talk-data.com talk-data.com

Topic

data

5765

tagged

Activity Trend

3 peak/qtr
2020-Q1 2026-Q1

Activities

5765 activities · Newest first

The Global Impact of Open Data

Open data has spurred economic innovation, social transformation, and fresh forms of political and government accountability in recent years, but few people understand how open data works. This comprehensive report, developed with support from Omidyar Network, presents detailed case studies of open data projects throughout the world, along with in-depth analysis of what works and what doesn’t. Authors Andrew Young and Stefaan Verhulst, both with The GovLab at New York University, explain how these projects have made governments more accountable and efficient, helped policymakers find solutions to previously intractable public problems, created new economic opportunities, and empowered citizens through new forms of social mobilization. This report includes: Recommendations and implementation steps for policymakers, entrepreneurs, and activists looking to leverage open data Key challenges, such as resource shortages and inadequate privacy or security protections Four conditions that enable open data to work—including organizational partnerships and collaborations Case studies of open data projects for improving government in Brazil, Sweden, Slovakia, and other countries Projects for empowering citizens in Tanzania, Kenya, Mexico, and Uruguay New business opportunities enabled by open weather, geo-location, and market research data Public problem-solving efforts built on open data for Ebola in Sierra Leone, dengue fever in Singapore, and earthquakes in New Zealand Andrew Young (@_AndrewYoung) is the Associate Director of Research at The GovLab (www.thegovlab.org), where he leads a number of grant-funded research efforts focusing on the impact of technology on public institutions. He is also the Network Coordinator of the GovLab-chaired MacArthur Foundation Research Network on Opening Governance. Stefaan G. Verhulst (@sverhulst) is the Co-Founder and Chief R&D Officer of The GovLab at New York University’s Tandon School of Engineering, responsible for experimentation and evidence gathering on how to transform governance by using advances in science and technology. He was Chief of Research for the Markle Foundation, where he continues to serve as Senior Advisor.

Mobile Security and Privacy

Mobile Security and Privacy: Advances, Challenges and Future Research Directions provides the first truly holistic view of leading edge mobile security research from Dr. Man Ho Au and Dr. Raymond Choo—leading researchers in mobile security. Mobile devices and apps have become part of everyday life in both developed and developing countries. As with most evolving technologies, mobile devices and mobile apps can be used for criminal exploitation. Along with the increased use of mobile devices and apps to access and store sensitive, personally identifiable information (PII) has come an increasing need for the community to have a better understanding of the associated security and privacy risks. Drawing upon the expertise of world-renowned researchers and experts, this volume comprehensively discusses a range of mobile security and privacy topics from research, applied, and international perspectives, while aligning technical security implementations with the most recent developments in government, legal, and international environments. The book does not focus on vendor-specific solutions, instead providing a complete presentation of forward-looking research in all areas of mobile security. The book will enable practitioners to learn about upcoming trends, scientists to share new directions in research, and government and industry decision-makers to prepare for major strategic decisions regarding implementation of mobile technology security and privacy. In addition to the state-of-the-art research advances, this book also discusses prospective future research topics and open challenges. Presents the most current and leading edge research on mobile security and privacy, featuring a panel of top experts in the field Provides a strategic and international overview of the security issues surrounding mobile technologies Covers key technical topics and provides readers with a complete understanding of the most current research findings along with future research directions and challenges Enables practitioners to learn about upcoming trends, scientists to share new directions in research, and government and industry decision-makers to prepare for major strategic decisions regarding the implementation of mobile technology security and privacy initiatives

The Analytical Marketer

How to lead the change Analytics are driving big changes, not only in what marketing departments do but in how they are organized, staffed, led, and run. Leaders are grappling with issues that range from building an analytically driven marketing organization and determining the kinds of structure and talent that are needed to leading interactions with IT, finance, and sales and creating a unified view of the customer. The Analytical Marketer provides critical insight into the changing marketing organization—digital, agile, and analytical—and the tools for reinventing it. Written by the head of global marketing for SAS, The Analytical Marketer is based on the author’s firsthand experience of transforming a marketing organization from “art” to “art and science.” Challenged and inspired by their company’s own analytics products, the SAS marketing team was forced to rethink itself in order to take advantage of the new capabilities that those tools offer the modern marketer. Key marketers and managers at SAS tell their stories alongside the author’s candid lessons learned as she led the marketing organization’s transformation. With additional examples from other leading companies, this book is a practical guide and set of best practices for creating a new marketing culture that thrives on and adds value through data and analytics.

