Big Data Appliance in Risk Management

Size: px
Start display at page:

Download "Big Data Appliance in Risk Management"

Transcription

1 Big Data Appliance in Risk Management Erste Group Bank Jozef Zubricky Group Credit Risk Models and Methods

2 Digital data have predictive power...

3 Web Scenarios with highest predictive power Currency Conversion Information (1.3 % Defaults) Loan Consolidation Information (4.6% Defaults)

4 Simplest method is Naïve Bayes Text classification: SPAM filter messages Term-frequency matrix Class probabilities Message 3 Msg1 Msg2 Msg3 Msg1 Msg2 Msg3 Message 2 Client 3 Message 1 Your has won 2.5 million. Client 2 Client 1 sit Mozilla Consolida Macintosh your has won million Cli1 Cli2 Cli3 sit Mozilla Consolida Macintosh SPAM 90% 5% 10% HAM 10% 95% 90% The messages with high SPAM probability classified as SPAM. Text classification: Digital scoring Lists of strings Term-frequency matrix Class probabilities Cli1 Cli2 Cli3 High risk 10% 40% 90% Low risk 90% 60% 10% Probability of high risk used as an additional variable in the scorecard.

5 Not able to implement In our traditional system, due to computational speed and ever changing underlying websites

6 Big Data appliance is build for such tasks Input Column 1: IP Address Column 2: Timestamp of click Column 3: URL of Page Visited Column 4: Webpage Text Map() Key (IP Address) Value (Timestamp) Value (URL or Web Page visited) Value (Probability of Web Page being good or bad based on Webpage text and Naïve Bayes) Reduce() Shuffle and Sort Least Risky Pages Most Risky Pages Least Risky IP Addresses Most Risky IP Addresses Key(IP Address) Value (List of probabilities of all the websites visited by IP Address per user session defined by timestamps)

7 No business case... Nobody wants to finance this just for one problem like this

8 Problem: Come up data driven model. Natural experiment data

9 Why not champion challenger? It is costly Reputation Risk

10 We found 2 natural experiments In 2007 we granted for almost one month loans without considering current instalments Until 2010 we were granting foreign exchange loans in some countries Well we though we did found natural experiments...

11 We deleted data and scripts were not working For first experiment data for 2007 were no longer available For second experiment, scripts were not working across a corridor

12 We managed to... Retrieve data from old backups. Modelling itself was quite a success. We have found our relationships

13 So we set up a project called CRANE Central Place for Model Development, Monitoring and Validation Unlimited Data History, to Utilise Past Crisis Data for Model Development Automated Data Load and Post Rollout Check to Reduce Operational Problems

14 We needed cheap storage 4 Cost of Data Warehouse Appliance 3 2 Cost of Hadoop Appliance TB 20TB 30TB 40TB 50TB

15 Big Data Technology without Big Data

16 But this is how it got in Business case based on cheap storage

17 But... How to connect it to production legacy systems? What is regulatory environment?

18 Our Environment is diverse We expanded by buying banks Different legacy IT systems Central modelling team distributed across locations Not enough storage in enterprise data warehouse

19 EBA and ESMA published Regulation draft on Big Data Type: EBA ESMA big data into Google They seek comments until People who wrote it have good insight into industry

20 Main Takeaways of Risks Transparent Security Reputation Conformist Referring to other Cybersecurity and Wrong decisions, Conformist directives aimed at data protection of difficult to control, behaviour of people client ownership of Big Data solutions. exclusion of groups when they know how the data and Risk of outsourcing of clients form their data influence transparency of use services decision making etc.

21 Thank you for your attention What is your experience with Data-mart projects? Jozef Zubricky What is your experience with Big Data usage? Jozef Zubricky

Data Mining & Machine Learning F2.4DN1/F2.9DM1

Data Mining & Machine Learning F2.4DN1/F2.9DM1 Data Mining & Machine Learning F2.4DN1/F2.9DM1 Nick Taylor N.K.Taylor@hw.ac.uk Room EM1.62 Data Data Mining - Content Introduction to Data Mining What it is, Who does it and Why Data Warehousing Virtuous

More information

SOLUTION BRIEF RSA ARCHER BUSINESS RESILIENCY

SOLUTION BRIEF RSA ARCHER BUSINESS RESILIENCY RSA ARCHER BUSINESS RESILIENCY INTRODUCTION Organizations are becoming a complex tapestry of products and services, processes, technologies, third parties, employees and more. Each element adds another

More information

Evolving To The Big Data Warehouse

Evolving To The Big Data Warehouse Evolving To The Big Data Warehouse Kevin Lancaster 1 Copyright Director, 2012, Oracle and/or its Engineered affiliates. All rights Insert Systems, Information Protection Policy Oracle Classification from

More information

Netezza The Analytics Appliance

Netezza The Analytics Appliance Software 2011 Netezza The Analytics Appliance Michael Eden Information Management Brand Executive Central & Eastern Europe Vilnius 18 October 2011 Information Management 2011IBM Corporation Thought for

More information

Credit Union Cyber Crisis: Gaining Awareness and Combatting Cyber Threats Without Breaking the Bank

Credit Union Cyber Crisis: Gaining Awareness and Combatting Cyber Threats Without Breaking the Bank Credit Union Cyber Crisis: Gaining Awareness and Combatting Cyber Threats Without Breaking the Bank Introduction The 6,331 credit unions in the United States face a unique challenge when it comes to cybersecurity.

