOLUTION IS HAPPENING... 3! Challenges... 3! Borrowing From The Enterprise BI Stack... 4! Visualization
More informationAutomated Context and Incident Response
Technical Brief Automated Context and Incident Response www.proofpoint.com Incident response requires situational awareness of the target, his or her environment, and the attacker. However, security alerts
More informationMassive Scalability With InterSystems IRIS Data Platform
Massive Scalability With InterSystems IRIS Data Platform Introduction Faced with the enormous and ever-growing amounts of data being generated in the world today, software architects need to pay special
More informationwhitepaper How to Measure, Report On, and Actually Reduce Vulnerability Risk
whitepaper How to Measure, Report On, and Actually Reduce Vulnerability Risk Assure the board your company won t be the next data breach Introduction A solid vulnerability management program is critical
More informationDATA MINING TRANSACTION
DATA MINING Data Mining is the process of extracting patterns from data. Data mining is seen as an increasingly important tool by modern business to transform data into an informational advantage. It is
More informationEBOOK. Stopping Fraud. How Proofpoint Helps Protect Your Organization from Impostors, Phishers and Other Non-Malware Threats.
EBOOK Stopping Email Fraud How Proofpoint Helps Protect Your Organization from Impostors, Phishers and Other Non-Malware Threats www.proofpoint.com EBOOK Stopping Email Fraud 2 Today s email attacks have
More informationRisk: Security s New Compliance. Torsten George VP Worldwide Marketing and Products, Agiliance Professional Strategies - S23
Risk: Security s New Compliance Torsten George VP Worldwide Marketing and Products, Agiliance Professional Strategies - S23 Agenda Market Dynamics Organizational Challenges Risk: Security s New Compliance
More informationTexas Death Row. Last Statements. Data Warehousing and Data Mart. By Group 16. Irving Rodriguez Joseph Lai Joe Martinez
Texas Death Row Last Statements Data Warehousing and Data Mart By Group 16 Irving Rodriguez Joseph Lai Joe Martinez Introduction For our data warehousing and data mart project we chose to use the Texas
More informationBoost your Analytics with Machine Learning for SQL Nerds. Julie mssqlgirl.com
Boost your Analytics with Machine Learning for SQL Nerds Julie Koesmarno @MsSQLGirl mssqlgirl.com 1. Y ML 2. Operationalizing ML 3. Tips & Tricks 4. Resources automation delighting customers Deepen Engagement
More informationWayward Wi-Fi. How Rogue Hotspots Can Hijack Your Data and Put Your Mobile Devices at Risk
Wayward Wi-Fi How Rogue Hotspots Can Hijack Your Data and Put Your Mobile Devices at Risk 288 MILLION There are more than 288 million unique Wi-Fi networks worldwide. Source: Wireless Geographic Logging
More informationREVENUE REPORTING DASHBOARD FOR A HOTEL GROUP
REVENUE REPORTING DASHBOARD FOR A HOTEL GROUP THE CLIENT PROBLEM Our client, an international hotel chain, wanted to create a completely automated performance evaluation engine for ancillary products.
More informationPrivate cloud for business
Private cloud for business Your IT Everywhere, Always. Executive summary The business challenge of IT The evolution in IT has resulted in extreme specialization that reaches into all areas of business.