JMP 13 Basic Analysis

JMP 13 Basic Analysis covers the initial types of analyses that you often perform in JMP, such as univariate, bivariate, and oneway analyses. Creating tables of summary statistics with the Tabulate platform is included along with approximating sampling distributions using bootstrapping. Find information about how to clean up your data before performing analyses. Read about performing powerful parametric and nonparametric simulation capability using Simulation.

JMP 13 Consumer Research

JMP 13 Consumer Research focuses on analyses that help users observe and predict subject's behavior, particularly those in the market research field. The Uplift platform predicts consumer behavior based on shifts in marketing efforts. Learn how to tabulate and summarize categorical responses with the Categorical platform. Factor Analysis rotates principal components to help identify which directions have the most variation among the variables. The book also covers Item Analysis, a method for identifying latent traits that might affect an individual's choices. And read about the Choice platform, which market researchers use to estimate probability in consumer spending.

JMP 13 Design of Experiments Guide

The JMP 13 Design of Experiments Guide covers classic DOE designs (for example, full factorial, response surface, and mixture designs). Read about more flexible custom designs, which you generate to fit your particular experimental situation. And discover JMP’s definitive screening designs, an efficient way to identify important factor interactions using fewer runs than required by traditional designs. The book also provides guidance on determining an appropriate sample size for your study.

JMP 13 Essential Graphing

Start with JMP 13 Essential Graphing to find the ideal graph for your data. The book begins with Graph Builder, a quick way to create graphs in a drag-and-drop window. Line charts, ellipses, box plots, and maps are just a few of the graphs available in Graph Builder. Find information about creating other types of plots: bubble plots, scatterplots, parallel plots, and more.

JMP 13 Multivariate Methods

JMP 13 Multivariate Methods describes techniques for analyzing several variables simultaneously. The book covers descriptive measures, such as correlations. It also describes methods that give insight into the structure of the multivariate data, such as clustering, latent class analysis, principal components, discriminant analysis, and partial least squares.

JMP 13 Predictive and Specialized Modeling

JMP 13 Predictive and Specialized Modeling provides details about modeling techniques such as partitioning, neural networks, nonlinear regression, and time series analysis. Topics include the Gaussian platform, which is useful in analyzing computer simulation experiments. The book also covers the Response Screening platform, which is useful in testing the effect of a predictor when you have many responses.

JMP 13 Quality and Process Methods

JMP 13 Quality and Process Methods describes tools for evaluating and improving processes. The book begins by discussing creating control charts, which let you visualize process measurements over time, quantify common cause variation, and identify special cause variation. Details about estimating your process capability based on measurement systems analysis studies are included. Lastly, the book discusses Pareto plots and cause-and-effect diagrams to identify root causes of variability.

JMP 13 Reliability and Survival Methods

JMP 13 Reliability and Survival Methods provides details about evaluating and improving reliability in a product or system and analyzing survival data for people and products. The book explains how to fit the best distribution to your time-to-event data or analyze destruction data. A few other topics include analyzing competing causes of failure, modeling reliability as improvements are made over time, and analyzing recurring events.

SAP Flexible Real Estate Management

Learn SAP's real estate management integrated solution to effectively manage the real estate portfolio at your organization. You will configure SAP REFX for business scenarios covering solutions from master data to financial posting and reporting. You will address all phases of the real estate life cycle, including real estate acquisition or disposal, portfolio management, and property and technical management. To succeed in today's global and highly competitive economy, asset optimization in real estate management has become a strategic task. Organizations need to ensure insight into their property portfolio to make informed decisions, improve portfolio performance, and reduce compliance costs. Sophisticated solutions are needed to manage changing consumer demands and the global workforce as well as information management, compliance adherence, and leasing and property management. SAP Flexible Real Estate Management by Daithankar is a full-featured book that integrates REFX with Controlling (CO), Plant and Maintenance (PM), CRM, SAP AA (ssset accounting), and SAP PS (project systems). You will refer to real-world, practical examples to illustrate configuration concepts and processes, and learn in an interactive, hands-on way through the use of screenshots, menu paths, and transaction codes throughout the book. What You Will Learn: Understand the SAP REFX Solutions landscape and industry best practices for SAP REFX implementation Configure SAP REFX Integrate REFX with other modules Understand how processes are supported by SAP REFX Who This Book Is For: CIOs/CEOs of organizations with real estate portfolios, SAP REFX purchasing decision makers, SAP REFX pre-sales teams, SAP REFX implementation/AMS consultants