More information

Cyber Security: Threat and Prevention

Cyber Security: Threat and Prevention Expand Your Horizons Webinar Series Cyber Security: Threat and Prevention February 24, 2015 1:00 1:45pm The Webinar will begin shortly. You can ask a question in the box on the right hand side. We will

More information

Improving the ROI of Your Data Warehouse

Improving the ROI of Your Data Warehouse Improving the ROI of Your Data Warehouse Many organizations are struggling with a straightforward but challenging problem: their data warehouse can t affordably house all of their data and simultaneously

More information

This tutorial will help computer science graduates to understand the basic-to-advanced concepts related to data warehousing.

This tutorial will help computer science graduates to understand the basic-to-advanced concepts related to data warehousing. About the Tutorial A data warehouse is constructed by integrating data from multiple heterogeneous sources. It supports analytical reporting, structured and/or ad hoc queries and decision making. This

More information

Moving Digital Identity to the Cloud, a Fundamental Shift in rethinking the enterprise collaborative model.

Moving Digital Identity to the Cloud, a Fundamental Shift in rethinking the enterprise collaborative model. TEG Progress Update Moving Digital Identity to the Cloud, a Fundamental Shift in rethinking the enterprise collaborative model. Fulup Ar Foll Master Architect Sun Microsystems Fulup@sun.com 1 What is the

More information

BUILD BETTER MICROSOFT SQL SERVER SOLUTIONS Sales Conversation Card

BUILD BETTER MICROSOFT SQL SERVER SOLUTIONS Sales Conversation Card OVERVIEW SALES OPPORTUNITY Lenovo Database Solutions for Microsoft SQL Server bring together the right mix of hardware infrastructure, software, and services to optimize a wide range of data warehouse

More information

JAVASCRIPT CHARTING. Scaling for the Enterprise with Metric Insights Copyright Metric insights, Inc.

JAVASCRIPT CHARTING. Scaling for the Enterprise with Metric Insights Copyright Metric insights, Inc. JAVASCRIPT CHARTING Scaling for the Enterprise with Metric Insights 2013 Copyright Metric insights, Inc. A REVOLUTION IS HAPPENING... 3! Challenges... 3! Borrowing From The Enterprise BI Stack... 4! Visualization

More information

Automated Context and Incident Response

Automated Context and Incident Response Technical Brief Automated Context and Incident Response www.proofpoint.com Incident response requires situational awareness of the target, his or her environment, and the attacker. However, security alerts

More information

Massive Scalability With InterSystems IRIS Data Platform

Massive Scalability With InterSystems IRIS Data Platform Massive Scalability With InterSystems IRIS Data Platform Introduction Faced with the enormous and ever-growing amounts of data being generated in the world today, software architects need to pay special

More information

whitepaper How to Measure, Report On, and Actually Reduce Vulnerability Risk

whitepaper How to Measure, Report On, and Actually Reduce Vulnerability Risk whitepaper How to Measure, Report On, and Actually Reduce Vulnerability Risk Assure the board your company won t be the next data breach Introduction A solid vulnerability management program is critical

More information

DATA MINING TRANSACTION

DATA MINING TRANSACTION DATA MINING Data Mining is the process of extracting patterns from data. Data mining is seen as an increasingly important tool by modern business to transform data into an informational advantage. It is

More information

EBOOK. Stopping Fraud. How Proofpoint Helps Protect Your Organization from Impostors, Phishers and Other Non-Malware Threats.

EBOOK. Stopping  Fraud. How Proofpoint Helps Protect Your Organization from Impostors, Phishers and Other Non-Malware Threats. EBOOK Stopping Email Fraud How Proofpoint Helps Protect Your Organization from Impostors, Phishers and Other Non-Malware Threats www.proofpoint.com EBOOK Stopping Email Fraud 2 Today s email attacks have

More information

Risk: Security s New Compliance. Torsten George VP Worldwide Marketing and Products, Agiliance Professional Strategies - S23

Risk: Security s New Compliance. Torsten George VP Worldwide Marketing and Products, Agiliance Professional Strategies - S23 Risk: Security s New Compliance Torsten George VP Worldwide Marketing and Products, Agiliance Professional Strategies - S23 Agenda Market Dynamics Organizational Challenges Risk: Security s New Compliance

More information

Texas Death Row. Last Statements. Data Warehousing and Data Mart. By Group 16. Irving Rodriguez Joseph Lai Joe Martinez