More informationIntroduction to Hadoop. Owen O Malley Yahoo!, Grid Team
Introduction to Hadoop Owen O Malley Yahoo!, Grid Team owen@yahoo-inc.com Who Am I? Yahoo! Architect on Hadoop Map/Reduce Design, review, and implement features in Hadoop Working on Hadoop full time since
More informationNPP & Blockchain Have you thought about the data? Ken Krupa, CTO, MarkLogic
NPP & Blockchain Have you thought about the data? Ken Krupa, CTO, MarkLogic Hello SLIDE: 2 14 COPYRIGHT November 2017 MARKLOGIC CORPORATION. ALL RIGHTS RESERVED. A QUICK LOOK New Payments Platform Open
More informationwith Advanced Protection
with Advanced Email Protection OVERVIEW Today s sophisticated threats are changing. They re multiplying. They re morphing into new variants. And they re targeting people, not just technology. As organizations
More informationMATT JONES HOW WHATSAPP REDUCED SPAM WHILE LAUNCHING END-TO-END ENCRYPTION
MATT JONES HOW WHATSAPP REDUCED SPAM WHILE LAUNCHING END-TO-END ENCRYPTION MATT JONES HOW WHATSAPP REDUCED SPAM WHILE LAUNCHING END-TO-END ENCRYPTION MATT JONES HOW WHATSAPP REDUCED SPAM WHILE LAUNCHING
More informationData Migration Platform
appmigrate TM Data Migration Platform QUALITY MANAGEMENT RECONCILIATION MAINTENANCE MIGRATION PROFILING COEXISTENCE CUTOVER PLANNING AND EXECUTION ? Problem Data migration done in the traditional way,
More informationCONSOLIDATING RISK MANAGEMENT AND REGULATORY COMPLIANCE APPLICATIONS USING A UNIFIED DATA PLATFORM
CONSOLIDATING RISK MANAGEMENT AND REGULATORY COMPLIANCE APPLICATIONS USING A UNIFIED PLATFORM Executive Summary Financial institutions have implemented and continue to implement many disparate applications
More informationSales and Marketing Strategies That Work for Financial Services
March 2008 Sales and Marketing Strategies That Work for Financial Services Julio Gomez Research Vice President www.financial-insights.com Agenda! Introduction to Financial Insights! Elements of a Winning
More informationMOBIUS + ARKIVY the enterprise solution for MIFID2 record keeping
+ Solution at a Glance IS A ROBUST AND SCALABLE ENTERPRISE CONTENT ARCHIVING AND MANAGEMENT SYSTEM. PAIRED WITH THE DIGITAL CONTENT GATEWAY, YOU GET A UNIFIED CONTENT ARCHIVING AND INFORMATION GOVERNANCE
More informationComparative analysis of data mining methods for predicting credit default probabilities in a retail bank portfolio
Comparative analysis of data mining methods for predicting credit default probabilities in a retail bank portfolio Adela Ioana Tudor, Adela Bâra, Simona Vasilica Oprea Department of Economic Informatics
More informationDivide & Recombine (D&R) with Tessera: High Performance Computing for Data Analysis.
1 Divide & Recombine (D&R) with Tessera: High Performance Computing for Data Analysis www.tessera.io Big Data? 2 A big term An associated concept new computational methods and systems are needed to make
More informationHow to develop a website content evaluation plan
How to develop a website content evaluation plan Realistically, content evaluation isn t a top priority for website owners. Finding the time to produce new content is hard enough. But we are missing a
More informationBisnode View Why is it so damn hard to piece together information across the enterprise?
Bisnode View Why is it so damn hard to piece together information across the enterprise? By Pär Österlund Why is it so damn hard to piece together information across the enterprise? By Pär Österlund Creating
More informationInformatica Data Quality Product Family
Brochure Informatica Product Family Deliver the Right Capabilities at the Right Time to the Right Users Benefits Reduce risks by identifying, resolving, and preventing costly data problems Enhance IT productivity
More informationRegulation and Innovation: The Experience of Regulating Kenya s M-Pesa
Regulation and Innovation: The Experience of Regulating Kenya s M-Pesa Njuguna Ndung u 2018 Annual Conference of the Cambridge Centre for Alternative Finance (CCAF): Reimagining Alternative Finance: Global
More informationManaging Data Resources
Chapter 7 OBJECTIVES Describe basic file organization concepts and the problems of managing data resources in a traditional file environment Managing Data Resources Describe how a database management system
More informationHow Real Time Are Your Analytics?
How Real Time Are Your Analytics? Min Xiao Solutions Architect, VoltDB Table of Contents Your Big Data Analytics.... 1 Turning Analytics into Real Time Decisions....2 Bridging the Gap...3 How VoltDB Helps....4
More informationSecurity analytics: From data to action Visual and analytical approaches to detecting modern adversaries
Security analytics: From data to action Visual and analytical approaches to detecting modern adversaries Chris Calvert, CISSP, CISM Director of Solutions Innovation Copyright 2013 Hewlett-Packard Development
More informationREGULATORY REPORTING FOR FINANCIAL SERVICES
REGULATORY REPORTING FOR FINANCIAL SERVICES Gordon Hughes, Global Sales Director, Intel Corporation Sinan Baskan, Solutions Director, Financial Services, MarkLogic Corporation Many regulators and regulations
More informationSymantec Enterprise Vault
Store, Manage, and Discover Critical Business Information The pressure on organizations to protect and manage data has intensified with the recent growth in unstructured data and the reliance on email
More informationWhat s New in Dealmaker Winter 14?
