Data-applied: Technology Insights

371 views
345 views

Published on

Data-applied: Technology Insights

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
371
On SlideShare
0
From Embeds
0
Number of Embeds
10
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Data-applied: Technology Insights

  1. 1. 4<br /> Data-Applied.com: Technology Insight<br />
  2. 2. Tools: Data<br />Import data: <br />CSV File, Excel File, SalesForce.com, Dynamics CRM<br />
  3. 3. Tools: Data<br />Export Data:<br />CSV File<br />
  4. 4. Tools<br />Super Pivots: An XML based API allowing multiple levels of grouping, binning and aggregation.<br />Tree Maps: An aspect-ratio optimization recursive layout algorithm. <br />
  5. 5. Tools<br />Forecasts: An optimized formulation of a specialized neural network with monte-carlo simulation<br />Monte Carlo methods are a class of computational algorithms that rely on repeated random sampling to compute their results. Monte Carlo methods are often used in simulating physical and mathematical systems.<br />
  6. 6. Tools<br />Correlations: A parallel formulation of Pearson product-moment correlation coefficient algorithm<br /> Pearson product-moment correlation coefficient is a measure of the correlation between two variables X and Y, giving a value between +1 and −1 inclusive. It is widely used in the sciences as a measure of the strength of linear dependence between two variables.<br />
  7. 7. Tools<br />Outliers: An optimized formulation of the Bay and Schwabacher’s outlier detection algorithm<br />Associations:An optimized formulation of the apriori-all association rule algorithm.<br />
  8. 8. Tools<br />Decisions:A parallel formulation of an algorithm based on information gain (discrete decision trees). A formulation of the Kruskal-Wallis statistic test (numeric trees)<br />The Kruskal–Wallis one-way analysis of variance by ranks (named after William Kruskal and W. Allen Wallis) is a non-parametric method for testing equality of population medians among groups. It is identical to a one-way analysis of variance with the data replaced by their ranks<br />
  9. 9. Tools<br />Clusters: An optimized formulation for the BIRCH clustering algorithm. <br />BIRCH (balanced iterative reducing and clustering using hierarchies) is an unsupervised data mining algorithm used to perform hierarchical clustering over particularly large data-sets. An advantage of Birch is its ability to incrementally and dynamically cluster incoming, multi-dimensional metric data points in an attempt to produce the best quality clustering for a given set of resources (memory and time constraints)<br />
  10. 10. Tools<br />Similarity: A parallel formulation of a Kohonen artificial neural network. <br />Kohonen self-organizing network is a self-organizing map (SOM) invented by Teuvo Kohonen performs a form of unsupervised learning. A set of artificial neurons learn to map points in an input space to coordinates in an output space. The input space can have different dimensions and topology from the output space, and the SOM will attempt to preserve these.<br />
  11. 11. Architecture: System<br />Web Client<br />Runs within a browser, uses XML requests, visualization capabilities using Microsoft Silverlight, local data caching and compression.<br />Web Service<br />secure XML-based Web API, accept and process XML requests<br />
  12. 12. Architecture: System<br />Back-End<br />Distributed computing, manage task priorities, detect abandoned tasks, restart failed tasks, terminate long-running tasks, and synchronize task execution between nodes<br />Database<br />SQL-based storage system, <br />
  13. 13. Architecture: System<br />
  14. 14. Architecture: System Data<br />Users, Workspaces, Rights<br />visual CAPTCHA challenge, email confirmation, workspace sharing. <br />Databases, Tables, Fields<br />Master-slave configuration in databases, <br />
  15. 15. Architecture: System Data<br />Nodes, Jobs, Tasks<br />Keys, Licenses, Logs<br />Comments, Downloads, Images, Settings<br />
  16. 16. Architecture: System Security<br />Right Enforcement<br />License Restrictions<br />Cryptographic Validations<br />

×