Texas Death Row. Last Statements. Data Warehousing and Data Mart. By Group 16. Irving Rodriguez Joseph Lai Joe Martinez Texas Death Row Last Statements Data Warehousing and Data Mart By Group 16 Irving Rodriguez Joseph Lai Joe Martinez Introduction For our data warehousing and data mart project we chose to use the Texas

More information

Boost your Analytics with Machine Learning for SQL Nerds. Julie mssqlgirl.com

Boost your Analytics with Machine Learning for SQL Nerds. Julie mssqlgirl.com Boost your Analytics with Machine Learning for SQL Nerds Julie Koesmarno @MsSQLGirl mssqlgirl.com 1. Y ML 2. Operationalizing ML 3. Tips & Tricks 4. Resources automation delighting customers Deepen Engagement

More information

Wayward Wi-Fi. How Rogue Hotspots Can Hijack Your Data and Put Your Mobile Devices at Risk

Wayward Wi-Fi. How Rogue Hotspots Can Hijack Your Data and Put Your Mobile Devices at Risk Wayward Wi-Fi How Rogue Hotspots Can Hijack Your Data and Put Your Mobile Devices at Risk 288 MILLION There are more than 288 million unique Wi-Fi networks worldwide. Source: Wireless Geographic Logging

More information

REVENUE REPORTING DASHBOARD FOR A HOTEL GROUP

REVENUE REPORTING DASHBOARD FOR A HOTEL GROUP REVENUE REPORTING DASHBOARD FOR A HOTEL GROUP THE CLIENT PROBLEM Our client, an international hotel chain, wanted to create a completely automated performance evaluation engine for ancillary products.

More information

Private cloud for business

Private cloud for business Private cloud for business Your IT Everywhere, Always. Executive summary The business challenge of IT The evolution in IT has resulted in extreme specialization that reaches into all areas of business.

More information

Introduction to Hadoop. Owen O Malley Yahoo!, Grid Team

Introduction to Hadoop. Owen O Malley Yahoo!, Grid Team Introduction to Hadoop Owen O Malley Yahoo!, Grid Team owen@yahoo-inc.com Who Am I? Yahoo! Architect on Hadoop Map/Reduce Design, review, and implement features in Hadoop Working on Hadoop full time since

More information

NPP & Blockchain Have you thought about the data? Ken Krupa, CTO, MarkLogic

NPP & Blockchain Have you thought about the data? Ken Krupa, CTO, MarkLogic NPP & Blockchain Have you thought about the data? Ken Krupa, CTO, MarkLogic Hello SLIDE: 2 14 COPYRIGHT November 2017 MARKLOGIC CORPORATION. ALL RIGHTS RESERVED. A QUICK LOOK New Payments Platform Open

More information

with Advanced Protection

with Advanced  Protection with Advanced Email Protection OVERVIEW Today s sophisticated threats are changing. They re multiplying. They re morphing into new variants. And they re targeting people, not just technology. As organizations

More information

MATT JONES HOW WHATSAPP REDUCED SPAM WHILE LAUNCHING END-TO-END ENCRYPTION

MATT JONES HOW WHATSAPP REDUCED SPAM WHILE LAUNCHING END-TO-END ENCRYPTION MATT JONES HOW WHATSAPP REDUCED SPAM WHILE LAUNCHING END-TO-END ENCRYPTION MATT JONES HOW WHATSAPP REDUCED SPAM WHILE LAUNCHING END-TO-END ENCRYPTION MATT JONES HOW WHATSAPP REDUCED SPAM WHILE LAUNCHING

More information

Data Migration Platform

Data Migration Platform appmigrate TM Data Migration Platform QUALITY MANAGEMENT RECONCILIATION MAINTENANCE MIGRATION PROFILING COEXISTENCE CUTOVER PLANNING AND EXECUTION ? Problem Data migration done in the traditional way,

More information

CONSOLIDATING RISK MANAGEMENT AND REGULATORY COMPLIANCE APPLICATIONS USING A UNIFIED DATA PLATFORM

CONSOLIDATING RISK MANAGEMENT AND REGULATORY COMPLIANCE APPLICATIONS USING A UNIFIED DATA PLATFORM CONSOLIDATING RISK MANAGEMENT AND REGULATORY COMPLIANCE APPLICATIONS USING A UNIFIED PLATFORM Executive Summary Financial institutions have implemented and continue to implement many disparate applications

More information

Sales and Marketing Strategies That Work for Financial Services

Sales and Marketing Strategies That Work for Financial Services March 2008 Sales and Marketing Strategies That Work for Financial Services Julio Gomez Research Vice President www.financial-insights.com Agenda! Introduction to Financial Insights! Elements of a Winning

More information

MOBIUS + ARKIVY the enterprise solution for MIFID2 record keeping

MOBIUS + ARKIVY the enterprise solution for MIFID2 record keeping + Solution at a Glance IS A ROBUST AND SCALABLE ENTERPRISE CONTENT ARCHIVING AND MANAGEMENT SYSTEM. PAIRED WITH THE DIGITAL CONTENT GATEWAY, YOU GET A UNIFIED CONTENT ARCHIVING AND INFORMATION GOVERNANCE

More information

Comparative analysis of data mining methods for predicting credit default probabilities in a retail bank portfolio

Comparative analysis of data mining methods for predicting credit default probabilities in a retail bank portfolio Comparative analysis of data mining methods for predicting credit default probabilities in a retail bank portfolio Adela Ioana Tudor, Adela Bâra, Simona Vasilica Oprea Department of Economic Informatics

More information

Divide & Recombine (D&R) with Tessera: High Performance Computing for Data Analysis.