What s New in Dealmaker Winter 14? Dealmaker Winter 14 contains significant improvements and enhancements to Smart Account Manager to provide a more powerful, easy-to-use account management solution. This
More informationMachine-Powered Learning for People-Centered Security
White paper Machine-Powered Learning for People-Centered Security Protecting Email with the Proofpoint Stateful Composite Scoring Service www.proofpoint.com INTRODUCTION: OUTGUNNED AND OVERWHELMED Today
More informationFIBO Operational Ontologies Briefing for the Object Management Group
FIBO Operational Ontologies Briefing for the Object Management Group March 20, 2013, Reston, VA David Newman Strategic Planning Manager, Senior Vice President, Enterprise Architecture Chair, Semantic Technology
More informationDisruptive Technologies Legal and Regulatory Aspects. 16 May 2017 Investment Summit - Swiss Gobal Enterprise
Disruptive Technologies Legal and Regulatory Aspects 16 May 2017 Investment Summit - Swiss Gobal Enterprise Legal and Regulatory Framework in Switzerland Legal and regulatory Framework: no laws or provisions
More informationVillage Software. Security Assessment Report
Village Software Security Assessment Report Version 1.0 January 25, 2019 Prepared by Manuel Acevedo Helpful Village Security Assessment Report! 1 of! 11 Version 1.0 Table of Contents Executive Summary
More informationSentryWire Next generation packet capture and network security.
Next generation packet capture and network security. 1 The data landscape 5 big cyber security trends for 2018 More data, more danger. Data proliferation brings many new opportunities but also many downsides:
More informationSentryWire Next generation packet capture and network security.
Next generation packet capture and network security. 1 The data landscape More data, more danger. Data proliferation brings many new opportunities but also many downsides: more data breaches, more sophisticated
More informationVOLTDB + HP VERTICA. page
VOLTDB + HP VERTICA ARCHITECTURE FOR FAST AND BIG DATA ARCHITECTURE FOR FAST + BIG DATA FAST DATA Fast Serve Analytics BIG DATA BI Reporting Fast Operational Database Streaming Analytics Columnar Analytics
More informationEBOOK. Stopping Fraud. How Proofpoint Helps Protect Your Organisation from Impostors, Phishers and Other Non-Malware Threats.
EBOOK Stopping Email Fraud How Proofpoint Helps Protect Your Organisation from Impostors, Phishers and Other Non-Malware Threats www.proofpoint.com EBOOK Stopping Email Fraud 2 Today s email attacks have
More informationVisual Workflow Implementation Guide
Version 30.0: Spring 14 Visual Workflow Implementation Guide Note: Any unreleased services or features referenced in this or other press releases or public statements are not currently available and may
More informationSummer 2010 Research Project. Spam Filtering by Text Classification. Manoj Reddy Advisor: Dr. Behrang Mohit
Summer 2010 Research Project Spam Filtering by Text Classification Manoj Reddy Advisor: Dr. Behrang Mohit NLP Field of Computer Science and Linguistics concerned with interactions between computers and
More informationAnalytics Driven, Simple, Accurate and Actionable Cyber Security Solution CYBER ANALYTICS
Analytics Driven, Simple, Accurate and Actionable Cyber Security Solution CYBER ANALYTICS Overview Cyberattacks are increasingly getting more frequent, more sophisticated and more widespread than ever
More informationNETACEA / WHITE PAPER DNS VS JAVASCRIPT
NETACEA / WHITE PAPER DNS VS JAVASCRIPT DNS VS JAVASCRIPT FOREWORD BACKGROUND ENTERPRISE GRADE VIRTUAL WAITING ROOM THE ALTERNATIVES SUMMARY ABOUT THE NETACEA VIRTUAL WAITING ROOM FOREWORD Visual Diagram
