All Posts
Europol, the law enforcement agency of the European Union, in its recently released 2014 Internet Organized Crime Threat Assessment (iOCTA), cited a report by U.S. security firm IID that predicts that the first “online murder” will occur by year end, based on the number of computer security system flaws discovered
Welcome to the blog “Operations Research with SAS: Optimize, Simulate, Understand.” For those of you without an operations research background, a brief explanation: operations research (OR) is the study of the operations of systems, with a focus on making them function more efficiently and more effectively. The overall goal of
The Chicago weather cooperated for MWSUG 2014 with nice crisp fall temperatures, clear skies and beautiful sunrises over the lake. Aside from the weather, here are my five favorite memories of MWSUG 2014: 1. Location-location-location. The location and venue were fabulous! Not only were we along the Chicago River with a beautiful
Getting consistent group colors across different data sets for a graph is a common topic of interest. Recently a user wrote in to ask how to ensure that specific groups "values" for a bar chart get specific colors. The group values may arrive in different order, or some may
As this article on the mythical data scientist describes, many people call this special kind of analytical talent "unicorns," because the breed can be so hard to find. In order to close the analytical talent gap that McKinsey Global Institute and others have predicted, and many of you experience today, SAS launched
Beginning with the first maintenance of SAS 9.4, you have the ability to define your own symbol markers using the SYMBOLCHAR and SYMBOLIMAGE statements. With these statements you can select a Unicode value or you can select an image file that exists on the local file system—making the possibilities for
How many times a day do you search (or “Google”) how to do something with a product, the best ways to perform “X,” or for help with a problem? Chances are it’s a lot, and when you do, you likely land on a forum where your peers have posted answers
I always recommend looking at data in several different ways, to get a more complete picture of what's really going on - such is the case with the member 'ratings' on dating websites. Let's take a look at some data from a different angle... In a recent blog post, I
In 2011, the passage of the federal Justice Reinvestment Act (JRA) brought significant changes to North Carolina’s criminal sentencing practices, particularly in relation to the supervision of offenders released into the community on probation or post-release supervision. A recent New York Times article highlighted how NC has used the implementation
The Mid-West SAS Users' Group conference in Chicago was a great success, with over 400 attendees and great weather. The conference hotel was in downtown with nice view of the river and a stroll down "Magnificent Mile". The city does a great job with the flower beds down Michigan Ave., along
In this post we dig deeper into the fourth recommended practice for securing the SAS-Hadoop environment through Kerberos authentication: When configuring SAS and Hadoop jointly in a high-performance environment, ensure that all SAS servers are recognized by Kerberos. Before explaining the complex steps in connecting to secure Hadoop within a
I recently caught up with Dr. Tom Davenport, analytics thought-leader and author of Big Data @ Work, in Dublin, where we talked about big data, the Internet of Things and Hadoop. I'll be sharing the conversation here with you in two parts. You'll find part one below, and you can check
Like many strong relationships, Yoga and I did not hit it off right away. I was in college enjoying strenuous exercise. I’d run, take step, and get in some abs all in one day. I was cardio crazy. There was nothing better than heading out on the trails for a
Do you have too many models to build, too many to manage, too few analytic resources or too much data? A Model Factory may be your answer. The mindset of analytics is changing. This represents the transformation from a “craftsman” dominated culture in which multiple weeks were spent cycling through
Want to know how much the Target and Home Depot cyberattacks cost those companies? According to Forbes, the price tag for data breach expenses ran $146 million for Target and is estimated at $62 million for Home Depot. Even financial institutions, once thought better protected, are reporting massive security breaches,