Divide & Recombine (D&R) with Tessera: High Performance Computing for Data Analysis. 1 Divide & Recombine (D&R) with Tessera: High Performance Computing for Data Analysis www.tessera.io Big Data? 2 A big term An associated concept new computational methods and systems are needed to make

More information

How to develop a website content evaluation plan

How to develop a website content evaluation plan How to develop a website content evaluation plan Realistically, content evaluation isn t a top priority for website owners. Finding the time to produce new content is hard enough. But we are missing a

More information

Bisnode View Why is it so damn hard to piece together information across the enterprise?

Bisnode View Why is it so damn hard to piece together information across the enterprise? Bisnode View Why is it so damn hard to piece together information across the enterprise? By Pär Österlund Why is it so damn hard to piece together information across the enterprise? By Pär Österlund Creating

More information

Informatica Data Quality Product Family

Informatica Data Quality Product Family Brochure Informatica Product Family Deliver the Right Capabilities at the Right Time to the Right Users Benefits Reduce risks by identifying, resolving, and preventing costly data problems Enhance IT productivity

More information

Regulation and Innovation: The Experience of Regulating Kenya s M-Pesa

Regulation and Innovation: The Experience of Regulating Kenya s M-Pesa Regulation and Innovation: The Experience of Regulating Kenya s M-Pesa Njuguna Ndung u 2018 Annual Conference of the Cambridge Centre for Alternative Finance (CCAF): Reimagining Alternative Finance: Global

More information

Managing Data Resources

Managing Data Resources Chapter 7 OBJECTIVES Describe basic file organization concepts and the problems of managing data resources in a traditional file environment Managing Data Resources Describe how a database management system

More information

How Real Time Are Your Analytics?

How Real Time Are Your Analytics? How Real Time Are Your Analytics? Min Xiao Solutions Architect, VoltDB Table of Contents Your Big Data Analytics.... 1 Turning Analytics into Real Time Decisions....2 Bridging the Gap...3 How VoltDB Helps....4

More information

Security analytics: From data to action Visual and analytical approaches to detecting modern adversaries

Security analytics: From data to action Visual and analytical approaches to detecting modern adversaries Security analytics: From data to action Visual and analytical approaches to detecting modern adversaries Chris Calvert, CISSP, CISM Director of Solutions Innovation Copyright 2013 Hewlett-Packard Development

More information

REGULATORY REPORTING FOR FINANCIAL SERVICES

REGULATORY REPORTING FOR FINANCIAL SERVICES REGULATORY REPORTING FOR FINANCIAL SERVICES Gordon Hughes, Global Sales Director, Intel Corporation Sinan Baskan, Solutions Director, Financial Services, MarkLogic Corporation Many regulators and regulations

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Store, Manage, and Discover Critical Business Information The pressure on organizations to protect and manage data has intensified with the recent growth in unstructured data and the reliance on email

More information

What s New in Dealmaker Winter 14?

What s New in Dealmaker Winter 14? What s New in Dealmaker Winter 14? Dealmaker Winter 14 contains significant improvements and enhancements to Smart Account Manager to provide a more powerful, easy-to-use account management solution. This

More information

Machine-Powered Learning for People-Centered Security

Machine-Powered Learning for People-Centered Security White paper Machine-Powered Learning for People-Centered Security Protecting Email with the Proofpoint Stateful Composite Scoring Service www.proofpoint.com INTRODUCTION: OUTGUNNED AND OVERWHELMED Today

More information

FIBO Operational Ontologies Briefing for the Object Management Group

FIBO Operational Ontologies Briefing for the Object Management Group FIBO Operational Ontologies Briefing for the Object Management Group March 20, 2013, Reston, VA David Newman Strategic Planning Manager, Senior Vice President, Enterprise Architecture Chair, Semantic Technology

More information

Disruptive Technologies Legal and Regulatory Aspects. 16 May 2017 Investment Summit - Swiss Gobal Enterprise

Disruptive Technologies Legal and Regulatory Aspects. 16 May 2017 Investment Summit - Swiss Gobal Enterprise Disruptive Technologies Legal and Regulatory Aspects 16 May 2017 Investment Summit - Swiss Gobal Enterprise Legal and Regulatory Framework in Switzerland Legal and regulatory Framework: no laws or provisions

More information

Village Software. Security Assessment Report

Village Software. Security Assessment Report Village Software Security Assessment Report Version 1.0 January 25, 2019 Prepared by Manuel Acevedo Helpful Village Security Assessment Report! 1 of! 11 Version 1.0 Table of Contents Executive Summary

More information

SentryWire Next generation packet capture and network security.