More informationImperva Incapsula Website Security
Imperva Incapsula Website Security DA T A SH E E T Application Security from the Cloud Imperva Incapsula cloud-based website security solution features the industry s leading WAF technology, as well as
More informationRole of search in retail banking. Analysis of current account usage and application in Italy APRIL JUNE 2011
Role of search in retail banking Analysis of current account usage and application in Italy APRIL JUNE 2011 OBJECTIVES Map the role of search in current account usage and the application process in the
More informationFast Innovation requires Fast IT
Fast Innovation requires Fast IT Cisco Data Virtualization Puneet Kumar Bhugra Business Solutions Manager 1 Challenge In Data, Big Data & Analytics Siloed, Multiple Sources Business Outcomes Business Opportunity:
More informationWild Mushrooms Classification Edible or Poisonous
Wild Mushrooms Classification Edible or Poisonous Yulin Shen ECE 539 Project Report Professor: Hu Yu Hen 2013 Fall ( I allow code to be released in the public domain) pg. 1 Contents Introduction. 3 Practicality
More informationAdministration of Symantec Messaging Gateway 10.5 Study Guide
Administration of Symantec Messaging Gateway Study Guide The following tables list the Symantec SCS Certification exam objectives for the Administration of Symantec Messaging Gateway exam and how these
More informationSearch Engine Optimization. Presentation Overview 1/7/2014. Internet Marketing Reality Check: Discover the Techniques Proven to Increase Leads
Internet Marketing Reality Check: Discover the Techniques Proven to Increase Leads FEBRUARY 6, 2014 10:00 11:00 AM Presenter: Chris Behan // Socius Marketing, Tampa, FL Presentation Overview Search Engine
More informationMicrosoft Developer Day
Microsoft Developer Day Pradeep Menon Microsoft Developer Day Solutions Architect Agenda Microsoft Developer Day Traditional Business Intelligence Architecture Structured Sources Extract Transform Structurize
More informationCisco s Appliance-based Content Security: IronPort and Web Security
Cisco s Appliance-based Content Security: IronPort E-mail and Web Security Hrvoje Dogan Consulting Systems Engineer, Security, Emerging Markets East 2010 Cisco and/or its affiliates. All rights reserved.
More informationSEO Toolkit Keyword and Competitor Research and On Page Optimisation
SEO Toolkit Keyword and Competitor Research and On Page Optimisation Marketing & Public Relations Department University of Newcastle February 2013 Version 1.0 SEO Toolkit Contents What is SEO? and the
More informationIntroducing Microsoft SQL Server 2016 R Services. Julian Lee Advanced Analytics Lead Global Black Belt Asia Timezone
Introducing Microsoft SQL Server 2016 R Services Julian Lee Advanced Analytics Lead Global Black Belt Asia Timezone SQL Server 2016: Everything built-in built-in built-in built-in built-in built-in $2,230
More information1 GOOGLE NOW ALLOWS EDITING BUSINESS LISTINGS
1 GOOGLE NOW ALLOWS EDITING BUSINESS LISTINGS DIRECTLY FROM THE SEARCH RESULTS If you area verified business in Google My Business, you can now update your business info directly from Google search engine
More informationISUPPLIER PORTAL USER MANUAL ADERP VERSION 1.0
ISUPPLIER PORTAL USER MANUAL ADERP VERSION 1.0 Contents Contents... i Oracle isupplier Portal Overview...1 Recommended Browsers and Settings...2 Advanced Settings...2 Turn-off pop-up blocker or Allow pop-up
More informationNetBanking Manage your finances by clicking and not by walking to the branch, from any computer with internet access.