Data Hiding Techniques in Windows OS

"This unique book delves down into the capabilities of hiding and obscuring data object within the Windows Operating System. However, one of the most noticeable and credible features of this publication is, it takes the reader from the very basics and background of data hiding techniques, and run’s on the reading-road to arrive at some of the more complex methodologies employed for concealing data object from the human eye and/or the investigation. As a practitioner in the Digital Age, I can see this book siting on the shelves of Cyber Security Professionals, and those working in the world of Digital Forensics – it is a recommended read, and is in my opinion a very valuable asset to those who are interested in the landscape of unknown unknowns. This is a book which may well help to discover more about that which is not in immediate view of the onlooker, and open up the mind to expand its imagination beyond its accepted limitations of known knowns." - John Walker, CSIRT/SOC/Cyber Threat Intelligence Specialist Featured in Digital Forensics Magazine, February 2017 In the digital world, the need to protect online communications increase as the technology behind it evolves. There are many techniques currently available to encrypt and secure our communication channels. Data hiding techniques can take data confidentiality to a new level as we can hide our secret messages in ordinary, honest-looking data files. Steganography is the science of hiding data. It has several categorizations, and each type has its own techniques in hiding. Steganography has played a vital role in secret communication during wars since the dawn of history. In recent days, few computer users successfully manage to exploit their Windows® machine to conceal their private data. Businesses also have deep concerns about misusing data hiding techniques. Many employers are amazed at how easily their valuable information can get out of their company walls. In many legal cases a disgruntled employee would successfully steal company private data despite all security measures implemented using simple digital hiding techniques. Human right activists who live in countries controlled by oppressive regimes need ways to smuggle their online communications without attracting surveillance monitoring systems, continuously scan in/out internet traffic for interesting keywords and other artifacts. The same applies to journalists and whistleblowers all over the world. Computer forensic investigators, law enforcements officers, intelligence services and IT security professionals need a guide to tell them where criminals can conceal their data in Windows® OS & multimedia files and how they can discover concealed data quickly and retrieve it in a forensic way. Data Hiding Techniques in Windows OS is a response to all these concerns. Data hiding topics are usually approached in most books using an academic method, with long math equations about how each hiding technique algorithm works behind the scene, and are usually targeted at people who work in the academic arenas. This book teaches professionals and end users alike how they can hide their data and discover the hidden ones using a variety of ways under the most commonly used operating system on earth, Windows®.

IBM DS8880 Architecture and Implementation (Release 8.1)

This edition applies to the DS8880 with DS8000 Release 8.1 Modification1 code. This IBM® Redbooks® publication describes the concepts, architecture, and implementation of the IBM DS8880 family. The book provides reference information to assist readers who need to plan for, install, and configure the DS8880 systems. The IBM DS8000® family is a high-performance, high-capacity, highly secure, and resilient series of disk storage systems. The DS8880 family is the latest and most advanced of the DS8000 offerings to date. The high availability, multiplatform support, including IBM z Systems™, and simplified management tools help provide a cost-effective path to an on-demand world. The IBM DS8880 family includes the new high-performance all-flash model (DS8888 Model 982, with its associated DS8888 Expansion Unit Model 98F), and two high-performance hybrid models (DS8884 Model 980 with its associated DS8884 Expansion Unit Model 98B, and DS8886 Model 981 with its associated DS8886 Expansion Unit Model 98E). Two powerful IBM POWER8® processor-based servers manage the cache to streamline disk I/Os, maximizing performance and throughput. These capabilities are further enhanced with the availability of high-performance flash enclosures (HPFEs). A major change with the introduction of the DS8880 is the reduction of the footprint to a 19-inch rack. Like its predecessors, the DS8880 supports advanced disaster recovery (DR) solutions, business continuity solutions, and thin provisioning. All disk drives in the DS8880 storage system include the Full Disk Encryption (FDE) feature. The DS8880 can automatically optimize the use of each storage tier, particularly flash drives and flash cards, through the IBM Easy Tier® feature. The DS8880 now includes the Copy Services Manager code and allows for easier integration in a Lightweight Directory Access Protocol (LDAP) infrastructure.