SentryWire Next generation packet capture and network security. Next generation packet capture and network security. 1 The data landscape 5 big cyber security trends for 2018 More data, more danger. Data proliferation brings many new opportunities but also many downsides:

More information

SentryWire Next generation packet capture and network security.

SentryWire Next generation packet capture and network security. Next generation packet capture and network security. 1 The data landscape More data, more danger. Data proliferation brings many new opportunities but also many downsides: more data breaches, more sophisticated

More information

VOLTDB + HP VERTICA. page

VOLTDB + HP VERTICA. page VOLTDB + HP VERTICA ARCHITECTURE FOR FAST AND BIG DATA ARCHITECTURE FOR FAST + BIG DATA FAST DATA Fast Serve Analytics BIG DATA BI Reporting Fast Operational Database Streaming Analytics Columnar Analytics

More information

EBOOK. Stopping Fraud. How Proofpoint Helps Protect Your Organisation from Impostors, Phishers and Other Non-Malware Threats.

EBOOK. Stopping  Fraud. How Proofpoint Helps Protect Your Organisation from Impostors, Phishers and Other Non-Malware Threats. EBOOK Stopping Email Fraud How Proofpoint Helps Protect Your Organisation from Impostors, Phishers and Other Non-Malware Threats www.proofpoint.com EBOOK Stopping Email Fraud 2 Today s email attacks have

More information

Visual Workflow Implementation Guide

Visual Workflow Implementation Guide Version 30.0: Spring 14 Visual Workflow Implementation Guide Note: Any unreleased services or features referenced in this or other press releases or public statements are not currently available and may

More information

Summer 2010 Research Project. Spam Filtering by Text Classification. Manoj Reddy Advisor: Dr. Behrang Mohit

Summer 2010 Research Project. Spam Filtering by Text Classification. Manoj Reddy Advisor: Dr. Behrang Mohit Summer 2010 Research Project Spam Filtering by Text Classification Manoj Reddy Advisor: Dr. Behrang Mohit NLP Field of Computer Science and Linguistics concerned with interactions between computers and

More information

Analytics Driven, Simple, Accurate and Actionable Cyber Security Solution CYBER ANALYTICS

Analytics Driven, Simple, Accurate and Actionable Cyber Security Solution CYBER ANALYTICS Analytics Driven, Simple, Accurate and Actionable Cyber Security Solution CYBER ANALYTICS Overview Cyberattacks are increasingly getting more frequent, more sophisticated and more widespread than ever

More information

NETACEA / WHITE PAPER DNS VS JAVASCRIPT

NETACEA / WHITE PAPER DNS VS JAVASCRIPT NETACEA / WHITE PAPER DNS VS JAVASCRIPT DNS VS JAVASCRIPT FOREWORD BACKGROUND ENTERPRISE GRADE VIRTUAL WAITING ROOM THE ALTERNATIVES SUMMARY ABOUT THE NETACEA VIRTUAL WAITING ROOM FOREWORD Visual Diagram

More information

Imperva Incapsula Website Security

Imperva Incapsula Website Security Imperva Incapsula Website Security DA T A SH E E T Application Security from the Cloud Imperva Incapsula cloud-based website security solution features the industry s leading WAF technology, as well as

More information

Role of search in retail banking. Analysis of current account usage and application in Italy APRIL JUNE 2011

Role of search in retail banking. Analysis of current account usage and application in Italy APRIL JUNE 2011 Role of search in retail banking Analysis of current account usage and application in Italy APRIL JUNE 2011 OBJECTIVES Map the role of search in current account usage and the application process in the

More information

Fast Innovation requires Fast IT

Fast Innovation requires Fast IT Fast Innovation requires Fast IT Cisco Data Virtualization Puneet Kumar Bhugra Business Solutions Manager 1 Challenge In Data, Big Data & Analytics Siloed, Multiple Sources Business Outcomes Business Opportunity:

More information

Wild Mushrooms Classification Edible or Poisonous

Wild Mushrooms Classification Edible or Poisonous Wild Mushrooms Classification Edible or Poisonous Yulin Shen ECE 539 Project Report Professor: Hu Yu Hen 2013 Fall ( I allow code to be released in the public domain) pg. 1 Contents Introduction. 3 Practicality

More information

Administration of Symantec Messaging Gateway 10.5 Study Guide

Administration of Symantec Messaging Gateway 10.5 Study Guide Administration of Symantec Messaging Gateway Study Guide The following tables list the Symantec SCS Certification exam objectives for the Administration of Symantec Messaging Gateway exam and how these

More information

Search Engine Optimization. Presentation Overview 1/7/2014. Internet Marketing Reality Check: Discover the Techniques Proven to Increase Leads