NetBanking Manage your finances by clicking and not by walking to the branch, from any computer with internet access. Preuzmite besplatnu aplikaciju sa: GET IT ON ili Available on the NetBanking Access
More informationMining Web Data. Lijun Zhang
Mining Web Data Lijun Zhang zlj@nju.edu.cn http://cs.nju.edu.cn/zlj Outline Introduction Web Crawling and Resource Discovery Search Engine Indexing and Query Processing Ranking Algorithms Recommender Systems
More informationA BETTER PATH: Security Enlightened. Security s Shift to the Cloud
A BETTER PATH: Security Enlightened Security s Shift to the Cloud Defense in Doubt Enterprises may be growing increasingly conscious of cybersecurity risks and investing millions of dollars in IT security,
More informationIMPLEMENTING SECURITY, PRIVACY, AND FAIR DATA USE PRINCIPLES
IMPLEMENTING SECURITY, PRIVACY, AND FAIR DATA USE PRINCIPLES Introductions Agenda Overall data risk and benefit landscape / shifting risk and opportunity landscape and market expectations Looking at data
More informationDeep Learning & Accelerating the NLP Journey in the Unstructured World
Deep Learning & Accelerating the NLP Journey in the Unstructured World Jenny Chong, Global Head of ecommunications Surveillance Shahzad Chohan, Global Head of Machine Intelligence and Accelerated Computing
More informationMOBILE DEFEND. Powering Robust Mobile Security Solutions
MOBILE DEFEND Powering Robust Mobile Security Solutions Table of Contents Introduction Trustlook SECURE ai Mobile Defend Who Uses SECURE ai Mobile Defend? How it Works o Mobile Device Risk Score o Mobile
More informationQ-Balancer Range FAQ The Q-Balance LB Series General Sales FAQ
Q-Balancer Range FAQ The Q-Balance LB Series The Q-Balance Balance Series is designed for Small and medium enterprises (SMEs) to provide cost-effective solutions for link resilience and load balancing
More informationData Warehouses Chapter 12. Class 10: Data Warehouses 1
Data Warehouses Chapter 12 Class 10: Data Warehouses 1 OLTP vs OLAP Operational Database: a database designed to support the day today transactions of an organization Data Warehouse: historical data is
More informationBig Data: From Transactions, To Interactions
Big Data: From Transactions, To Interactions Martin Willcox [@willcoxmnk], Director Big Data Centre of Excellence (Teradata International) April 2016 1 Agenda Beyond transactions Riding the three waves:
More informationData Quality Architecture and Options
Data Quality Architecture and Options Nita Khare Alliances & Technology Team - Solution Architect nita.khare@tcs.com * IBM IM Champion 2013 * December 3, 2013 0 Agenda Pain Areas / Challenges of DQ Solution
More informationBROWSER POLICY: DESCRIPTION OF SUPPORT 2 SUPPORTED BROWSERS 2 TIER 2 SUPPORTED BROWSERS 2 UNSUPPORTED BROWSERS 2
Browser Policy June 2016 Table of Contents BROWSER POLICY: DESCRIPTION OF SUPPORT 2 SUPPORTED BROWSERS 2 TIER 1 SUPPORTED BROWSERS 2 TIER 2 SUPPORTED BROWSERS 2 UNSUPPORTED BROWSERS 2 SCOPE OF APPLICABILITY
More informationUsing Internet as a Data Source for Official Statistics: a Comparative Analysis of Web Scraping Technologies
NTTS 2015 Session 6A - Big data sources: web scraping and smart meters Using Internet as a Data Source for Official Statistics: a Comparative Analysis of Web Scraping Technologies Giulio Barcaroli(*) (barcarol@istat.it),
More informationData safety for digital business. Veritas Backup Exec WHITE PAPER. One solution for hybrid, physical, and virtual environments.
WHITE PAPER Data safety for digital business. One solution for hybrid, physical, and virtual environments. It s common knowledge that the cloud plays a critical role in helping organizations accomplish
More informationFine-Grained Access Control
Secure your sensitive information Fine-Grained Access Control 2 Serving financial institutions, federal agencies, pharmaceutical companies, payment service providers, insurers, broadcasting companies,
More informationSpam Detection ECE 539 Fall 2013 Ethan Grefe. For Public Use
Email Detection ECE 539 Fall 2013 Ethan Grefe For Public Use Introduction email is sent out in large quantities every day. This results in email inboxes being filled with unwanted and inappropriate messages.