Search Engine Optimization. Presentation Overview 1/7/2014. Internet Marketing Reality Check: Discover the Techniques Proven to Increase Leads Internet Marketing Reality Check: Discover the Techniques Proven to Increase Leads FEBRUARY 6, 2014 10:00 11:00 AM Presenter: Chris Behan // Socius Marketing, Tampa, FL Presentation Overview Search Engine

More information

Microsoft Developer Day

Microsoft Developer Day Microsoft Developer Day Pradeep Menon Microsoft Developer Day Solutions Architect Agenda Microsoft Developer Day Traditional Business Intelligence Architecture Structured Sources Extract Transform Structurize

More information

Cisco s Appliance-based Content Security: IronPort and Web Security

Cisco s Appliance-based Content Security: IronPort  and Web Security Cisco s Appliance-based Content Security: IronPort E-mail and Web Security Hrvoje Dogan Consulting Systems Engineer, Security, Emerging Markets East 2010 Cisco and/or its affiliates. All rights reserved.

More information

SEO Toolkit Keyword and Competitor Research and On Page Optimisation

SEO Toolkit Keyword and Competitor Research and On Page Optimisation SEO Toolkit Keyword and Competitor Research and On Page Optimisation Marketing & Public Relations Department University of Newcastle February 2013 Version 1.0 SEO Toolkit Contents What is SEO? and the

More information

Introducing Microsoft SQL Server 2016 R Services. Julian Lee Advanced Analytics Lead Global Black Belt Asia Timezone

Introducing Microsoft SQL Server 2016 R Services. Julian Lee Advanced Analytics Lead Global Black Belt Asia Timezone Introducing Microsoft SQL Server 2016 R Services Julian Lee Advanced Analytics Lead Global Black Belt Asia Timezone SQL Server 2016: Everything built-in built-in built-in built-in built-in built-in $2,230

More information

1 GOOGLE NOW ALLOWS EDITING BUSINESS LISTINGS

1 GOOGLE NOW ALLOWS EDITING BUSINESS LISTINGS 1 GOOGLE NOW ALLOWS EDITING BUSINESS LISTINGS DIRECTLY FROM THE SEARCH RESULTS If you area verified business in Google My Business, you can now update your business info directly from Google search engine

More information

ISUPPLIER PORTAL USER MANUAL ADERP VERSION 1.0

ISUPPLIER PORTAL USER MANUAL ADERP VERSION 1.0 ISUPPLIER PORTAL USER MANUAL ADERP VERSION 1.0 Contents Contents... i Oracle isupplier Portal Overview...1 Recommended Browsers and Settings...2 Advanced Settings...2 Turn-off pop-up blocker or Allow pop-up

More information

NetBanking Manage your finances by clicking and not by walking to the branch, from any computer with internet access.

NetBanking Manage your finances by clicking and not by walking to the branch, from any computer with internet access. NetBanking Manage your finances by clicking and not by walking to the branch, from any computer with internet access. Preuzmite besplatnu aplikaciju sa: GET IT ON ili Available on the NetBanking Access

More information

Mining Web Data. Lijun Zhang

Mining Web Data. Lijun Zhang Mining Web Data Lijun Zhang zlj@nju.edu.cn http://cs.nju.edu.cn/zlj Outline Introduction Web Crawling and Resource Discovery Search Engine Indexing and Query Processing Ranking Algorithms Recommender Systems

More information

A BETTER PATH: Security Enlightened. Security s Shift to the Cloud

A BETTER PATH: Security Enlightened. Security s Shift to the Cloud A BETTER PATH: Security Enlightened Security s Shift to the Cloud Defense in Doubt Enterprises may be growing increasingly conscious of cybersecurity risks and investing millions of dollars in IT security,

More information

IMPLEMENTING SECURITY, PRIVACY, AND FAIR DATA USE PRINCIPLES

IMPLEMENTING SECURITY, PRIVACY, AND FAIR DATA USE PRINCIPLES IMPLEMENTING SECURITY, PRIVACY, AND FAIR DATA USE PRINCIPLES Introductions Agenda Overall data risk and benefit landscape / shifting risk and opportunity landscape and market expectations Looking at data

More information

Deep Learning & Accelerating the NLP Journey in the Unstructured World

Deep Learning & Accelerating the NLP Journey in the Unstructured World Deep Learning & Accelerating the NLP Journey in the Unstructured World Jenny Chong, Global Head of ecommunications Surveillance Shahzad Chohan, Global Head of Machine Intelligence and Accelerated Computing

More information

MOBILE DEFEND. Powering Robust Mobile Security Solutions

MOBILE DEFEND. Powering Robust Mobile Security Solutions MOBILE DEFEND Powering Robust Mobile Security Solutions Table of Contents Introduction Trustlook SECURE ai Mobile Defend Who Uses SECURE ai Mobile Defend? How it Works o Mobile Device Risk Score o Mobile

More information

Q-Balancer Range FAQ The Q-Balance LB Series General Sales FAQ

Q-Balancer Range FAQ The Q-Balance LB Series General Sales FAQ Q-Balancer Range FAQ The Q-Balance LB Series The Q-Balance Balance Series is designed for Small and medium enterprises (SMEs) to provide cost-effective solutions for link resilience and load balancing

More information

Data Warehouses Chapter 12. Class 10: Data Warehouses 1

Data Warehouses Chapter 12. Class 10: Data Warehouses 1 Data Warehouses Chapter 12 Class 10: Data Warehouses 1 OLTP vs OLAP Operational Database: a database designed to support the day today transactions of an organization Data Warehouse: historical data is

More information

Big Data: From Transactions, To Interactions

Big Data: From Transactions, To Interactions Big Data: From Transactions, To Interactions Martin Willcox [@willcoxmnk], Director Big Data Centre of Excellence (Teradata International) April 2016 1 Agenda Beyond transactions Riding the three waves:

More information

Data Quality Architecture and Options

Data Quality Architecture and Options Data Quality Architecture and Options Nita Khare Alliances & Technology Team - Solution Architect nita.khare@tcs.com * IBM IM Champion 2013 * December 3, 2013 0 Agenda Pain Areas / Challenges of DQ Solution

More information

BROWSER POLICY: DESCRIPTION OF SUPPORT 2 SUPPORTED BROWSERS 2 TIER 2 SUPPORTED BROWSERS 2 UNSUPPORTED BROWSERS 2

BROWSER POLICY: DESCRIPTION OF SUPPORT 2 SUPPORTED BROWSERS 2 TIER 2 SUPPORTED BROWSERS 2 UNSUPPORTED BROWSERS 2 Browser Policy June 2016 Table of Contents BROWSER POLICY: DESCRIPTION OF SUPPORT 2 SUPPORTED BROWSERS 2 TIER 1 SUPPORTED BROWSERS 2 TIER 2 SUPPORTED BROWSERS 2 UNSUPPORTED BROWSERS 2 SCOPE OF APPLICABILITY

More information

Using Internet as a Data Source for Official Statistics: a Comparative Analysis of Web Scraping Technologies

Using Internet as a Data Source for Official Statistics: a Comparative Analysis of Web Scraping Technologies NTTS 2015 Session 6A - Big data sources: web scraping and smart meters Using Internet as a Data Source for Official Statistics: a Comparative Analysis of Web Scraping Technologies Giulio Barcaroli(*) (barcarol@istat.it),

More information

Data safety for digital business. Veritas Backup Exec WHITE PAPER. One solution for hybrid, physical, and virtual environments.

Data safety for digital business. Veritas Backup Exec WHITE PAPER. One solution for hybrid, physical, and virtual environments. WHITE PAPER Data safety for digital business. One solution for hybrid, physical, and virtual environments. It s common knowledge that the cloud plays a critical role in helping organizations accomplish

More information

Fine-Grained Access Control

Fine-Grained Access Control Secure your sensitive information Fine-Grained Access Control 2 Serving financial institutions, federal agencies, pharmaceutical companies, payment service providers, insurers, broadcasting companies,

More information

Spam Detection ECE 539 Fall 2013 Ethan Grefe. For Public Use

Spam Detection ECE 539 Fall 2013 Ethan Grefe. For Public Use Email Detection ECE 539 Fall 2013 Ethan Grefe For Public Use Introduction email is sent out in large quantities every day. This results in email inboxes being filled with unwanted and inappropriate messages.

More information

Chapter 6 VIDEO CASES

Chapter 6 VIDEO CASES Chapter 6 Foundations of Business Intelligence: Databases and Information Management VIDEO CASES Case 1a: City of Dubuque Uses Cloud Computing and Sensors to Build a Smarter, Sustainable City Case 1b:

More information

Security and Compliance for Office 365

Security and Compliance for Office 365 Security and Compliance for Office 365 [Proofpoint has] given us our time back to focus on the really evil stuff. CISO, Global 500 Manufacturer Like millions of businesses around the world, you may be

More information

BigDataBench: a Benchmark Suite for Big Data Application

BigDataBench: a Benchmark Suite for Big Data Application BigDataBench: a Benchmark Suite for Big Data Application Wanling Gao Institute of Computing Technology, Chinese Academy of Sciences HVC tutorial in conjunction with The 19th IEEE International Symposium

More information

May 4, :00 3:00pm ET

May 4, :00 3:00pm ET The Plague of Spreadsheet Fraud and How to Address It May 4, 2010 2:00 3:00pm ET Technical Support# 1-800-xxx-xxxx Welcome Agenda Speaker Ralph Baxter, Founder and CEO, ClusterSeven Agenda 1. Why is spreadsheet

More information

The Changing DNS Market: A Technical Perspective

The Changing DNS Market: A Technical Perspective The Changing DNS Market: A Technical Perspective Johan Ihrén Netnod October 6, 2016 Netnod Customer Mtg, October 6, 2016, Changing DNS Market: A Tech Perspective, johani@netnod.se 1 / 15 Introduction When