More informationChapter 6 VIDEO CASES
Chapter 6 Foundations of Business Intelligence: Databases and Information Management VIDEO CASES Case 1a: City of Dubuque Uses Cloud Computing and Sensors to Build a Smarter, Sustainable City Case 1b:
More informationSecurity and Compliance for Office 365
Security and Compliance for Office 365 [Proofpoint has] given us our time back to focus on the really evil stuff. CISO, Global 500 Manufacturer Like millions of businesses around the world, you may be
More informationBigDataBench: a Benchmark Suite for Big Data Application
BigDataBench: a Benchmark Suite for Big Data Application Wanling Gao Institute of Computing Technology, Chinese Academy of Sciences HVC tutorial in conjunction with The 19th IEEE International Symposium
More informationMay 4, :00 3:00pm ET
The Plague of Spreadsheet Fraud and How to Address It May 4, 2010 2:00 3:00pm ET Technical Support# 1-800-xxx-xxxx Welcome Agenda Speaker Ralph Baxter, Founder and CEO, ClusterSeven Agenda 1. Why is spreadsheet
More informationThe Changing DNS Market: A Technical Perspective
The Changing DNS Market: A Technical Perspective Johan Ihrén Netnod October 6, 2016 Netnod Customer Mtg, October 6, 2016, Changing DNS Market: A Tech Perspective, johani@netnod.se 1 / 15 Introduction When
More informationThe European Single Electronic Format (ESEF) Requirements for reporting entities overview of the draft regulatory standard (RTS)
ESMA REGULAR USE 19 November 2018 The European Single Electronic Format (ESEF) Requirements for reporting entities overview of the draft regulatory standard (RTS) Anna Sciortino ESEF Mandate for ESMA ESMA
More informationWIN BACK YOUR CUSTOMERS! A guide to re-engaging your inactive subscribers
WIN BACK YOUR CUSTOMERS! A guide to re-engaging your inactive email subscribers Table of contents Win back your customers! 1 Is your brand capturing your disengaged and hard-to-reach customers? 1 Who are
More informationThe Challenge of Managing
The Challenge of Managing E-Mail Marc Pfeiffer, Deputy Director Division of Local Government Services League of Municipalities 2008 Annual Conference November 19, 2008 The E-Mail Rant There is too much
More informationShort review of the Coinmama.com. Registration on the Coinmama
Short review of the Coinmama.com Coinmama is not an exchange in its' usual sense. Here you can only buy currency, so its' more like a currency exchanger. The platform doesn t have the built-in wallet and
More informationIntroduction to Data Science Day 2
Introduction to Data Science Day 2 Data Matters Summer workshop series in data science Sponsored by the Odum Institute, RENCI, and NCDS Thomas M. Carsey carsey@unc.edu Examples of Data Science Google Flu
More informationSIEM Product Comparison
SIEM Product Comparison SIEM Technology Space SIEM market analysis of the last 3 years suggest: Market consolidation of SIEM players (25 vendors in 2011 to 16 vendors in 2013) Only products with technology
More informationRISK MANAGEMENT Education and Certification
RISK MANAGEMENT Education and Certification aba.com/risked 1-800-BANKERS A new type of risk management professional is now in demand one that can demonstrate a thorough understanding of the complexities
More informationADERP ISUPPLIER PORTAL USER MANUAL VERSION 1.2
ADERP ISUPPLIER PORTAL USER MANUAL VERSION 1.2 Document Control Change Record 4 Date Author Version Change Reference 12-Dec-2016 DOF 1.0 08-Feb-2017 DOF 1.1 Updated with new URL links 23-Mar-2017 DOF 1.2
More informationCOST PER LEAD ADVERTISING BY THE NUMBERS 10 Steps That Will Transform Your Acquisition Process
COST PER LEAD ADVERTISING BY THE NUMBERS 10 Steps That Will Transform Your Acquisition Process Whitepaper by: Steve Rafferty - Founder/CEO ActiveProspect Running a Cost Per Lead advertising campaign seems
More informationContractual Approaches to Data Protection in Clinical Research Projects
Contractual Approaches to Data Protection in Clinical Research Projects EICAR, 24th Annual Conference Nürnberg, October 2016 Dr. jur. Marc Stauch Institute for Legal Informatics Leibniz Universität Hannover
More informationHow a Metadata Repository enables dynamism and automation in SDTM-like dataset generation
Paper DH05 How a Metadata Repository enables dynamism and automation in SDTM-like dataset generation Judith Goud, Akana, Bennekom, The Netherlands Priya Shetty, Intelent, Princeton, USA ABSTRACT The traditional
More informationIdentifying Important Communications
Identifying Important Communications Aaron Jaffey ajaffey@stanford.edu Akifumi Kobashi akobashi@stanford.edu Abstract As we move towards a society increasingly dependent on electronic communication, our
More informationCS 188: Artificial Intelligence Fall 2011
CS 188: Artificial Intelligence Fall 2011 Lecture 21: ML: Naïve Bayes 11/10/2011 Dan Klein UC Berkeley Example: Spam Filter Input: email Output: spam/ham Setup: Get a large collection of example emails,
More informationBuying Names: Append, List Rental + Co-Registration Realities
Buying Email Names: Append, List Rental + Co-Registration Realities More data on this topic available from:: Patricia Maguire Director of Marketing Entertainment Publications Tuesday, March 6, 2007 Entertainment
More information