More information

The European Single Electronic Format (ESEF) Requirements for reporting entities overview of the draft regulatory standard (RTS)

The European Single Electronic Format (ESEF) Requirements for reporting entities overview of the draft regulatory standard (RTS) ESMA REGULAR USE 19 November 2018 The European Single Electronic Format (ESEF) Requirements for reporting entities overview of the draft regulatory standard (RTS) Anna Sciortino ESEF Mandate for ESMA ESMA

More information

WIN BACK YOUR CUSTOMERS! A guide to re-engaging your inactive subscribers

WIN BACK YOUR CUSTOMERS! A guide to re-engaging your inactive  subscribers WIN BACK YOUR CUSTOMERS! A guide to re-engaging your inactive email subscribers Table of contents Win back your customers! 1 Is your brand capturing your disengaged and hard-to-reach customers? 1 Who are

More information

The Challenge of Managing

The Challenge of Managing The Challenge of Managing E-Mail Marc Pfeiffer, Deputy Director Division of Local Government Services League of Municipalities 2008 Annual Conference November 19, 2008 The E-Mail Rant There is too much

More information

Short review of the Coinmama.com. Registration on the Coinmama

Short review of the Coinmama.com. Registration on the Coinmama Short review of the Coinmama.com Coinmama is not an exchange in its' usual sense. Here you can only buy currency, so its' more like a currency exchanger. The platform doesn t have the built-in wallet and

More information

Introduction to Data Science Day 2

Introduction to Data Science Day 2 Introduction to Data Science Day 2 Data Matters Summer workshop series in data science Sponsored by the Odum Institute, RENCI, and NCDS Thomas M. Carsey carsey@unc.edu Examples of Data Science Google Flu

More information

SIEM Product Comparison

SIEM Product Comparison SIEM Product Comparison SIEM Technology Space SIEM market analysis of the last 3 years suggest: Market consolidation of SIEM players (25 vendors in 2011 to 16 vendors in 2013) Only products with technology

More information

RISK MANAGEMENT Education and Certification

RISK MANAGEMENT Education and Certification RISK MANAGEMENT Education and Certification aba.com/risked 1-800-BANKERS A new type of risk management professional is now in demand one that can demonstrate a thorough understanding of the complexities

More information

ADERP ISUPPLIER PORTAL USER MANUAL VERSION 1.2

ADERP ISUPPLIER PORTAL USER MANUAL VERSION 1.2 ADERP ISUPPLIER PORTAL USER MANUAL VERSION 1.2 Document Control Change Record 4 Date Author Version Change Reference 12-Dec-2016 DOF 1.0 08-Feb-2017 DOF 1.1 Updated with new URL links 23-Mar-2017 DOF 1.2

More information

COST PER LEAD ADVERTISING BY THE NUMBERS 10 Steps That Will Transform Your Acquisition Process

COST PER LEAD ADVERTISING BY THE NUMBERS 10 Steps That Will Transform Your Acquisition Process COST PER LEAD ADVERTISING BY THE NUMBERS 10 Steps That Will Transform Your Acquisition Process Whitepaper by: Steve Rafferty - Founder/CEO ActiveProspect Running a Cost Per Lead advertising campaign seems

More information

Contractual Approaches to Data Protection in Clinical Research Projects

Contractual Approaches to Data Protection in Clinical Research Projects Contractual Approaches to Data Protection in Clinical Research Projects EICAR, 24th Annual Conference Nürnberg, October 2016 Dr. jur. Marc Stauch Institute for Legal Informatics Leibniz Universität Hannover

More information

How a Metadata Repository enables dynamism and automation in SDTM-like dataset generation

How a Metadata Repository enables dynamism and automation in SDTM-like dataset generation Paper DH05 How a Metadata Repository enables dynamism and automation in SDTM-like dataset generation Judith Goud, Akana, Bennekom, The Netherlands Priya Shetty, Intelent, Princeton, USA ABSTRACT The traditional

More information

Identifying Important Communications

Identifying Important Communications Identifying Important Communications Aaron Jaffey ajaffey@stanford.edu Akifumi Kobashi akobashi@stanford.edu Abstract As we move towards a society increasingly dependent on electronic communication, our

More information

CS 188: Artificial Intelligence Fall 2011

CS 188: Artificial Intelligence Fall 2011 CS 188: Artificial Intelligence Fall 2011 Lecture 21: ML: Naïve Bayes 11/10/2011 Dan Klein UC Berkeley Example: Spam Filter Input: email Output: spam/ham Setup: Get a large collection of example emails,

More information

Buying Names: Append, List Rental + Co-Registration Realities

Buying  Names: Append, List Rental + Co-Registration Realities Buying Email Names: Append, List Rental + Co-Registration Realities More data on this topic available from:: Patricia Maguire Director of Marketing Entertainment Publications Tuesday, March 6, 2007 Entertainment

More information